Senior Information System Security Officer
Information security analyst job in Huntsville, AL
MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Officer (ISSO) to join our team in Huntsville, Alabama.
Responsibilities include, but are not limited to:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Provide liaison support between the system owner and other IS security personnel
Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters
Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR; Working knowledge of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and ATO processes
Minimum Qualifications:
Must meet one of the following levels of experience: A high school diploma/GED and 7 years' experience, a bachelor's degree in computer science cybersecurity or a related discipline and five years' experience, or a master's degree in computer science cybersecurity or a related discipline and 3 years' experience.
Hold at least one of the following Information Assurance Management (IAM) Level III certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or equivalent certifications
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications
Preferred Qualifications:
A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline
Clearance Requirements:
Must have a current/active Top Secret security clearance with eligibility to obtain SCI prior to starting this position.
Selected candidate must be willing to undergo a Polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
Often positions self to maintain computers in the lab, including under the desks and in the server closet
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Senior Professional, Application Data Cloud Security
Information security analyst job in Atlanta, GA
Cargill's size and scale allows us to make a positive impact in the world. Our purpose is to nourish the world in a safe, responsible and sustainable way. We are a family company providing food, ingredients, agricultural solutions and industrial products that are vitalfor living. We connect farmers with markets so they can prosper. We connect customers with ingredients so they can make meals people love. And we connect families with daily essentials - from eggs to edible oils, salt to skincare, feed to alternative fuel. Our 160,000 colleagues, operating in 70 countries, make essential products that touch billions of lives each day. Join us and reach your higher purpose at Cargill.
Job Purpose and Impact
The Senior Professional, Application Data & Cloud Security job designs, implements and oversees security measures across development, security and operations, software as a service or platform as a service and multi-cloud environments. With minimal supervision, this job ensures the integrity, confidentiality and availability of data and applications, thereby supporting the organization's overall security posture and compliance with industry standards.
Key Accountabilities
SECURITY FRAMEWORKS: Designs and implements development, security and operations tools and processes as well as multi-cloud control capabilities to improve security posture across the organization.
SECURITY CONTROLS: Designs and operates software as a service or platform as a service security controls to protect applications and data in cloud environments.
DATA MANAGEMENT: Leads data lineage, data protection and flow controls to ensure secure data handling and compliance with regulations.
CYBERSECURITY DELIVERY: Leads cybersecurity delivery to safeguard enterprise resource planning systems and associated data, assessing and suggesting preparation for potential risks.
PERFORMANCE MONITORING: Leads performance monitoring to assess security measure's effectiveness and efficiency and recommend areas for improvement.
DATA PRIVACY FUNCTIONS: Engages with the data privacy function during incidents to ensure compliance and mitigate risks.
QUALITY ASSURANCE TESTING: Performs complex quality assurance testing and proposes continuous improvements to security processes and tools.
PERFORMANCE METRICS: Quantifies, prepares and communicates business and functional performance against objectives, ensuring alignment with organizational goals and security standards.
COLLABORATION: Cooperates with cybersecurity peers, data privacy partners, external experts, industry consortia, and other internal and external teams to maintain effective and efficient data protection fundamentals and deliver business objectives.
Short Description
This role is based out of Wayzata, MN.
The expected salary for this position is $105,000.00 - $178,000. Compensation varies depending on a wide array of factors including but not limited to the specific location, certifications, education, and level of experience. The disclosed range estimate may be adjusted for any applicable geographic differential associated with the location at which the position may be filled. This position is eligible for a discretionary incentive award. The incentive award amount is dependent upon company performance and your personal performance. At Cargill we put people first. As part of your overall rewards, we offer a comprehensive benefit program including medical and/or other benefits dependent on the position offered and hours worked. Visit: learn more (subject to certain collective bargaining agreements for Union positions).
Minnesota Sick and Safe Leave accruals of one hour for every 30 worked, up to 48 hours per calendar year unless otherwise provided by law.
Qualifications
Minimum requirement of 4 years of relevant work experience. Typically reflects 5 years or more of relevant experience.
Equal Opportunity Employer, including Disability/Vet.
Cloud Security Analyst
Information security analyst job in Miami, FL
About the Company
Your new role as a Senior Cloud Security Analyst based in Miami, you will lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP). Acting as a consultant to internal teams, you'll evaluate digital security gaps, implement solutions, and ensure compliance with governance standards. You'll manage IAM processes, review access controls, monitor security events, and provide strategic security directives to stakeholders.
About the Role
Responsibilities
Lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP).
Act as a consultant to internal teams.
Evaluate digital security gaps and implement solutions.
Ensure compliance with governance standards.
Manage IAM processes and review access controls.
Monitor security events and provide strategic security directives to stakeholders.
Qualifications
Bachelor's degree in Computer Science or related field (or equivalent experience).
5+ years in cloud security and identity access management.
Required Skills
Expertise in Azure and AWS security administration.
Strong IAM knowledge (SailPoint, Active Directory, O365).
Familiarity with GDPR, PCI, NIST frameworks.
Scripting experience (PowerShell; Python a plus).
Experience with vulnerability tools (Qualys, Orca preferred).
Preferred Skills
Microsoft 365 Messaging or Security Administrator, CompTIA Cloud+.
Pay range and compensation package
110-120K plus bonus
Equal Opportunity Statement
We are committed to diversity and inclusivity.
