Security Engineer - Threat & Vulnerability
Cyber security analyst job in Saint Louis, MO
We are seeking a Security Engineer II to support threat and vulnerability management across on-premises and cloud environments. This role focuses on identifying security risks, assessing vulnerabilities, ensuring secure configurations, and driving remediation efforts to improve overall security posture.
Key Responsibilities:
Identify, assess, and remediate vulnerabilities across on-prem and cloud environments (AWS/Azure/GCP)
Monitor and analyze threat intelligence using frameworks such as MITRE ATT&CK, OWASP, and CVSS
Utilize vulnerability and cloud security tools (Tenable, Qualys, Rapid7, Prisma Cloud, Defender for Cloud, Wiz)
Perform secure configuration audits using CIS Benchmarks, NIST, and STIGs
Collaborate with IT, Cloud, and DevOps teams to implement remediation
Automate security processes using scripting (Python, PowerShell, Bash)
Track remediation progress and communicate risks to technical and non-technical stakeholders
Required Skills & Experience:
4+ years of experience in Cybersecurity or IT with exposure to vulnerability or cloud security
Hands-on experience with vulnerability management tools
Strong understanding of security controls, risk management, and compliance
Experience with scripting/automation and API integrations
Familiarity with SIEM, logging, monitoring, and ticketing systems
CI Cyber Threat Analyst IV
Cyber security analyst job in Saint Louis, MO
Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements:
Duties:
Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable):
Threat data collected and reported by NGA Technical CI team and network security personnel.
Intelligence reported by the Intelligence Community.
Fusion of all source threat analysis derived from multiple intelligence sources (INTs).
Imagery when available.
Information that can be used to inform security decisions.
Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
Compilation of data collected and reported in weekly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decision makers.
Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
Compilation of data collected and reported in weekly and monthly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decisions.
Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include:
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
Raw and finished Intelligence reported by Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA.
Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires:
Coordination with teammates and stakeholders to ensure accuracy of reported information.
Cross referencing local information reporting with Intelligence Community reporting.
Clear and concise writing to briefly convey threat.
Responsiveness to Intelligence Community priority collections requirements.
Timeliness.
Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross).
Provide Technical CI advise and expertise in support of CI inquiries, operations and issues.
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats).
Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
Skills and Experience Required:
Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level.
Desired:
Be a credentialed graduate of an accredited federal or DoD CI training academy.
Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov.
Experience translating Government vision into understandable and achievable measures.
Experience in using supervisory skills to coach teammates to achieve objectives.
Monitor and track progress toward achievable measures.
Information Assurance Principal Analyst (Program Lead) - JOEPS
Cyber security analyst job in Scott Air Force Base, IL
The Information Assurance Principal Analyst/Program Lead will provide leadership, oversight, and operational management for the Joint Operation Planning and Execution System (JOPES) and the Transportation Visualizer (TransViz) Functional Management Support contract. This individual will act as the primary liaison between TeAM, government officials, and all contract stakeholders, ensuring the coordination, integration, and execution of all program activities in accordance with DoD and USTRANSCOM expectations. The Information Assurance Principal Analyst/Program Lead will be responsible for meeting all performance, schedule, and quality objectives as outlined in the contract's scope.
Mission Objectives - The primary objective of this project is to support the operational effectiveness and mission readiness of the JOPES and TransViz platforms at Scott Air Force Base. As a critical contract team member, the Information Assurance Principal Analyst/Program Lead ensures seamless functional management, stakeholder coordination, and compliance with all contractual and security requirements while facilitating process improvements and the timely delivery of program services. This position supports USTRANSCOM and associated DoD agencies by optimizing system capabilities and user experience in support of national defense objectives.
Position Responsibility Summary
Serve as the principal point of contact (POC) for all programmatic, technical, and contractual matters, representing TeAM in communications with government officials and stakeholders.
Serve as a Liaison for all meetings & events, coordinating & scheduling all course training for teams, and attending reviews of the program.
Lead, supervise, and coordinate activities of the project team-overseeing System Administrators and the Database Administrator-to fulfill contract objectives.
Ensure timely and accurate reporting of program performance, deliverables, metrics, and compliance with DoD security, safety, and operational requirements.
Manage risks, mitigate issues, and implement corrective actions to maintain project schedule and instill quality control.
Oversee and ensure workforce compliance with all mandatory security, safety, and DoD-mandated annual training, including but not limited to OPSEC, Antiterrorism Level I, CUI, and Emergency Operations.
Develop and implement process improvements, leveraging industry best practices (e.g., ITIL) to enhance JOPES/TransViz functionality and user satisfaction.
Foster a culture of open communication and collaboration across stakeholders, promoting continuous improvement in program delivery.
Ensure all support activities are conducted on-site in compliance with established guidelines and within the designated geographic radius.
