Post job

Cyber Security Engineer remote jobs

- 551 jobs
  • Epic Cadence & Security Analyst

    Onpoint Search Consultants 4.2company rating

    Remote job

    What you will find ... 100% REMOTE exceptional benefits (pension plan options) top ranked hospital in the U.S. What you will do ... design & build Epic Cadence build Epic Security break-fix & support Epic Cadence & Security optimize Decision Tree for scheduling liaison with operational stakeholders Wish list ... 5+ years Epic Cadence & Security build REQUIRED Epic Cadence Certification REQUIRED Epic Security Certification recent Epic Security work Decision Tree a plus
    $80k-116k yearly est. 2d ago
  • Security Analyst III - Hybrid

    Charles Schwab 4.8company rating

    Remote job

    Regular Your opportunity At Schwab, you're empowered to make an impact on your career. Here, innovative thought meets creative problem solving, helping us “challenge the status quo” and transform the finance industry together. We believe in the importance of in-office collaboration and fully intend for the selected candidate for this role to work on site in the specified location(s). The Access Management department is responsible for provisioning and securing user and privileged access to our core applications and systems in both the distributed and mainframe environments for all Schwab internal users. This includes Active Directory, Exchange, TSO/Beta, SecurID, VAS enabled UNIX, Remedy, and a variety of other Schwab Business applications. We also provide technical support for access control issues for Schwab global-wide production systems. In addition the team implements security controls and interacts with auditors and regulators to provide evidence of access compliance. The information security analyst will be primarily responsible for administration of high risk business applications across a variety of technology platforms. These administrative tasks may require coordination with outside vendors and/or configuration of user accounts on Windows, Unix, mainframe, or SQL and Oracle environments. What you'll do: This position administers access and provides support for Schwab-wide production systems in compliance with Information Security, Privacy and SOX policies and procedures. This position also partners regularly with internal business partners to design service delivery processes. Responsible for administering access, maintaining documentation and troubleshooting access issues specifically for High Risk Business applications. Work both independently and within teams to complete work with minimum supervision, and strong customer service, written and verbal communication skills are required. Develop and enhance automated solutions. What you have A bachelors in Computer Science or related technical area and/or 4-6 years of experience with multiple operating systems, including Windows, Unix, and Mainframe systems. Develop in Power BI, UI Path or Power Automate Experience administering access for multiple applications simultaneously. Experience documenting work procedures required. Strong analytical, technical and communication skills are required. Experience with systems account creation, modification and removal is required. Experience analyzing complex business and system requirements Demonstrated the ability to work both independently and within teams Ability to partner with small teams in technical tasks. Ability to anticipate technical issues that require resolution for success. Ability to interface with business / technology partners on projects. Demonstrated ability to achieve success on large complex initiatives Experience with Remedy or other service management ticketing tooling desired. Knowledge of IT Security concepts and Access Management principles desired. Be driven to expand your technical capabilities and experiences outside of your day-to-day tasks. What's in it for you At Schwab, you're empowered to shape your future. We champion your growth through meaningful work, continuous learning, and a culture of trust and collaboration-so you can build the skills to make a lasting impact. Our Hybrid Work and Flexibility approach balances our ongoing commitment to workplace flexibility, serving our clients, and our strong belief in the value of being together in person on a regular basis. We offer a competitive benefits package that takes care of the whole you - both today and in the future: 401(k) with company match and Employee stock purchase plan Paid time for vacation, volunteering, and 28-day sabbatical after every 5 years of service for eligible positions Paid parental leave and family building benefits Tuition reimbursement Health, dental, and vision insurance
    $79k-106k yearly est. Auto-Apply 1d ago
  • Offensive Cyber Analyst / Programmer