Bank Information Security Governance Senior
Information security analyst job in Tampa, FL
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplyIT Helpdesk Analyst
Information security analyst job in Smyrna, GA
Addison Group is working with an engineering company in search for a temporary IT Helpdesk Analyst. This is a short term 12-14 week opportunity and onsite 5 days a week in Smyrna GA.
We're seeking a Tier 1 Helpdesk Contractor to support hardware setup, device deployment, and day-to-day troubleshooting for end users in our Smyrna corporate office. This role is ideal for someone organized, personable, and customer-focused, who enjoys providing hands-on IT support and working with internal technicians and staff.
Key Responsibilities
Set up and configure new and replacement devices for new hires (Windows laptops, iPhones, iPads).
Prepare and program devices using company software such as WatchDog, Azure, Intune, and Company Portal.
Oversee automated device deployments in Intune; monitor and complete basic configuration steps as needed.
Track and manage equipment inventory, maintaining accurate records (serial numbers, local inventory spreadsheet, and system updates).
Support M365 (Microsoft 365) applications, including assisting with PowerPoint and device connectivity issues.
Respond to end-user calls and emails, resolving Tier 1 issues including:
Password resets
VPN access and connectivity
Hardware troubleshooting
Assist with onboarding and device setup for new hires and replacement staff.
Collaborate closely with team members to ensure smooth IT operations and customer satisfaction.
Benefits: Medical, Dental, Vision, 401(k)
Cyber Security Analyst
Information security analyst job in Atlanta, GA
A Southern Company Security Analyst participates in monitoring, hunting and responding to cyber security events. He or She, provides a front-line role during cyber security incidents, identifying the extent of the threat, business impacts and advising or sometimes performing the most suitable course of action to contain, eradicate and remediate an incident. A Southern Company Security Analyst maintains a good knowledge of the threat landscape, helps enhance visibility and response capabilities by identifying new methods of detecting threats. A Southern Company Security Analyst is proactive and seeks out adversaries determined to negatively impact Southern Companies reputation, financial interest or threatens the safety of our employees and customers.
Candidates are expected to discuss and demonstrate they meet required qualifications for applicable roles.
Responsibilities
Take action on security events presented to Analyst via SIEM, user submissions, dashboards, etc.
Self-initiate hunting initiatives to discover potential breaches or undiscovered cyber threats
Remain abreast of emerging threat patterns and provide recommendations to detect threats
Assists with patching recommendations and workarounds for zero-day threats.
Coordinate mitigation or remediations task with stakeholders or supporting teams
Communicates with management on incident updates.
Monitors SIEM and analyzes security events to determine appropriate actions
Monitors emails containing links/attachments associated with potential phishing attempts to determine appropriate actions
Identify and tune false positives associated with current security events
Document analytical steps and findings associated with security event investigations
Qualifications Required for Cyber Security Analyst
2 years IT security experience
Minimum 2 years of experience in performing analysis on Windows and LINUX/UNIX systems
Minimum 2 years of experience and/or familiarity in the following areas:
Network/Endpoint: analysis tools
Scripting languages
Windows/Unix command line utilities
Reputation analysis associated with IP's, Domains, Email Addresses
Ticketing Systems
Required to submit to a background examination.
Experience operating within a security application such as Kali, Metasploit, and etc.
Familiar with and have worked within Cyber Security Frameworks such as:
NIST 800 - 61
Attack Life Cycle
SANS Security Controls
MITRE
SANS Security 500 Series or other industry standard equivalent
Experience with PCAP analysis
Experience investigating endpoint and network security events
Experience investigating user reported Phishing events (specifically investigating suspicious links and attachments)
Experience analyzing security events utilizing sandbox technology
Experience operating within a security application such as Kali, Metasploit, and etc.
Oral and written communication skills
Experience taking ownership of incidents from acknowledgement to resolution
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Experience initiating security event investigations
Preferred capabilities:
Oral and written communication skills
Ability to take ownership of incidents from acknowledgement to resolution
Ability to initiate security event investigations
Ability to comprehend and articulate business impact associated with security events
Interacting with vendors to support proof of concepts
Proficient in Microsoft Office products: Excel, Word, Outlook and etc.
Exposure, experience and/or knowledge of cloud technology
Familiar with NIST 800-61 and SANS Critical Security Controls
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Desired certifications:
GIAC Security Essentials (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
Security+
Other certifications within IT Security
Characteristics of an Southern Company Cyber Analyst
Self-Motivated - Cyber Analysts do not only act when security tools trigger alerts, we are suspicious by nature and can generate security events based on self-initiated task.
Perseverance - Cyber Analysts identify resources that allow us to move through or around barriers as we analyze cyber security events.
Dependable - Cyber Analysts work within a team environment and thus, we rely on one another for knowledge-sharing and dependence.
Integrity - As Cyber Analysts, our reputation is our code of ethics. We are not perfect. We admit our mistakes. We do the right thing.
Sense of Humor - Although this may vary, just have one; I promise we can work with it. We have a lot of fun in what we do, so you will need a sense of humor to keep up.
This position falls under the company's Insider Threat Program and will have access to, and control over sensitive data, systems or assets. Enhanced personnel screening, which includes a background review, drug screen and psychological assessment, will be required if you are selected for this position
Auto-ApplyInformation Security/Privacy Analyst
Information security analyst job in Robins Air Force Base, GA
Responsibilities
Peraton is seeking an Information Security/Privacy Analyst for its' Product Data Systems Support program within our Cyber Mission Sector.
Location: Robins Air Force Base, GA. This is a full-time on-site role.
