Information Assurance Analyst remote jobs - 556 jobs
Senior Security Engineer II (DevSecOps)
Aledade, Inc. 4.1
Remote job
As a Senior Security Engineer II at Aledade, we play a central role in helping secure our enterprise, cloud native environments, and applications. We're looking for security engineers that understand data and automation are important ingredients to our mission and know how to actively employ these ingredients at scale. Beyond the technical expertise, we value individuals who can partner cross-functionally across various teams, driving impactful outcomes and further securing our digital landscape.
Primary Duties
Working cross functionally to design, build, and operate solutions that continuously improve and automate our security capabilities
Leveraging data to understand trends, metrics, and opportunities to improve our security posture and then helping execute on those opportunities with stakeholders
Leading and enhancing incident response efforts, spearheading analysis, containment, and mitigation strategies in a cross-functional environment to ensure effective resolution and remediation of security incidents
Helping craft and refine security documentation pertinent to our Security Program, such as policies, standards, baselines, and standard operating procedures
Mentoring and coaching more junior engineers or analysts
Minimum Qualifications
BS / BTech (or higher) in Computer Science, Information Technology, Cybersecurity or a related field, 8 years security domain experience without degree
4+ years of experience acting as a trusted advisor in a team setting, solving for short-term and long-term business value
4+ years of experience coaching other engineers or analysts
Domain Specific
6+ years of experience in securing and deploying applications within Cloud Native environments
5+ years of experience in a dedicated DevOps/DevSecOps/SRE role with focus on establishing secure SDLC and DevSecOps processes.
Experience in scripting languages such as Python and Bash.
Experience with Cloud Native Software Development environments and practices with a focus on multi-cloud deployments in AWS, Azure and/or GCP.
Preferred KSA's
Prior experience working in the healthcare industry with health-tech systems, like Electronic Health Records, Clinical data, etc.
Prior experience with a focus on tooling, automation, and distributed systems development is preferred.
Experience generating automated metrics to measure service and program effectiveness and consistency
Strong communication skills, both written and verbal, with the capability to articulate complex technical issues to a diverse audience
Domain Specific
Experience with continuous integration tools (e.g. Cloud formation, Code deploy, Jenkins, CircleCI, Codefresh, Github Actions etc.).
Experience with configuration management platforms (e.g. Ansible, Chef, Salt).
Hands-on experience using Terraform, Python and/or other orchestration platforms at scale.
Familiarity with Agile and waterfall development methodologies.
Familiarity with automated testing methodologies, and continuous integration concepts.
Experience in creating, deploying, maintaining, and troubleshooting Docker images.
Experience in scoping, deploying, maintaining and troubleshooting Kubernetes clusters.
Experience with deploying policies with AWS Control tower, Azure Security hub, Google Resource Manager etc.
Physical Requirements
Sitting for prolonged periods of time. Extensive use of computers and keyboard. Occasional walking and lifting may be required.
Who We Are
Aledade, a public benefit corporation, exists to empower the most transformational part of our health care landscape - independent primary care. We were founded in 2014, and since then, we've become the largest network of independent primary care in the country - helping practices, health centers and clinics deliver better care to their patients and thrive in value-based care. Additionally, by creating value-based contracts across a wide variety of health plans, we aim to flip the script on the traditional fee-for-service model. Our work strengthens continuity of care, aligns incentives and ensures primary care physicians are paid for what they do best - keeping patients healthy. If you want to help create a health care system that is good for patients, good for practices and good for society - and if you're eager to join a collaborative, inclusive and remote-first culture - you've come to the right place.
What Does This Mean for You?
At Aledade, you will be part of a creative culture that is driven by a passion for tackling complex issues with respect, open-mindedness and a desire to learn. You will collaborate with team members who bring a wide range of experiences, interests, backgrounds, beliefs and achievements to their work - and who are all united by a shared passion for public health and a commitment to the Aledade mission.