    Lockheed Martin 4.8company rating

    Remote job

    may be eligible for up to a $25K sign on bonus for external hires\! **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life\. You'll develop innovative offensive cyber capabilities that help protect the nation and the world\. Cyber | Lockheed Martin **Who we are:** Are you driven by the thrill of outsmarting even the most advanced security systems and networks? Do you find satisfaction in crafting innovative solutions to stay one step ahead of the adversary? If so, join Lockheed Martin Cyber & Intelligence's elite Offensive Cyber team, where we don't just test defenses \- we pioneer the techniques, tools, and exploits that define the cutting edge of offensive cyber operations\. We're seeking a highly skilled and motivated individual to join our Cyber & Intelligence team as an Offensive Cyber specialist\. The ideal candidate will possess a strong passion for cybersecurity and a drive to develop innovative solutions that surpass existing security measures\. Key responsibilities will include designing and implementing advanced techniques, tools, and exploits to stay ahead of emerging threats\. If you have a proven track record of thinking creatively and pushing the boundaries of what's possible in cybersecurity, we encourage you to apply\. Our team is dedicated to pioneering the latest advancements in offensive cyber operations, and we're looking for someone who shares our commitment to excellence and innovation\. As a member of our elite team, you will have the opportunity to work on complex and challenging projects, collaborating with experienced professionals to develop cutting\-edge solutions that drive our industry forward\. If you're a talented and ambitious ind **Why Join Us:** Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work\. Learn more about Lockheed Martin's competitive and comprehensive benefits package\. We support our employees, so they can support our mission\. **The Work:** A CNO \(Computer Network Operations\) offensive cyber professional can be described as a "cyber warrior," harnessing their expertise in computer systems and networks to disrupt and disable adversary capabilities\. Alternatively, they can be referred to as a "digital operator," skillfully navigating the virtual battlefield to achieve strategic objectives\. They can also be characterized as "cyber operatives," leveraging their knowledge of cybersecurity and computer networks to conduct operations and gather critical intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and real\-time systems\. Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment\. Stop having to look for a new job with every rumor and whim of contract changes\. \#RMSC6ISR \#RMSCYTJ \#OneLMHotJobs \#RMSTG2025 \#RMSTG2026 **Basic Qualifications:** - Candidate must possess active US security clearance with a polygraph - Bachelor's degree in computer science, information systems, or network engineering from an accredited college\. OR 4 years equivalent experience in lieu of a degree\. - Experience programming with any of the following: Assembly, C, C\+\+, Java, Perl or Python - Experience programming in one or more systems: Windows, Unix, Embedded, or Mobile platform applications **Desired Skills:** - 2\+ years in computer science, information systems, or network engineering\. - Able to design, write, and execute software test plans **Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for consideration\. **Clearance Level:** TS/SCI w/Poly **Other Important Information You Should Know** **Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match\. Should this match be identified you may be contacted for this and future openings\. **Ability to Work Remotely:** Onsite Full\-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility\. **Work Schedules:** Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees\. Schedules range from standard 40 hours over a five day work week while others may be condensed\. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits\. **Schedule for this Position:** 9x80 every other Friday off **Pay Rate:** The annual base salary range for this position in California, Massachusetts, and New York \(excluding most major metropolitan areas\), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $76,500 \- $134,895\. For states not referenced above, the salary range for this position will reflect the candidate's final work location\. Please note that the salary information is a general guideline only\. Lockheed Martin considers factors such as \(but not limited to\) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer\. **Benefits offered:** Medical, Dental, Vision, Life Insurance, Short\-Term Disability, Long\-Term Disability, 401\(k\) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays\. \(Washington state applicants only\) Non\-represented full\-time employees: accrue at least 10 hours per month of Paid Time Off \(PTO\) to be used for incidental absences and other reasons; receive at least 90 hours for holidays\. Represented full time employees accrue 6\.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays\. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year\. This position is incentive plan eligible\. **Lockheed Martin is an equal opportunity employer\. Qualified candidates will be considered without regard to legally protected characteristics\.** **The application window will close in 90 days; applicants are encouraged to apply within 5 \- 30 days of the requisition posting date in order to receive optimal consideration\.** At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges\. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work\. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility\. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work\. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility\. If this sounds like a culture you connect with, you're invited to apply for this role\. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications\. **Experience Level:** Experienced Professional **Business Unit:** RMS **Relocation Available:** Possible **Career Area:** Cyber Security **Type:** Task Order/IDIQ **Shift:** First
    $76.5k-134.9k yearly 46d ago
  • Senior Cyber Security Ops Analyst | Remote | Contract