In this role, you will:
Ensure that security policies, procedures, and directives of the National Industrial Security Program Operating Manual NISPOM manuals are followed.
Maintain oversight and compliance of existing information systems through technical reviews and system auditing.
Interface with program management and customers on security requirements implementation, required documentation, and classification management.
Provide information systems security guidance awareness and training and participates in customer security inspections and reviews.
Manage, develop, prepare, implement, and maintain security plans, standard operating procedures (SOPs), security tests, and evaluation plans.
Collaborate with internal security and IT staff to ensure the continued compliance and secure operation of accredited information systems.
Keep abreast of industry best practices and trends, as well as new technologies, and then plans and advises for implementation.
Manage 3 A&A packages utilizing eMASS for system approval.
Submit POA&Ms for TCNO, STIG, or other system deficiencies.
Coordinate with systems administrators, developers, and other team members for issue resolution, coordination or clarification.
Review change requests for system security impacts.
Review System Access Requests for the systems administered by the organization.
Revalidate email organizational accounts.
Create and modify security group requests, adding and removing users to groups.
Answer cyber related security questions from team members within organization.
Ensure compliance with DoD/AF instructions, directives, EOs and other regulations.
Qualifications
Required:
Bachelor's degree with a minimum of 5 years of relevant experience, Master's degree with 3+ years of relevant experience, Associate's degree with an minimum of 7 years of relevant experience, or 9 years of relevant experience in lieu of a degree.
Familiarity with Risk Management Framework (RMF) and NIST SP 800-53 controls.
Experience in analysis of security plans and policies.
Demonstrated ability to be self-motivated, self-supervisory, and results oriented.
Demonstrated organizational skills and strong verbal/written communication skills.
The ability to obtain/maintain Security+ certification within 6 weeks of hire date.
The ability to obtain a Common Access Card (CAC).
U.S. citizenship required.
The ability to obtain a DoD level Secret security clearance.
Preferred:
General experience with DoD networks.
Current Security+ certification.
Current CISM, CIPA, CISSP professional certification.
An active DoD level Secret security clearance.
Experience with Enterprise Mission Assurance Support Service (eMASS).
Benefits:
At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We're fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyInformation Security Analyst - IV
Information security analyst job in Alpharetta, GA
America Networks is a leading sensor and networking solutions partner for companies in any Industrial, Manufacturing, and Waste management space. We design and manufacture sensors for storage tanks, water metering, energy metering, gas monitoring, and asset management.
Our founders are hardcore telecommunications engineers with combined 200 + years of experience in designing, optimizing and performance engineering; for several mid - large wireless carriers internationally - that saw a need to provide low power, cost efficient sensors to collect data, create alerts, and predict needed actions. We have combined these sensors with low power, wide area (LPWA) networking technologies to provide clients various options to decrease re-occurring costs associated with operating an IoT network of sensors and connected devices.
We specialize in design, deployment, optimization, and support of these Networks. Whether an off-the-shelf or custom solution is needed, we'll create a solution and push the data on the best cloud platform to fit your needs, including your own.
Job Description
The responsibility of this position includes data protection, logging and monitoring for data security of our Big Data and Enterprise Data Warehouse platforms. Tools will be used to classify column level data according to confidentiality categories. This position will also be responsible for development and deployment of advanced data science algorithms to automatically detect and alert data usage anomalies. Encryption, tokenization, data masking, etc. will be applied to data according to confidentiality levels.
• B.S. or equivalent work experience
• 6+ years in related discipline
• Experience with all phases of the Software Development Lifecycle, including system analysis, design, coding, testing, debugging and documentation
• Teamwork & collaboration skills to work across organizations and lead cross-functional teams
• Communication & stakeholder management skills
• Problem solving skills to develop quick yet sound solutions to resolve complex issues
• Programming Language(s): KSH, JAVA
• Software: SHA 256, MD5, SSH, SSL, TLS, Teradata Tools and Utilities (BTEQ, MLoad, FastExport, FastLoad, TPT, TDCH, Query Grid, etc.), Hortonworks Hadoop software (Sqoop, HIVE, HBASE, SPARK, KAFKA, Kyvos, Ranger, Knox, Kerebos, etc.), Informatica software (Secure@Source, TDM, DDM, PowerCenter, BDM, EIC, IDL, IDQ, IIS, etc.), Aster, Tableau, Cognos, Qlik and other BI tools.. AWS cloud security for Hadoop/Teradata and HPE Voltage.
Demonstrated excellent teamwork and also ability to work independently with minimal supervision.
Expert knowledge of the wireless industry and data management activities.
Must have Hadoop and cloud security expertise with usage logging, monitoring, tokenization/encryption, access controls, and analysis.
Additional Information
Vivek Salvatore
vivek.salvatore(@)americanetworks.com
(
*************
Information Security Analyst
Information security analyst job in Tampa, FL
As an Information Security Analyst, you will have shared responsibility for implementing and maintaining company's security strategies and services while providing security guidance based on industry standards and best practices. The ideal candidate will ho have an educational background and/or experience to maintain and support assigned information security technologies with general leadership oversight.
*This position is located out of our Tampa, FL corporate office.
2 days a week in office are required*
Some of the regular responsibilities may include:
Provision, manage, monitor, test, and decommission security tools and applications.
Attend and lead small project meetings and enforce best practices.
Apply specialized security technical knowledge.
Evaluate, plan and implement security projects.
Remain current on assigned security tools and applications and apply skilled understanding of troubleshooting.
Document and resolve moderately complex problems.
Report progress to leaders.