Information Security Specialist
Cyber security analyst job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
Easy ApplyCyber Resilience Specialist
Cyber security analyst job in Saint Louis, MO
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery.
What You'll Do
* Lead and facilitate Business Impact Assessments (BIAs) across business units
* Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems
* Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience
* Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles
* Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews
* Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations
* Support program governance, metrics, training, and awareness efforts
What You'll Bring
* 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting
* Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning
* Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms)
* Experience supporting risk assessments and regulatory audits
* Excellent facilitation and stakeholder management skills
* Strong writing skills to produce clear, client-ready plans and reports
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
#LI-MS12
Easy ApplyCyber Security Operations Specialist II
Cyber security analyst job in Saint Louis, MO
WCBinc is looking for a Cyber Security Operations Specialist II to operate and manage all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation. This role will develop and execute security policies, plans, and procedures and ensure security measures of the network.
What You'll Get to Do:
Provide cyber threat intelligence services for the collection, fusion, analysis, creation, and distribution of threat intelligence from government entities, commercial feeds, open sources, and other partners to obtain situational awareness of the threat environment.
Provide cyber threat intelligence services on an expanded 12x5 service support level during core hours and on-call support with two-hour response time during non-core hours.
Cyber threat intelligence services shall develop and disseminate reports and tippers to internal and external stakeholders based on events, alerts, and incidents on customer systems and networks.
Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems.
Designs and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.
Receive tickets from other Cybersecurity Operations Services sub-services and conduct detailed analysis to validate any event/alert/incident
Categorize, prioritize, investigate, and assess cybersecurity events/alerts/incidents to identify the extent and scope of the event/alert/incident and what impact there is on the operation or systems
Update and forward tickets to other Cybersecurity Operations Services to customer as needed
Collect, aggregate, and analyze artifacts and evidence from all available tools, knowledge sources, and data artifacts to determine and document the who, what, when, where, why and how of an intrusion, its extent, how to limit damage, and how to recover
Submit custom signatures and tuning requests as needed to Network Security Services, Endpoint Security Services, and Cybersecurity Data Analysis Services
Assists the C-IRT by assessing ongoing incident activity to predict adversary responses and locations of compromise
Documents tickets and analysis to a level of detail sufficient to reconstruct the analyst's analysis, to include but not limited to the steps taken, timelines, and data required to justify the analyst's assessment
Provide custom metrics reports including incident category types, tools used, number of indicators, time opened at each step, trending statistics, service availability, system utilization, etc.
Provide input to the daily CSOC Significant Activity, Operations, and the weekly CSOC Status Report
Advanced Cybersecurity Analytics, coordinate with Network Security Services, Endpoint Security Services, and Cybersecurity Data Analysis Services to develop or tune rules/signatures/scripts
Data Security Analyst
Cyber security analyst job in Saint Louis, MO
Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning.
What You'll Be Doing
Monitor security service performance and availability: Provide recommendations on security equipment, software, and services
On-going investigation: Inspect information security alarms and events to determine vulnerability and impact
Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk
Participate in architecture reviews: Ensure adherence to information security architecture
Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents
Design and deliver programs: Create education and training programs on information security and privacy matters
The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* *************************
"Delivering quality solutions through quality people"
Easy ApplySenior Information Security Analyst (Job ID: 3705)
Cyber security analyst job in Scott Air Force Base, IL
Senior Information Security Analyst (Job ID: 3705) Location: Scott AFB, IL Senior Information Security Analyst is contingent upon contract funding Purpose: * Valkyrie Enterprises has need for a Senior Information Security Analyst who will provide network and I.T. design support at Scott Air-Force Base, IL
Job Description:
* Oversees overall network security. Ensures protection from viruses or other security threats, corrupt data and maintain system backups.
* Communicates hardware/software problems with outside support personnel, i.e.: vendors and technical support representatives.
* Develop and implement security protocols to protect network infrastructure and data integrity.
* Monitor network traffic for unusual activity and respond to potential threats in real-time.
* Conduct vulnerability assessments and penetration testing to identify weaknesses in systems.
* Collaborate with IT teams to design secure cloud infrastructure solutions.
* Maintain and manage security tools such as PRTG, Juniper, and other monitoring systems.
* Document security incidents and create reports for management review.
* Stays up to date with the latest cybersecurity trends, threats, and technology advancements.
* Assists in the development of disaster recovery plans and business continuity strategies.
Qualifications
* Must have a minimum of 10 years' experience in Cyber Security.
* Must have demonstrated experience as a Cybersecurity Engineer or in a similar role.
* Must have extensive knowledge of security protocols, cryptography, and security frameworks.
* Must have significant experience in managing network IDS/IPS systems, including FireEye NX and Cisco FIREPOWER appliances.
* Must possess advanced understanding of Microsoft OS & applications.
