Post job

Cyber Security Engineer remote jobs

- 549 jobs
  • Federal Information Security Engineer - FISMA, GRC, NIST; Public Trust (Hybrid)

    Peyton Resource Group 3.5company rating

    Remote job

    6 month Contract-to-Hire Contract Rate: $60-67/hr on W2 Salary Conversion: $145-155K, DOE Hybrid; 3 days/week onsite work is required Must be a US Citizen or Green Card/Permanent Resident Ability to obtain a Public Trust Clearance is required Technical Environment (preferred): CSAM, Splunk, Tenable, Palo Alto, Checkmarx Summary: Immediate need for a FISMA Information Security Engineer to bridge the gap between technical security controls and federal compliance requirements. This position involves both security engineering and governance, risk, and compliance (GRC) activities, primarily centered around the Federal Information Security Modernization Act (FISMA) and the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). FISMA/NIST Compliance & Documentation, Auditing & Reporting: Implement and Monitor Controls: Implement, document, and monitor security controls in accordance with NIST SP 800-53 (Security and Privacy Controls for Federal Information Systems and Organizations). Assessment & Authorization (A&A) Support: Support the Authorization process, including contributing to security assessments, control validation, and evidence gathering to achieve and maintain an Authority to Operate (ATO). System Security Plan (SSP) Management: Assist in the development, maintenance, and update of System Security Plans (SSPs), including continuous monitoring strategies and Plans of Action and Milestones (POA&Ms). Coordinate and support Internal & External Security Audits (e.g., Office of Inspector General (OIG), independent assessors). Reporting: Generate reports on security control compliance, vulnerability posture, and POA&M status for stakeholders and the Authorizing Official (AO). Security Engineering & Operations: Control Implementation: Consult on the configuration and management of security tools and systems (e.g., SIEM, vulnerability scanners, intrusion detection/prevention systems) to effectively enforce NIST 800-53 controls. Vulnerability Management: Analyze results, prioritize remediation efforts based on risk to the system's security categorization (e.g., FIPS 199), and track POA&M completion. Incident Response: Participate in security incident response planning and testing activities, ensuring all incidents are documented and handled in compliance with federal reporting requirements. Change Management: Review system and network change requests to ensure security implications are addressed and maintain the security posture of authorized systems. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field Relevant security certifications 3-5+ years of progressive, hands-on experience in Federal IT Security Engineering 2-4+ years of experience focusing on federal compliance (FISMA, NIST RMF) Technical environment: CSAM, Splunk, Tenable, Palo Alto, Checkmarx About PRG With 20+ years of success in the staffing industry, Peyton Resource Group focuses on matching talent to the precise needs of our clients. Your success is our commitment, and we back up that commitment by only recommending opportunities that align with your goals. Our candidate-centric approach ensures you are in the driver's seat of your career, and our team of recruiters will partner with you and support you every step of the way. PRG's dedication to service has been widely recognized throughout the industry. PRG has been awarded ClearlyRated's Best of Staffing award for 10+ years, as well as the Business Journal's Best Places to Work in Dallas, San Antonio and Austin.
    $60-67 hourly 2d ago
  • Cyber Security Engineer

    Lucas James Talent Partners

    Remote job

    Our client Dscout is a flexible Experience Research Platform for capturing in-context insights from high-quality participants, bridging the gap between product teams and users. Leading brands like Sonos, Spotify, Duolingo and Best Buy use Dscout to test ideas, iterate quickly, collaborate, and build confidently. We are expanding our smart and driven team and would love for you to join us. We are looking for a Cybersecurity Engineer to become a part of the Cybersecurity team reporting to the VP, Compliance and Information. The Cybersecurity Engineer will contribute to reducing risk within the Dscout SaaS environment and internal IT systems. This includes planning and implementing cybersecurity controls, supporting cybersecurity operations, and monitoring the threat landscape. This role will ensure Dscout controls operate effectively over time. What You Will Do Lead the process to build security into the Dscout SaaS environment. This includes applying security throughout the software development lifecycle. Collaborate with Engineering to plan and implement cybersecurity controls to protect the SaaS environment. This includes applying leading practices to secure AWS resources (e.g., VPCs, EC2 instances, and containers). Continually enhance security monitoring of the SaaS environment and internal IT services by implementing SIEM and working with Engineering to continuously improve logging and auditability. Assess evolving threats and develop recommendations to mitigate risk to Dscout. You will provide weekly threat intelligence reports highlighting potential risk to the organization. Work side-by-side with Engineering to analyze, contain, and mitigate cyber attacks and other related incidents. Perform vulnerability monitoring and, where appropriate, ensure remediation. Participate in the development of security policies and processes. Assist third party risk reviews. Provide recommendations to continually improve security controls. Assist in development of security programs and efforts to promote security awareness. What you need to have (we can call them Desired Skills and Background): Experience working with developers to conduct security reviews and provide strong recommendations to manage risk. This includes a strong understanding and practical use of OWASP Top 10 (web and AI). Experience securing AWS cloud environments and infrastructure as code solutions such as Terraform. Proven ability to implement security monitoring tools such as Datadog. This includes the ability to identify relevant scenarios and ensure proper logging. Experience responding to cyber attacks such as bots and account compromise as well as threats like data leakage and infected computers. Strong knowledge of cloud computing environments. Working knowledge of security in software development and continuous integration/continuous delivery (CI/CD). Experience documenting and implementing security policies and processes. Knowledge of security frameworks and standards: ISO 27001, NIST, or SANS preferred. Experience with HITRUST and/or SOC 2 certification is preferred. Good communication, documentation and presentation skills. Limitless curiosity and insatiable appetite to understand human behavior and relevant technologies. Background Bachelor's degree is preferred CISSP, CCSP, or GIAC security certification preferred A minimum of 3 years of security experience Of course, what is outlined above is an ideal set of expectations, but things may shift based on business needs, and other projects and tasks could be added at the discretion of your manager. About Dscout Dscout is a team of passionate, empathetic, and curious professionals. As a recognized leader in the Forrester Wave, we're at the cutting edge of experience research technology. The power of research drives us-how in-context insights from real people can build more enjoyable products and services. We prioritize learning, sharing, and building. We also deeply value being a diverse and inclusive team and company and look for team members who align with that belief. Join our dynamic team and help shape product roadmaps and business strategies for the world's most loved brands. It doesn't stop there. When you join the Dscout team, you will get: * A strong and competitive compensation package with a built-in bonus and equity program. * An incredible and progressive benefits package (for both you and your dependents) to support work/life balance, including flexible PTO, 16 company holidays, 12 weeks of paid parental leave, 401k match, and much more. * An education stipend to support your growth & development and a remote work stipend. * A company that is open and transparent with our team. You will know what is happening and why it matters. Dscout is an equal-opportunity employer that values diversity. We do not discriminate based on identity, including race, color, religion, national origin or ancestry, sex, gender identity and expression, age, physical or mental disability, pregnancy, veteran or military status, unfavorable discharge from military service, genetic information, sexual orientation, marital status, order of protection status, citizenship status, arrest record or expunged or sealed convictions, or any other legally recognized protected basis under federal, state, or local law. If you need reasonable accommodations for any part of the employment process, please email us at accommodations@dscout.com with the nature of your request and your contact information. We'll do all we can to ensure you're set up for success during our interview process while upholding your privacy, including accommodation requests. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this email address. When you apply at Dscout, we will process your job applicant data, including your employment and education history, transcript, writing samples, and references, as necessary to consider your job application for open positions. For more information about our privacy practices, please visit our Privacy Policy. Dscout participates in the E-Verify program in certain locations, as required by law. NOTE: DSCOUT NEVER CONTACTS JOB APPLICANTS VIA TEXT, MESSENGER, OR OTHER SIMILAR APPLICATIONS. BE AWARE OF PHISHING AND SPOOFING SCAMS, BOTH VIA TEXT AND EMAIL. ONLY RESPOND TO EMAILS FROM DSCOUT.COM #BI-Remote #LI-Remote
    $68k-92k yearly est. 1d ago
  • Nuclear Cyber Security Engineer - REMOTE