    Spartan Technologies

    Remote job

    Senior Cyber Security Ops Analyst Applicants Need To Know 6+ Month Contract Work Status: USC, GC Sponsorship: No, Sponsorship provided. Office Type: Remote Hourly Rate: $75 to $85 W2 Only No Corp-to-Corp Please note that only candidates who are authorized to work in the United States without sponsorship will be considered for this position. We seek a Senior Cyber Security Ops Analyst for our client. This is a contract position lasting 6+ months. The role is remote and requires availability in the Eastern or Central time zones. As a Sr Cyber Security Ops Analyst, you will be responsible for security monitoring and incident response for both internal and external threats. You will collaborate with internal IT teams and MSSP to ensure effective security monitoring and response. Additionally, you will implement advanced security monitoring techniques to identify malicious behavior and develop automation response scripts to remediate commodity threats. Your role will also involve performing threat analysis utilizing industry standard frameworks and conducting threat research to improve detection and response capabilities. You will have the opportunity to propose and review security plans and policies to enhance the overall security environment. The Work: Conduct investigations and respond to internal and external security threats. Oversee, respond to, and remediate DLP (data loss prevention) and SIEM events from on-premise and cloud systems. Implement advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints. Manage, administer, and improve security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry-standard security technologies. Develop automation response scripts to remediate commodity threats. Perform threat hunting activities to identify compromised resources. Understand and perform threat analysis utilizing industry-standard frameworks (kill chain and diamond model). Perform threat research and intelligence gathering to improve detection and response capabilities. Propose and review security plans and policies to improve the security environment. Maintain operational playbooks, process diagrams, and documentation for security monitoring and response. Review proposed Security deployments to ensure security monitoring requirements are met. Provide off-hour support as needed for security monitoring and response activities. Work closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external. Review compromised systems to identify the root cause of security incidents. Qualifications: Minimum of 5 years of experience in security monitoring and incident response Strong knowledge of DLP (data loss prevention) and SIEM events Experience with advanced security monitoring techniques on SaaS, cloud systems, network, servers, and endpoints Proficiency in managing and administering security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry standard security technologies Ability to develop automation response scripts for commodity threats Familiarity with threat hunting activities to identify compromised resources Understanding of threat analysis utilizing industry standard frameworks (kill chain and diamond model) Experience in threat research and intelligence gathering to improve detection and response capabilities Knowledge of reviewing security plans and policies to enhance the security environment Strong documentation skills for operational playbooks, process diagrams, and security monitoring/response documentation Ability to review proposed Security deployments to ensure compliance with security monitoring requirements Willingness to provide off-hour support for security monitoring and response activities Nice to Have: Experience with cloud security technologies such as CASB, Cloud Access Security Brokers Knowledge of scripting languages such as Python or PowerShell Familiarity with industry compliance standards (e.g., PCI DSS, HIPAA, GDPR) Certifications in relevant areas such as CISSP, CISM, or CEH Experience working with incident response tools and processes #CyberSecurity #SecurityOps #IncidentResponse #ThreatAnalysis #SecurityMonitoring #DataLossPrevention #SIEMEvents #CloudSecurity #EndpointSecurity #ITSecurity
    $75-85 hourly 60d+ ago
  • Cyber Security Analyst - Cyber Security Certification Manager

    Techximius

    Remote job

    Tech(x) is an energized company with experienced, specialized and progressive thought leaders progressing talented professionals in areas of technology, security, logistics, project management, talent management and procurement. We are building our DoD and technology footprint by allowing hybrid and remote work locations, as well as flexible schedules. As a solution-based company, we foster a creative environment that welcomes new perspectives from all of our team members. This is a pivotal position for our team; internal and external customers, who is focused on supporting the program and its growth. Responsibilities This position supports a DEVCOM lab under NSA and requires cyber security SME level oversight in certifying lab policies, and procedures for cyber security industry level standards. Implement security measures and monitor networks. Identify, interpret, and evaluate major applications, infrastructure, enclaves, and Enterprise system environments based on proposed accreditation boundaries. Establish and publish upon approval Cybersecurity policies and Standard Operating Procedures (SOPs) as required to include Quality control process documentation. Coordinating with third party certification labs. Assist in the maintainability of a Continuous Monitoring Strategy and Program to maintain information system networks for operational testing Work with Engineers and COMSEC SME to assess security levels for projects. Performing certification audits, at internally and at assembly facilities. Sample coordination and submissions. Update of online certification website. Must be able to participate in testing, and contribute towards solutions when problems arise, at third party certification agencies. This position does not have direct reports or supervisory responsibilities. All other duties assigned. Qualifications Experienced debriefer. Have excellent communications, teamwork, leadership and conflict management skills. Knowledge of computer applications software. Can identify and communicate risks and provide mitigation strategies. Ability to enter data accurately into databases. Ability to write routine reports and correspondence. Interpersonal skills are necessary to work effectively and cooperatively with all levels of management and staff. Must possess effective oral and technical written communication skills to clearly communicate information to others. Must be proficient in applying Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) and or Security Requirements Guide (SRG) checklist to various devices within an Information System Preferred Qualifications ISSP certified. DoD contract experience. Experience with the Army's cryptographic programs. COMSEC training and or experience. Certified as a Certified Information System Security Professional (CISSP) Military trained and a Veteran. DoD TS/SCI w/poly Clearance. Certified Information Systems Auditor (CISA) Clearance: Active DoD TS/SCI clearance. Education & Experience: Bachelor's degree in Cyber Security, Computer Science, Engineering or other closely related field. 4-9 years of cyber security experience. Location: Linthicum Heights, Maryland. Monday-Friday 8:00 am to 5:00 pm. Schedule flexing (starting and ending times) is available with the PM's approval. Travel: Some travel. Join the Team: Tech(x) is a customer centric team, both external and internal customers. This team supports each other to be successful on the job and in meeting the mission. Tech(x) is an Equal Opportunity Employer.
    $75k-101k yearly est. Auto-Apply 6d ago
  • AI & Cyber SME