* Must have extensive experience with hardware/software troubleshooting and analysis.
* Must demonstrate initiative, the ability to manage multiple projects, meet deadlines, and determine priorities in a fast-paced environment.
* Must have excellent people skills; communication and familiarity with a customer support environment are crucial.
* Must have IAT Level II Certification
Desired Qualifications
* C&A, RMF Certifications are preferred.
Security Requirements
* TS/SCI security clearance
Travel Requirements:
* Occasional travel- less than 10%
* If position requires travel by domestic flight or access to secure federal facilities/military bases, candidate must be able to obtain (by start of position) and maintain appropriate identification credentials, such as REAL ID. (More information regarding REAL ID can be found: *************************** )
Physical Requirements:
* Remaining in a stationary position, often standing, or sitting for prolonged periods.
* Required to use hands to finger, handle, or feel; reach with hands and arms.
Valkyrie strictly adheres to a policy of equal employment opportunity. This policy is based on Valkyrie's commitment to hire and retain qualified employees consistent with position requirements; and to seek, employ, promote and treat all employees and applicants for employment without regard to race, color, religious creed, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental disability, age, military status or protected veteran status, marital status, registered domestic partner or civil union status, gender (including sex stereotyping and gender identity or expression), medical condition, genetic information or sexual orientation or other protected characteristics.
Additionally, Valkyrie Enterprises provides a variety of benefits to eligible employees to support your best health, wellness, and future, to include medical/dental/vision options, company paid life and disability insurances, 401k with match, education reimbursement, as well as company paid holidays and paid time off (PTO).
Pay Range: $34 - $44 per hour
Information Security Operations Analyst II
Cyber security analyst job in OFallon, MO
**Our Purpose** _Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential._
**Title and Summary**
Information Security Operations Analyst II
Overview
The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff.
The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset.
Role
In this Security Awareness position, you will:
- Liaise between the Security Awareness team and all others at Mastercard.
- Build new content and design awareness events to positively impact the security behaviors of Mastercard staff.
- Partner with external providers to deliver effectives solutions with quality and integrity.
- Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team.
All About You
The ideal candidate for this position should:
- Possess advanced knowledge in security awareness concepts and principals.
- Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors.
- Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard.
- Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings.
- Lead vendor relationships with those providers of contract solutions for the Security Awareness program.
- A professional certification in Security Awareness is not required but highly encouraged.
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
Abide by Mastercard's security policies and practices;
- Ensure the confidentiality and integrity of the information being accessed.
- Report any suspected information security violation or breach.
- Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
**Corporate Security Responsibility**
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
+ Abide by Mastercard's security policies and practices;
+ Ensure the confidentiality and integrity of the information being accessed;
+ Report any suspected information security violation or breach, and
+ Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations.
**Pay Ranges**
O'Fallon, Missouri: $76,000 - $127,000 USD
Product Security Engineering 2
Cyber security analyst job in Saint Charles, MO
JOB TITLE: Product Security Engineering 2 PAY RATE: $53-67/hour
We are a national aerospace and defense staffing agency seeking highly qualified candidates for a position with a top-tier client.
Job Details:
Job Type: Contract (12 months with potential for extension)
Clearance: Active Top Secret U.S. Security Clearance required (must be active within the last 24 months)
Industry: Aerospace / Defense / Aviation
Benefits: Medical, dental, and vision (Cigna)
Perks: Bonus potential + Priority access via Tier 1 supplier
Openings Nationwide: Thousands of opportunities across the U.S.
Qualifying Questions:
Are you a U.S. person as defined under ITAR regulations?
Do you meet the educational and experience requirements for this role?
Can you commute to the job location or relocate if necessary?
Summary:
Assess organization-wide security and privacy risks, updating assessment results on an ongoing basis.
Perform system analysis and develop system tests for cyber threats, cybersecurity evaluations, and large-scale event assessments.
Ensure adherence to the product security engineering development lifecycle, emphasizing clear requirements development and verification (using CAMEO).
Conduct criticality analyses, collaborate with suppliers, identify critical components, and integrate them into overall system designs.
Perform cyber risk assessments and develop mitigation plans (e.g., POA&Ms, SCRM) using tools including but not limited to CAMEO.
Support and facilitate ATO/IATT packages, including processing IAVMs and CTOs.
Perform software assurance tasks, including developing software assurance risk reports.
Support proposal development efforts (e.g., BOE generation, GR&A development, trade studies).
Assist with the engineering installation and analysis of patches, updates, and upgrades to assess system impact.
Attend and facilitate program boards, collect data, and manage project documentation and collaboration.
Apply Security Technical Implementation Guides (STIGs) and manage Cyber Tasking Orders (CTOs).
Document and verify all installation and configuration steps for labs and operational deliveries.
Provide feedback to Cyber Leadership and engineers to improve tools and processes.