    JSG (Johnson Service Group, Inc.

    Remote job

    IF YOU DO NOT HAVE THE REQUIRED BACKGROND IN THE U.S. COMMERCAL NUCLEAR INDUSTRY, PLEASE DO NOT APPLY. Immediate opening for a Cyber Security Engineer with commercial nuclear background, to perform design modifications (involving digital upgrades) as well as preparing cyber assessments on those digital components. Prefer direct/perm hire, will consider contract. This person will be the go-to individual for Cyber related projects. Must be familiar with NEI-08-09, EPRI graded approach, have digital mod experience, and extensive understanding of plant SSC (Safety Classification of Structures, Systems, and Components). Site Cyber qualifications to perform CSAT (Cyber Security Assessment Team) would be a plus. Compensation based on experience, but likely in the 140K-$160K range. JSG offers medical, dental, vision, life insurance options, short-term disability, 401(k), weekly pay, and more. Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law. #D650
    $160k yearly 16h ago
  • Network Security Engineer II

    Glocomms 4.3company rating

    Remote job

    Sr. Network Engineer II Employment Type: Full-Time Sponsorship: Not Provided We're seeking an experienced Sr. Network Engineer to join a growing IT team and play a key role in designing, implementing, and maintaining enterprise-level network infrastructure. This is a remote position available exclusively to candidates residing in Idaho or Utah. What You'll Do Plan, implement, and support network projects, including risk assessment and migration strategies. Configure and maintain Cisco routers, switches, wireless, remote access, and WAN devices. Recommend and implement new technologies to improve network performance and scalability. Monitor global network performance, troubleshoot issues, and perform preventative maintenance. Collaborate with carriers for circuit procurement and migrations. Maintain accurate technical documentation and configurations. Participate in on-call rotation and occasional travel as needed. What You'll Bring 6+ years of hands-on networking and troubleshooting experience in multiprotocol environments. 5+ years with router/switch technology and routing protocols (BGP, MPLS, EIGRP). 4+ years supporting LANs, VLANs, WLANs, VPNs, NAT, and DHCP services. 3+ years with network security products and protocols (IPS/IDS, IPSEC VPN). CCNP preferred. Experience with Cisco Nexus (9k, 7k, 5k), ISR, ASR, Next Gen Firewalls, Meraki wireless. Familiarity with monitoring tools (SolarWinds, Splunk, ThousandEyes, AppDynamics). Strong leadership, problem-solving, and communication skills.
    $74k-112k yearly est. 16h ago
  • Network Security Engineer (Hybrid), Only locals from Texas

    Veritis Group Inc.

    Remote job

    Hi, We are looking for Network Security Engineer (Hybrid). Please let me know if interested and share your resume. Job Title: Network Security Engineer (Hybrid), Only locals from Texas Network Security Design and Implementation (MUST HAVE): Design and implement robust network security architectures to safeguard the organization's data and systems. Configure and deploy firewalls, VPNs, intrusion detection/prevention systems, and other security devices. Architect and build secure, cost-effective, and scalable AWS cloud infrastructure to meet business objectives while taking care of compliance and best practices. Configure, deploy and maintain solutions using infrastructure as code (IaC) such as Terraform. Ensure that the architecture and solutions are compliant with Industry standard cybersecurity Frameworks. Plan and implement the migration of Legacy infrastructure as code (IaC) to current terraform version. Network Monitoring and Analysis (MUST HAVE): Ingest monitoring tools to detect and respond to security threats. Analyze network traffic patterns and behavior to identify potential issues. Lead incident response and troubleshoot complex connectivity issues across environments. Drive initiatives around network observability, security, and performance Collaboration and Communication: Work closely with cross-functional teams to integrate security measures into the overall IT infrastructure. Provide guidance and training to security engineers and IT staff across the globe. Requirements Bachelor's or Master's degree in Computer Science, Information Technology, or a related field Several years of experience in network security roles, with a focus on designing and implementing security solutions in AWS cloud environments Relevant certifications such as AWS Certified Advanced Networking - Specialty, CCNP Security, or equivalent Proficiency in firewall and VPN configurations Strong understanding of intrusion detection/prevention systems Knowledge of encryption protocols, network protocols, and security frameworks Ability to analyze complex network security issues and provide effective solutions Strong troubleshooting skills to address security incidents Excellent written and verbal communication skills for both technical and non-technical audiences Regards, Praveen Vasala Email ID: ************************** Contact: ***************** Ext: 122
    $70k-96k yearly est. 1d ago
  • OT Security Architect

