Post job

Cyber Security Engineer remote jobs

- 608 jobs
  • Cyber Security Engineer

    Robert Half 4.5company rating

    Remote job

    Are you ready for a change in 2026? If so, please keep reading! A client in the financial services industry is seeking a Cybersecurity Engineer to join their growing Information Security team. This is a direct-hire, hybrid role based in Fresno, CA, offering a mix of in-office and remote work each week. This role is ideal for a seasoned, hands-on cybersecurity professional who enjoys advanced threat analysis, incident response, and security engineering within a regulated environment, and who is confident serving as a trusted technical advisor across the organization. As the Cybersecurity Engineer, you will: Perform threat analysis, threat hunting, and incident response from detection through remediation Monitor, tune, and investigate alerts across EDR/XDR, SIEM, DLP, email security, and identity protection tools Support cloud security initiatives, particularly within Microsoft Azure and Microsoft security ecosystems Conduct vulnerability management, risk assessments, and remediation planning Participate in security architecture reviews, vendor assessments, and technology implementations Develop and improve security policies, procedures, runbooks, and technical documentation Serve as a senior technical resource, advising internal teams on security, risk, and compliance matters The ideal candidate will have: 5+ years of hands-on experience as a Cybersecurity Analyst, Security Engineer, SOC Analyst, or similar role Strong experience with threat detection, forensic analysis, and incident response Deep familiarity with Microsoft-based security environments Experience in highly regulated or financial services environments strongly preferred One or more professional cybersecurity certifications such as CISSP, CEH, CySA+, or similar If interested in learning more about this Cybersecurity Engineer role, please apply today!
    $106k-151k yearly est. 1d ago
  • Sr Security Engineer

    LHH 4.3company rating

    Remote job

    Top Must Haves to Include in Submittal Required: 4+ years of experience with a Senior Security Engineer Title. Required: 4+ years of experience with active threat hunting, looking for potential attacks rather than just passively waiting for attacks Required: Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures. Required: 4+ years of experience with Microsoft Defender for Endpoint Required: 4+ years of experience with Microsoft Sentinel (SIEM/SOAR) Required: 4+ years of experience with Azure Security Center & Microsoft Purview Compliance Manager Required: Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus. Required: 3+ years of experience in Microsoft security technologies and tools such as Purview Information Protection Required: 4+ years of experience with Managed Extended Detection and Response (MXDR) Required: 9 out of 10 communication skills (must be able to understand everything they say and must have 10 out of 10 English comprehension. Accents are ok.) Very Nice To Have: 2+ years of experience with red team/blue team exercises to test defenses and improve security operations. Very Nice To Have: 2+ years of experience evaluating, influencing, and recommending technology and product direction What does the company do Insurance Location / Address: Orange, California On-Site / Hybrid / Remote Fully Remote in any State in the US (PST Hours) Reports To: Director of IT Infrastructure Does this Position have Direct Reports No COVDI19 Vax required No vaccination requirements Accept Visa / H1b Sponsorship No (GC or USC only) Schedule PST hours Dress code Business Professional Full Time Compensation Base Salary: 120k-143k (could be flexible but would need approval) Signing Bonus Potential: Potentially (would need approval) Discretionary Bonus? Yes, they have an annual discretionary bonus but did not specify an exact percentage. Annual Base Salary Merit Increase: Up to 4% per year Stock: No 401k Match: 30% match up to 100% of IRS Annual Contribution Allotment Relocation: No (fully remote role) ---------------------------------------------------------------------------- Minimum of 6+ years hands-on experience directly related to security (Minimum of 4 years as Sr. Level position) Proactive hands-on threat hunting experience looking for potential attacks and identifying potential security risks Deep experience and understanding of Microsoft Defender, Sentinel, Azure Security Center Experience with Managed Extended Detection and Response (MXDR) Security related certifications such as Certified Ethical Hacker (CEH), AZ-500 (Microsoft Azure Security Engineer) Certified Information Systems Security Professional (CISSP) Reports to -- Director of IT Infrastructure Perform active threat hunting, looking for potential attacks rather than just passively waiting for attacks Perform red team/blue team exercises to test defenses and improve security operations. Assists with vulnerability assessments, using provided security tools to identify system vulnerabilities Design and implement security controls across cloud and on-premises environments Create and maintain security monitoring and alerting solutions Data Loss Prevention (DLP): Monitor DLP alerts, investigate incidents, and recommend actions to relevant teams to mitigate data breaches. Assists in the planning and deployment of the companys cloud information security strategies Manage Infrastructure and application security monitoring tools to detect and respond to security incidents in real-time Participate in the development and improvement of the company's SDLC processes, ensuring security practices are integrated into all stages of product development Responsible for evaluating, influencing, and recommending technology and product direction Stay informed on the latest cybersecurity trends, emerging threats, attack techniques, and zero-day vulnerabilities affecting Microsoft environments and other relevant technologies. On-site or remote regular attendance and punctuality are essential functions of the job. Perform other business tasks or functions as assigned. Qualifications Knowledge, Skills & Abilities Required: Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures. Deep knowledge of Microsoft security solutions o Microsoft Defender for Endpoint o Microsoft Sentinel (SIEM/SOAR) o Azure Security Center & Microsoft Purview Compliance Manager o Microsoft Intune and Conditional Access Policies Strong understanding of security principles and best practices Strong knowledge and hands on experience with Data Loss Prevention Hands-on experience in threat hunting Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus. Proficiency in Microsoft security technologies and tools such as Purview Information Protection, Defender for Cloud and Sentinel Experience with Managed Extended Detection and Response (MXDR) Proficient in Microsoft Office programs, including Word, Excel, PowerPoint, as well as Outlook. Adhere to all PHI (Protected Health Information) and HIPAA (Health Insurance Portability and Accountability Act) guidelines. Educational Requirements: High School Diploma or equivalent required. Bachelors degree in Computer Science, Cyber Security or equivalent experience required. Minimum of six (6) years of hands-on experience in IT with a focus on security. Physical Requirements:??Must be able to sit for extended periods and occasionally stand and walk. Must have adequate hearing for phone work. Vision requirements include close vision and the ability to adjust focus. Must be able to communicate effectively in English. Must be able to use a keyboard and other office equipment. Ability to lift up to 10 pounds occasionally. “Benefit offerings include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits, and 401K plan. Our program provides employees the flexibility to choose the type of coverage that meets their individual needs. Available paid leave may include Paid Sick Leave, where required by law; any other paid leave required by Federal, State, or local law; and Holiday pay upon meeting eligibility criteria.” “Equal Opportunity Employer/Veterans/Disabled To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to ******************************************* The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable: • The California Fair Chance Act • Los Angeles City Fair Chance Ordinance • Los Angeles County Fair Chance Ordinance for Employers • San Francisco Fair Chance Ordinance”
    $135k-177k yearly est. 2d ago
  • Network Security Analyst 2 - Austin, TX (Hybrid)

