Post job

Information security analyst jobs in Athens, GA

- 365 jobs
All
Information Security Analyst
Cyber Security Analyst
Information Systems Security Officer
Security Engineer
Security System Engineer
Information Assurance Analyst
Senior Security Analyst
Information Security Director
Senior Security Engineer
Security Architect
Senior Information Security Engineer
Information Technology Security Manager
Network Security Analyst
  • Information Technology Security Manager

    Broad River Retail

    Information security analyst job in Fort Mill, SC

    CULTURE SNAPSHOT: Broad River Retail is an organization of integrity, diversity and culture working together for the purpose of ‘ Furnishing Life's Best Memories' . At Broad River, we call all our employees “Memory Makers.” We do this because we know everyone that works for our Company has the power to make positive memories not only for our Guests, but also for their families, co-workers, and communities. We take pride in training and developing our teams so that they can provide a premier customer experience to every Guest. Our Memory Makers are the driving force that has led us to being the largest and fastest growing Ashley licensee in the U.S. and landing us on the Top Places to Work list two years in a row in our industry. AT A GLANCE: The IT Security Manager reports directly to the VP of IT/BI and is part of the IT/BI Department. The IT Security Manager is responsible for safeguarding the organization's digital assets by managing and monitoring, detecting, and responding to security threats. This role involves conducting risk assessments, managing incident responses, and implementing security protocols to ensure the integrity, confidentiality, and availability of enterprise systems and data. DAY IN THE LIFE AS THIS MEMORY MAKER: Monitor security networks and systems for breaches or suspicious activity. Respond to security incidents and conduct thorough investigations. Perform vulnerability assessments and penetration testing. Develop and implement security measures and protocols. Analyze security alerts and determine appropriate response actions. Collaborate with IT teams to ensure secure system configurations. Prepare regular security reports for management. Conduct security awareness training for staff. Lead and manage security-related projects and initiatives. WHAT YOU'LL NEED TO SUCCEED: Bachelor's degree in Computer Science, Information Technology, or related field. 5+ years of experience in cybersecurity or related roles. 3+ years of Information Technology Management or related field Certifications such as CISSP, CISM, CEH, or GIAC preferred. Strong understanding of cybersecurity frameworks (e.g., NIST, ISO-27001, PCI-DSS). Experience with SIEM, IDS/IPS, firewalls, and endpoint protection tools. Excellent analytical, problem-solving, and communication skills. Ability to lead security-related projects and initiatives. Clearly convey ideas, expectations, and feedback to teams, ensuring transparency and alignment across all levels. Build strong relationships and a positive work culture. Address and resolve conflicts within the team, mediating differences and finding mutually beneficial solutions. Inspire and encourage team members, fostering a sense of purpose and driving performance toward shared goals. Respond to change with flexibility and a positive outlook, guiding teams through transitions and unforeseen challenges. Distribute tasks effectively based on team strengths, ensuring optimal workload balance and empowering others to take ownership. Mentor and provide constructive feedback to help team members grow, enhancing their skills and career development. WORKPLACE ENVIRONMENT: While performing the duties of this job the employee is: Prolonged periods sitting at a desk and working on a computer. Must be able to lift up to 15 pounds at a time. WORK SCHEDULE OUTLINED ON SITE, HYBRID, REMOTE WITH EXPECTATIONS Ability to work independently, as well as, in a collaborative team environment within an office setting. Physical requirements such as extended periods of sitting and computer use may be required. Physical requirements such as extended periods of standing may be required. Ability to communicate effectively verbally, in writing, and/or electronically. Ability to use logical reasoning for simple and complex problem solving. Travel up to 20% of your time. In accordance with the Americans with Disabilities Act (ADA), reasonable accommodations may be made to empower individuals with disabilities to undertake the essential duties and responsibilities of the position. MEMORY MAKER PERKS & BENEFITS: Salary Range based on background, skill, and experience Medical, dental, vision, and life insurance options Paid time off and 401K matching contribution Employee discount (40%) at BRR locations Internal Opportunities for career growth and advancement OUR COMMITMENT TO YOU: Broad River Retail is committed to creating a place where everyone feels respected, valued, and able to reach their full potential. Regardless of race, gender, religion, sexual orientation, age, disability, or if you're parenting the next generation of Memory Makers, we firmly believe our work is at its best when everyone feels free to be their most authentic self.
    $84k-121k yearly est. 2d ago
  • Cyber Security Analyst