    First Quality 4.7company rating

    Remote job

    We are seeking an OT Security Architect to work remotely. This position will be responsible for safeguarding our operational technology infrastructure. This role offers the flexibility to work remotely with periodic travel to our manufacturing sites. First Quality is a growing manufacturing organization that has defined security as one of its key business values. Joining our team will provide you with unique personal and professional growth opportunities where you'll be hands-on and securing cutting-edge industrial automation and technologies contributing to a growing field where cybersecurity directly protects critical processes, manufacturing, and safety. Primary responsibilities include: • Primarily responsible for OT security event monitoring, management, and response • Create an IS reference architecture for our OT networks • Work with OT engineering team, as well as with SOC team and verify that the reference architecture fits the business processes and requirements • Work with OT engineering teams for defining security controls for their on-going projects • Provide technical guidance to the GRC team with assessing OT 3rd party vendor and supply chain • Integrate with OT engineering projects and verify that the required IS controls are properly implemented • Revise and develop processes to strengthen the current OT Security Operations Framework, review policies and highlight the challenges in managing SLAs • Perform threat management, threat modeling, identify threat vectors and develop use cases for OT security monitoring including red\blue penetrations tests • Responsible for developing, configuring, and maintaining OT security automation and orchestration IR's and tools. • Creation of reports, dashboards, metrics for OT security operations and presentation to Sr. Mgmt. • Create required standards and procedures (i.e. IS purchasing standard, sanitization process) in coordination with all relevant stakeholders The ideal candidate should possess the following: • Minimum of five (5) years of professional experience in OT security and operations. • Knowledge of controls and automation equipment and principles (i.e. PLCs, SCADA, DCS, HMIs, VFDs, etc.) • Familiarity with security frameworks and standards such as NIST, ICS Mitre ATT&CK, and IEC 62443 • Experience in defining and implementing security controls for OT engineering projects. • Experience managing projects with the abilities to prioritize tasks and manage time effectively. • Experience in developing, configuring, and maintaining OT security automation and orchestration tools. • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In lieu of degree, related experience will be considered. • Background in manufacturing controls is preferred What We Offer You We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive: • Competitive base salary and bonus opportunities • Paid time off (three-week minimum) • Medical, dental and vision starting day one • 401(k) with employer match • Paid parental leave • Child and family care assistance (dependent care FSA with employer match up to $2500) • Bundle of joy benefit (years' worth of free diapers to all team members with a new baby) • Tuition assistance • Wellness program with savings of up to $4,000 per year on insurance premiums • ...and more! First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data. First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status. For immediate consideration, please go to the Careers section at ******************** to complete our online application.
    $85k-133k yearly est. 4d ago
  • Offensive Cyber Analyst / Programmer 1

    Lockheed Martin 4.8company rating

    Remote job

    may be eligible for a $25K sign on bonus for external hires! What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber | Lockheed Martin Who we are: Are you driven by the thrill of outsmarting even the most advanced security systems and networks? Do you find satisfaction in crafting innovative solutions to stay one step ahead of the adversary? If so, join Lockheed Martin Cyber & Intelligence's elite Offensive Cyber team, where we don't just test defenses - we pioneer the techniques, tools, and exploits that define the cutting edge of offensive cyber operations. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. The Work: A CNO (Computer Network Operations) offensive cyber professional can be described as a "cyber warrior," harnessing their expertise in computer systems and networks to disrupt and disable adversary capabilities. Alternatively, they can be referred to as a "digital operator," skillfully navigating the virtual battlefield to achieve strategic objectives. They can also be characterized as "cyber operatives," leveraging their knowledge of cybersecurity and computer networks to conduct operations and gather critical intelligence. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool developers, embedded developers, and cyber researchers. We want your expertise in traditional computing (Windows/Linux/MacOS), mobile technology (Android/iOS), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special-purpose embedded and real-time systems. Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment. #RMSC6ISR #RMSCYTJ #OneLMHotJobs #RMSTG2025 Basic Qualifications • Candidate must possess active US security clearance with a polygraph • 4+ years overall experience • Bachelor of Science in Math, Science, Engineering, Statistics, Engineering Management, or related discipline. May substitute an additional four years' experience in lieu of a Bachelor's Degree. Masters degree can be substituted for 2 years of experience. • Experience programming in any of the following: Assembly, C, C++, Python • Experience with Offensive Cyber Tools and Techniques Desired skills • Interest in offensive cyber solutions • Experience using network sockets programming including developing packet-level programs, expert packet-level understanding of IP, TCP, and application-level protocols Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. * At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Other Important Information By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to work remotely Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedule Information Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Security Clearance Information This position requires a government security clearance, you must be a US Citizen for consideration. Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. This position is incentive plan eligible.
    $107.3k-185.8k yearly 38d ago
  • Consultant - Cyber Security Analyst (Fractional/Contract Role)