    My3Tech

    Remote job

    Years Required/Preferred Experience 4 Required Experience with Linux and Windows operating systems 2 Required Experience of Vulnerability Management and Proficiency with Vulnerability Management tools 2 Required Understanding of networking concepts 2 Required Knowledge of Cybersecurity Frameworks such as NIST, ISO, or PCI. 2 Required Understanding of the MITRE ATT&CK framework 2 Required Ability to comprehend technical infrastructure, cloud computing, third-party dependencies and managed services 3 Preferred Degree in cybersecurity, computer science or related field 3 Preferred Experience with Red Hat Enterprise Linux (RHEI) administration, and Microsoft Active Directory and Group Policy 3 Preferred Experience with vulnerability management in cloud platforms such as AWS or Azure 3 Preferred Experience with Tenable/Qualys; JavaScript or PowerShell 3 Preferred Experience with ServiceNow dashboards 3 Preferred Ability to make actionable recommendations for discovered vulnerabilities 3 Preferred Ability to convey technical concepts clearly to both technical and non-technical audiences 3 Preferred Strong written skill for creating documentation and executive summaries
    $67k-91k yearly est. 5d ago
  • Epic Cadence & Security Analyst

    Onpoint Search Consultants 4.2company rating

    Remote job

    What you will find ... 100% REMOTE exceptional benefits (pension plan options) top ranked hospital in the U.S. What you will do ... design & build Epic Cadence build Epic Security break-fix & support Epic Cadence & Security optimize Decision Tree for scheduling liaison with operational stakeholders Wish list ... 5+ years Epic Cadence & Security build REQUIRED Epic Cadence Certification REQUIRED Epic Security Certification recent Epic Security work Decision Tree a plus
    $80k-116k yearly est. 2d ago
  • Information Security Analyst

    Ispace, Inc.