    Southern Company 4.5company rating

    Information security analyst job in Atlanta, GA

    A Southern Company Security Analyst participates in monitoring, hunting and responding to cyber security events. He or She, provides a front-line role during cyber security incidents, identifying the extent of the threat, business impacts and advising or sometimes performing the most suitable course of action to contain, eradicate and remediate an incident. A Southern Company Security Analyst maintains a good knowledge of the threat landscape, helps enhance visibility and response capabilities by identifying new methods of detecting threats. A Southern Company Security Analyst is proactive and seeks out adversaries determined to negatively impact Southern Companies reputation, financial interest or threatens the safety of our employees and customers. Candidates are expected to discuss and demonstrate they meet required qualifications for applicable roles. Responsibilities Take action on security events presented to Analyst via SIEM, user submissions, dashboards, etc. Self-initiate hunting initiatives to discover potential breaches or undiscovered cyber threats Remain abreast of emerging threat patterns and provide recommendations to detect threats Assists with patching recommendations and workarounds for zero-day threats. Coordinate mitigation or remediations task with stakeholders or supporting teams Communicates with management on incident updates. Monitors SIEM and analyzes security events to determine appropriate actions Monitors emails containing links/attachments associated with potential phishing attempts to determine appropriate actions Identify and tune false positives associated with current security events Document analytical steps and findings associated with security event investigations Qualifications Required for Cyber Security Analyst 2 years IT security experience Minimum 2 years of experience in performing analysis on Windows and LINUX/UNIX systems Minimum 2 years of experience and/or familiarity in the following areas: Network/Endpoint: analysis tools Scripting languages Windows/Unix command line utilities Reputation analysis associated with IP's, Domains, Email Addresses Ticketing Systems Required to submit to a background examination. Experience operating within a security application such as Kali, Metasploit, and etc. Familiar with and have worked within Cyber Security Frameworks such as: NIST 800 - 61 Attack Life Cycle SANS Security Controls MITRE SANS Security 500 Series or other industry standard equivalent Experience with PCAP analysis Experience investigating endpoint and network security events Experience investigating user reported Phishing events (specifically investigating suspicious links and attachments) Experience analyzing security events utilizing sandbox technology Experience operating within a security application such as Kali, Metasploit, and etc. Oral and written communication skills Experience taking ownership of incidents from acknowledgement to resolution Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies Experience initiating security event investigations Preferred capabilities: Oral and written communication skills Ability to take ownership of incidents from acknowledgement to resolution Ability to initiate security event investigations Ability to comprehend and articulate business impact associated with security events Interacting with vendors to support proof of concepts Proficient in Microsoft Office products: Excel, Word, Outlook and etc. Exposure, experience and/or knowledge of cloud technology Familiar with NIST 800-61 and SANS Critical Security Controls Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies Desired certifications: GIAC Security Essentials (GCIH) GIAC Certified Intrusion Analyst (GCIA) Security+ Other certifications within IT Security Characteristics of an Southern Company Cyber Analyst Self-Motivated - Cyber Analysts do not only act when security tools trigger alerts, we are suspicious by nature and can generate security events based on self-initiated task. Perseverance - Cyber Analysts identify resources that allow us to move through or around barriers as we analyze cyber security events. Dependable - Cyber Analysts work within a team environment and thus, we rely on one another for knowledge-sharing and dependence. Integrity - As Cyber Analysts, our reputation is our code of ethics. We are not perfect. We admit our mistakes. We do the right thing. Sense of Humor - Although this may vary, just have one; I promise we can work with it. We have a lot of fun in what we do, so you will need a sense of humor to keep up. This position falls under the company's Insider Threat Program and will have access to, and control over sensitive data, systems or assets. Enhanced personnel screening, which includes a background review, drug screen and psychological assessment, will be required if you are selected for this position
    $95k-118k yearly est. Auto-Apply 60d+ ago
  • Information Security/Privacy Analyst