Monitor and analyze Identity security incidents, and provide recommendations for remediation
Other duties as assigned or required.
Experience to be successful:
IT security risks and mitigation strategies.
Security Incident Response
Security frameworks, including ISO and NIST.
Company IT and HR policies.
Various IT security-related regulatory requirements.
IT security logging and monitoring strategies.
Deployment and use of sophisticated IT security monitoring tools.
Educational background: Bachelor's degree in computer science, Information Systems, or other related field; or has 2-5 years of relevant experience.
Technical Skills to understand the role:
Analytical ability
Analyzing Security System Logs, Security Tools, and Data
Communicating Up, Down, and Across All Levels of the Organization
Creating, Modifying, and Updating Security Information Event Management (SIEM)
Deep Understanding of Risk Management Frameworks
Discovering Vulnerabilities in Information Systems
Evaluating and Deconstructing Malware Software
Familiarity with Security Regulations and Standards
Implement and Maintain Security Frameworks for Existing and New Systems
Maintaining Security Records of Monitoring and Incident Response Activities
Monitoring Compliance with Information Security Policies and Procedures
Network and System Administration Experience
Responding to Requests for Specialized Cyber Threat Reports
Performing Cyber and Technical Threat Analyses
Performing Security Monitoring
Producing Situational and Incident-Related Reports
Providing Host-Based Forensics
Providing Timely and Relevant Security Reports
Responding to Security Events
Supporting and Managing Security Services
#LI-MB1
Benefits may include:
Comprehensive medical, prescriptions, dental and vision plans
401(k) plan with a discretionary company match
Shareholder Purchase and Reinvestment Plan
Basic life and accidental death and dismemberment insurance premium paid by the company
Voluntary supplemental life insurance for employees, spouses and dependent children
Fertility and Family Building Benefits
Paid Disability benefits
Paid time off programs
11 Company paid holidays per year
Flexible spending account
Health savings account (available to High Deductible Health Plan participants only)
Employee Assistance Program
Educational Assistance Program
Voluntary benefits, such as Critical Illness, Hospital Indemnity, Pet Insurance and Accident Insurance
Title insurance policies and certain escrow services for the employee's primary personal residence at no charge
Transportation benefit plan for mass transit, parking and vanpool, in several markets
Note: If you currently are employed by Old Republic Title (or one of its wholly owned affiliated companies) please get in touch with your human resources representative regarding the application process.
For California applicants, please click the following link to view our CCPA Applicant Notice
Old Republic Title is an Equal Opportunity Employer
Auto-ApplyInformation Security Analyst - Threat Intelligence
Information security analyst job in Alpharetta, GA
Are you passionate about the changing threat landscape, love the challenge of understanding how the latest malware works, and can evangelize the risks and issues across a broad organization? Are you looking for a challenging leadership position that will allow you to shape the future of security across the internet? Do you thrive on working with a close-knit, highly-motivated team?
Come join Lancope's threat intelligence team to help protect Lancope's customers against cyber-attacks. The successful candidate will join a global team of senior security analysts focusing on the changing threat landscape and effect on Lancope's customers. This position requires a professional with a strong security software and threat analysis background that is capable of identifying and establishing the relationships and processes within and external to Lancope to build an investigative threat research structure and flow. The team will source data across Lancope, i.e. internal product and traffic monitoring groups, as well as through external partner and qualified third-party relationships.
Lancope is looking for a full time Information Security Analyst for Lancope's Threat Intelligence Team. Analysts in this role will have experience in threat research and a desire to own innovative ideas from invention, through proof-of-concept, and to deployment.
Primary Responsibilities
Conduct literature reviews and keep abreast of state of the hack, data sources, data analysis techniques and big data
Invent and/or apply new techniques to telemetry data on a global scale and identify new security threats
Develop and document proofs-of-concept (POCs) to demonstrate the efficacy, performance, and scalability of new techniques
Publish and present research findings, including methodology and measured efficacy improvements
Help guide the development by working with product teams
Partner to turn successful POCs into product features and actionable intelligence.
Education and Experience
The ideal candidate for this role brings considerable experience, motivation, and organization along with both intense curiosity and desire to make an impact in internet security. Researchers in this role enjoy considerable latitude and work hands-on to complete all phases of applied research. The successful applicant will have demonstrable skills in some of the below areas:
At least 2 years relevant experience
Network administration, System administration (Windows or Unix)
IT security with a focus on computer forensics, incident response, malicious code/exploits, anti-virus, etc.
Knowledge of the current security threat landscape, especially network and web-based threats
Familiar with Windows exploits, malware and malicious code trends
Knowledge of TCP/IP and application in securing systems, investigating security incidents
Solid understanding of computer science fundamentals, software engineering
Knowledge of one or more programming/scripting languages
Web application and script development
Log and data analysis
Strong written and verbal communication
Self-motivated and highly ambitious
Creative problem solving skills and excellent troubleshooting/debugging skills
Excellent teamwork and people skills
Ability to manage multiple tasks and work towards long-term goals
Incident response experience a definitive plus
Information Security Associate or Specialist
Information security analyst job in Alpharetta, GA
The use of IT (Information Technology) infrastructure in the company is vital for daily operation. The IS (Information Security) Specialist should Provide secure Information Technology infrastructure service to the company as well as companywide employees and staff.
Role Description.