    American Bureau of Shipping 4.8company rating

    Remote job

    The Senior Principal Consultant will work as a senior expert on the successful delivery of projects for clients as a member of a project team within a market program. This includes providing technical expertise to the project manager and team members with initiating, planning, executing, monitoring and controlling, and closing projects. This position also includes maintaining relationships with clients and key decision-makers to help identify follow-on Business opportunities and maintain customer intelligence. What You Will Do: Provide expertise on project tasks to ensure quality services are delivered on schedule and within the available budget to meet customer requirements. Define project tasks, estimate task duration, and develop a project schedule as part of developing a project management plan Review project management plans to understand the scope, schedule, and assigned work authorization Provide technical expertise to support the execution of project tasks Develop briefing materials and write reports to communicate concepts and analysis results to clients and end users Lead research and data analysis, including but not limited to assisting with conducting customer or stakeholder analyses Prepare written documents, and reports, and provides presentations to clients. Develop conclusions and recommendations, write reports, and assist with client presentations Track and reports hours spend executing projects Work with individuals at all levels, provide input to reports and other deliverables, execute multiple assignments, meet agreed deadlines, and adjust to changing client demands Develop relationships with existing customers to facilitate the development of new business. Identify new business opportunities with existing customers for current and/or additional services Participate in marketing activities, conference presentations, technical whitepapers Assist with proposal development, including writing proposals, estimating the level of effort Learn, understand and be conversant in ABSG Industrial Cybersecurity products and services Review published reports and news articles about existing and potential new clients to identify customer intelligence Networking to meet new potential clients Serves as senior technical expert guiding project tasks and ensuring quality, schedule, and budget compliance. Project management with planning, sequencing tasks, estimating durations, and developing project schedules. Performs quality assurance on deliverables and tracks project execution metrics. Maintains and develops relationships with clients and key decision-makers. Actively participates in client meetings, presentations, and proposal development. Identifies new business opportunities through client interactions and market intelligence. Communicates client needs internally and contributes to proposal writing. Leverages subject matter expertise to drive growth and expand services. What You Will Need: Education and Experience Bachelor's degree in Computer Science, Business, or a recognized equivalent from an accredited university. Experience will be considered in lieu of education, preferably in data processing or a related field. Typically requires a minimum of five (5) years of working with a Customer Relationship Management System (CRM). Proven experience in Systems Development environment with project management responsibility for successful projects. Extensive IT and functional experience in cultivating positive customer relationships. experience working in organizations to support services provided to internal/external clients PMP Certification is preferred. Microsoft Dynamics CE experience preferred Knowledge, Skills, and Abilities Analytical and problem-solving capabilities. Strong understanding of sales, marketing, and customer service processes, to ensure functionally correct implementation. Strong understanding of Dynamics 365 CRM design, structure, functionality, and processes. Knowledge of CPQ (Configure, Price, Quote), PRM (Partner Relationship Management), CLM (Contract Lifecycle Management), and Sale Compensation Management applications, and their functionality. Managed complete life cycle projects involving multiple cross-functional business teams. Excellent verbal, written, and presentation skills consistent with a client group, including senior managers & executives. Knowledge of Microsoft Power Platform, working with Power BI to build data visualization, and Power Automate implementing business workflow. Strategic while also able to perform tactical duties. Self-starter, highly motivated with the ability to work with limited supervision. Experienced in the design and maintenance of business applications. Ability to obtain a working knowledge of the ABS Health, Safety, Quality, and Environmental Management System. Salary: $210k - $220k Reporting Relationships: Reports to a Manager, Director, or Executive level position and has no direct reports.
    $72k-98k yearly est. Auto-Apply 12d ago
  • Cyber Security Analyst II (Remote)

    Ntirety, Inc.

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: * Act as the primary point of escalation for Cyber Security Analyst I technicians * Provides coaching to Cyber Security Analyst I employees on how to perform their duties * Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats * Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole * Performs all of the following functions of a Cyber Security Analyst I, with proficiency * Monitor computer networks for security issues and respond accordingly, including: * Creating/Managing firewall rules * Managing anti-virus endpoint tools * Performing event correlation analysis on potential threats identified through our SIEM * Configuring/Managing log management * Configuring/Managing file integrity monitoring * Performing vulnerability scans and remediation of identified risks * The methodology & analysis of identifying compromised servers * Performing rule tuning in our SIEM for improved detection capabilities * Interact with customers by phone, chat, or trouble ticket on any customer facing security issues * Investigate, document and assess security breaches and other cyber security incidents * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs * Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives * Identify and fix detected vulnerabilities to maintain a high-security standard * Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities * May be relied upon as a technical point of contact during Escalated Events relating to security * Review, investigate and respond to any external "abuse" complaints coming from our IP space * Develop best practices for IT security * Research security enhancements and make recommendations to management * Handle escalated internal or customer security issues from support or another operations team * Takes part in any security-oriented projects or critical initiatives * Stay up to date on information technology & security news, trends and standards * Deliver an exceptional customer experience every day * Other duties as identified or assigned DESIRED ROLE OUTCOMES: * Keep us and our customers free from security incidents but respond capably when one occurs * Our detection of security threats is continually improving * Provide valuable insights and visibility around security incidents to our customers * Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: * A minimum of 2 years' experience in a security analyst role * Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred * Must have experience in a Security Operations Center (SOC) * Must have technical troubleshooting and problem-solving skills * Understanding of network management principles * Experience in systems administration of Windows and Linux based operating systems * Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies * Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts * Ability to identify and mitigate network vulnerabilities and explain how to avoid them * Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact * Ability to learn and communicate technical information to non-technical people * Must have excellent written & oral communication skills, and strong interpersonal skills * Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $76k-102k yearly est. 60d+ ago
  • Cyber Security Analyst II