In addition to time off to support work-life balance and enjoyment, we offer the following comprehensive benefits package designed for the overall well-being of our team members:
Flexible work schedules and the ability to work remotely are available for many roles
Health, dental and vision insurance paid up to 80% for employees, dependents and domestic partners
Robust time-off plan (21 days of PTO in your first year)
Two paid volunteer days and 11 paid holidays
12 weeks paid parental leave for all new parents
Six weeks paid sabbatical after six years of service
Educational Assistant Program and Clinical Employee Reimbursement Program
401(k) with up to 4% match
Stock options
And much more!
At Aledade, we don't just accept differences, we celebrate them! We strive to attract, develop and retain highly qualified individuals representing the diverse communities where we live and work. Aledade is committed to creating a diverse environment and is proud to be an equal opportunity employer. Employment policies and decisions at Aledade are based on merit, qualifications, performance and business needs. All qualified candidates will receive consideration for employment without regard to age, race, color, national origin, gender (including pregnancy, childbirth or medical conditions related to pregnancy or childbirth), gender identity or expression, religion, physical or mental disability, medical condition, legally protected genetic information, marital status, veteran status, or sexual orientation.
Privacy Policy: By applying for this job, you agree to Aledade's Applicant Privacy Policy available at *************************************************
#J-18808-Ljbffr
A leading data collaboration platform in San Francisco seeks a Senior Security Engineer to enhance threat detection and automation strategies. The role involves implementing detection logic, automating workflows, and developing scalable cloud solutions. Candidates should have a Bachelor's degree in a relevant field and strong skills in security automation and detection engineering. This position offers competitive compensation with a base range of $131,500 to $203,000.
#J-18808-Ljbffr
A leading security training provider is seeking a Senior Security Engineer for their content engineering team. This role supports security professionals, builds hands-on content, and integrates security into DevOps. Ideal candidates have over 5 years of experience in application security and are passionate about improving security practices. The position is remote-first with competitive compensation and benefits.
#J-18808-Ljbffr
A technology company is seeking a skilled software engineer to join their Radar team, focusing on building systems for real-time identity event processing. The ideal candidate will have over 5 years of experience in software development, a background in large-scale systems, and strong collaboration skills. This position offers flexible remote work and comprehensive benefits, including healthcare coverage, equity grants, and generous paid time off. Join a growing team committed to delivering a seamless identity security platform.
#J-18808-Ljbffr
$114k-163k yearly est. 1d ago
Cyber Information Assurance Analyst SME
Chickasaw Nation Industries 4.9
Remote job
The Cyber InformationAssuranceAnalyst SME provides IT support services for the Marine Corps Logistics Base by independently conducting complex security analyses of classified and unclassified systems for compliance with security requirements. Performs Command Cyber Readiness Inspections, vulnerability evaluations, and utilizing various security technologies and tools to assess the security posture of intricate computer systems and networks. Responsibilities include conducting vulnerability and risk analyses, participation in penetration studies, and defining security requirements for a range of computing systems. Recommends solutions to enhance security, gathers technical information to align with organizational goals, and offers technical analysis and advice to client executive management on system improvements, focusing on areas like information systems architecture, networking, and communication protocols. This position is on-site in the Albany, GA area.
Chickasaw Nation Industries, Inc. serves as a holding company with multiple subsidiaries engaged in several lines of business (Technology, Infrastructure & Engineering, Health, Manufacturing, Public Safety, Consulting, and Transportation) for the federal government and commercial enterprises. A portion of our profits is used to support Chickasaw citizens. We are proud to support the economic development and long-term viability of the Chickasaw Nation and its people. CNI offers premium benefits eligible on the first day of hire to full time employees; (Medical - Dental - Vision), Company Life Insurance, Short-Term and Long-Term Disability Insurance, 401(K) Immediate Vesting, Professional Development Assistance, Legal Aid Assistance Program, Family Planning / Fertility Assistance, Personal Time Off, and Observance of Federal Holidays.
As a federal contractor, CNI is a drug-free workplace and adheres to the Federal Controlled Substance Act.
ESSENTIAL REQUIREMENTS
Secret Clearance is required and must be maintained for employment. Must be eligible for an IT-II upon assignment.
Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification.
IAM III and IAT II level certification is required.
Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
Seven (7) years IT experience
Five (5) years IA experience
Two (2) years of experience with DOD Vulnerability Management System
Command Cyber Readiness Inspection certification in at least one of the following areas:
Retina scan analysis o Operating Systems (Windows, Unix)
Boundary defense (network policy, router, firewall)
Internal defense (L2 switch, L3 switch)
DNS (policy, BIND/Windows)
HBSS (remote console, AV, ABM, PA, HIPS, ePO)
Traditional security (Common, Basic, NCV, SCV)
Wireless communications (BES, handhelds)
Strong analytical and problem solving skills for resolving security issues
Strong skills implementing and configuring networks and network components
Knowledge and understanding of DOD security regulations, DISA Security Technical Implementation Guides
Understanding of SCAP
Knowledge of and proficiency with: VULNERATOR; USCYBERCOM CTO Compliance Program; Wireless vulnerability assessment; Web Services (IIS, Apache, Proxy); Database (SQL Server, Oracle); Email Services (Exchange); Vulnerability Scans (NESSUS, SCCM); Knowledge of Phishing exercises; USB Detect; Physical Security.
Nice to have: DISA FSO certified CCRI Team Lead and have a certification in penetration testing, such as: Licensed Penetration Tester (LPT); Certified Expert Penetration Tester (CEPT); Certified Ethical Hacker (CEH); Global InformationAssurance Certification Penetration Tester (GPEN); Familiarity with AUTOCHECKLIST Tool.
KEY DUTIES AND RESPONSIBILITIES
Essential Duties and responsibilities include the following. Other duties may be assigned.
Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements.
Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations.
Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks.
Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies.
Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers.
Recommends solutions to meet security requirements.
Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture.
Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves.
Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC. Competent to work at the highest level of all phases of information systems auditing.
EDUCATION AND EXPERIENCE
Seven (7) years of experience, or an equivalent combination of education/experience.
PHYSICAL DEMANDS
Work is primarily performed in an office environment. Regularly required to sit. Regularly required use hands to finger, handle, or feel, reach with hands and arms to handle objects and operate tools, computer, and/or controls. Required to speak and hear. Occasionally required to stand, walk and stoop, kneel, crouch, or crawl. Must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, depth perception, and ability to adjust focus. Exposed to general office noise with computers printers and light traffic.
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this job.
EOE including Disability/Vet
CNI offers a comprehensive benefits package that includes:
Medical
Dental
Vision
401(k)
Family Planning/Fertility Assistance
STD/LTD/Basic Life/AD&D
Legal-Aid Program
Employee Assistance Program (EAP)
Paid Time Off (PTO) - (11) Federal Holidays
Training and Development Opportunities
Your application submission will be considered for all potential employment opportunities with Chickasaw Nation Industries (CNI).
$48k-74k yearly est. Auto-Apply 2d ago
Offensive Cyber Analyst / Programmer 2
Lockheed Martin 4.8
Remote job
may be eligible for up to a $25K sign on bonus for external hires! What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world.
Cyber | Lockheed Martin
Who we are:
Ready to make a real impact in the world of cybersecurity? Join Lockheed Martin Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetration testing - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense.
The Work:
A CNO (Computer Network Operations) offensive cyber professional can be described as a "cyber warrior," harnessing their expertise in computer systems and networks to disrupt and disable adversary capabilities. Alternatively, they can be referred to as a "digital operator," skillfully navigating the virtual battlefield to achieve strategic objectives. They can also be characterized as "cyber operatives," leveraging their knowledge of cybersecurity and computer networks to conduct operations and gather critical intelligence.
We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool developers, embedded developers, and cyber researchers. We want your expertise in traditional computing (Windows/Linux/MacOS), mobile technology (Android/iOS), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special-purpose embedded and real-time systems. Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment.
Why Join Us:
Your Health, Your Wealth, Your Life
Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work.
Learn more about Lockheed Martin's competitive and comprehensive benefits package.
We support our employees, so they can support our mission.