    Arootah

    Remote job

    Join our experienced roster of consultants that support Hedge Funds and Family Offices. Arootah is a personal and professional development leader in the Investment and Financial Services industry. Our mission is to provide top business advisory services to our hedge fund client base. We focus our Business Consulting on the multi-faceted needs of Hedge Funds and Family Offices. Arootah was founded by Rich Bello, the Co-Founder and COO of the industry-leading $10 billion hedge fund, Blue Ridge Capital. Rich brings more than 30 years of experience, including leadership positions at Morgan Stanley, Tiger Management, and Ernst & Young. Visit us at **************************************** for more information. WHO WE NEED: Arootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. As a consultant, you will work with our Hedge Fund and Family Office clients to provide expert advice. Having previously served in this role, you have specific, hands-on experience implementing, maintaining, and operating a cybersecurity program for a leading Hedge Fund or Family Office. What You'll Do Best practice reviews. Developing realistic and effective action plans. Breaking apart goals into actionable steps. Advising on vendor selection and oversight. Creating and implementing policies, procedures, and control measures. Evaluating each client's advancement toward goal actualization through key performance indicators (KPIs) and scoring matrices. Special projects or other areas of need. Implement and assist with the day-to-day operations of securing the firm's various information systems by providing technical expertise in all areas of network, system, and application security. Protect sensitive information by installing and configuring security software like firewalls and encryption programs. Monitor network traffic and analyze records like authentication logs to identify and investigate anomalies to prevent and detect security incidents. Lead the firm's vulnerability management program, conduct the annual cybersecurity assessments and penetration tests, and research and report on emerging threats, to help the firm take pre-emptive risk mitigation steps. Implement organization-wide security best practices to protect the business against existing, new, and emerging security threats. Test and analyze the organization's business continuity and disaster recovery plan to ensure operations will continue in the event of a cyberattack or natural disaster. Assesses new security technologies to determine potential value for the firm. Execute and carry out firm incident response program to identify and prevent all potential breaches (internal or external), or misuse of data, that may occur. Review, investigate, and respond to real-time alerts within the environment. Generate real-time and historical reports for internal and external stakeholders regarding security and/or compliance violations. Qualifications A Bachelor's degree in Computer Science, Computer Engineering, Information Systems, Information Sciences, or a related field, with a strong academic record. One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC, GCIH, GNFA, GREM or other related SANS certifications. 5+ years of specific experience as a Cybersecurity Analyst at a hedge fund or family office. Working experience with one or more of the following technology vendors and products: Splunk Cloud, Rapid7 Nexpose Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT, or similar. Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems. In-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events. Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, Cobit, and ISO. Strong writing and presentation skills are requiredin order to communicate findings and recommendations, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff. Job Status Contractor Hours are based on the needs of the assigned client (0-40 hours per week). Join a well-funded disruptor in finance and technology. Enjoy the flexibility of remote work and choosing your assignments. Be part of a dynamic, high-energy company in its expansion stage. Now is the time to join! For more information, visit us at Arootah.com.
    $75k-102k yearly est. Auto-Apply 60d+ ago
  • AI & Cyber SME

    American Bureau of Shipping 4.8company rating

    Remote job

    The Senior Principal Consultant will work as a senior expert on the successful delivery of projects for clients as a member of a project team within a market program. This includes providing technical expertise to the project manager and team members with initiating, planning, executing, monitoring and controlling, and closing projects. This position also includes maintaining relationships with clients and key decision-makers to help identify follow-on Business opportunities and maintain customer intelligence. What You Will Do: Provide expertise on project tasks to ensure quality services are delivered on schedule and within the available budget to meet customer requirements. Define project tasks, estimate task duration, and develop a project schedule as part of developing a project management plan Review project management plans to understand the scope, schedule, and assigned work authorization Provide technical expertise to support the execution of project tasks Develop briefing materials and write reports to communicate concepts and analysis results to clients and end users Lead research and data analysis, including but not limited to assisting with conducting customer or stakeholder analyses Prepare written documents, and reports, and provides presentations to clients. Develop conclusions and recommendations, write reports, and assist with client presentations Track and reports hours spend executing projects Work with individuals at all levels, provide input to reports and other deliverables, execute multiple assignments, meet agreed deadlines, and adjust to changing client demands Develop relationships with existing customers to facilitate the development of new business. Identify new business opportunities with existing customers for current and/or additional services Participate in marketing activities, conference presentations, technical whitepapers Assist with proposal development, including writing proposals, estimating the level of effort Learn, understand and be conversant in ABSG Industrial Cybersecurity products and services Review published reports and news articles about existing and potential new clients to identify customer intelligence Networking to meet new potential clients Serves as senior technical expert guiding project tasks and ensuring quality, schedule, and budget compliance. Project management with planning, sequencing tasks, estimating durations, and developing project schedules. Performs quality assurance on deliverables and tracks project execution metrics. Maintains and develops relationships with clients and key decision-makers. Actively participates in client meetings, presentations, and proposal development. Identifies new business opportunities through client interactions and market intelligence. Communicates client needs internally and contributes to proposal writing. Leverages subject matter expertise to drive growth and expand services. What You Will Need: Education and Experience Bachelor's degree in Computer Science, Business, or a recognized equivalent from an accredited university. Experience will be considered in lieu of education, preferably in data processing or a related field. Typically requires a minimum of five (5) years of working with a Customer Relationship Management System (CRM). Proven experience in Systems Development environment with project management responsibility for successful projects. Extensive IT and functional experience in cultivating positive customer relationships. experience working in organizations to support services provided to internal/external clients PMP Certification is preferred. Microsoft Dynamics CE experience preferred Knowledge, Skills, and Abilities Analytical and problem-solving capabilities. Strong understanding of sales, marketing, and customer service processes, to ensure functionally correct implementation. Strong understanding of Dynamics 365 CRM design, structure, functionality, and processes. Knowledge of CPQ (Configure, Price, Quote), PRM (Partner Relationship Management), CLM (Contract Lifecycle Management), and Sale Compensation Management applications, and their functionality. Managed complete life cycle projects involving multiple cross-functional business teams. Excellent verbal, written, and presentation skills consistent with a client group, including senior managers & executives. Knowledge of Microsoft Power Platform, working with Power BI to build data visualization, and Power Automate implementing business workflow. Strategic while also able to perform tactical duties. Self-starter, highly motivated with the ability to work with limited supervision. Experienced in the design and maintenance of business applications. Ability to obtain a working knowledge of the ABS Health, Safety, Quality, and Environmental Management System. Salary: $210k - $220k Reporting Relationships: Reports to a Manager, Director, or Executive level position and has no direct reports.
    $72k-98k yearly est. Auto-Apply 3d ago
  • Cyber Analyst, Digital Forensics Incident Response