    Cybersheath 3.7company rating

    Remote job

    Job Description CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position The schedule for this role is: Week One: Friday - Sunday 8:00 AM - 8:00 PM Week Two: Friday - Monday 8:00 AM - 8:00 PM Travel requirements: 0-5% yearly. Please note that this role will be part of our SOC on-call rotation CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000-$100,000 USD
    $70k-100k yearly 13d ago
  • Cyber Threat Fusion Analyst

    Beyond SOF

    Remote job

    The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start. Essential Job Functions Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats. Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections. Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. Understand concepts of log and packet analysis Navigate the command line using specific expressions to manipulate data Handle and organize disparate data about detections, attacks, and attackers Employ discovery techniques and vetting of new intelligence. Create Situational Awareness Reports and Threat Briefs. Minimum Required Qualifications Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree. Computer defense technologies spanning endpoint, network, and open source. Required Security Clearance: TS/SCI. 8570 IAT II certification is required prior to start. It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
    $74k-100k yearly est. 60d+ ago
  • Cyber Insider Threat Analyst (Remote)

    RTX

    Remote job

    Country: United States of America Remote U.S. Citizen, U.S. Person, or Immigration Status Requirements: U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract. Security Clearance: None/Not Required RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA. The following position is to join our RTX Enterprise Services team: Role Overview: Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats. What You Will Do: Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns. Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers. Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats. Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models. Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts. Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions. Work independently and with teams to define and complete analysis activities. Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers. Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape. Assist in building processes, procedures and training for the insider threat team. Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes. Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies. Perform other duties as assigned and as required to continuously drive process excellence. Qualifications You Must Have: Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience. Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions. Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise. The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE). Industry certifications in information security or technology such as, CISSP, CISM, CGEIT. Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR). Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms. Demonstrate critical thinking and problem-solving skills. What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care. Learn More & Apply Now! Work Location: Remote Please consider the following role type definition as you apply for this role: Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $82k-111k yearly est. Auto-Apply 60d+ ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Remote job

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $76k-99k yearly est. Auto-Apply 34d ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • SR CYBER SECURITY ENGINEER