Collaborate with Information System Security Officers (ISSOs) to ensure compliance with cybersecurity standards and regulations.
Support cyber threat intelligence, scanning, patching, remediation, and tool/application development.
Assist in compliance activities including TEMPEST, DFARS, COMSEC, and CNSSI.
Develop tools for cyber forensics and identify opportunities for efficiency and productivity improvements.
Perform system analysis trade studies to define technical concepts and solutions.
Requirements:
Active Top Secret U.S. Security Clearance required (must be active within the last 24 months)
Bachelor's degree (or equivalent technical education) in engineering, engineering technology, computer science, data science, mathematics, physics, or chemistry.
2 or more years of related experience, or an equivalent combination of education and experience.
Current DoD 8570 certification at IAT Level II / IAM Level I or higher (e.g., Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA).
1+ years of experience in product security or cybersecurity engineering.
1+ years of experience with cybersecurity frameworks (NIST, OWASP, DFARS).
Strong analytical, collaboration, communication, and organizational skills.
ABET accreditation preferred but not required.
Must be a U.S. Citizen (as defined by ITAR).
Preferred Qualifications:
Proficiency with CAMEO.
2+ years of Windows/RHEL system administration experience, including tuning and troubleshooting cyber tools (ESS/HBSS, ConfigOS, Splunk, etc.).
2+ years of experience configuring and scripting audit tools.
Experience with Software Assurance (SwA) static and/or dynamic code analysis tools (e.g., Fortify).
Familiarity with FISMA/RMF and NIST 800-53 requirements.
Experience leading cyber test and evaluation at system or component level.
Strong written and verbal communication skills with the ability to simplify complex technical issues.
Understanding of DoD defense systems architectures, communications systems, and test/data analysis methods.
About Us:
The Structures Company is a premier national aerospace and defense staffing agency specializing in contract, contract-to-hire, and direct hire placements. We deliver expert workforce solutions across engineering, IT, production, maintenance, and support roles.
As trusted partners to major aerospace OEMs and Tier 1 suppliers, we connect professionals with opportunities to grow and excel in the aviation and aerospace industries.
Eligibility Requirements:
Must be a U.S. Citizen, lawful permanent resident, or protected individual under 8 U.S.C. 1324b(a)(3) to comply with ITAR regulations.
Keywords: aerospace, aviation, engineering, maintenance, aircraft design, defense
Take your career to new heights-apply today!
Engineers - #Hotjobs
Managed Services Security Analyst
Cyber security analyst job in Maryland Heights, MO
The Managed Service Security Analyst is responsible for monitoring, detecting, and responding to security incidents to protect client environments. This role involves the identification of vulnerabilities, analyzing security risks, responding to security operations service tickets, and implementing protective measures. The Security Analyst will also assist with security audits, incident response, compliance-related activities and projects, and ensuring that all security services meet established performance and security standards.
PRINCIPAL DUTIES AND RESPONSIBILITIES:
Client Support: Provide security-related support to clients, addressing concerns, incidents, and queries in a timely manner.
Security Monitoring: Perform continuous security monitoring of client systems, networks, and applications for malicious activities or security breaches.
Incident Response: Respond to security incidents, conduct investigations, containment, and remediation efforts to mitigate risks and protect client environments.
Vulnerability Management: Identify, assess, and prioritize vulnerabilities in client systems, recommending and implementing mitigation strategies.
Threat Intelligence: Utilize threat intelligence tools to identify potential risks and provide proactive defense recommendations.
Compliance Support: Ensure client systems adhere to regulatory and compliance standards (e.g., PII, HIPAA, PCI-DSS) as required.
Security Audits: Assist with internal and external security audits, including the preparation and maintenance of audit documentation.
Documentation: Maintain detailed records of security incidents, operational tasks, and system configurations in accordance with best practices.
KNOWLEDGE, SKILLS AND ABILITIES:
Education: Bachelor's degree in information technology, Computer Science, a related field, or additional years of relevant job experience.
Experience: Minimum of 1 year of experience in an IT security or service role, preferably in a managed services environment.
Certifications: Relevant certifications such as CASP+, CISSP, CEH, CompTIA Security+, or equivalent are preferred.
Skills:
Strong understanding of security frameworks (e.g., NIST, ISO 27001).
Experience with security information and event management (SIEM) tools.
Excellent analytical and problem-solving abilities.
Strong communication and interpersonal skills for client-facing interactions.
Ability to manage multiple security incidents and tasks simultaneously.
Vulnerability & Security Engineer
Cyber security analyst job in Saint Louis, MO
We are looking for experienced Vulnerability Development / Security Engineers with a background in healthcare IT to join our security team. You will focus on identifying, assessing, and remediating vulnerabilities across applications and cloud environments.
Responsibilities:
Conduct SAST and DAST scans and manage vulnerability remediation.