This position is participating in our External Referral Program. If you know somebody who may be a fit, click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer
#RMSCYTJ
#RMSC6ISR
#OneLMHotJobs
#RMSTG2025
#RMSTG2026
Basic Qualifications
• Candidate must possess active US security clearance with a polygraph
• 8+ years overall experience
• Bachelor of Science in Math, Science, Engineering, Statistics, Engineering Management, or related discipline.
May substitute an additional four years' experience in lieu of a Bachelor's Degree.
Masters degree may substitute for additional 2 years of experience
• Experience programming in Assembly, C, C++ or Python
• Experience with Offensive Cyber Tools and Techniques
Desired skills
• 6+ years desired of USG Offensive Cyber experience.
• Experience using network sockets programming including developing packet-level programs, expert packet-level understanding of IP, TCP, and application-level protocols
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $113,900 - $200,905. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $131,000 - $227,125. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
$74k-96k yearly est. 60d+ ago
Cyber Analyst, Digital Forensics Incident Response
Bay 4.7
Remote job
Why you should join our At-Bay Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
The Role:
Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via:
Forensically sound collection, transmission, and storage of digital evidence
Analysis of digital evidence to identify indicators of compromise and adversary activity
Development of incident timelines and theories of compromise
Identification of incident root causes
Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.)
Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary
Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary
Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds
Development and delivery of incident response training and simulations for targeted insureds
Key skills:
Previous digital forensics and incident response experience
Strong oral and written communication skills
Previous hands-on experience performing digital forensics and incident response, including several of the following:
Business Email Compromise
Ransomware
Digital evidence collection and analysis
Development and analysis of cyber threat intelligence
Leadership of or participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc.
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements:
Bachelor's degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline
Willingness to travel as needed to perform job functions
Preferred requirements:
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Previous background in law enforcement or government/military with experience leading complex technical investigations
Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
Experience in a top-10 cyber consulting firm or leading DFIR provider preferred
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location:
USA, Nationwide
Fully Remote
Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
$80k-115k yearly Auto-Apply 60d+ ago
Cyber Security Analyst - REMOTE
Jobgether
Remote job
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Cyber Security Analyst - REMOTE. In this critical role, you'll be monitoring, investigating, and responding to security threats across various networks and environments. Your proactive threat hunting and analytics will play a vital role in strengthening the enterprise defenses. The analyst will also work on incident response and automation to effectively mitigate cyber risks and improve the overall security posture. Your contributions will significantly enhance the organization's ability to effectively manage and respond to cybersecurity challenges in an ever-evolving landscape.Accountabilities
Actively hunt for indicators of compromise (IOCs) and suspicious activities across environments.
Develop and execute KQL queries and create dashboards for telemetry analysis.
Automate detection, log analysis, and incident response workflows using scripting.
Monitor environments for potential breaches, escalating or remediating as necessary.
Collaborate cross-functionally to investigate incidents and implement corrective actions.
Identify and validate vulnerabilities, ensuring remediation and compliance.
Participate in red/blue team exercises and post-incident reviews.
Create and enhance security baselines, detection rules, and playbooks.
Prepare comprehensive reports and documentation on security incidents.
Ensure alignment with internal policies and industry standards.
Research and stay informed on emerging attack vectors and vulnerabilities.
Requirements
Hands-on experience using KQL for building queries and dashboards.
Experience with EDR/XDR, SIEM, and SOAR platforms.
Proficiency in Python or PowerShell scripting for automation.
Familiarity with threat intelligence and incident response methodologies.
Knowledge of common threat frameworks such as MITRE ATT&CK.
Understanding of cloud security operations across platforms like Azure and AWS.
Excellent analytical skills with a detail-oriented mindset.
Ability to work independently and collaboratively in a team environment.
Strong problem-solving skills and a self-motivated attitude.
Excellent communication skills and cross-departmental awareness.
Benefits
Medical, dental, and vision insurance.
Paid Time Off and Paid Holidays.
Life insurance and Short/Long Term Disability.
401k plan with matching contributions.
Paid Sick Time.
Pet Insurance.
Discount programs on travel, gyms, and other services.
Continuous learning opportunities and professional growth.
Work remotely from anywhere, particularly from the West Coast.