    Peraton 3.2company rating

    Information security analyst job in Robins Air Force Base, GA

    Responsibilities Peraton is seeking an Information Security/Privacy Analyst for its' Product Data Systems Support program within our Cyber Mission Sector. Location: Robins Air Force Base, GA. This is a full-time on-site role. In this role, you will: Ensure that security policies, procedures, and directives of the National Industrial Security Program Operating Manual NISPOM manuals are followed. Maintain oversight and compliance of existing information systems through technical reviews and system auditing. Interface with program management and customers on security requirements implementation, required documentation, and classification management. Provide information systems security guidance awareness and training and participates in customer security inspections and reviews. Manage, develop, prepare, implement, and maintain security plans, standard operating procedures (SOPs), security tests, and evaluation plans. Collaborate with internal security and IT staff to ensure the continued compliance and secure operation of accredited information systems. Keep abreast of industry best practices and trends, as well as new technologies, and then plans and advises for implementation. Manage 3 A&A packages utilizing eMASS for system approval. Submit POA&Ms for TCNO, STIG, or other system deficiencies. Coordinate with systems administrators, developers, and other team members for issue resolution, coordination or clarification. Review change requests for system security impacts. Review System Access Requests for the systems administered by the organization. Revalidate email organizational accounts. Create and modify security group requests, adding and removing users to groups. Answer cyber related security questions from team members within organization. Ensure compliance with DoD/AF instructions, directives, EOs and other regulations. Qualifications Required: Bachelor's degree with a minimum of 5 years of relevant experience, Master's degree with 3+ years of relevant experience, Associate's degree with an minimum of 7 years of relevant experience, or 9 years of relevant experience in lieu of a degree. Familiarity with Risk Management Framework (RMF) and NIST SP 800-53 controls. Experience in analysis of security plans and policies. Demonstrated ability to be self-motivated, self-supervisory, and results oriented. Demonstrated organizational skills and strong verbal/written communication skills. The ability to obtain/maintain Security+ certification within 6 weeks of hire date. The ability to obtain a Common Access Card (CAC). U.S. citizenship required. The ability to obtain a DoD level Secret security clearance. Preferred: General experience with DoD networks. Current Security+ certification. Current CISM, CIPA, CISSP professional certification. An active DoD level Secret security clearance. Experience with Enterprise Mission Assurance Support Service (eMASS). Benefits: At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We're fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
    $80k-128k yearly Auto-Apply 5d ago
  • Information Security Analyst