    Chugach Government Solutions, LLC 4.7company rating

    Remote job

    About Us When you work at Chugach Government Solutions (CGS), you join a proud legacy of supporting missions while sustaining culture. The federal division of Chugach Alaska Corporation, CGS has been supporting critical missions as a government contractor for over 25 years. Our focus is to support facility maintenance, IT/technical services, construction and education. We are proud to have built, and continue to foster, an incredibly talented team spanning across the globe in hundreds of different fields - each team member proud to serve our country with first-class business services, while also making a difference for our Chugach shareholders. At CGS, empowering employees is a part of our core, and that focus is one of the ways we build and foster high-performing teams. We empower our employees through competitive compensation and benefits package, professional growth opportunities, truthful communication, and more! If you are looking for an opportunity to serve something bigger than yourself; if you want your day job to be one that creates meaningful value; if you are looking for an environment that highly values employees and respects individual differences - then Chugach Government Solutions may be the right fit for you! Job Overview This role will be working with NIWC team to provide technical expertise in Risk Management Framework (RMF) and Cybersecurity Engineering for multiple customers. You will provide leadership and support in operational, technical and process of system A&A packages, to include development and analysis of required policies and other deliverables as required throughout the RMF lifecycle. The IT systems vary in size based on locations in CONUS and OCONUS. The Sr. Cybersecurity Engineer will apply his/her experience and knowledge to help the project team support the guide, design, implementation, documentation, and troubleshooting of the environment(s). Work Model: Hybrid Responsibilities Essential Duties & Job Functions: * Serve as the primary cybersecurity advisor to NIWC customers, providing subject matter expertise on the Risk Management Framework (RMF). Authorization process as an ISSE, up to the Top Secret level. * Establish and maintain effective relationships with internal personnel and external representatives at various levels. * Analyze security findings, Develop mitigations for open findings, and/or update POA&M. * Draft diagrams, plans, policies, and SOPs to document findings, procedures, and longer-term strategy. * Oversee the execution of Security Technical Implementation Guides (STIGs), Security Content Automation Protocol (SCAP), and Assured Compliance. Assessment Solution (ACAS) scans in accordance with DoD and Navy guidance. * Direct the ongoing management of VRAM site to have the updated security scans and track IAVAs and other cyber alerts (CTOs). * Act as a lead subject matter expert during security incidents to investigate, contain, and remediate breaches. * Communicate complex security risks and requirements to both technical and non-technical stakeholders. * Provide strategic recommendations for securing systems and changes to increase efficiency in applying security controls. * Perform other Cybersecurity duties as tasked.. Accountable For: * Ability to mentor and guide other cyber professionals on the team. * Ability to collaborate with site administrators and the cyber team on developing a strategy to improve security posture. Job Requirements Mandatory: * Bachelor's degree in Cybersecurity or related STEM discipline. * Master's degree in related field is highly desired. * Candidates must possess an active TS clearance to be considered. * Ten years of managing project tasks and personnel. * Ten+ years of experience in DoD accreditation/authorization process. * Experience with Microsoft servers, network, STIGs, SCAP, and ACAS. * Experience with JWICS RMF process is highly desired. * Knowledge/Understanding of Cross Domain Solutions is highly desired. * Compliant with DoD 8140/8570 IAT Level II certification. * Must be able to successfully pass a pre-employment background check and pre-hire drug test. Working Conditions: * Military bases. * Travel as required. * Possible remote position available. Physical Requirements: * Ability to lift 30 pounds unaided or 80-pound loads aided. Reasonable Accommodation: CGS will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with Chugach Government Solutions or any of its subsidiaries, please email ******************. Equal Employment Opportunity: Chugach is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, gender, sexual orientation, gender identity or expression, age, pregnancy, disability, genetic factors, protected veteran status, or other characteristics protected by law.
    $77k-104k yearly est. Auto-Apply 43d ago
  • Senior Backend Engineer - Identity Security & Agentic Systems

    Veza Technologies, Inc.

    Remote job

    At Veza, we're building the next generation of Access Identity Security - and we're bringing GenAI into the core of that mission. We're seeking a Senior Backend Engineer who is excited to work on multi-agent systems, LLM-based automation, and Model Context Protocols (MCP) to transform how access control intelligence is built and delivered. This is a rare opportunity to operate at the frontier of LLM research and backend systems engineering, contributing to both the design of scalable architectures and the implementation of intelligent agents that reason, decide, and act. You will: Building APIs and backend services, test and evaluation frameworks in Python/Golang to support agentic workflows. Prototyping and productizing LLM-based capabilities into the identity access pipeline. Developing agent orchestration layers and working with frameworks like LangGraph or AutoGen. Designing systems around context-awareness, memory, and autonomous decision-making. You Have: Education: Bachelor's or Master's degree in Computer Science, Engineering, or a related field. Experience: 5+ years of backend development experience. Strong proficiency in one or more programming languages, such as Python, Golang, or Java. Experience designing and implementing RESTful APIs and Microservices Architectures. Experience with cloud platforms, such as AWS, Azure, or Google Cloud Platform, and familiarity with IAM services and features. Curiosity and/or experience with GenAI technologies, multi-agent systems, or prompt orchestration. Strong communication and interpersonal skills, with the ability to effectively communicate technical concepts to both technical and non-technical stakeholders. Strong sense of Product feature Ownership - from Ideation to Deployment The compensation for this role depends on several factors such as the candidate's skills, qualifications, experience, and work location. For candidates offered a position at the posted job level, the provided range is the expected base salary. This does not include any additional variable compensation, such as commission. Compensation Disclosure $154,000-$210,000 USD Our Culture We're driven to build a strong company culture and are looking for individuals with solid alignment with the following: Ownership Mindset Act with Integrity Guardians of our Customers Opinionated Humility Build Trust, Earn Trust At Veza, your base pay is one part of your total compensation package. For this position, the reasonably expected pay range can be discussed with your recruiter for the level at which this job has been scoped. Your base pay will depend on several factors, including your experience, qualifications, education, location, and skills. In the event that you are considered for a different level, a higher or lower pay range would apply. This position is also eligible for equity and a competitive benefits package. Veza is proud to be an equal opportunity employer. We are committed to equal employment opportunities regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, veteran status, or other applicable legally protected characteristics. We also consider qualified applicants according to applicable federal, state, and local laws. If a candidate with a disability requires an accommodation during the recruitment process, please email ******************* About Veza Veza is the identity security company. Identity and security teams use Veza to secure identity access across SaaS apps, on-prem apps, data systems, and cloud infrastructure. Veza solves the blind spots of traditional identity tools with its unique ability to ingest and organize permissions metadata in the Veza Authorization Graph. Global enterprises like Blackstone, Wynn Resorts, and Expedia trust Veza to visualize access permissions, monitor permissions activity, automate access reviews, and remediate privilege violations. Founded in 2020, Veza is headquartered in Redwood City, California, and is funded by Accel, Bain Capital, Ballistic Ventures, GV, Norwest Venture Partners, and True Ventures. Visit us at veza.com and follow us on LinkedIn, Twitter, and YouTube.
    $154k-210k yearly Auto-Apply 39d ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems International 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. Create solution design documentation (drawings, BOMs, solution design summaries). Provide technical support for in-office and on-site team members. Support management in the process of creating documentation for implementing new technology with new and existing customers. Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications A minimum of 3-7 years previous experience in the industry. Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. Experience in the design and planning of access control and video systems. Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Other Eligibility Requirements Ability to manage time and multiple tasks without supervision. Organizational skills & detail oriented. Good analytical and problem-solving skills. Excellent presentation, writing skills, verbal, and written customer communication skills. Experience in computer programs such as Microsoft Office, Adobe, etc. preferred. Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $82k-110k yearly est. Auto-Apply 19d ago
  • Senior Consultant - Epic Security Analyst - Remote