    Remote job

    Title: Information Security Analyst Duration: 12+ months contract Hybrid role 3 days Office, 2 days work from home Pay rate$65 per hr on W2 Local to Los Angeles candidates only Summary This is a hands-on security position working within the Information Security group and with the internal IT department at large. This position's core focus is to ensure consistent, measurable end to end delivery of security services. The successful candidate will work to develop and deploy capabilities ensuring enterprise systems and data are protected with the security controls and tools required to meet policy and compliance requirements. We are looking for candidates who have a passion for cybersecurity, threat detection, risk mitigation and response. You will be a key part of our efforts to build and support a defensible environment where we are able to detect, contain and respond quickly to threats and compromises in ways that serve to enable the business needs of a highly collaborative organization. The environment is fast-paced and commonly on the leading edge of technology, including early adoption of various cloud services along with the challenges of integrating those services into our security practice. Responsibilities Support a Technology Vendor Management program, ensuring technology risk reviews across multiple disciplines, and monitoring for renewals and savings opportunities Participate in risk reviews of the IT control framework (NIST CSF, CIS, ITIL, ISO 270001, etc.) Conduct thorough vendor, product and applications security assessments partnering with systems owners to integrate security early during the project lifecycle. Coordinate, across service owners, the implementation of core security integrations (SSO, Event Logs, Secrets, Alerting, Threat Model and Backup/Recovery) with applications developed in-house and externally/SaaS hosted environments. Partner with business groups to review workflows, producing output to enhance security processes in support of those workflows. Support the development and implementation of a data protection program. Coordinate with IRM leadership to develop and deliver key security metrics to ensure technical security controls are meeting desired objectives; ensuring the measurable effectiveness of CAA's technical controls. Required Capabilities A minimum of 2-3 years in Information Technology A minimum of 2 years' experience in cybersecurity risk management A Bachelor's or Master's Degree in a relevant field of work Strong analytical skills in conducting due diligence to identify, assess and prioritize vendor risks Familiarity with information security frameworks (NIST, ISO27001), data privacy regulations (GDPR, CCPA), and information security certifications/attestations (SOC, ISO, PCIDSS, FedRAMP) Experience in coordinating technical integrations for security tooling and processes. Ability to review complex systems architectures to identify key security integration opportunities Produce a comprehensive, written, security assessment of vendors security posture Experience using security analytics tooling to produce operational metrics and dashboards A strong understanding of the fundamental operations of servers, operating systems, cloud applications, and infrastructure Desired Skills Core skills in Cybersecurity fundamentals and Third Party Risk Management Familiarity with using Third Party Risk Management tools/processes such as One Trust, SIG or similar GRC platforms. Hands-on experience in Azure, AWS Cloud environments and familiarity with core Cloud services and Cloud architecture Familiarity with core security concepts of Single Sign-on (e.g PingFed, SAML), Identity and Access Administration (Active Directory, Azure AD, AWS IAM), Event Management (Splunk), Expert skills in using Microsoft Office suite, JIRA. If you're interested in above role please send me your updated resume to *******************************
    $65 hourly 2d ago
  • Nuclear Cyber Security Engineer - REMOTE

    JSG (Johnson Service Group, Inc.

    Remote job

    IF YOU DO NOT HAVE THE REQUIRED BACKGROND IN THE U.S. COMMERCAL NUCLEAR INDUSTRY, PLEASE DO NOT APPLY. Immediate opening for a Cyber Security Engineer with commercial nuclear background, to perform design modifications (involving digital upgrades) as well as preparing cyber assessments on those digital components. Prefer direct/perm hire, will consider contract. This person will be the go-to individual for Cyber related projects. Must be familiar with NEI-08-09, EPRI graded approach, have digital mod experience, and extensive understanding of plant SSC (Safety Classification of Structures, Systems, and Components). Site Cyber qualifications to perform CSAT (Cyber Security Assessment Team) would be a plus. Compensation based on experience, but likely in the 140K-$160K range. JSG offers medical, dental, vision, life insurance options, short-term disability, 401(k), weekly pay, and more. Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law. #D650
    $160k yearly 4d ago
  • Network Security Engineer II

    Glocomms 4.3company rating

    Remote job

    Sr. Network Engineer II Employment Type: Full-Time Sponsorship: Not Provided We're seeking an experienced Sr. Network Engineer to join a growing IT team and play a key role in designing, implementing, and maintaining enterprise-level network infrastructure. This is a remote position available exclusively to candidates residing in Idaho or Utah. What You'll Do Plan, implement, and support network projects, including risk assessment and migration strategies. Configure and maintain Cisco routers, switches, wireless, remote access, and WAN devices. Recommend and implement new technologies to improve network performance and scalability. Monitor global network performance, troubleshoot issues, and perform preventative maintenance. Collaborate with carriers for circuit procurement and migrations. Maintain accurate technical documentation and configurations. Participate in on-call rotation and occasional travel as needed. What You'll Bring 6+ years of hands-on networking and troubleshooting experience in multiprotocol environments. 5+ years with router/switch technology and routing protocols (BGP, MPLS, EIGRP). 4+ years supporting LANs, VLANs, WLANs, VPNs, NAT, and DHCP services. 3+ years with network security products and protocols (IPS/IDS, IPSEC VPN). CCNP preferred. Experience with Cisco Nexus (9k, 7k, 5k), ISR, ASR, Next Gen Firewalls, Meraki wireless. Familiarity with monitoring tools (SolarWinds, Splunk, ThousandEyes, AppDynamics). Strong leadership, problem-solving, and communication skills.
    $74k-112k yearly est. 4d ago
  • Smart Contract Security Engineer

    Techchain Talent

    Remote job

    Our client is building the infrastructure for a more trustworthy internet. We are looking for a Smart Contract Security Engineer. In this role, you wont just audit code, you'll shape the security model for high-value protocols and safeguard the trust of an entire ecosystem. You'll work at the intersection of cutting-edge research, high-stakes engineering, and adversarial thinking, building defences for decentralized systems. This is a full-time position, fully remote or located with our primarily Seattle-based team. What You Will Do Lead design and security reviews of complex staking, reward distribution, and protocol contracts Build tooling, fuzzers, and formal verification pipelines to identify vulnerabilities before attackers do Collaborate directly with protocol researchers and engineers to harden new features from inception Read, interpret, and refine formal verification specifications to ensure they capture critical security properties Work closely with product and leadership teams to set on-chain strategy and roadmaps This is a unique opportunity to create a new paradigm of permissionless innovation and have outsized impact on the protocol and broader ecosystem. What You Will Bring Deep understanding of blockchain fundamentals, EVM, and common vulnerabilities Experience with developer tools for smart contract development (e.g., Hardhat, Foundry) Passion for collaborating with developers, security auditors, and stakeholders Strong testing skills and experience with testing frameworks for smart contracts Experience with production deployments of non-trivial protocols and associated security audits Ability to collaborate with cross-functional and geographically remote teams For more information, please contact **************************
    $97k-136k yearly est. 5d ago
  • OT Security Architect