Define and implement Macro (Servers, Groups and Shared resource) and Micro (Personal and Single) IT infrastructure. Analyze, Plan, Design, Develop and Implement IT Infrastructure and IT Security solutions to support company IT requirements. Analyze and prevent any Information risk ensuring the companys information integrity. Define, maintain and monitor the execution of IS and IT policies. Execute and monitor company IT/IS Compliance.
Essential Duties and Responsibilities
-Monitoring and maintaining computer systems and networks
-Responding in a timely manner to service issues and requests
-Providing technical support across the company
-Support equipment repair and replacement service
-Testing Benchmarking new technology
-Maintain and execute IT Training program for new employs
-Monitor IT/IS Infrastructure (including servers and network devices) to ensure data integrity
-Reporting of daily system issues.
-Analyze and propose system improvements.
-Documentation related to IT/IS policies, issues, and procedures.
-Participation and active analyst, designer, and developer in IT projects.
-Monitoring of IT/IS infrastructure-related expenses.
-Other duties as assigned.
Requirements
Qualifications: Listed below are the minimum and/or desired qualifications of the position including education, work experience, and knowledge & skills that are required to perform satisfactorily in the position:
Education and Work Experience:
-Vocational or undergraduate degree in information systems and computer science or related field.
-One (1) to three (3) years of information systems, computer science and/or IT-related experience.
Knowledge and Skills:
-PC and Server management
-IT Hardware and Software installation
-Initiative skills
-Problem-solving skills
-Understanding of IT infrastructure and application architectures
-Great Social and Communication Skills
-Great Oral and Written Communication Skills
-System process analysis and design capabilities/experience
-Server Operating systems (Windows Server, Linux, HP-UX, Unix, Sun Solaris)
-Antivirus, NAC, DLP, MDM and other IS Solutions
-IS Related definition and policies (ex. ISO 27001)
-Networking (Cisco/HP) and network devices (Routers and Switch)
-VPN
-TCP/IP, UDP, Network standards
-LDAP, Active Directory and Exchange
-Access Control
-Security Cameras
-Firewall, Web Filter and other network security appliance solutions
-Database systems (SQL Server/MySQL/Oracle) and programming skill (is a plus)
-MS Office skills (especially Excel skills)
Physical Demands:
-Position requires sitting at a desk working on a computer for at least 2/3 of time.
-Position requires regular and reliable attendance.
-Position requires local travel up to 10% of the time.
Cyber Security Analyst
Information security analyst job in Georgia
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better.
We are actively seeking an experienced Cyber Security Analyst to join our Security Operations Center in Great Neck, New York, or work in a hybrid capacity from CT, GA, NY, NJ, PA, or SC. In this role, you will be responsible for incident detection, investigation and response, rules development tuning and improvement, defining and developing automations, and incorporating Threat Intelligence and Threat Hunting activities to enhance detection and mitigation strategies.
Primary responsibilities include:
* Incident Detection and Response - Monitor and analyze alerts generated by SIEM/SOAR platforms and user reports, investigate security incidents, and execute containment and eradication procedures to minimize impact and restore normal operations.
* Tuning & Optimization - Continuously refine detection rules and SOC processes to reduce false positives, enhance detection accuracy, and improve overall operational efficiency.
* Research & Development - Explore emerging threats and attack techniques to develop and implement new detection rules to expand visibility and strengthen the organization's security posture.
* Threat Hunting - Proactively hunt for hidden threats by analyzing logs and identifying gaps missed by existing security tools and improve security posture.
* Threat Intelligence - Review threat intelligence feeds, channels and articles to identify potential risks and proactively strengthen defenses.
* Automation Development - Design, implement, and maintain automation solutions to streamline SOC workflows, reduce manual effort, and accelerate incident response times.
* Reporting - Prepare and present comprehensive reports on key SOC activities, metrics, and security trends to stakeholders and management.
* Penetration Testing - Participate in Red and Purple Team exercises to assess and improve the effectiveness of security controls and incident response capabilities.
The ideal candidate should possess the following:
* Bachelor's degree in Computer Security, Cybersecurity, Information Security, or a related field preferred. Additional relevant experience may be considered in lieu of a degree.
* Experience with advanced SIEM content development, including custom correlation rules, dashboards, and reporting.
* Minimum of 1 year of experience working in a Security Operations Center (SOC) environment, either in-house or with a Managed Security Service Provider (MSSP).
* Proficiency in scripting languages such as Python, PowerShell, or Bash for automating security tasks and processes.
* Direct involvement in end-to-end incident response, including root cause determination and post-incident reporting.
* Experience monitoring and securing cloud environments (e.g., Microsoft Azure, AWS, Google Cloud Platform).
* Hands-on experience working with SIEM (e.g. Splunk, Microsoft Sentinel, Qradar)
* Familiarity with EDR solutions like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint or Cortex XDR.
* Understanding and familiarity with interpreting common log sources for monitoring and investigation (e.g. Firewall, Azure AD, Windows Security Log, Email, Proxy\URL Filtering etc.)
* Solid grasp of prevalent attack types, including phishing, brute-force attacks, malware, and data exfiltration techniques.
* Excellent verbal and written communication skills, with the ability to collaborate effectively with team members both within and outside the SOC.
* High level of situational awareness and problem sensitivity, with the ability to proactively identify issues and escalate concerns as appropriate.
* Demonstrated proactive mindset, strong sense of responsibility, and urgency in addressing security incidents and tasks.
* Ability to work independently, manage multiple priorities, and succeed in a fast-paced, dynamic environment.