Why Apply Through Jobgether? We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best!Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time.#LI-CL1
$76k-102k yearly est. Auto-Apply 6d ago
Cyber Security Analyst II
Cybersheath 3.7
Remote job
Job Description
CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team!
CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.
Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory.
Job Overview
The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments.
Key Responsibilities
Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments
Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel
Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations
Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket)
Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns
Analyze federation security including ADFS token-based attacks and SAML token manipulation
Configure and tune WAF/firewall rule sets and investigate related security incidents
Develop network segmentation strategies and identify lateral movement attempts
Develop and maintain incident response playbooks for various attack scenarios
Coordinate incident response activities with cross-functional teams
Required Qualifications
3-5 years in cybersecurity with 2+ years SOC experience
Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD)
Experience with SIEM platforms and security monitoring tools
Scripting proficiency (PowerShell, Python)
Strong analytical and communication skills
Microsoft Certified: Security Operations Analyst (SC-200)
One additional security certification: EC-Council CSA, CompTIA Security+, or similar
Preferred Qualifications
Microsoft Certified: Azure Security Engineer (AZ-500)
Microsoft Certified: Identity and Access Administrator (SC-300)
CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification
CISSP, SSCP, CCSP
Skills & Expertise
Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps)
Azure Sentinel KQL query development and alert configuration
Azure AD/Entra ID security configuration and attack path analysis
Active Directory security assessment including GPOs, trust relationships, and delegation
Email security and phishing detection/response
Cloud security posture management
Incident handling and digital forensics
Threat intelligence analysis and implementation
Work Environment
CyberSheath is a fully remote organization, and this will be a work-from-home position
The schedule for this role is:
Week One: Friday - Sunday 8:00 AM - 8:00 PM
Week Two: Friday - Monday 8:00 AM - 8:00 PM
Travel requirements: 0-5% yearly.
Please note that this role will be part of our SOC on-call rotation
CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability.
Budgeted Pay Range$70,000-$100,000 USD
$70k-100k yearly 13d ago
Cyber Threat Fusion Analyst
Beyond SOF
Remote job
The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start.
Essential Job Functions
Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR).
Produce reporting for new or emerging threats and threat vectors.
Utilize SIEM technologies to correlate security events and logs and identify threats
Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections
Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR).
Produce reporting for new or emerging threats and threat vectors.
Utilize SIEM technologies to correlate security events and logs and identify threats.
Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections.
Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks.
Understand concepts of log and packet analysis
Navigate the command line using specific expressions to manipulate data
Handle and organize disparate data about detections, attacks, and attackers
Employ discovery techniques and vetting of new intelligence.
Create Situational Awareness Reports and Threat Briefs.
Minimum Required Qualifications
Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required.
Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree.
Computer defense technologies spanning endpoint, network, and open source.
Required Security Clearance: TS/SCI.
8570 IAT II certification is required prior to start.
It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
$74k-100k yearly est. 60d+ ago
Cyber Security Analyst
Military, Veterans and Diverse Job Seekers
Remote job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
$74k-100k yearly est. 60d+ ago
Global Cyber Wordings Analyst
Liberty Mutual 4.5
Remote job
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
Join our team as a Cyber Security Analyst and help safeguard critical systems while driving innovation in security practices. We are looking for a proactive professional who thrives in a collaborative environment and is passionate about protecting data and infrastructure.
Responsibilities
Lead efforts to monitor and maintain security across servers, networks, and endpoints.
Administer and enhance network security defenses to prevent breaches.
Analyze vulnerabilities and implement solutions to strengthen system integrity.
Respond to and investigate cyber incidents, ensuring timely resolution and documentation.
Develop and maintain security policies, standards, and guidelines aligned with best practices.
Collaborate with IT teams to ensure security controls, and compliance and risk management strategies are effective.
Educate staff on cybersecurity awareness and best practices.
Qualifications
Required:
Minimum 5 years of experience in cybersecurity, network engineering, or system analysis.
Strong knowledge of incident response, intrusion detection, and risk management.
Proficiency in analyzing complex systems and security audit results.
Excellent communication and problem-solving skills.