    First Quality 4.7company rating

    Remote job

    We are seeking an OT Security Architect to work remotely. This position will be responsible for safeguarding our operational technology infrastructure. This role offers the flexibility to work remotely with periodic travel to our manufacturing sites. First Quality is a growing manufacturing organization that has defined security as one of its key business values. Joining our team will provide you with unique personal and professional growth opportunities where you'll be hands-on and securing cutting-edge industrial automation and technologies contributing to a growing field where cybersecurity directly protects critical processes, manufacturing, and safety. Primary responsibilities include: • Primarily responsible for OT security event monitoring, management, and response • Create an IS reference architecture for our OT networks • Work with OT engineering team, as well as with SOC team and verify that the reference architecture fits the business processes and requirements • Work with OT engineering teams for defining security controls for their on-going projects • Provide technical guidance to the GRC team with assessing OT 3rd party vendor and supply chain • Integrate with OT engineering projects and verify that the required IS controls are properly implemented • Revise and develop processes to strengthen the current OT Security Operations Framework, review policies and highlight the challenges in managing SLAs • Perform threat management, threat modeling, identify threat vectors and develop use cases for OT security monitoring including red\blue penetrations tests • Responsible for developing, configuring, and maintaining OT security automation and orchestration IR's and tools. • Creation of reports, dashboards, metrics for OT security operations and presentation to Sr. Mgmt. • Create required standards and procedures (i.e. IS purchasing standard, sanitization process) in coordination with all relevant stakeholders The ideal candidate should possess the following: • Minimum of five (5) years of professional experience in OT security and operations. • Knowledge of controls and automation equipment and principles (i.e. PLCs, SCADA, DCS, HMIs, VFDs, etc.) • Familiarity with security frameworks and standards such as NIST, ICS Mitre ATT&CK, and IEC 62443 • Experience in defining and implementing security controls for OT engineering projects. • Experience managing projects with the abilities to prioritize tasks and manage time effectively. • Experience in developing, configuring, and maintaining OT security automation and orchestration tools. • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In lieu of degree, related experience will be considered. • Background in manufacturing controls is preferred What We Offer You We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive: • Competitive base salary and bonus opportunities • Paid time off (three-week minimum) • Medical, dental and vision starting day one • 401(k) with employer match • Paid parental leave • Child and family care assistance (dependent care FSA with employer match up to $2500) • Bundle of joy benefit (years' worth of free diapers to all team members with a new baby) • Tuition assistance • Wellness program with savings of up to $4,000 per year on insurance premiums • ...and more! First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data. First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status. For immediate consideration, please go to the Careers section at ******************** to complete our online application.
    $85k-133k yearly est. 3d ago
  • Cyber Security Analyst II (Remote)

    Ntirety, Inc.

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: * Act as the primary point of escalation for Cyber Security Analyst I technicians * Provides coaching to Cyber Security Analyst I employees on how to perform their duties * Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats * Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole * Performs all of the following functions of a Cyber Security Analyst I, with proficiency * Monitor computer networks for security issues and respond accordingly, including: * Creating/Managing firewall rules * Managing anti-virus endpoint tools * Performing event correlation analysis on potential threats identified through our SIEM * Configuring/Managing log management * Configuring/Managing file integrity monitoring * Performing vulnerability scans and remediation of identified risks * The methodology & analysis of identifying compromised servers * Performing rule tuning in our SIEM for improved detection capabilities * Interact with customers by phone, chat, or trouble ticket on any customer facing security issues * Investigate, document and assess security breaches and other cyber security incidents * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs * Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives * Identify and fix detected vulnerabilities to maintain a high-security standard * Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities * May be relied upon as a technical point of contact during Escalated Events relating to security * Review, investigate and respond to any external "abuse" complaints coming from our IP space * Develop best practices for IT security * Research security enhancements and make recommendations to management * Handle escalated internal or customer security issues from support or another operations team * Takes part in any security-oriented projects or critical initiatives * Stay up to date on information technology & security news, trends and standards * Deliver an exceptional customer experience every day * Other duties as identified or assigned DESIRED ROLE OUTCOMES: * Keep us and our customers free from security incidents but respond capably when one occurs * Our detection of security threats is continually improving * Provide valuable insights and visibility around security incidents to our customers * Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: * A minimum of 2 years' experience in a security analyst role * Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred * Must have experience in a Security Operations Center (SOC) * Must have technical troubleshooting and problem-solving skills * Understanding of network management principles * Experience in systems administration of Windows and Linux based operating systems * Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies * Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts * Ability to identify and mitigate network vulnerabilities and explain how to avoid them * Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact * Ability to learn and communicate technical information to non-technical people * Must have excellent written & oral communication skills, and strong interpersonal skills * Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $76k-102k yearly est. 60d+ ago
  • Cyber Security Analyst II