    Coastal Carolina University 4.5company rating

    Information security analyst job in Conway, SC

    Posting Details Classification Title IT Security Specialist/ Analyst I Classification Code AM80 Pay Band 6 Subject to Drug/Alcohol Testing Guidelines No Subject to Credit Check No Internal Title Information Security Analyst Department Information Technology Services Position Type PCLS - Slotted Classified Full or Part Time Full-Time Basis 12 mo. Hours per week 37.5 hours per week Normal Work Schedule Mon-Thu: 8-5 ; Fri: 8-12:30 Job Details Coastal Carolina University is currently accepting applications for the following full-time position: Information Security Analyst in the Office of Information Technology Services. Coastal Carolina University's Information Technology Services is looking for an information security analyst who is responsible for monitoring, analyzing, and mitigating cybersecurity and compliance risks. The analyst will also aid in the development of solutions, research new technologies, assist in policy changes, and recommend content for security awareness programs. How to Apply: Interested candidates may apply online at ***************************************** Applicants must submit a cover letter, resume and list of three (3) professional references. Review of applications will begin immediately and continue until position is filled. Required Qualifications: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis. Preferred Qualifications: Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team. Duties include, but are not limited to: * Research information security events, incidents, and issues to isolate and identify root or systemic causes. Responds according to policy and best practices. * Assists business units and operational teams with information security risk assessments and audits. * Gathers, compiles, and synthesizes information for security processes and systems around vulnerabilities and risk. * Aids in the development of solutions through security partnerships and research on new technologies, required policy changes, and vendor offerings. * Recommends content for information security training and awareness programs. IT Security Specialist/Analyst I (AM80/61122728/FTE-S01096P), full-time position with benefits. SC State Pay Band: 06. Salary range: $47,588.00 (minimum) - $67,817.00 (midpoint). Normal work hours are Monday through Thursday, 8:00 a.m. to 5:00 p.m. and Friday, 8:00 a.m. to 12:30 p.m. Must be flexible to meet the special scheduling needs of the university. Coastal Carolina University is a public comprehensive liberal arts institution located in Conway, South Carolina, just nine miles from the Atlantic coastal resort city of Myrtle Beach. Coastal Carolina University enrolls over 10,000 students from 49 states and 55 nations. The University is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award the baccalaureate and master's degrees of national and/or regional significance in the arts and sciences, business, humanities, education, and health and human services, a specialist degree in instructional technology, and PhD degrees in marine science: coastal and marine systems science and education sciences. The University provides equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, citizenship status, national origin, or because an employee or applicant for employment is an individual with a disability or a disabled veteran, an Armed Forces service medal veteran, a recently separated veteran, or an active-duty wartime or campaign badge veteran, or other "protected veteran," as defined by law. Coastal Carolina University is an EO/AA employer. Required Qualifications A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis. Preferred Qualifications Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team. Knowledge, Skills & Abilities Possess knowledge of system and network security for various operating systems and local area networks. Experience with security tools and technologies for deploying, managing, measuring, and auditing system and network security. Has a foundational understanding of application, hosted service, and cloud security principles. Capable of contributing to the creation of detailed technical documentation on security processes and procedures. Demonstrates basic analytical and problem-solving skills. Understands risk concepts and principles. Communicates effectively with audiences of varying technical knowledge levels. Posting Detail Information Posting Number FTE-S01096P Number of Vacancies 1 Desired Start Date 01/12/2026 Position End Date (if temporary) Job Open Date 12/11/2025 Job Close Date Open Until Filled Yes Special Instructions to Applicants Quicklink for Posting **************************************** Job Duties
    $47.6k-67.8k yearly 10d ago
  • Junior Cyber Security Analyst

    Reliance Worldwide 4.7company rating

    Information security analyst job in Atlanta, GA

    Reliance Worldwide Corporation
    $77k-107k yearly est. Auto-Apply 3d ago
  • Cyber Security Analyst