Preferred:
Bachelor's degree in Computer Science or related field.
Certifications such as CISSP, CEH, or CISA.
Experience with Windows Server, Linux, Cisco, and security tools like Wireshark.
Since 1981, Allegiance by Cigna Healthcare has specialized in the administration of medical benefits, offering core services such as claims processing, customer service, utilization management, and case management. Backed by a unique high-touch approach to both member and client service, Allegiance supports and administers some of the nation's most innovative approaches to Health Plan benefits.
If you will be working at home occasionally or permanently, the internet connection must be obtained through a cable broadband or fiber optic internet service provider with speeds of at least 10Mbps download/5Mbps upload.For this position, we anticipate offering an hourly rate of 32 - 49 USD / hourly, depending on relevant factors, including experience and geographic location.
This role is also anticipated to be eligible to participate in an annual bonus plan.
At The Cigna Group, you'll enjoy a comprehensive range of benefits, with a focus on supporting your whole health. Starting on day one of your employment, you'll be offered several health-related benefits including medical, vision, dental, and well-being and behavioral health programs. We also offer 401(k), company paid life insurance, tuition reimbursement, a minimum of 18 days of paid time off per year and paid holidays. For more details on our employee benefits programs, click here.
About Cigna Healthcare
Cigna Healthcare, a division of The Cigna Group, is an advocate for better health through every stage of life. We guide our customers through the health care system, empowering them with the information and insight they need to make the best choices for improving their health and vitality. Join us in driving growth and improving lives.
Qualified applicants will be considered without regard to race, color, age, disability, sex, childbirth (including pregnancy) or related medical conditions including but not limited to lactation, sexual orientation, gender identity or expression, veteran or military status, religion, national origin, ancestry, marital or familial status, genetic information, status with regard to public assistance, citizenship status or any other characteristic protected by applicable equal employment opportunity laws.
If you require reasonable accommodation in completing the online application process, please email: ********************* for support. Do not email ********************* for an update on your application or to provide your resume as you will not receive a response.
The Cigna Group has a tobacco-free policy and reserves the right not to hire tobacco/nicotine users in states where that is legally permissible. Candidates in such states who use tobacco/nicotine will not be considered for employment unless they enter a qualifying smoking cessation program prior to the start of their employment. These states include: Alabama, Alaska, Arizona, Arkansas, Delaware, Florida, Georgia, Hawaii, Idaho, Iowa, Kansas, Maryland, Massachusetts, Michigan, Nebraska, Ohio, Pennsylvania, Texas, Utah, Vermont, and Washington State.
Qualified applicants with criminal histories will be considered for employment in a manner consistent with all federal, state and local ordinances.
$72k-95k yearly est. Auto-Apply 2d ago
Senior Information Security Specialist-SECRET CLEARANCE REQUIRED
Latitude Inc.
Remote job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusion detection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
$82k-116k yearly est. Auto-Apply 60d+ ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
Musckids
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information Security Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
Perform cyber security incident handling, tracking and reporting.
Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
Respond to relevant service requests received from end users (e.g. for investigation of security events).
Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
Conduct vulnerability assessments to identify security risks and report findings to system owners.
Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
Perform risk assessments and translate business requirements into effective security controls.
Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
A Bachelor's degree in information security, informationassurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, informationassurance, computer science, or a related field, and 3 years of IT security experience required.
Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
Strong analytical and problem-solving skills with the ability to make decisions under pressure.
Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
Familiarity with cloud security (Azure, AWS) and identity management solutions.
Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
CISSP, CISM, GIAC, or equivalent.