Perform secure code reviews and implement best practices in Java and Python.
Conduct threat modeling for applications, APIs, and cloud environments.
Collaborate with development teams to ensure secure application delivery.
Stay updated on security trends and healthcare-specific compliance requirements.
Qualifications:
6-10 years of experience in application security or vulnerability management.
Hands-on with SAST/DAST tools, patching, and secure coding.
Strong knowledge of API and cloud security.
Healthcare IT experience preferred (HIPAA, HITRUST, or related frameworks).
Excellent analytical and communication skills.
Security Analyst II
Cyber security analyst job in Collinsville, IL
Monitors the health of Touchette Regional Hospital and SIHF Healthcare's security threat posture and cybersecurity & network infrastructure.
Develops a deep understanding of the threat landscape and ensures cybersecurity technology is monitored to detect threats.
Works with the IS Security Officer and junior members of the team to ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with Touchette Regional Hospital and SIHF Healthcare IT and cybersecurity standards
Develops, documents, maintains, and communicates Touchette Regional Hospital and SIHF Healthcare's governance models and compliance codes and standards.
Develop, provide, and maintain necessary documentation for all network applications and network systems
Assist with network security in a multi-hospital & multi-healthcare clinic environment
Key responsibilities include:
Monitors endpoint anti-virus & malware, content-filtering, data loss prevention solutions, multi factor authentication systems, device profiling systems, firewall rules, network ACLs, server configuration monitoring, network logging consolidation and event correlation systems.
Analyze threat intelligence to anticipate and mitigate potential risks.
Conduct root cause analysis of security incidents and recommend corrective actions.
Conduct research on network products, services, protocols, and standards in support of network & security procurement and development efforts.
Installs and maintains network & security operating systems; ensures that backup copies of all files are routinely made and securely stored at separate location; maintains system documentation.
Develops vulnerability remediation documentation and assists in the remediation of vulnerabilities both on server and network systems both cloud and physical.
Documents systems with vulnerability's that are not able to be remediated, develops an action plan to secure those devices and communicates this information to stakeholder's and the IS Security Officer.
Develops the skills necessary to manage network security solutions.
Develops expertise in scanning and monitoring networks or server systems for attacks, malicious software, intrusions, and threats.
Develops an understanding of the organization's current threat posture and uses a variety of tools to understand emerging threat patterns and gauge potential impacts to day-to-day business processes.
Develops attack and penetration technologies to reduce threat landscape while looking for creative ways to save money and time where possible.
Works with the IS Security Officer to develop policies and training to ensure employees are following and understanding security policies and procedures.
Provides cybersecurity and network support for operational systems and assists in business planning, maintenance, and troubleshooting.
Executes risk management initiatives to assess risk and gather information/data for defining/updating policy/standards.
Researches and interprets risks and impacts of new technology, emerging patterns and trends in the cybersecurity landscape and provides updates/reports to the IS Security Officer on a regular basis.
Develops monitoring use cases, tests, and assesses the effectiveness of Digital controls.
Develops expertise in working with Network Packet Analyzers, Next-Generation Antivirus, Endpoint Detection and Response, Cyber Threat Intelligence and Threat Hunting Tools.
Engages and communicates effectively with internal personnel, external vendors, or contacts in day-to-day activities and fosters positive business relationships.
Educates the various business units on the different IT or cybersecurity strategies, policies, processes, and procedures.
Executes projects and programs for the Network and Security team as required.
Prepares and works with the different stakeholders to develop business continuity, disaster recovery and incident response plans
Develop methods or propose technologies to protect data at rest when required.
Will be required to provide on-call support in rotating intervals and emergency support as needed.
Ability to occasionally support routine or emergency network or security changes during normal business hours, after-hours, on weekends or during holidays is required. At the direction of your supervisor this may involve travel on-site to a pre-determined location to support these changes.
Ability to participate in on-call rotation.
Provides second-level technical support to users concerning network & security system operations.
Performs all other duties as assigned.
Qualifications
Bachelor's degree preferred, preferably in computer science, cybersecurity, network engineering, engineering, mathematics, or equivalent work experience
5-6 years of experience in information security, cybersecurity, or a related IT role.
Professional certifications preferred Cisco Certified CyberOps Professional (CCCP), Cisco Certified Network Professional - Security (CCNP Security), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED).
In addition to the above qualifications, the successful candidate will demonstrate:
Fundamental knowledge of networking & security concepts
Understand the OSI model, well-known and reserved ports & network protocol specifications
Understand encryption methods used in securing network traffic transiting unsecured networks
Understand encryption methods to secure sensitive information stored digitally
Hands-on technical troubleshooting capabilities (physical, virtual, logical)
Ability to work independently under minimal supervision
Familiarity with network monitoring tools
Exceptional critical thinking and problem-solving ability
Strong interpersonal skills to assist non-technical individuals with complex technical issues
Ability to adapt and learn new skills rapidly in support of the IT organization across a variety of different operating systems, protocols, applications, or technologies.