    Orange Business 3.3company rating

    Information security analyst job in Atlanta, GA

    Orange Business is here! About us Orange Business is a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities. About the role Orange Cyberdefense specializes in the design, implementation and support of the most reliable and innovative security solutions and services - we are seeking a SOC Analyst to join our global team for a major account. As a SOC Analyst you are responsible for the detection, investigation and defense against cyber-attacks. In our SOC, you will work with security experts and use the latest technologies to analyze potential security incidents. As the team is working based on FTS (follow-the-sun) model involving Brazil, France & Malaysia teams, shift work is required for this role. Your key responsibilities as a SOC Analyst will include to: Ensure that customer environments are always protected against cyber-attacks Triage and investigate alarms generated by SIEM tools, endpoint protection tools, network anomaly detection tools, etc. by performing in-depth analysis Undertake threat hunting investigations and campaigns Escalate relevant threats to customers and providing advice based on these threats Detect anomalies and attack patterns along the entire cyber-kill chain as described by MITRE ATT&CK Support our customers during a security incident and ensure effective defense against attacks Continuously develop improvements and detection methods to optimize detections Report monthly on the status of customer environments Advice customers on cyber trends. About you Cybersecurity needs to be your passion, securing the customers assets your mission. As security is often a tradeoff between different aspects, you need to be pragmatic and result driven to get your message delivered while reducing the risk for the customer. Excellent English written/verbal and communication skills. Minimum of 2 years of experience in a similar role Experience using SIEM and/or EDR/XDR security tools - Knowledge in SPLUNK technology is a plus. A degree in Computer Science, Cyber Security, Digital Forensics or Engineering - or equivalent industry recognized certification/experience Ideally have experience with penetration testing, incident detection, incident response and malware analysis Broad knowledge on threat analysis and experience in intelligence reporting. Ideally have experience with penetration testing, incident detection, incident response and malware analysis. Ideally have certifications such as CySA+, CEH, OSCP, OSDA, Splunk Power Ideally have experience working within a SOC, if not then any experience within an IT Department providing customer support Experience in reversing malware is a plus Industry certifications like CISA, CISM, CISSP is a plus What we offer Our Competitive Benefits Package Includes: Comprehensive health coverage (medical, dental, vision) for you and your family Financial protection: life, disability, AD&D, and business travel insurance 401(k) plan with company match Pre-tax savings through HSA and FSA accounts Employee assistance program, tuition reimbursement, and adoption support Healthy living and wellness reimbursements Group-rate insurance options: home, auto, pet, and more Generous PTO and paid volunteer days Legal assistance, critical illness, hospital indemnity, and ID theft protection plans Only your skills matter Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neuroatypia, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
    $75k-102k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Uptime365

    Information security analyst job in Atlanta, GA

    Role Value Proposition: The Incident Response Analyst will be a member of UpTime365's Global Cyber Incident Response Team. In this role, an analyst will use cutting edge tools and solutions, and collaborate with global team members across the organization to perform cyber incident response and protect UpTime365's partners against cyber threats. Key Responsibilities: Response to cyber security events and incidents by analyzing forensic data, logs, and threat intel to validate security threats, assess impact, determine root cause, and help coordinate remediation actions. Maintain awareness of emerging threats. Willingness and self -motiviation to learn and take advantage of all training opportunities provided. Perform proactive threat hunting to identify potential threats to UpTime365 and its partners. Partner with global incident response teams to coordinate global incident response. Eventual participation on a rotating on -call roster for off hour escalations. Requirements Essential Business Experience and Technical Skills: A bachelor's degree in cyber security or computer science, or 2 -4 years of combined IT and Cyber Security related work experience. 1 -3 years of experience analyzing logs (e.g. endpoint, network, identity), performing data correlation, and using SIEM or log management tools. Basic understanding of the Windows operating system and command line tools, network fundamentals, and cyber security concepts and frameworks. Scripting experience for analysis and automation of repeatable processes. Security specific certifications from SANS and other industry recognized organizations are desirable. Benefits Dental insurance Medical insurance Vision insurance 401K Paid vacation and sick leave Tuition fee reimbursement Students loan assistance
    $75k-102k yearly est. 60d+ ago
  • Information Security Analyst - IV