    Bay 4.7company rating

    Remote job

    Why you should join our At-Bay Security team: At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers. The Role: Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via: Forensically sound collection, transmission, and storage of digital evidence Analysis of digital evidence to identify indicators of compromise and adversary activity Development of incident timelines and theories of compromise Identification of incident root causes Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.) Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds Development and delivery of incident response training and simulations for targeted insureds Key skills: Previous digital forensics and incident response experience Strong oral and written communication skills Previous hands-on experience performing digital forensics and incident response, including several of the following: Business Email Compromise Ransomware Digital evidence collection and analysis Development and analysis of cyber threat intelligence Leadership of or participation in investigations involving digital evidence Intrusion detection / cyber threat hunting Malware analysis Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc. Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.) Minimum requirements: Bachelor's degree or equivalent Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline Willingness to travel as needed to perform job functions Preferred requirements: Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity Previous background in law enforcement or government/military with experience leading complex technical investigations Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google) Experience in a top-10 cyber consulting firm or leading DFIR provider preferred One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.) Work location: USA, Nationwide Fully Remote Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent. #LI-CK1
    $80k-115k yearly Auto-Apply 41d ago
  • Cyber Security Analyst II

    Cybersheath 3.7company rating

    Remote job

    Job Description CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position The schedule for this role is: Week One: Friday - Sunday 8:00 AM - 8:00 PM Week Two: Friday - Monday 8:00 AM - 8:00 PM Travel requirements: 0-5% yearly. Please note that this role will be part of our SOC on-call rotation CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000-$100,000 USD
    $70k-100k yearly 4d ago
  • Associate Cyber Security Operations Analyst

    S&C Minimal

    Remote job

    As an S&C Electric team member, you'll work on projects that have real-world impact. You'll help transform the grid for resilient and reliable power worldwide. S&C has more than a 100-year history of innovation and has been 100% employee-owned since 2012. We continue this legacy as a trusted, forward-thinking leader in the electrical industry. You will advance a safer, more reliable, and more resilient electrical grid. Our products help the grid adapt to severe weather and transition to clean energy. We're big enough to be a respected industry leader but small enough for you to impact our company directly. Our commitment gives you opportunities to impact on and off the job positively. Join S&C to make an impact on tomorrow's energy challenges and become an employee-owner! Hours 8:00 am - 5:00 pm (Mon-Fri) Remote Compensation At S&C, we are dedicated to providing competitive and equitable compensation for all our team members, and we are committed to transparency in our pay practices. The estimated annual base salary range for this position in the United States is $67,200 - $86,814 and can be found in the JOB INFO section below. Individual pay within this salary range is determined by several compensable factors, including performance, knowledge, job-related skills and experience, and relevant education or training. This role is also eligible for S&C's annual incentive plan (AIP), subject to eligibility criteria. Join Our Team as an Associate Cyber Security Operations Analyst! The Grid Enablement Cyber Security and Communications Team is responsible for designing, implementing, and maintaining secure system configurations in accordance with Federal and industry cyber security standards, stakeholder requirements, & operational needs. Leveraging deep expertise in both Information Technology (IT) and Operational Technology (OT), the team applies cyber security principles in a way that not only protects systems but also ensures they operate at their full potential. This approach balances robust security with optimal system performance, supporting the mission-critical functions of our customers. The Associate Cyber Security Operations Analyst is tasked with supporting the Grid Enablement - Cyber Security teams project requirements by assisting in the implementation of cyber security frameworks used by the Department of Defense (DoD) and private sector utilities. This role works closely with technical leads and team members to develop strategies, timelines, and high quality deliverables for cybersecurity and complex engineering projects. Responsibilities include contributing to network design and security architecture, participating in hardware/software specifications, and ensuring device configurations meet compliance and risk management standards while maintaining functionality of mixed IT and OT systems. Key Responsibilities: Work with the technical lead on cybersecurity project scopes Work with Team to develop strategy and timeline to meet project's milestones and deliverables Participate in network design, security architecture, and diagrams Participate in hardware, software, and communications media specification Participate in device configurations and hardening for security compliance and Risk Management Work with Team to ensure timely delivery of high-quality cybersecurity documentation including security policies and procedures, RMF artifacts, configuration guides, testing reports, and training materials Participate in cybersecurity assessments including vulnerability and compliance scanning and reporting Participate in S&C's Information Security program as it applies to customer facing services Must be able to work independently in a fully remote environment Ability to relay technical information to non-technical audiences Function effectively within a global teams environment and under minimal supervision Ability to travel internationally and out of state on average 4-5 times per year for 1-3 weeks per trip Maintains regular and punctual attendance. Attends in-person or virtual meetings as requested or required. Communicates effectively and respectfully with others. Other responsibilities as assigned. Must be a United States Citizen. What you'll Need To Succeed: Degree program in Information Systems, Cybersecurity, Computer Science, Computer Engineering, or a related field in progress to be complete within 2 years (associate's degree) or 3 years (bachelor's degree) from date of hire. It may be permissible to substitute current technical certification to meet requirements at the discretion of the hiring manager. Familiarity with Microsoft security technology Foundational knowledge of cyber security and risk management concepts. Strong interpersonal skills with the ability to interview, facilitate, and collaborate with diverse subject matter experts and stakeholders. Strong written and verbal communication skills with the ability to communicate effectively with all levels of leaders and team members, adjusting communication approaches based on the audience. Strong organizational skills with the ability to manage multiple projects simultaneously to deadlines. Ability to work independently and as part of a team. Strong attention to detail and ability to follow activities through on time and with accuracy. Critical thinking and problem-solving skills and an ability to identify potential issues and seek support for resolution. Proficient in Microsoft Office products including Outlook, Excel, and PowerPoint. Preferred: At least 1 year experience in cyber security or technical field. S&C Electric is committed to equal-opportunity employment. All employees and applicants will be considered without regard to age, color, disability, gender, national origin, race, religion, sexual orientation, gender identity, protected veteran status, or any other classification protected by federal, state, or local law. If you are an individual with a disability and need an accommodation to complete the application, please email us at *******************. No fixed deadline #LI-BB1
    $67.2k-86.8k yearly Auto-Apply 1d ago
  • Cyber Threat Fusion Analyst