    Nordic Consulting Partners 4.4company rating

    Remote job

    Make a difference. Be happy. Grow your career. A Nordic consultant is more than just an Epic expert. Our analysts take ownership for their work and the greater success of the organization. We're also looking for someone who listens to the client and understands that each project and each organization is unique. You'll need to tackle tough projects to help those organizations succeed. Experience implementing Epic is required, and if you have experience on a Connect or optimization project, that's a plus. Here are a couple things you'll need: -At least 3 years of Epic experience -At least 1 current Epic certification (Security, Security Coordinator) Senior Consultant A Senior Consultant provides consulting services to clients on Epic-related projects in an analyst, project management, project leadership or training capacity. Key Responsibilities Perform Epic-related consulting and administrative computer services for Nordic clients Apply technical expertise to individual client system build in order to identify, troubleshoot, and resolve problems. Mentor client project teams as necessary in project and system build strategy. Track and document risks and issues. Analyze and document workflows. Work closely with project leadership, including documentation and facilitation. Work directly with Epic end users. Monitor workflows, provide documentation, and optimization suggestions. Lead meetings regarding project status and on-going work-product coordination. Additional specific duties related to the project as may be required and dictated by individual clients. These duties are documented on a per-contract basis in the client's statement of work. May be invited to attend corporate functions as a representative of the company to meet prospective consultants, as well as solidify relationships with client and Nordic co-workers. #LI-AB1 EEO Language: Nordic is an equal opportunity employer dedicated to a policy of non-discrimination on any protected basis including race, creed, color, age, gender, religion, national origin, disability, marital or veteran status, sexual orientation, or any other legally protected status under applicable local, state or federal law. EEO/AA Employer: M/F/Disabled and Vet. Nordic is an equal opportunity employer. We are committed to creating an inclusive environment for all employees and applicants. We do not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, marital or veteran status, or any other protected status under applicable federal, state, or local laws. We encourage individuals of all backgrounds to apply, including women, minorities, individuals with disabilities, and veterans.
    $94k-130k yearly est. Auto-Apply 60d+ ago
  • Senior Systems Engineer SAP Security & GRC

    Cloudscouts Software Solutions LLC

    Remote job

    Job DescriptionSenior Systems Engineer SAP Security & GRC, immediate start. I am working with a Pharmaceutical client with an urgent requirement for a Senior Systems Engineer to own and drive their SAP Security & GRC roadmap across S/4HANA and adjacent platforms (Ariba, MDG, BTP). What you'll do: Define and maintain SAP security guidelines, SoD frameworks, and compliance controls (SOX, GxP, ITGC) Lead SAP GRC 12.x (ARM, ARA, BRM, EAM, access certifications) implementations, role design, and CHARM workflows Support upgrades, Greenfield implementations, and security enhancements Serve as primary contact for audits, KPI reporting, and continuous improvement initiatives Explore AI/ML solutions for predictive access analytics and compliance automation The ideal consultant will have: 78 years of SAP Security & GRC experience, including S/4HANA and Fiori-role design Hands-on experience with SAP GRC 12.x modules and CHARM processes Deep knowledge of access-management principles, SoD analysis, SOX/GxP compliance, and ITGCs Experience across SAP applications: Ariba, MDG, GTS, BTP, ATTP Excellent troubleshooting, communication, and stakeholder collaboration skills Work remote temporarily due to COVID-19.
    $81k-114k yearly est. 7d ago
  • Senior Information Security Risk Specialist (GRC)