Enthusiasm
Teamworking skills
Attention to detail
Physical Demands:
Must be able to sit and/or stand for prolonged periods of time
Must be able to wear personal protective equipment (PPE) (mask, gown, gloves) when required
Must occasionally lift and/or move up to 50 pounds; 100 pounds with assistance.
Auto-ApplyCI Cyber Threat Analyst IV
Cyber security analyst job in Saint Louis, MO
Job Description
Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements:
Duties:
Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable):
Threat data collected and reported by NGA Technical CI team and network security personnel.
Intelligence reported by the Intelligence Community.
Fusion of all source threat analysis derived from multiple intelligence sources (INTs).
Imagery when available.
Information that can be used to inform security decisions.
Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
Compilation of data collected and reported in weekly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decision makers.
Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
Compilation of data collected and reported in weekly and monthly products.
Intelligence reported by the Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Depiction of Technical CI threat(s) to NGA to inform security decisions.
Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include:
Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
Raw and finished Intelligence reported by Intelligence Community.
Fused All Source threat analysis derived from multiple INTs.
Include imagery when available.
Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA.
Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires:
Coordination with teammates and stakeholders to ensure accuracy of reported information.
Cross referencing local information reporting with Intelligence Community reporting.
Clear and concise writing to briefly convey threat.
Responsiveness to Intelligence Community priority collections requirements.
Timeliness.
Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross).
Provide Technical CI advise and expertise in support of CI inquiries, operations and issues.
Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats).
Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
Display an ability to collaborate with internal NGA and external IC/Cyber community members.
Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
Skills and Experience Required:
Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level.
Desired:
Be a credentialed graduate of an accredited federal or DoD CI training academy.
Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov.
Experience translating Government vision into understandable and achievable measures.
Experience in using supervisory skills to coach teammates to achieve objectives.
Monitor and track progress toward achievable measures.
Information Security Specialist
Cyber security analyst job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
Easy ApplyCyber Security Operations Specialist III
Cyber security analyst job in Saint Louis, MO
WCBinc is pursuing an opportunity with the National Geospatial-Intelligence Agency (NGA) for Transport & Cybersecurity Services (TCS) contract. The functional capabilities are to provide the information technology (IT) infrastructure services required to deliver timely, relevant, and accurate GEOINT in support of national security. TCS will provide innovative design, engineering, procurement, implementation, operations, sustainment and disposal of transport and cybersecurity IT services on multiple networks and security domains, at multiple locations worldwide to support the NGA GEOINT mission.
What You'll Get to Do:
Provide cyber threat intelligence services for the collection, fusion, analysis, creation, and distribution of threat intelligence from government entities, commercial feeds, open sources, and other partners to obtain situational awareness of the threat environment.
Cyber threat intelligence services shall develop and disseminate reports and tippers to internal and external stakeholders based on events, alerts, and incidents on the customer systems and networks.
Provide advanced cybersecurity analytics (ACA) services which aggregates and analyzes products, data, and information to identify trends and patterns, anomalous activity, provide situational awareness of the customers networks, missions and threats, and provide operational recommendations, visualizations, tuning requests, and custom signature creation to the CSOC and other internal and external stakeholders.
Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems.
Designs and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
Advanced Cybersecurity Analytics will provide advanced cybersecurity services on an expanded 12x5service support level during core hours and on-call support with two-hour response time during non-core hours.
Cyber Threat Intel Services will provide advanced cybersecurity services on an expanded 12x5 service support level during core hours and on-call support with two-hour response time during non-core hours.
Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.
Develops new concepts and processes.
Analyzes root causes and resolves issues.
Supports more junior level technicians and specialists in their activities.
Can perform all tasks of lower level technicians or specialists.
Works individually, actively participates on integrated teams, and may also lead a task, project or team
Requires guidance and direction from more expert level technicians, specialists, and managers only when dealing with new, uncertain situations.
Provides guidance to lower level technicians and specialists.
Security Analysts
Cyber security analyst job in Saint Louis, MO
Security analysts are responsible for analyzing system and application security and making recommendations that optimize the protection of our computer systems and information resources. Security analysts develop, test, implement and maintain security policies and programs. They are responsible for staying current on security best practices and identifying security procedures to support business objectives and regulatory compliance.
Responsibilities:
The Information Security Office (ISO) Regulatory Compliance team is seeking a Security Analyst 2 to actively contribute to our organization's compliance efforts. This role calls for someone who can work closely with various business units, conduct thorough assessments, and assist in crafting effective remediation plans.