    Amnet Services

    Information security analyst job in Alpharetta, GA

    America Networks is a leading sensor and networking solutions partner for companies in any Industrial, Manufacturing, and Waste management space. We design and manufacture sensors for storage tanks, water metering, energy metering, gas monitoring, and asset management. Our founders are hardcore telecommunications engineers with combined 200 + years of experience in designing, optimizing and performance engineering; for several mid - large wireless carriers internationally - that saw a need to provide low power, cost efficient sensors to collect data, create alerts, and predict needed actions. We have combined these sensors with low power, wide area (LPWA) networking technologies to provide clients various options to decrease re-occurring costs associated with operating an IoT network of sensors and connected devices. We specialize in design, deployment, optimization, and support of these Networks. Whether an off-the-shelf or custom solution is needed, we'll create a solution and push the data on the best cloud platform to fit your needs, including your own. Job Description The responsibility of this position includes data protection, logging and monitoring for data security of our Big Data and Enterprise Data Warehouse platforms. Tools will be used to classify column level data according to confidentiality categories. This position will also be responsible for development and deployment of advanced data science algorithms to automatically detect and alert data usage anomalies. Encryption, tokenization, data masking, etc. will be applied to data according to confidentiality levels. • B.S. or equivalent work experience • 6+ years in related discipline • Experience with all phases of the Software Development Lifecycle, including system analysis, design, coding, testing, debugging and documentation • Teamwork & collaboration skills to work across organizations and lead cross-functional teams • Communication & stakeholder management skills • Problem solving skills to develop quick yet sound solutions to resolve complex issues • Programming Language(s): KSH, JAVA • Software: SHA 256, MD5, SSH, SSL, TLS, Teradata Tools and Utilities (BTEQ, MLoad, FastExport, FastLoad, TPT, TDCH, Query Grid, etc.), Hortonworks Hadoop software (Sqoop, HIVE, HBASE, SPARK, KAFKA, Kyvos, Ranger, Knox, Kerebos, etc.), Informatica software (Secure@Source, TDM, DDM, PowerCenter, BDM, EIC, IDL, IDQ, IIS, etc.), Aster, Tableau, Cognos, Qlik and other BI tools.. AWS cloud security for Hadoop/Teradata and HPE Voltage. Demonstrated excellent teamwork and also ability to work independently with minimal supervision. Expert knowledge of the wireless industry and data management activities. Must have Hadoop and cloud security expertise with usage logging, monitoring, tokenization/encryption, access controls, and analysis. Additional Information Vivek Salvatore vivek.salvatore(@)americanetworks.com ( *************
    $72k-102k yearly est. 15h ago
  • Information Security Analyst - Threat Intelligence

    Lancope 3.7company rating

    Information security analyst job in Alpharetta, GA

    Are you passionate about the changing threat landscape, love the challenge of understanding how the latest malware works, and can evangelize the risks and issues across a broad organization? Are you looking for a challenging leadership position that will allow you to shape the future of security across the internet? Do you thrive on working with a close-knit, highly-motivated team? Come join Lancope's threat intelligence team to help protect Lancope's customers against cyber-attacks. The successful candidate will join a global team of senior security analysts focusing on the changing threat landscape and effect on Lancope's customers. This position requires a professional with a strong security software and threat analysis background that is capable of identifying and establishing the relationships and processes within and external to Lancope to build an investigative threat research structure and flow. The team will source data across Lancope, i.e. internal product and traffic monitoring groups, as well as through external partner and qualified third-party relationships. Lancope is looking for a full time Information Security Analyst for Lancope's Threat Intelligence Team. Analysts in this role will have experience in threat research and a desire to own innovative ideas from invention, through proof-of-concept, and to deployment. Primary Responsibilities Conduct literature reviews and keep abreast of state of the hack, data sources, data analysis techniques and big data Invent and/or apply new techniques to telemetry data on a global scale and identify new security threats Develop and document proofs-of-concept (POCs) to demonstrate the efficacy, performance, and scalability of new techniques Publish and present research findings, including methodology and measured efficacy improvements Help guide the development by working with product teams Partner to turn successful POCs into product features and actionable intelligence. Education and Experience The ideal candidate for this role brings considerable experience, motivation, and organization along with both intense curiosity and desire to make an impact in internet security. Researchers in this role enjoy considerable latitude and work hands-on to complete all phases of applied research. The successful applicant will have demonstrable skills in some of the below areas: At least 2 years relevant experience Network administration, System administration (Windows or Unix) IT security with a focus on computer forensics, incident response, malicious code/exploits, anti-virus, etc. Knowledge of the current security threat landscape, especially network and web-based threats Familiar with Windows exploits, malware and malicious code trends Knowledge of TCP/IP and application in securing systems, investigating security incidents Solid understanding of computer science fundamentals, software engineering Knowledge of one or more programming/scripting languages Web application and script development Log and data analysis Strong written and verbal communication Self-motivated and highly ambitious Creative problem solving skills and excellent troubleshooting/debugging skills Excellent teamwork and people skills Ability to manage multiple tasks and work towards long-term goals Incident response experience a definitive plus
    $71k-99k yearly est. 60d+ ago
  • Information Security Associate or Specialist