    Cybersheath 3.7company rating

    Remote job

    Job Description CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position The schedule for this role is: Week One: Friday - Sunday 8:00 AM - 8:00 PM Week Two: Friday - Monday 8:00 AM - 8:00 PM Travel requirements: 0-5% yearly. Please note that this role will be part of our SOC on-call rotation CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000-$100,000 USD
    $70k-100k yearly 18d ago
  • Cyber Threat Fusion Analyst

    Beyond SOF

    Remote job

    The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start. Essential Job Functions Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats. Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections. Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. Understand concepts of log and packet analysis Navigate the command line using specific expressions to manipulate data Handle and organize disparate data about detections, attacks, and attackers Employ discovery techniques and vetting of new intelligence. Create Situational Awareness Reports and Threat Briefs. Minimum Required Qualifications Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree. Computer defense technologies spanning endpoint, network, and open source. Required Security Clearance: TS/SCI. 8570 IAT II certification is required prior to start. It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
    $74k-100k yearly est. 60d+ ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Remote job

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $76k-99k yearly est. Auto-Apply 40d ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • Classified Cyber Security Staff / ISSM / Goleta, CA

    Lockheed Martin 4.8company rating

    Remote job

    You will be the Classified Cyber Security Staff for the Santa Barbara Focal Plane Infrared Sensors Business\. Our team is responsible for safeguarding critical mission‑critical information systems and ensuring compliance with government security mandates\. **What You Will Be Doing** As the Classified Cyber Security Staff you will be responsible for leading information‑system security strategy and operations within the Santa Barbara Focal Plane Infrared Sensors Business\. Your responsibilities will include, but are not limited to: + Oversee day‑to‑day information system security operations as the ISSM on all technical security matters\. + Review and oversee RMF package authorizations to maintain continuous authorization\. + Monitor, analyze, and respond to security events and incidents\. + Document compliance actions, manage POA&Ms, and maintain automated tracking\. + Participate in internal and external security audits, risk assessments, and investigations\. **Why Join Us** We seek a collaborative, mission‑focused professional who thrives in a fast‑paced, high‑impact environment\. This role offers the opportunity to shape the security posture of cutting‑edge infrared sensor systems, work with expert engineers, and drive meaningful results that protect national security\. We are committed to supporting your work‑life balance and overall well‑being, offering flexible scheduling options\. Learn more about Lockheed Martin's comprehensive benefits package here \(************************************************* \. **Further Information About This Opportunity** This position is located in Goleta, CA\. Discover more about Lockheed Martin Missiles and Fire Control\. \(******************************************************************************************************************************************************************************************************************************** MUST BE A U\.S\. CITIZEN \- This position is located at a facility that requires special access\. The selected candidate must possess an active Top Secret clearance to start\. **Basic Qualifications:** - DoD 8570 IAM Level III certification - Hands on experience with industry standard Information Assurance tools required to achieve accreditation of systems to include vulnerability scanning tools, auditing tools, endpoint protection tools, Security Incident and Event Mgmt \(SIEM\) tools, package submission tools\. Ability to perform an analysis in order to determine path forward in regards to policies and procedures and how to resolve discrepancies\. - Experience driving the RMF process while working with government accreditation authorities for approvals and the ability to perform risk and vulnerability assessments in line with current regulatory guidelines such as DAAPM/JSIG/ICD 503\. - Ability to motivate, influence and performance manage people with classified cybersecurity skills\. - Ability to effectively translate and connect the cybersecurity objectives and program requirements to broader business outcomes both financially and operationally often requiring effective communication and relationship building with internal stakeholders and external customers\. \- Top Secret with ability to obtain SCI **Desired Skills:** - Currently working in environment supporting IC customers - Must have the ability to work on site full\-time - Proved ability to obtain and maintain system ATOs - Hands\-on experience with ICD 503/JSIG and DAAPAM - Experience implementing new and complex technologies at multiple classification levels within large environments and at an Enterprise level\. - Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience; or 3 years of professional experience with a related Master's degree\. - Prior FSO/CPSO experience **Security Clearance Statement:** This position requires a government security clearance, you must be a US Citizen for consideration\. **Clearance Level:** Top Secret with Investigation or CV date within 5 years **Other Important Information You Should Know** **Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match\. Should this match be identified you may be contacted for this and future openings\. **Ability to Work Remotely:** Onsite Full\-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility\. **Work Schedules:** Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees\. Schedules range from standard 40 hours over a five day work week while others may be condensed\. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits\. **Schedule for this Position:** 4x10 hour day, 3 days off per week **Pay Rate:** The annual base salary range for this position in California, Massachusetts, and New York \(excluding most major metropolitan areas\), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $113,900 \- $200,905\. For states not referenced above, the salary range for this position will reflect the candidate's final work location\. Please note that the salary information is a general guideline only\. Lockheed Martin considers factors such as \(but not limited to\) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer\. **Benefits offered:** Medical, Dental, Vision, Life Insurance, Short\-Term Disability, Long\-Term Disability, 401\(k\) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays\. \(Washington state applicants only\) Non\-represented full\-time employees: accrue at least 10 hours per month of Paid Time Off \(PTO\) to be used for incidental absences and other reasons; receive at least 90 hours for holidays\. Represented full time employees accrue 6\.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays\. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year\. This position is incentive plan eligible\. **Pay Rate:** The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $131,000 \- $227,125\. For states not referenced above, the salary range for this position will reflect the candidate's final work location\. Please note that the salary information is a general guideline only\. Lockheed Martin considers factors such as \(but not limited to\) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer\. **Benefits offered:** Medical, Dental, Vision, Life Insurance, Short\-Term Disability, Long\-Term Disability, 401\(k\) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays\. This position is incentive plan eligible\. **Lockheed Martin is an equal opportunity employer\. Qualified candidates will be considered without regard to legally protected characteristics\.** **The application window will close in 90 days; applicants are encouraged to apply within 5 \- 30 days of the requisition posting date in order to receive optimal consideration\.** At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges\. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work\. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility\. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work\. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility\. If this sounds like a culture you connect with, you're invited to apply for this role\. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs , and apply for roles that align with your qualifications\. **Experience Level:** Experienced Professional **Business Unit:** MISSILES AND FIRE CONTROL **Relocation Available:** Possible **Career Area:** Cyber Security **Type:** Full\-Time **Shift:** First
    $77k-100k yearly est. 57d ago
  • Senior Cyber Security Operations Engineer