Physical Requirements
Mobility & Posture
Standing: Continuous
Sitting: Continuous
Walking: Continuous
Climbing stairs: Infrequent
Working indoors: Continuous
Working outdoors (temperature extremes): Infrequent
Working from elevated areas: Frequent
Working in confined/cramped spaces: Frequent
Kneeling: Infrequent
Bending at the waist: Continuous
Twisting at the waist: Frequent
Squatting: Frequent
Manual Dexterity & Strength
Pinching operations: Frequent
Gross motor use (fingers/hands): Continuous
Firm grasping (fingers/hands): Continuous
Fine manipulation (fingers/hands): Continuous
Reaching overhead: Frequent
Reaching in all directions: Continuous
Repetitive motion (hands/wrists/elbows/shoulders): Continuous
Full use of both legs: Continuous
Balance & coordination (lower extremities): Frequent
Lifting & Force Requirements
Lift/carry 50 lbs. unassisted: Infrequent
Lift/lower 50 lbs. from floor to 36”: Infrequent
Lift up to 25 lbs. overhead: Infrequent
Exert up to 50 lbs. of force: Frequent
Examples:
Transfer 100 lb. non-ambulatory patient = 50 lbs. force
Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
Push patient stretcher one-handed = 25 lbs. force
Vision & Sensory
Maintain corrected vision 20/40 (one or both eyes): Continuous
Recognize objects (near/far): Continuous
Color discrimination: Continuous
Depth perception: Continuous
Peripheral vision: Continuous
Hearing acuity (with correction): Continuous
Tactile sensory function: Continuous
Gross motor with fine motor coordination: Continuous
Selected Positions:
Olfactory (smell) function: Continuous
Respirator use qualification: Continuous
Work Environment & Conditions
Effective stress management: Continuous
Rotating shifts: Frequent
Overtime as required: Frequent
Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$82k-116k yearly est. Auto-Apply 7d ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
MUSC (Med. Univ of South Carolina
Remote job
The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior Information Security Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
* Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
* Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
* Perform cyber security incident handling, tracking and reporting.
* Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
* Respond to relevant service requests received from end users (e.g. for investigation of security events).
* Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
* Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
* Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
* Conduct vulnerability assessments to identify security risks and report findings to system owners.
* Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
* Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
* Perform risk assessments and translate business requirements into effective security controls.
* Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
* Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
* A Bachelor's degree in information security, informationassurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, informationassurance, computer science, or a related field, and 3 years of IT security experience required.
* Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
* Strong analytical and problem-solving skills with the ability to make decisions under pressure.
* Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
* Familiarity with cloud security (Azure, AWS) and identity management solutions.
* Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
* Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
* Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
* CISSP, CISM, GIAC, or equivalent.
Physical Requirements
* Mobility & Posture
* Standing: Continuous
* Sitting: Continuous
* Walking: Continuous
* Climbing stairs: Infrequent
* Working indoors: Continuous
* Working outdoors (temperature extremes): Infrequent
* Working from elevated areas: Frequent
* Working in confined/cramped spaces: Frequent
* Kneeling: Infrequent
* Bending at the waist: Continuous
* Twisting at the waist: Frequent
* Squatting: Frequent
* Manual Dexterity & Strength
* Pinching operations: Frequent
* Gross motor use (fingers/hands): Continuous
* Firm grasping (fingers/hands): Continuous
* Fine manipulation (fingers/hands): Continuous
* Reaching overhead: Frequent
* Reaching in all directions: Continuous
* Repetitive motion (hands/wrists/elbows/shoulders): Continuous
* Full use of both legs: Continuous
* Balance & coordination (lower extremities): Frequent
* Lifting & Force Requirements
* Lift/carry 50 lbs. unassisted: Infrequent
* Lift/lower 50 lbs. from floor to 36": Infrequent
* Lift up to 25 lbs. overhead: Infrequent
* Exert up to 50 lbs. of force: Frequent
* Examples:
* Transfer 100 lb. non-ambulatory patient = 50 lbs. force
* Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
* Push patient stretcher one-handed = 25 lbs. force
* Vision & Sensory
* Maintain corrected vision 20/40 (one or both eyes): Continuous
* Recognize objects (near/far): Continuous
* Color discrimination: Continuous
* Depth perception: Continuous
* Peripheral vision: Continuous
* Hearing acuity (with correction): Continuous
* Tactile sensory function: Continuous
* Gross motor with fine motor coordination: Continuous
* Selected Positions:
* Olfactory (smell) function: Continuous
* Respirator use qualification: Continuous
* Work Environment & Conditions
* Effective stress management: Continuous
* Rotating shifts: Frequent
* Overtime as required: Frequent
* Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$65k-92k yearly est. 6d ago
Information Security Compliance Senior Analyst
Crypto.com 3.3
Remote job
At Crypto.com, our dedication to user security is led by our highly experienced Security Team. Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors. The team includes holders of international patents for technologies integrated in our security architecture. Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS. Our Chief Information Security Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy.
Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning. The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base.
About the Role
As our Security Compliance Senior Analyst, you will be tasked with security compliance activities along with our journey. You are expected to take the initiative to assist us with several security compliance programs and certifications. You are required to address and review compliance gaps and give recommendations and support on remediation activities. You will also be trusted to provide technical advice to ensure that security compliance requirements are met throughout all business units. This role requires technical knowledge of network security, especially on-prem and cloud native architectures. A familiarity with US derivatives regulatory frameworks would be advantageous. Job Responsibilities:
Assist in our security compliance programs, including ISO27001, ISO27701, PCI-DSS, SOC2 Type 2, and local regulations
Participate in internal security and privacy assessments, internal and external audits, compliance certifications, and risk management
Provide complete and accurate responses to internal and third-party enquiries on security compliance
Perform security compliance assessment activities, including periodic technical, organizational, and third-party risk and control assessments, and managing remediation activities to completion
Design and manage necessary control and framework required to comply with international standards and US local regulations
Identify and drive process improvements for streamlining global security compliance operations
Qualifications:
3-5 years of experience in information security, privacy, IT audit or IT risk management related roles.
Prefer experience with one or more of the following: In-house security and privacy operations, conducting security control assessments, risk assessments or audits.
Prefer experience with any of the following: ISO27001, ISO27701, SOC1, SOC2, PCI, SOX, COSO, cloud technologies, and data protection regulations and requirements.
Ability to analyze and review US and Global privacy and information security compliance and provide guidance.
Holders of security-related certifications/qualifications will be an advantage: CISSP, CRISC, CISM, CISA, ISO27001 LA, CIPT, CIPP/E, or other relevant certifications
Experience leading compliance initiatives and working with auditors and/or external regulators
It's a plus if you:
Have experience in information security and privacy management in virtual assets, fintech, online services, platform services, or global services.
Have experience in establishing information security and privacy framework to meet US regulations, (CFTC, FINRA, SEC, and other US based regulators.)
Are a strong commitment to personal learning and development
Are detail minded with an analytical mindset
Have good communication skills with an ability to explain complex technical issues to non-technical business users
Have prior experience with project management
Have an interest and understanding of Blockchain and AI technologies
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
$81k-120k yearly est. Auto-Apply 7d ago
Remote Pre-Sales Security Systems Engineer - Access Control & CCTV (REVIT /AUTOCAD Specific)
Kastle Systems International 3.6
Remote job
Together, We Enhance Innovation and Growth
i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
This position requires Revit as the primary focus with CAD proficiency (AutoCAD) required for supporting certain systems and projects.
Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
Create solution design documentation (drawings, BOMs, solution design summaries).
Provide technical support for in-office and on-site team members.
Support management in the process of creating documentation for implementing new technology with new and existing customers.
Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
A minimum of 3-7 years previous experience in the industry.
Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
Experience in the design and planning of access control and video systems.
Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
This position requires Revit as the primary focus with CAD proficiency (AutoCAD) required for supporting certain systems and projects.
Other Eligibility Requirements
Ability to manage time and multiple tasks without supervision.
Organizational skills & detail oriented.
Good analytical and problem-solving skills.
Excellent presentation, writing skills, verbal, and written customer communication skills.
Experience in computer programs such as Microsoft Office, Adobe, etc. preferred. Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
$99k-139k yearly est. Auto-Apply 60d+ ago
Staff Information Security Analyst
Playstation 4.8
Remote job
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information Security Analyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
$185.6k-261k yearly Auto-Apply 13d ago
Information Security Controls Analyst
United Community Bank 4.5
Remote job
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in InformationAssurance, Computer Science, Engineering, or a related technical field.
Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Conditions of Employment
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
$50k-77k yearly Auto-Apply 13d ago
Learn more about information assurance analyst jobs