    Beyond SOF

    Remote job

    The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start. Essential Job Functions Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats. Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections. Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. Understand concepts of log and packet analysis Navigate the command line using specific expressions to manipulate data Handle and organize disparate data about detections, attacks, and attackers Employ discovery techniques and vetting of new intelligence. Create Situational Awareness Reports and Threat Briefs. Minimum Required Qualifications Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree. Computer defense technologies spanning endpoint, network, and open source. Required Security Clearance: TS/SCI. 8570 IAT II certification is required prior to start. It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
    $74k-100k yearly est. 60d+ ago
  • Cyber Insider Threat Analyst (Remote)

    RTX

    Remote job

    Country: United States of America Remote U.S. Citizen, U.S. Person, or Immigration Status Requirements: U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract. Security Clearance: None/Not Required RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA. The following position is to join our RTX Enterprise Services team: Role Overview: Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats. What You Will Do: Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns. Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers. Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats. Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models. Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts. Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions. Work independently and with teams to define and complete analysis activities. Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers. Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape. Assist in building processes, procedures and training for the insider threat team. Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes. Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies. Perform other duties as assigned and as required to continuously drive process excellence. Qualifications You Must Have: Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience. Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions. Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise. The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE). Industry certifications in information security or technology such as, CISSP, CISM, CGEIT. Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR). Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms. Demonstrate critical thinking and problem-solving skills. What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care. Learn More & Apply Now! Work Location: Remote Please consider the following role type definition as you apply for this role: Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $82k-111k yearly est. Auto-Apply 58d ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Remote job

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $76k-99k yearly est. Auto-Apply 26d ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • Security Systems Engineer (Remote)

    Cisco 4.8company rating

    Remote job

    The application window is expected to close on 12/08/2025. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received. **AI at Cisco** With Cisco, you're not just embracing the future - you're helping create it! We are focused on integrating AI into our solutions to transform collaboration, security, networking, observability, and more. We are innovating ethical AI products and infrastructure that enable our customers to stay ahead of cyberattacks, predict and prevent network outages, and make team meetings more productive. Our extensive data sets and broad customer reach means limitless possibilities for you to build impactful AI solutions that solve a wide array of real-world problems. Join us at Cisco where you will innovate with top AI experts and be a part of our mission to power an inclusive future for all. **AI in the Business Unit** The Cisco Security group includes such industry leading security suites and products as Hypershield, Cisco Secure Access, Identity Intelligence, Duo, XDR, Cisco Security AI, Talos, and more. We are using machine learning and GenAI across our products to simplify security, prevent sophisticated attacks, and ensure the secure use of large language models (LLMs). In Security, we are building AI-enhanced cybersecurity for better outcomes, combining AI with the breadth of Cisco telemetry across the network, private and public cloud infrastructure, applications, internet, email, and endpoints. With Security AI, we make it simple to use natural language instruction and interact with GenAI - from deploying and managing firewall policies to streamlining incident response. With Duo, we are creating extensive machine learning and analytics to detect and block suspicious users. We are harnessing our rich security expertise in conjunction with AIML to transform the way we assist, augment, and automate security efforts for our customers! We need your help to tip the scale in favor of defenders and enable enterprises everywhere to cancel bad actors. **Meet the Team** You will be a part of our Cisco Security Innovation team within the Security Business Group. This team incubates ideas that turn into the future of Cisco's innovative security solutions. You will play a pivotal role in driving scalable performance AI models to improve the efficacy of threat detections. You will bring your expertise in deep learning and large transformer models conduct research, design and development of state-of-the-art ML/AI techniques applicable to threat detection, including anomaly detection, behavioral analysis, signature generation, and predictive modeling. The techniques are focused toward realtime efficacy and evaluating scalable architectures. **Your Impact** + Leverage modern AI/ML techniques to improve the accuracy of threat detection solutions and automate/accelerate manual analysis processes. + Develop and implement advanced machine learning models across different hardware environments (including cloud and network edge); models may include adapting neural network architectures or creating novel ones to address challenges. + Develop methods to identify performance metrics and efficacy of the models especially of the hardware accelerated models. + Analyze and extract significant patterns in high-dimensional data spaces using advanced techniques. + Implement robust software systems for integrating and maintaining machine learning models. + Collaborate with software engineering teams to design primary deployment strategies for machine learning models into security systems. + Establish and maintain best practices for machine learning and security operations, including clear documentation of models and procedures. **Minimum Qualifications:** + Bachelor's degree or higher in Computer Science or related field + 5+ years of related security experience, specifically in the areas of network security environments + Experience with multi-threaded environments + Experience with Linux operating systems and embedded Linux environments **Preferred Qualifications:** + Master's or PhD degree in Computer Science, Computer Engineering, or a related field + Experience with state-of-the art machine learning techniques and libraries + Debugging skills in complex hardware/software + Coding experience with Python, C/C++, etc. + Experience with software development environments and version control systems (e.g. Git) + A strategic problem solver in the areas of threat detection and analysis + Experience optimizing machine learning or deep learning models for specific hardware + Familiarity with hardware acceleration libraries (e.g., Morpheus, cu DNN, TensorRT, OpenVINO). + Experience with containerization technologies (e.g., Docker, Kubernetes) in the context of hardware-specific deployments + Knowledge of cybersecurity concepts and threat detection methodologies + Low-level Kernel coding experience \#LI-RN1 **Why Cisco?** At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. **Message to applicants applying to work in the U.S. and/or Canada:** The starting salary range posted for this position is $165,000.00 to $241,400.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits. Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process. U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time. U.S. employees are eligible for paid time away as described below, subject to Cisco's policies: + 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees + 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco + Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees + Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations) + 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next + Additional paid time away may be requested to deal with critical or emergency issues for family members + Optional 10 paid days per full calendar year to volunteer For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies. Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows: + .75% of incentive target for each 1% of revenue attainment up to 50% of quota; + 1.5% of incentive target for each 1% of attainment between 50% and 75%; + 1% of incentive target for each 1% of attainment between 75% and 100%; and + Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid. The applicable full salary ranges for this position, by specific state, are listed below: New York City Metro Area: $165,000.00 - $277,600.00 Non-Metro New York state & Washington state: $146,700.00 - $247,000.00 * For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined. ** Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements. Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
    $165k-277.6k yearly 33d ago
  • Information Security Manager