* Strong motivation and willingness to continually learn and grow, adapting to new tools and evolving threat landscapes.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
* Competitive base salary and bonus opportunities
* Paid time off (three-week minimum)
* Medical, dental and vision starting day one
* 401(k) with employer match
* Paid parental leave
* Child and family care assistance (dependent care FSA with employer match up to $2500)
* Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
* Tuition assistance
* Wellness program with savings of up to $4,000 per year on insurance premiums
* ...and more!
The estimated annual base salary range for this position is $110,000 - $140,000.
Base pay is only part of our total compensation package, which also includes an attractive annual discretionary bonus and robust suite of employee benefits for which you are eligible to participate in starting on your first day of employment.
Base pay offered will be determined on an individualized basis and we will consider your location, experience, and other job-related factors.
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplyCyber Security Analyst 2
Information security analyst job in Birmingham, AL
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cyber security modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Information Security Analyst
Information security analyst job in Doral, FL
SGP Recruiting provides both operations and strategic support to Tribal 8(a) and commercial organizations. Our client is a CVE-verified Veteran-Owned Small Business (VOSB) and a proud ISO 9001:2015 certified organization specializing in systems integration and enterprise management solutions. As a trusted GSA MAS contract holder, they deliver mission-critical telecommunications, network infrastructure, and IT services to Federal, State, and Local Government agencies, the U.S. Military, and private-sector clients.
They are seeking a motivated, career and customer-oriented Information Security Analyst in Doral, FL. Possible other locations for this position: Key West, Newport (FL), and Naval Station Guantánamo Bay (NSGB). Join a team dedicated to Meeting today's mission demands requires more than just technology - it requires the right people, the right expertise, and the right partners working together with precision and purpose. Propel your career forward and be part of something extraordinary.
Salary Range - $85 - 90K Annually.
Employment - Full time
Worksite Type - Onsite
Security Clearance Required - Secret
Responsibilities include but are not limited to:
· Design, development, and maintenance of insightful and actionable. The Cybersecurity Analyst is responsible for the design, development, and maintenance of insightful and actionable dashboards using the ConstantView platform dashboards using the ConstantView platform.
· Possess a high level of expertise in ConstantView's functionalities, data visualization techniques, and data analysis methodologies.
· Lead the development of dashboards that effectively translate complex data into clear and concise visual representations, enabling stakeholders to gain valuable insights and make informed decisions.
· Includes collaborating with business users to understand their information needs, identifying relevant data sources, and designing dashboards that align with business objectives.
· Manipulate and transform data, apply appropriate visualizations, and ensure the accuracy and reliability of dashboard outputs.
· They also maintain existing dashboards, troubleshoot issues, and implement enhancements based on user feedback and evolving business requirements.
· They possess a strong understanding of data modeling, SQL querying, and data governance principles and can communicate technical concepts to non-technical audiences.
· The Information Systems Specialist III provides direction and mentorship to subordinate staff.
Minimum Qualifications:
· Bachelor's degree in information systems, Computer Science, Data Analytics, or 4+ years of additional experience related field in lieu of a required Bachelor's degree
· 9+ years of relevant Information Systems Specialist experience.
· Experience in data analysis and reporting, with a significant portion focused on dashboard development.
· Proven expertise in using Constant View for dashboard creation and maintenance.
· Strong understanding of data visualization principles and best practices.
· Experience with data manipulation and transformation techniques using SQL or other tools. Experience with data modeling and database design concepts. Relevant ConstantView certifications (e.g., developer, administrator). Training or certifications in data visualization tools and techniques.
Desired Qualifications:
· Master's degree in a relevant field. Experience with other data visualization platforms (e.g., Tableau, Power BI).
· Experience with data storytelling and presentation skills. Experience with data governance and data quality management.
· Experience with agile-informed development methodologies.
· Experience with statistical analysis and data mining techniques.
· Certifications in relevant programming languages (e.g., Python, R). Certifications in data science or data engineering.
· Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
Our client provides a variety of benefits including company-paid health, dental & vision insurance coverage, as well as additional employee-paid health insurance options; company-paid life and disability insurance; 401k retirement savings plan with employer match; 10 company paid holidays per year, and paid time off.
Our client also considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
Auto-ApplySystems Cybersecurity
Information security analyst job in Warner Robins, GA
Job Description
At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future.
We are privately held, are repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success.
Credence has an immediate need for a Systems Cybersecurity at the journeyman level to support the mission of the Global Hawk (AFLCMC/WIAG) and U-2 (AFLCMC/WIA) Division is to provide continuous, high altitude long endurance (HALE), all-weather, day/night, wide area reconnaissance and surveillance remotely piloted aircraft (RPA) systems. Global Hawk and U-2 Division is located at both Wright Patterson AFB, OH and Robins AFB, GA. The mission of the Sustainment Branch (AFLCMC/WIAGA) is to provide sustainment support to the operational Global Hawk fleet to include aircraft, payloads, and ground assets. Sustainment Branch is located at Robins AFB, GA. The mission of the International & New Business Branch (AFLCMC/WIAPC) is to avail exportable versions of all-weather, day/night, wide area reconnaissance HALE RPA capabilities to international US partners. International & New Business Branch is located at Wright Patterson AFB, OH.
Requirements
Responsibilities include, but are not limited to the duties listed below
At the initiation of the period of performance and throughout the period of performance of the contract, the Systems Cybersecurity will ensure, as a minimum, 50% of the total labor provided to deliver cybersecurity services is certified in accordance with DoD 8570.01-M standards. (CDRL A001).