    DHD Consulting 4.3company rating

    Information security analyst job in Alpharetta, GA

    The use of IT (Information Technology) infrastructure in the company is vital for daily operation. The IS (Information Security) Specialist should Provide secure Information Technology infrastructure service to the company as well as companywide employees and staff. Role Description. Define and implement Macro (Servers, Groups and Shared resource) and Micro (Personal and Single) IT infrastructure. Analyze, Plan, Design, Develop and Implement IT Infrastructure and IT Security solutions to support company IT requirements. Analyze and prevent any Information risk ensuring the companys information integrity. Define, maintain and monitor the execution of IS and IT policies. Execute and monitor company IT/IS Compliance. Essential Duties and Responsibilities -Monitoring and maintaining computer systems and networks -Responding in a timely manner to service issues and requests -Providing technical support across the company -Support equipment repair and replacement service -Testing Benchmarking new technology -Maintain and execute IT Training program for new employs -Monitor IT/IS Infrastructure (including servers and network devices) to ensure data integrity -Reporting of daily system issues. -Analyze and propose system improvements. -Documentation related to IT/IS policies, issues, and procedures. -Participation and active analyst, designer, and developer in IT projects. -Monitoring of IT/IS infrastructure-related expenses. -Other duties as assigned. Requirements Qualifications: Listed below are the minimum and/or desired qualifications of the position including education, work experience, and knowledge & skills that are required to perform satisfactorily in the position: Education and Work Experience: -Vocational or undergraduate degree in information systems and computer science or related field. -One (1) to three (3) years of information systems, computer science and/or IT-related experience. Knowledge and Skills: -PC and Server management -IT Hardware and Software installation -Initiative skills -Problem-solving skills -Understanding of IT infrastructure and application architectures -Great Social and Communication Skills -Great Oral and Written Communication Skills -System process analysis and design capabilities/experience -Server Operating systems (Windows Server, Linux, HP-UX, Unix, Sun Solaris) -Antivirus, NAC, DLP, MDM and other IS Solutions -IS Related definition and policies (ex. ISO 27001) -Networking (Cisco/HP) and network devices (Routers and Switch) -VPN -TCP/IP, UDP, Network standards -LDAP, Active Directory and Exchange -Access Control -Security Cameras -Firewall, Web Filter and other network security appliance solutions -Database systems (SQL Server/MySQL/Oracle) and programming skill (is a plus) -MS Office skills (especially Excel skills) Physical Demands: -Position requires sitting at a desk working on a computer for at least 2/3 of time. -Position requires regular and reliable attendance. -Position requires local travel up to 10% of the time.
    $76k-109k yearly est. 60d+ ago
  • Cyber Security Analyst