Key Responsibilities:
As a Security Analyst 2 on the Regulatory Compliance Team, you will:
Coordinate audits with external assessors (QSA) and internal stakeholders to streamline assessment process related to collecting evidences
Lead the validation of PCI requirements testing results and drive compliance gap remediation efforts
Create and maintain documentation to support PCI program
Conduct comprehensive internal compliance assessments, identify compliance gaps, and actively participate in developing remediation plans.
Collaborate closely with different business units to ensure alignment with relevant regulations and standards.
Support automation efforts across the compliance function.
Regularly review policies and procedures to ensure ongoing compliance with regulatory requirements.
Effectively manage and prioritize multiple projects related to regulatory compliance.
Stay vigilant in monitoring and tracking regulatory changes, providing teams with guidance on updating policies and procedures as needed.
Be a source of guidance and support for fellow members of the compliance team.
Qualifications:
Required:
Must be presently authorized to work in the U.S. without a requirement for work authorization sponsorship by our company for this position now or in the future
Must be committed to incorporating security into all decisions and daily job responsibilities
3+ years with leading, planning and execution of PCI assessments which includes review of control design with a focus on payment card compliance and security.
Demonstrate the ability to work both independently with a strong sense of ownership and collaboratively within a team to achieve departmental and project objectives.
Ability to maintain a high degree of confidentiality.
Detail-oriented with strong project management skills, including project planning, directing project activities, and leading project teams.
Proficient in documentation, communication skills, and a proven ability to deliver formal and informal presentations to a diverse audience.
Ability to organize and prioritize multiple complex assignments and tasks for self and team members, ensuring deadlines are met.
Excellent problem-solving and analytical skills, with the ability to define problems, collect data, establish facts, and draw valid conclusions.
Demonstrated leadership, collaboration, and relationship management skills, representing goals within the team and outside the department.
Ability to be flexible and adaptable to changing requirements and responsibilities while delivering high-quality results.
Commitment to incorporating security into all decisions and daily job responsibilities.
Proficiency with Microsoft Office applications, including Outlook, Word, PowerPoint, and Excel.
Preferred:
Bachelor's degree in Cyber Security, Computer Science, Computer Information Systems, Management Information Systems, or extensive security-related experience, or an equivalent combination of education and experience.
Functional knowledge of productivity, documentation, and collaboration tools such as SharePoint, Jira, Confluence, and Jive.
The Timberline Group Phone: ************ PO Box 385, Lebanon, MO 65536 ********************* *************************
"Delivering quality solutions through quality people"
Easy ApplyInformation Security Operations Analyst II
Cyber security analyst job in OFallon, MO
Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential.
Title and Summary
Information Security Operations Analyst II
Overview
The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff.
The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset.
Role
In this Security Awareness position, you will:
* Liaise between the Security Awareness team and all others at Mastercard.
* Build new content and design awareness events to positively impact the security behaviors of Mastercard staff.
* Partner with external providers to deliver effectives solutions with quality and integrity.
* Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team.
All About You
The ideal candidate for this position should:
* Possess advanced knowledge in security awareness concepts and principals.
* Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors.
* Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard.
* Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings.
* Lead vendor relationships with those providers of contract solutions for the Security Awareness program.
* A professional certification in Security Awareness is not required but highly encouraged.
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
Abide by Mastercard's security policies and practices;
* Ensure the confidentiality and integrity of the information being accessed.
* Report any suspected information security violation or breach.
* Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
Corporate Security Responsibility
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
* Abide by Mastercard's security policies and practices;
* Ensure the confidentiality and integrity of the information being accessed;
* Report any suspected information security violation or breach, and
* Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations.
Pay Ranges
O'Fallon, Missouri: $76,000 - $127,000 USD
Auto-ApplySecurity Analyst II
Cyber security analyst job in Collinsville, IL
Job Description
Monitors the health of Touchette Regional Hospital and SIHF Healthcare's security threat posture and cybersecurity & network infrastructure.
Develops a deep understanding of the threat landscape and ensures cybersecurity technology is monitored to detect threats.
Works with the IS Security Officer and junior members of the team to ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with Touchette Regional Hospital and SIHF Healthcare IT and cybersecurity standards
Develops, documents, maintains, and communicates Touchette Regional Hospital and SIHF Healthcare's governance models and compliance codes and standards.
Develop, provide, and maintain necessary documentation for all network applications and network systems
Assist with network security in a multi-hospital & multi-healthcare clinic environment
Key responsibilities include:
Monitors endpoint anti-virus & malware, content-filtering, data loss prevention solutions, multi factor authentication systems, device profiling systems, firewall rules, network ACLs, server configuration monitoring, network logging consolidation and event correlation systems.
Analyze threat intelligence to anticipate and mitigate potential risks.
Conduct root cause analysis of security incidents and recommend corrective actions.
Conduct research on network products, services, protocols, and standards in support of network & security procurement and development efforts.