    Stellar Health

    Remote job

    Historically, US Healthcare has relied on a fee-for-service reimbursement system where providers are paid based on the quantity of patient visits and procedures, rather than the quality of health outcomes. At Stellar Health, we help primary care providers put patient health first. Our platform - a mix of technology, people, and analytics - supports providers at the point of care, delivering real-time patient information, activating practice staff, and empowering providers and care teams with incentives that reward the work they are already doing to keep patients healthy. Using the Stellar App, our web-based, point-of-care tool; practices receive a simple checklist of recommended actions that support the best quality care. Providers and care teams are then paid monthly for each action they complete, and Payors save money in reduced healthcare costs along the way. Stellar is a US-based Health-tech backed by Top VCs ( General Atlantic, Point72, & Primary Venture Partners) with an established product & proven operating model. We've shown that we make a real difference for physician practices and their patients. About the position: Stellar Health is looking for an Information Security Manager to help prioritize and drive our Information Security program and investments. We are looking for an individual that is passionate about building out new security processes that are thoughtful in their design for both external users, customers, and teammates. Stellar Health operates in the HealthTech space and is HITRUST R2 certified. This role will help ensure our security program is proactive as possible by: Helping reduce the effort to maintain and demonstrate our alignment to HITRUST by automating the collection of evidence, as well as deploy continuous testing of controls.Staying aligned with our cross-functional teams as they deliver on their controls and support our security processes. Bolster and improve our internal security processes as a security team by partnering with our leadership team to set strategic priorities for the team, informed by our organization and platform services' threat models. How you'll make an impact: By 3 months you will… Have a solid foundation of our current security posture, controls, and security processes, what is working well and where there are gaps Have a prioritized list of areas of improvement and/or investments to help reinforce and improve our security posture Implemented 1-2 improvements to current processes and/or automations to ensure a security control is working appropriately, examples of potential improvements:Ensure all Git repos align with our change management standards around PR reviews, automated code testing, deployments and any required security reviews Implement continuous testing of our endpoint configurations to ensure they align to our security standards (e.g. all endpoints are encrypted at rest, have security agents deployed) By 6 months you will… Aligned with senior leadership around team skillset and staffing needs to maintain security processes and operations Collaborated with other teams that support our security controls to expand the list of improvements to include non-security pain points in evidence collection or inefficient processes Delivered first quarter of 1-2 projects from the prioritized list of areas of improvement Established a process to review high risk applications and systems with System Owners to ensure they align to any applicable security standards/controls and other security recommendations What You'll Bring: 4-5 years of security program & engineering experience building and implementing security tooling and processes Strong familiarity and experience helping secure cloud environments and infrastructure, preferably AWSSupported, and preferably led, external audits of security frameworks (e.g. SOC 2 Type 2, ISO 27001, HITRUST) Experience with coding and automation, preferably Python and/or Terraform Who will love this job: You enjoy a tight partnership and daily interactions with DevOps and IT engineers to deliver on technical projects and process improvements You are passionate about designing thoughtful, business-focused solutions to security problems vs implementing a security “best practice” solution when not applicable You appreciate the need to audit and validate security controls, but would much rather automate the work where possible so you can focus your efforts on creating strong proactive partnerships and further reducing security risks elsewhere Pay: The salary range for this role is $170,000 - $200,000 + an annual performance based bonus. Where a new hire falls within this range will be based on their individual skills and experience, and how these competencies compare across other employees in the same role. Stellar's bands are designed to allow for individual compensation growth within the role. As such, new hires typically start at the lower end of the range. Stellar rewards performance and outcomes - should you join the company, you will have the opportunity to grow your salary over time. Perks & Benefits: Stellar offers a carefully curated selection of wellness benefits and perks to our employees: Medical, Dental and Vision Benefits Flexible PTO Universal Paid Family Leave Company sponsored One Medical memberships and Citibike memberships Medical Travel Benefits A monthly wellness stipend that gives employees the freedom to choose where they spend their cash, whether it be on wellness, pet care, childcare, WFH items, or charitable donations Stock Options & a 401k matching program Career development opportunities like Manager Training, coaching, and an internal mobility program A broad calendar of company sponsored social events that for our in-office and remote employees Diversity is the key to our success. Stellar Health is an equal opportunity employer and we are open to all qualified applicants regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or expression, veteran status, or any other legally protected status. We believe that diverse teams -and the different identities, cultures, and life experiences our team members bring to the table- enable us to create amazing products, find creative solutions to interesting problems, and build an inclusive working environment. Stellar Health Employment Privacy Notice At Stellar Health, your privacy and security as a job seeker is a priority no matter where you are in the interview process. As recruiting scams have become more prevalent, please take note of the following practices to ensure the legitimacy of any interaction with our team. Please note that any communication from our recruiters and hiring managers at Stellar Health about a job opportunity will only be made by a Stellar Health employee with an @stellar.health email address. Stellar Health does not utilize third-party agencies for recruitment services and does not conduct text message or chat-based interviews. Any other email addresses, agencies, or forums may be phishing scams designed to obtain your personal information. We will not ask you to provide personal or financial information, including, but not limited to, your social security number, online account passwords, credit card numbers, passport information, and other related banking information until we begin onboarding activities, which will be coordinated by a member of the Stellar Health People Ops Team with an @stellar.health email address. If you are ever unsure whether you are in contact with a legitimate Stellar Health teammate, please contact people-team@stellar.health. If you believe you've been a victim of a phishing attack, please mark the communication as “spam” and immediately report it by contacting the U.S. Federal Trade Commission.
    $170k-200k yearly Auto-Apply 19d ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $100k-140k yearly est. Auto-Apply 10d ago
  • Manager Senior, Information Security