    Unveiling Opportunities

    Remote job

    About Us At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you. What are we looking for? We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively. What will you do? Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders. Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth. Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate. Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities. Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002. Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance. Help support internal/external audits and evidence collection via a GRC tool. Document new and update existing policies, procedures, standards and resources Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities. Help support customer security reviews, RFPs and external security and privacy inquiries. Participate in defining, collecting and tracking various Security Metrics. What skills and experience should you bring? 5+ years of experience working in information security, risk or compliance. Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc. Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST. Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk. Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines. Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization. Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers. Experience working with both technical and non-technical teams. Ability and desire to understand the intent of requirements and provide effective recommendations. Ability to prioritize in a highly dynamic work environment. Our Preferred Qualifications: Advanced degree in computer science, Information Technology, Information Security or related field. Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks. Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.) Ability to assess and pragmatically define scope and relevant controls. Strong desire to learn and continuously develop and deepen technical skills. Why us? You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry. Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA Unlimited PTO Industry-leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Disability and life insurance Employee assistance program Gym membership reimbursement Cell phone reimbursement Numerous company-sponsored events, including regular happy hours and team-building events This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions. Base Salary Range$104,000-$138,000 USD SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. SentinelOne participates in the E-Verify Program for all U.S. based roles.
    $104k-138k yearly Auto-Apply 32d ago
  • Senior Information Security Specialist-SECRET CLEARANCE REQUIRED

    Latitude Inc.

    Remote job

    Primary Responsibilities: Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization. Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation. Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts. Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment. Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats. Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps. Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment. Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures. Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance. Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments. All other duties as assigned by management. Qualifications Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education. Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies. Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS). Minimum of (5) years of experience with Security Information and Event Management (SIEM). Minimum of five (5) years of experience in the risk management framework. Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases. Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred. Must have an active DoD Secret Clearance.
    $82k-116k yearly est. Auto-Apply 60d+ ago
  • Information Security Controls Analyst

    United Community Bank 4.5company rating

    Remote job

    United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization. What You'll Do * Review and document the adequacy of security and technology controls across business and IT environments. * Evaluate control posture through interviews, documentation reviews, and workflow analysis. * Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls. * Partner with risk management and security leadership to align controls with organizational risk tolerance. * Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance. * Document and advocate for control improvements that balance risk with operational efficiency. * Support control development across testing, QA, and production environments. * Present control effectiveness reports to senior risk leadership. * Stay current on regulatory requirements, internal policies, and industry best practices. Requirements For Success Experience: * 3+ years in cybersecurity or IT practitioner roles. * 2+ years in IT risk or controls analysis. * Practical experience with risk management and IT control frameworks. Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field. Required Skills: * Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST). * Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA). * Experience with CIS CSC, ISO 2700, or NIST CSF. * Excellent written and verbal communication across all organizational levels. * Strong organizational skills and ability to meet SLAs. * Sound judgment and decision-making in complex scenarios. * High integrity, trustworthiness, and adaptability. Preferred Skills: * Certifications such as CISSP, CISA, CRISC, or CISM. * Technical experience with enterprise networks, applications, and directory services. * Familiarity with enterprise GRC platforms. Conditions of Employment * Must be able to pass a criminal background & credit check * This is a full-time, non-remote position FLSA Status: * Exempt We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
    $50k-77k yearly 39d ago

Learn more about cyber security engineer jobs

Work from home and remote cyber security engineer jobs

Nowadays, it seems that many people would prefer to work from home over going into the office every day. With remote work becoming a more viable option, especially for cyber security engineers, we decided to look into what the best options are based on salary and industry. In addition, we scoured over millions of job listings to find all the best remote jobs for a cyber security engineer so that you can skip the commute and stay home with Fido.

We also looked into what type of skills might be useful for you to have in order to get that job offer. We found that cyber security engineer remote jobs require these skills:

  1. Cyber security
  2. Python
  3. Linux
  4. Architecture
  5. Nist

We didn't just stop at finding the best skills. We also found the best remote employers that you're going to want to apply to. The best remote employers for a cyber security engineer include:

  1. Sentara Healthcare
  2. Booz Allen Hamilton
  3. Lockheed Martin

Since you're already searching for a remote job, you might as well find jobs that pay well because you should never have to settle. We found the industries that will pay you the most as a cyber security engineer:

  1. Technology
  2. Professional
  3. Health care

Top companies hiring cyber security engineers for remote work

Most common employers for cyber security engineer

RankCompanyAverage salaryHourly rateJob openings
1Digital Defense by HelpSystems$109,122$52.460
2Brooksource$102,486$49.270
3Harbor Freight Tools$101,960$49.020
4Jacobs Enterprises$99,709$47.9410
5Constellation West$97,210$46.743
6Booz Allen Hamilton$96,405$46.35117
7ASRC Federal$91,616$44.056
8Serco$91,167$43.8320
9Lockheed Martin$87,326$41.98151
10CACI International$86,486$41.58113

Browse computer and mathematical jobs