Installs and maintains network & security operating systems; ensures that backup copies of all files are routinely made and securely stored at separate location; maintains system documentation.
Develops vulnerability remediation documentation and assists in the remediation of vulnerabilities both on server and network systems both cloud and physical.
Documents systems with vulnerability's that are not able to be remediated, develops an action plan to secure those devices and communicates this information to stakeholder's and the IS Security Officer.
Develops the skills necessary to manage network security solutions.
Develops expertise in scanning and monitoring networks or server systems for attacks, malicious software, intrusions, and threats.
Develops an understanding of the organization's current threat posture and uses a variety of tools to understand emerging threat patterns and gauge potential impacts to day-to-day business processes.
Develops attack and penetration technologies to reduce threat landscape while looking for creative ways to save money and time where possible.
Works with the IS Security Officer to develop policies and training to ensure employees are following and understanding security policies and procedures.
Provides cybersecurity and network support for operational systems and assists in business planning, maintenance, and troubleshooting.
Executes risk management initiatives to assess risk and gather information/data for defining/updating policy/standards.
Researches and interprets risks and impacts of new technology, emerging patterns and trends in the cybersecurity landscape and provides updates/reports to the IS Security Officer on a regular basis.
Develops monitoring use cases, tests, and assesses the effectiveness of Digital controls.
Develops expertise in working with Network Packet Analyzers, Next-Generation Antivirus, Endpoint Detection and Response, Cyber Threat Intelligence and Threat Hunting Tools.
Engages and communicates effectively with internal personnel, external vendors, or contacts in day-to-day activities and fosters positive business relationships.
Educates the various business units on the different IT or cybersecurity strategies, policies, processes, and procedures.
Executes projects and programs for the Network and Security team as required.
Prepares and works with the different stakeholders to develop business continuity, disaster recovery and incident response plans
Develop methods or propose technologies to protect data at rest when required.
Will be required to provide on-call support in rotating intervals and emergency support as needed.
Ability to occasionally support routine or emergency network or security changes during normal business hours, after-hours, on weekends or during holidays is required. At the direction of your supervisor this may involve travel on-site to a pre-determined location to support these changes.
Ability to participate in on-call rotation.
Provides second-level technical support to users concerning network & security system operations.
Performs all other duties as assigned.
Qualifications
Bachelor's degree preferred, preferably in computer science, cybersecurity, network engineering, engineering, mathematics, or equivalent work experience
5-6 years of experience in information security, cybersecurity, or a related IT role.
Professional certifications preferred Cisco Certified CyberOps Professional (CCCP), Cisco Certified Network Professional - Security (CCNP Security), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED).
In addition to the above qualifications, the successful candidate will demonstrate:
Fundamental knowledge of networking & security concepts
Understand the OSI model, well-known and reserved ports & network protocol specifications
Understand encryption methods used in securing network traffic transiting unsecured networks
Understand encryption methods to secure sensitive information stored digitally
Hands-on technical troubleshooting capabilities (physical, virtual, logical)
Ability to work independently under minimal supervision
Familiarity with network monitoring tools
Exceptional critical thinking and problem-solving ability
Strong interpersonal skills to assist non-technical individuals with complex technical issues
Ability to adapt and learn new skills rapidly in support of the IT organization across a variety of different operating systems, protocols, applications, or technologies.
Enthusiasm
Teamworking skills
Attention to detail
Physical Demands:
Must be able to sit and/or stand for prolonged periods of time
Must be able to wear personal protective equipment (PPE) (mask, gown, gloves) when required
Must occasionally lift and/or move up to 50 pounds; 100 pounds with assistance.
Information Security Operations Analyst II
Cyber security analyst job in OFallon, MO
Our Purpose
Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential.
Title and Summary
Information Security Operations Analyst IIOverview
The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff.
The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset.
Role
In this Security Awareness position, you will:
• Liaise between the Security Awareness team and all others at Mastercard.
• Build new content and design awareness events to positively impact the security behaviors of Mastercard staff.
• Partner with external providers to deliver effectives solutions with quality and integrity.
• Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team.
All About You
The ideal candidate for this position should:
• Possess advanced knowledge in security awareness concepts and principals.
• Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors.
• Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard.
• Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings.
• Lead vendor relationships with those providers of contract solutions for the Security Awareness program.
• A professional certification in Security Awareness is not required but highly encouraged.
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
Abide by Mastercard's security policies and practices;
• Ensure the confidentiality and integrity of the information being accessed.
• Report any suspected information security violation or breach.
• Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
Corporate Security Responsibility
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
Abide by Mastercard's security policies and practices;
Ensure the confidentiality and integrity of the information being accessed;
Report any suspected information security violation or breach, and
Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations.
Pay Ranges
O'Fallon, Missouri: $76,000 - $127,000 USD
Auto-Apply