    Unitil Corporation 4.9company rating

    Remote job

    Position is available to work in a hybrid work from home capacity. The manager will discuss this in more detail at time of interview. Candidates will need to be local to the Hampton area. If not, they will need to relocate to the area to be considered for this role. Our Company More than a utility company, Unitil provides energy for life. Our work helps keep homes comfortable, businesses thriving and communities connected. Unitil is an investor-owned public utility proudly serving Maine, Massachusetts and New Hampshire. We are dedicated to delivering energy to our customers safely and reliably. Unitil is committed to creating an inclusive environment that welcomes and values the differences among all of our employees, customers, suppliers and the communities in which we live and conduct business. The continued success of Unitil is enhanced through initiatives that promote diversity and value our employees. Take advantage of a comprehensive benefits package. Unitil offers competitive salaries, a consumer-driven health plan, dental and vision coverage, flexible work, company-paid holidays, a, robust, highly competitive retirement plan and educational assistance. * Note: Benefit offerings may differ between union and non-union employee groups Position Purpose Utilizes security software and practices to secure systems. Develops, tests and validates solutions and/or processes to remediate exploitable conditions on servers and other infrastructure assets. Implements software patches and configuration changes to address system vulnerabilities. Assists in the monitoring of IT compliance with SOX, NERC/CIP, Mass. Privacy and other legal and regulatory authorities. Provides back up for cyber team members, as needed. Principal Accountabilities % of time End Results 60% Data Security * Perform activities that ensure the security of corporate data, privacy, and record confidentiality * Participate in periodic risk assessments, to ensure compliance with security standards * Manage processes to assess cyber risk, and facilitate the application of fixes, patches and updates. Coordinate with IT Infrastructure the installation of manual patching of servers * Implement compliance activities with IT Policies, procedures and tests including the Written Information Security, Asset Management, Disaster Recovery, Change Management, Problem Management, and Security Plans 20% Compliance * Assist in coordination of cyber drills, exercises and assessments with internal and external stakeholders * Identifies security risks and exposures, and participate in response activities * Provide reporting needed for IT Control monitoring and responses to external audits, external penetration tests and vulnerability assessments. Fulfill audit requests by providing supporting evidence. * Evaluates vendor security assessments and assists in managing the program * Report on compliance activities related to IT NERC, SOX, MA Privacy, PCI and other IT compliancy programs for the company. * Follow IT policies and procedures to ensure the security of information assets against unauthorized or accidental modification, destruction, or disclosure. Work with Application Owners to obtain proper documentation for system/application changes 15% Identity, Credential & Access Management * Work with Application Owners to define critical security groups and process for maintaining 'least privileged' access to systems * System access security administration of critical financial and key critical business systems 5% Assist the Director of Information Security, and other Subject Matter Experts, in the evaluation and implementation of tools, policies and configurations to improve data security and business controls. Research new technologies and/or processes that will assist in achieving these goals. Qualifications * Bachelor's Degree, Information Systems, Computer Science, Information Security or related field (Desired * 7-10 years IT security or information security experience. * Proven ability to engage with Senior Management and regulators. * Knowledge of technical infrastructure, networks, databases and systems. * Knowledge and related experience in IT security issues and techniques. * Effective communication skills, focusing on presentation of technical information. * Strong analytical skills and attention to detail. * Advanced technical degree and/or Security Certifications preferred. Unitil is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law. Last Updated: 12/22/25
    $78k-96k yearly est. 5d ago
  • Cyber Security Analyst II (Remote)