Will ensure all system deliverables comply with DoD and Air Force cybersecurity policy, specifically DoDI 8500.01, Cybersecurity, and AFI 33-200, Air Force Cybersecurity Program Management.
To ensure cybersecurity policy is implemented correctly on systems, you will ensure compliance with DoD and Air Force Certification and Accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.01, Risk Management Framework (RMF) for DoD Information Technology, and AFI 33-210, The Risk Management Framework (RMF) for Air Force Information Technology.
Will support activities and meet the requirements of DoDI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication.
Education, Requirements and Qualifications
Active TS/SCI required
Bachelor's or master's degree in a related field and at least three (3) years of experience in the respective technical / professional discipline being performed, three (3) of which must be in the DoD or other United States Government (USG) ISR/SOF Organizations.
OR, seven (7) years of directly related experience with proper certifications as described in the PWS labor category performance requirements, five (5) of which must be in the DoD or other USG ISR/SOF Organizations.
Excellent written and verbal communication skills
Job may require the employee to be:
Willingness to travel if needed.
In a stationary position 50% of the time
Able to ascend/descend stairs as needed
Able to move equipment not to exceed 25 lbs. as needed.
Please join us, as together we build a better world one mission at a time powered by technology and its people!
#LI-Onsite
#veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Family Leave (Maternity, Paternity)
Short Term & Long Term Disability
Information Security Analyst
Information security analyst job in Atlanta, GA
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
The candidate will be a member of the Application Security Assessment (ASA) Team enforcing Global Cyber Security & Fraud at First Data. This includes automated vulnerability scanning mixed with manual penetration testing against web-based applications, web services, and thick client applications.
Job Specific Responsibilities Utilize dynamic and static application security testing tools effectively, including IBM AppScan Standard, Fortify SCA, Burp Suite Pro, and Qualys.
Host developer-focused appsec training workshops on topics including secure coding and vulnerability remediation.
Coordinate testing objectives, reporting deliverables, and remediation efforts as the liaison between the financial institution(s), First Data, and third-party assessors.
Provide documented guidance to development teams that define effective remediation solutions for vulnerabilities.
Contribute to maintaining First Data Corporation's PCI-DSS certifications through addressing regulatory requirements.
Availability to work occasional off-hours to complete assessments tied to meeting critical business objectives.
Interview Required: Yes
Information Technology-Info Security Analyst - Information Technology-Info Security Analyst
Qualifications
Bachelors Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Hands on technical experience with dynamic and static security testing tools, including source code assessments.
Deep analytical skills, strong out-of-the-box thinking.
Ability to effectively perform detailed-oriented technical information security work on a full-time basis.
Excel independently in a fast-paced environment.
Effective oral and written communication skills.
Preferred Qualifications Masters Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Proficient web-application developer with demonstrable knowledge of HTML, C/C++, Java, VB, Ruby, etc.
CEH, Security+, GWAPT
Additional Information
Regards,
Vikas Kumar
vikas.kumar(@)360itpro.com
Information Security Specialist (US) - Penetration Tester
Information security analyst job in Fort Lauderdale, FL
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist - Penetration Tester defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Responsibilities:
* Conduct Penetration Tests: Perform thorough and methodical penetration testing on web applications, mobile, AI, network infrastructures, and other systems to identify security vulnerabilities.
* Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
* Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
* Develop and Execute Test Plans: Design and execute detailed test plans
* Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
* Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements.
* Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
* Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications :
* Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
* Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
* Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
* Familiarity with security standards and frameworks Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyINFORMATION SECURITY ANALYST III - 73002976
Information security analyst job in Tallahassee, FL
Working Title: INFORMATION SECURITY ANALYST III - 73002976 Pay Plan: Career Service 73002976 Salary: $57,000.00 - $63,000.00 / annually Total Compensation Estimator Tool
Florida Department of Revenue
Information Services Program
Information Security Analyst III
Tallahassee
This is an Internal Agency Advertisement
If you have a desire to use your talent and skills at an organization that provides critical services to millions of individuals, businesses and families across the state, the Florida Department of Revenue invites you to apply to become an essential member of our team. We are committed to maintaining a diverse workforce and providing employment opportunities to veterans and individuals who have a disability. To learn more about the Department of Revenue's excellent array of benefits, including career training, tuition waivers, paid vacations, insurance, and retirement programs, visit our website.
JOB SUMMARY:
This is an advanced level support as an Information Security Analyst III position on the DOR Governance, Risk, and Compliance (GRC) Team, located in the Information Systems Program in Tallahassee. Cybersecurity is one of the fastest growing fields with endless opportunities for monitoring and mitigation of security threats. Customer service, time management, and effective communication are extremely important for this role. The incumbent serves as the point of contact regarding Risk Management on the Security GRC Team. This is independent work conducting organizational studies and evaluations, conducting risk assessments, business impact analysis assessments, providing technical assistance, and developing process and procedures to assist the organization in the analysis, assessment, and control of risks. May include program analysis, management consulting, and examination development.
MINIMUM REQUIREMENTS:
* Currently employed with the Florida Department of Revenue.
* Four years or more experience working in Information Technology or Information Security.
* Two years or more providing guidance to managers and their staff.
* Experience collaborating with various stakeholders, teams, or executive management.
* Experience conducting research and analyzing complex data, requirements, and information.
* Experience planning, organizing, and coordinating efforts across an organization.
* One year experience with NIST Risk Management Framework.
* Working knowledge and experience in Microsoft Office applications, specifically, Excel and Word.