    USAA 4.7company rating

    Remote job

    Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity As a dedicated Manager Senior, Information Security (Application Security), you will lead our Application Security Engineering (ASE) Team. ASE team is responsible for supporting the business in the protection and secure development of USAA application by ensuring security throughout the Software Development Process (SDLC). This leader will also be responsible for identifying emerging risks, documenting, and building business cases to address them. This team is a part of our Cyber Threat Operation Center (CTOC), which protects, detects and responds to cyber security events. The CTOC is comprised of several teams that partner as needed to provide centralized and coordinated response and mitigation activities. Leads one or more analytical, business or technical support functions and is responsible for the implementation and management of enterprise information security policies, standards, processes and solutions that ensure USAA establishes, deepens and retains a best-in-class security posture. Develops, designs and implements security governance and assurance processes within security domains. This role has a direct impact on protecting USAA's brand and reputation within assigned Information Security domains. Plans and organizes activities of professional and administrative staff engaged in providing information security/cyber security services associated with existing and emerging security risks in a complex and highly regulated environment. Partners with the lines-of-business, Enterprise Risk and Compliance, Audit Services, and Legal, to support enterprise information security risk and compliance initiatives. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in one of the following locations: San Antonio, TX, Plano, TX, Phoenix, AZ, Colorado Springs, CO. Relocation assistance is not available for this position. What you'll do: Responsible for ownership and execution of one or more critical security domains or capabilities. Implements senior leadership's strategic vision and leads their team in the compliant day-to-day completion of their assigned information security domain. Chips in to the organization's short and long-term vision, strategies, goals and metrics. Leads effective operation of assigned information security domain's day-to-day operations including capacity, resilience and dependability capabilities and how changes in conditions, operations, or the environment will affect the system's operation. Develops, reviews, and communicates information security risk management policies and procedures to ensure appropriateness and adequacy versus industry standard methodologies and regulatory requirements. Responsible for developing performance indicators and reporting the status of information security activities and alerting management to potential risks, compliance issues, and operational inefficiencies. Develops, designs, and delivers a sustainable governance and assurance model within multiple domains. Identifies, monitors and evaluates operational solutions to reduce information security risk, meet compliance requirements and increase enterprise workforce efficiency, business agility and workforce scalability. Promotes information security awareness within their teams and across Enterprise Security Group. Serves as financial steward for the organization and handles workforce and budgets to ensure they cost-effectively meet the needs of the organization. Builds and oversees a team of employees for assigned functional area through ongoing execution of recruiting, development, retention, coaching and support, performance management, and managerial activities. Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures. What you have: Bachelor's degree in Information Security, Information Technology, Computer Science, Business Administration, Information Systems/Management or related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree. 6 years of related information security experience in one or more domains, e.g.: Cybersecurity, Identity and Access Management, Information Assurance and Governance, Operational Risk Management and/or Information Technology to include considerable accountability for projects, programs, processes or policies. 2 years of direct team lead, supervisory, or management experience in an Information Security or Information Technology domain. 2 years of researching, designing, or implementing technology, information security or cybersecurity solutions in a large financial institution or large enterprise information security program with a consistent track record of delivering results in compliance with federal/state/regulatory information security and risk management policies, standards, and guidelines. Working knowledge of relevant regulations and standards related to risk management and information security, e.g.: FFIEC, Gramm-Leach-Bliley, FFIEC Cybersecurity Assessment Tool, NIST Cybersecurity Framework and the Payment Card Industry Data Security Standard. Strong written and verbal communication skills, including the ability to communicate technical analyses to a non-technical audience. Strong knowledge of security technologies to include cryptography, authentication, authorization, and controls. Strong Knowledge of IT risks and experience implementing security solutions. Knowledge of threats, vulnerabilities, attack methods and countermeasures for web-based applications, networks, and cyber security solutions. Expertise in risk management processes and principles. Familiarity with budgets, forecasting, and executing on the budgets for the applicable information security, cybersecurity, or technology support function. What sets you apart: Robust understanding of Application Security Standard and Frameworks (OWASP Top 10, OWASP SAMM, BSIMM, NIST SSDF, etc.) Familiarity with application security testing tools (SAST/DAST/SCA/Containers) and Web Application Firewall (WAF) Familiarity with Agile Workflows and Software Development Process (SDLC) Strong relationship management skills and ability to engage business partners across the enterprise. Compensation range: The salary range for this position is: $138,230.00 - $264,200.00. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on USAAjobs.com. Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $83k-107k yearly est. Auto-Apply 4d ago

Learn more about cyber security engineer jobs

Work from home and remote cyber security engineer jobs

Nowadays, it seems that many people would prefer to work from home over going into the office every day. With remote work becoming a more viable option, especially for cyber security engineers, we decided to look into what the best options are based on salary and industry. In addition, we scoured over millions of job listings to find all the best remote jobs for a cyber security engineer so that you can skip the commute and stay home with Fido.

We also looked into what type of skills might be useful for you to have in order to get that job offer. We found that cyber security engineer remote jobs require these skills:

  1. Cyber security
  2. Python
  3. Linux
  4. Architecture
  5. Nist

We didn't just stop at finding the best skills. We also found the best remote employers that you're going to want to apply to. The best remote employers for a cyber security engineer include:

  1. Sentara Healthcare
  2. Booz Allen Hamilton
  3. Lockheed Martin

Since you're already searching for a remote job, you might as well find jobs that pay well because you should never have to settle. We found the industries that will pay you the most as a cyber security engineer:

  1. Technology
  2. Professional
  3. Health care

Top companies hiring cyber security engineers for remote work

Most common employers for cyber security engineer

RankCompanyAverage salaryHourly rateJob openings
1Digital Defense by HelpSystems$109,122$52.460
2Brooksource$102,486$49.270
3Harbor Freight Tools$101,960$49.020
4Jacobs Enterprises$99,709$47.9410
5Constellation West$97,210$46.743
6Booz Allen Hamilton$96,405$46.3588
7ASRC Federal$91,616$44.055
8Serco$91,167$43.8320
9Lockheed Martin$87,326$41.98142
10CACI International$86,486$41.5891

Browse computer and mathematical jobs