    Hostway 4.6company rating

    Remote job

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: Act as the primary point of escalation for Cyber Security Analyst I technicians Provides coaching to Cyber Security Analyst I employees on how to perform their duties Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole Performs all of the following functions of a Cyber Security Analyst I, with proficiency Monitor computer networks for security issues and respond accordingly, including: Creating/Managing firewall rules Managing anti-virus endpoint tools Performing event correlation analysis on potential threats identified through our SIEM Configuring/Managing log management Configuring/Managing file integrity monitoring Performing vulnerability scans and remediation of identified risks The methodology & analysis of identifying compromised servers Performing rule tuning in our SIEM for improved detection capabilities Interact with customers by phone, chat, or trouble ticket on any customer facing security issues Investigate, document and assess security breaches and other cyber security incidents Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives Identify and fix detected vulnerabilities to maintain a high-security standard Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities May be relied upon as a technical point of contact during Escalated Events relating to security Review, investigate and respond to any external “abuse” complaints coming from our IP space Develop best practices for IT security Research security enhancements and make recommendations to management Handle escalated internal or customer security issues from support or another operations team Takes part in any security-oriented projects or critical initiatives Stay up to date on information technology & security news, trends and standards Deliver an exceptional customer experience every day Other duties as identified or assigned DESIRED ROLE OUTCOMES: Keep us and our customers free from security incidents but respond capably when one occurs Our detection of security threats is continually improving Provide valuable insights and visibility around security incidents to our customers Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: A minimum of 2 years' experience in a security analyst role Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred Must have experience in a Security Operations Center (SOC) Must have technical troubleshooting and problem-solving skills Understanding of network management principles Experience in systems administration of Windows and Linux based operating systems Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts Ability to identify and mitigate network vulnerabilities and explain how to avoid them Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact Ability to learn and communicate technical information to non-technical people Must have excellent written & oral communication skills, and strong interpersonal skills Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $79k-102k yearly est. Auto-Apply 60d+ ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $100k-140k yearly est. Auto-Apply 24d ago
  • Info Security Analyst II / IS - Information Security / Full-time

    Children's Hospital Los Angeles 4.7company rating

    Remote job

    **NATIONAL LEADERS IN PEDIATRIC CARE** Ranked among the top 10 pediatric hospitals in the nation, Children's Hospital Los Angeles (CHLA) provides the best care for kids in California. Here world-class experts in medicine, education and research work together to deliver family-centered care half a million times each year. From primary to complex critical care, more than 350 programs and services are offered, each one specially designed for children. The CHLA of the future is brighter than can be imagined. Investments in technology, research and innovation will create care that is personal, convenient and empowering. Our scientists will work with clinical experts to take laboratory discoveries and create treatments that are a perfect match for every patient. And together, CHLA team members will turn health care into health transformation. Join a hospital where the work you do will matter-to you, to your colleagues, and above all, to our patients and families. The work will be challenging, but always rewarding. **It's Work That Matters.** **Overview** **PLEASE NOTE: This is a remote position. In accordance with CHLA policy, candidates must establish primary residency in California prior to their start date.** **Purpose Statement/Position Summary:** The Information Security Analyst II is responsible for monitoring and addressing information security alerts, improving detection and response capabilities, and participating in efforts to streamline processes and improve efficiency. They will also be responsible for conducting security training and awareness campaigns, reporting on results, and conducting remedial training. The analyst will contribute to information security policies and standards as they are developed and maintained, in accordance with NIST CSF and HIPAA. They will be a mentor for Information Security Analyst I and peers. **Minimum Qualifications/Work Experience:** _Required:_ 5 years of progressive experience in computing and information security, including experience with information security operations, utilization of multiple security tools to conduct investigations, and security training, preferably in a healthcare environment. · Management of information security tools. · Knowledge of vulnerability resolution. · Skills in risk analysis and hands-on issue resolution. · General awareness of NIST CSF and HIPAA security rule. · Experience analyzing security incidents utilizing multiple security tools for discovery. · Strong analytical and problem-solving skills **Education/Licensure/Certification:** _Required:_ Associate degree in a related field or equivalent combination of education and experience may be considered. **Certifications in two of the following required:** · ISACA · CompTIA · EC-Council · Azure Security · AWS Security · Cisco · (ISC)² · GIAC **Pay Scale Information** $75,712.00-$124,384.00 CHLA values the contribution each Team Member brings to our organization. Final determination of a successful candidate's starting pay will vary based on a number of factors, including, but not limited to education and experience within the job or the industry. The pay scale listed for this position is generally for candidates that meet the specified qualifications and requirements listed on this specific job description. Additional pay may be determined for those candidates that exceed these specified qualifications and requirements. We provide a competitive compensation package that recognizes your experience, credentials, and education alongside a robust benefits program to meet your needs. CHLA looks forward to introducing you to our world-class organization where we create hope and build healthier futures. Children's Hospital Los Angeles (CHLA) is a leader in pediatric and adolescent health both here and across the globe. As a premier Magnet teaching hospital, you'll find an environment that's alive with learning, rooted in care and compassion, and home to thought leadership and unwavering support. CHLA is dedicated to creating hope and building healthier futures - for our patients, as well as for you and your career! CHLA has been affiliated with the Keck School of Medicine of the University of Southern California since 1932. At Children's Hospital Los Angeles, our work matters. And so do each and every one of our valued team members. CHLA is an Equal Employment Opportunity employer. We consider qualified applicants for all positions without regard to race, color, religion, creed, national origin, sex, gender identity, age, physical or mental disability, sexual orientation, marital status, veteran or military status, genetic information or any other legally protected basis under federal, state or local laws, regulations or ordinances. We will also consider for employment qualified applicants with criminal history, in a manner consistent with the requirements of state and local laws, including the LA City Fair Chance Ordinance and SF Fair Chance Ordinance. Qualified Applicants with disabilities are entitled to reasonable accommodation under the California Fair Employment and Housing Act and the Americans with Disabilities Act. Please contact CHLA Human Resources if you need assistance completing the application process. Our various experiences, perspectives and backgrounds allow us to better serve our patients and create a strong community at CHLA. Information Security
    $75.7k-124.4k yearly 60d+ ago
  • Information Security Analyst