PREFERENCES:
* Experience with ISO/IEC 20000.
* Experience with F.A.C. 60GG-2.
* Experience with NIST Cybersecurity Framework.
* Experience with cybersecurity rules and IRS Pub 1075.
* Experience utilizing SharePoint.
* Experience documenting processes, policies, and procedures.
* Advanced level experience in Microsoft Office Suite.
* Experience using project management, IT task management, Change Management, or other audit-related software.
* Strong verbal and written communication skills with the ability to communicate appropriately with technicians, as well as management.
SPECIAL NOTES:
* Failing to respond, or providing a response such as "see resume," "n/a" or similar, to a qualifying question that requires an explanatory response will disqualify the applicant from further consideration.
* This position is located in Tallahassee.
* This position is not eligible for telework.
* The tentative salary for this position is $60,000.00 annually.
SALARY: $57,000.00 - $63,000.00 / annually
BENEFITS:
Benefits include, but are not limited to, health insurance, life insurance, tuition waivers, paid sick and personal leave, paid parental leave, 10 paid holidays annually, retirement savings, and vision and dental insurance.
ADDITIONAL INFORMATION YOU NEED TO KNOW
CONTACT INFORMATION: Sangeetha Mohan Doss, **************, **************************************.
SCREENING DISCLAIMER: Your responses to qualifying questions must be verifiable by skills and/or experiences you stated on your candidate profile and/or resume.
SKILLS VERIFICATION TEST OR ONLINE SKILLS ASSESSMENT: If you meet the minimum job requirements, we might require you to take a skills verification test or an online skills assessment to be considered for an interview.
CANDIDATE POOL: Future vacancies may be filled from this advertisement for a period of up to six months.
CRIMINAL BACKGROUND CHECKS: You will be required to undergo a National Level-2 criminal background check which requires you to provide your fingerprints.
REMINDER: Male candidates born on or after October 1, 1962, will not be eligible for hire or promotion unless they are registered with the Selective Services System (SSS) before their 26th birthday or have a Letter of Registration Exemption from the SSS. For more information, please visit the SSS website at *******************
The State of Florida is an Equal Opportunity Employer/Affirmative Action Employer, and does not tolerate discrimination or violence in the workplace.
Candidates requiring a reasonable accommodation, as defined by the Americans with Disabilities Act, must notify the agency hiring authority and/or People First Service Center (***************. Notification to the hiring authority must be made in advance to allow sufficient time to provide the accommodation.
The State of Florida supports a Drug-Free workplace. All employees are subject to reasonable suspicion drug testing in accordance with Section 112.0455, F.S., Drug-Free Workplace Act.
VETERANS' PREFERENCE. Pursuant to Chapter 295, Florida Statutes, candidates eligible for Veterans' Preference will receive preference in employment for Career Service vacancies and are encouraged to apply. Certain service members may be eligible to receive waivers for postsecondary educational requirements. Candidates claiming Veterans' Preference must attach supporting documentation with each submission that includes character of service (for example, DD Form 214 Member Copy #4) along with any other documentation as required by Rule 55A-7, Florida Administrative Code. Veterans' Preference documentation requirements are available by clicking here. All documentation is due by the close of the vacancy announcement.
Location:
Easy ApplyNetwork Security Analyst
Information security analyst job in Augusta, GA
Network Security AnalystLOCATIONFort Eisenhower, GA 30905CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyNetwork Security II (Boundary)
Information security analyst job in Montgomery, AL
DLS Engineering is seeking a Network Security II (Boundary) professional for a full-time position in support of the Air Force Intranet Control (AFINC) program at Gunter Annex in Montgomery, Alabama. This is an on-site position.
As part of AFINC, the mission of the 26th Network Operations Squadron (26 NOS) is to provide mission assurance to the warfighter through the operation, management, and defense of the Department of Defense Information Network (DODIN). In the execution of its mission, the 26 NOS maintains network infrastructure, to include routers, switches, proxies, firewalls, servers, workstations, printers, Storage Area Networks (SAN) and test labs, to provide maneuverability and defense of both classified and unclassified networks.
A day in the life:
Install, monitor, configure, troubleshoot, upgrade, patch, harden, maintain, and operate intrusion detection/prevention systems, firewalls, load balancers, and web proxies to protect AFNet resources from both internal and external threats according to Department of Defense security standards
Perform complex analytics on boundary protection systems to protect system assets from compromise, data loss, and other requirements. Perform Defense Cyberspace Operations (DCO) and DODIN operations.
When I read the below it sounds like me:
5+ years of experience with Enterprise DOD boundary protection and CSSP operations.
IAT-II Certification (required)
Palo Alto: Network Security Professional OR Cisco Certified Network Administrator (CCNA) OR Palo Alto Networks Certified Network Security Administrator (PCNSA)
Active Secret Clearance
Other information:
We offer a competitive salary and a 401k program with company match.
We offer a comprehensive benefits package including health, vision, dental, life, and disability insurance.
We offer a generous paid time off package
If accommodation is needed with the application and / or the interview process for applicants with disabilities, please contact Human Resources at ************.
DLS is an E-Verify company.
DLS is an equal employment opportunity employer. Qualified applicants will receive consideration without regard to age, race, religion, sex (pregnancy, sexual orientation, gender identity), national origin, or disability. We encourage all qualified applicants to apply. If you believe you have been discriminated against, please contact Barbara Ellison. You also have the right to file a charge of discrimination with the equal employment opportunity commission.
Must be able pass a government background check, which will be completed before employment.