    HJ Staffing 3.9company rating

    Remote job

    HJ Staffing is seeking an Information Security Analyst to join a prominent Managed Care Plan serving over 456,000 members. In this role, you will be the primary lead in analyzing security practices, investigating breaches, and ensuring the organization remains aligned with rigorous healthcare industry standards. We are looking for a technical expert who can bridge the gap between complex infrastructure and staff education to protect sensitive member data. What You Will Do Security Monitoring & Investigation: Monitor computer networks for security issues, lead the investigation of breaches in collaboration with the Information Security Manager, and document damage assessments. Compliance & Auditing: Assess the efficacy of existing measures to ensure they meet HIPAA and FISCAM security standards; conduct proactive system vulnerability audits and manage annual penetration testing with vendors. Solution Implementation: Participate in the evaluation, design, and implementation of new security solutions, including firewalls and data encryption programs, to protect the organization's computer networks from cyber-attacks. Risk Advisory: Analyze software and systems requirements to provide objective advice on security risks and develop clear remediation options for management and senior ITS staff. Policy & Documentation: Assist with the development of security policies, procedures, and standards; maintain comprehensive documentation of computer security procedures and tests. Training & Phishing Defense: Develop high-impact training materials and presentations to educate the organization on data security, including frequent training on how to detect and avoid phishing attempts. What You Will Bring Education: Bachelor's degree in IT, Cybersecurity, Computer Science, or a related field (a Master's degree may substitute for 2 years of experience). Experience: 8 years of professional-level IT experience, with at least 3 years specifically performing information security functions in a healthcare environment. Certifications: Current CISSP, CISM, or CEH (Certified Ethical Hacker) certification is required. Technical Knowledge: Strong understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts, along with proficiency in virtualization and Windows-based systems. Regulatory Expertise: In-depth knowledge of HIPAA and FISCAM security guidelines and a working knowledge of frameworks such as NIST, ISO 27001, or COBIT. You Will Be Successful If: You are a Strategic Problem Solver: You can manage multiple priorities, meet strict deadlines, and adapt to shifting security needs. You are an Effective Communicator: You possess clear writing skills and the ability to present complex technical content to non-technical audiences. You are Collaborative & Diplomatic: You have the leadership ability to facilitate meetings and build strong relationships across infrastructure and administrative teams. You are Proactive: You stay informed of emerging technologies (AI, IoT, blockchain) and look for ways to eliminate technical debt before it becomes a vulnerability. You are Incident-Ready: You are willing to respond to after-hours information security incidents as needed. Important Details Residency Requirement: Candidate must reside in the state of California. Work Status: 100% Remote; must be a US Citizen or Green Card holder. Market Context: This is a competitive role for a major managed care plan; qualified candidates are encouraged to submit their credentials immediately.
    $90k-131k yearly est. 9d ago

Learn more about cyber security engineer jobs

Work from home and remote cyber security engineer jobs

Nowadays, it seems that many people would prefer to work from home over going into the office every day. With remote work becoming a more viable option, especially for cyber security engineers, we decided to look into what the best options are based on salary and industry. In addition, we scoured over millions of job listings to find all the best remote jobs for a cyber security engineer so that you can skip the commute and stay home with Fido.

We also looked into what type of skills might be useful for you to have in order to get that job offer. We found that cyber security engineer remote jobs require these skills:

  1. Cyber security
  2. Python
  3. Linux
  4. Architecture
  5. Nist

We didn't just stop at finding the best skills. We also found the best remote employers that you're going to want to apply to. The best remote employers for a cyber security engineer include:

  1. Sentara Healthcare
  2. Booz Allen Hamilton
  3. Lockheed Martin

Since you're already searching for a remote job, you might as well find jobs that pay well because you should never have to settle. We found the industries that will pay you the most as a cyber security engineer:

  1. Technology
  2. Professional
  3. Health care

Top companies hiring cyber security engineers for remote work

Most common employers for cyber security engineer

RankCompanyAverage salaryHourly rateJob openings
1Digital Defense by HelpSystems$109,122$52.460
2Brooksource$102,486$49.270
3Harbor Freight Tools$101,960$49.020
4Jacobs Enterprises$99,709$47.949
5Constellation West$97,210$46.745
6Booz Allen Hamilton$96,405$46.35106
7ASRC Federal$91,616$44.054
8Serco$91,167$43.8313
9Lockheed Martin$87,326$41.98128
10CACI International$86,486$41.5877

Browse computer and mathematical jobs