    Vets Hired

    Information security analyst job in North Charleston, SC

    PRIMARY DUTIES & RESPONSIBILITIES: Conducts regular risk assessments to identify potential vulnerabilities and threats within the AWS IL5 environment Develops strategies for risk mitigation and implements necessary controls to address identified risks Maintains a risk register documenting identified risks and corresponding mitigation actions Ensures AWS configurations align with IL5 security requirements, including encryption, access controls, and network segmentation Implements and enforces compliance with relevant security standards and regulations, such as NIST SP 800-53 and DoD IL5 requirements Monitors AWS configurations for deviations from security baselines and promptly remediates any non-compliant settings Implements strong IAM policies to enforce least privilege access across AWS resources Regularly reviews IAM roles and permissions to ensure alignment with the principle of least privilege Enables multi-factor authentication (MFA) for privileged accounts and sensitive operations Deploys robust monitoring tools to detect unauthorized access attempts, suspicious activities, and security breaches Establishes incident response procedures to promptly respond to security incidents and minimize their impact Conducts post-incident reviews to identify lessons learned and improves incident response processes Implements encryption mechanisms to protect data at rest and in transit within the AWS IL5 environment Regularly reviews encryption policies and key management practices to ensure effectiveness Provides regular security training and awareness programs to AWS IL5 users and administrators Educates users about common cyber threats, phishing attacks, and best practices for secure usage of AWS resources Encourages a culture of security awareness and proactive risk mitigation among all stakeholders Conducts periodic security assessments and audits to evaluate the effectiveness of cyber security controls Identifies areas for improvement and implement enhancements to strengthen the security posture of the AWS IL5 Cloud SCCA Stays abreast of emerging cyber threats, vulnerabilities, and industry best practices to adapt security measures accordingly Travels approximately 3-4 days a quarter, as required DESIRED SKILLS & REQUIREMENTS: RMF experience USMC Cyber experience SAFe (Scaled Agile Framework) experience Working Place: North Charleston, South Carolina, United States Company : Scientific Research Corporation
    $64k-87k yearly est. 60d+ ago
  • Systems Cybersecurity

    Credence 3.7company rating

    Information security analyst job in Warner Robins, GA

    Job Description At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future. We are privately held, are repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success. Credence has an immediate need for a Systems Cybersecurity at the journeyman level to support the mission of the Global Hawk (AFLCMC/WIAG) and U-2 (AFLCMC/WIA) Division is to provide continuous, high altitude long endurance (HALE), all-weather, day/night, wide area reconnaissance and surveillance remotely piloted aircraft (RPA) systems. Global Hawk and U-2 Division is located at both Wright Patterson AFB, OH and Robins AFB, GA. The mission of the Sustainment Branch (AFLCMC/WIAGA) is to provide sustainment support to the operational Global Hawk fleet to include aircraft, payloads, and ground assets. Sustainment Branch is located at Robins AFB, GA. The mission of the International & New Business Branch (AFLCMC/WIAPC) is to avail exportable versions of all-weather, day/night, wide area reconnaissance HALE RPA capabilities to international US partners. International & New Business Branch is located at Wright Patterson AFB, OH. This job is onsite on Robins AFB, GA. Requirements Responsibilities include, but are not limited to the duties listed below At the initiation of the period of performance and throughout the period of performance of the contract, the Systems Cybersecurity will ensure, as a minimum, 50% of the total labor provided to deliver cybersecurity services is certified in accordance with DoD 8570.01-M standards. (CDRL A001). Will ensure all system deliverables comply with DoD and Air Force cybersecurity policy, specifically DoDI 8500.01, Cybersecurity, and AFI 33-200, Air Force Cybersecurity Program Management. To ensure cybersecurity policy is implemented correctly on systems, you will ensure compliance with DoD and Air Force Certification and Accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.01, Risk Management Framework (RMF) for DoD Information Technology, and AFI 33-210, The Risk Management Framework (RMF) for Air Force Information Technology. Will support activities and meet the requirements of DoDI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication. Education, Requirements and Qualifications Active TS/SCI required Bachelor's or master's degree in a related field and at least three (3) years of experience in the respective technical / professional discipline being performed, three (3) of which must be in the DoD or other United States Government (USG) ISR/SOF Organizations. OR, seven (7) years of directly related experience with proper certifications as described in the PWS labor category performance requirements, five (5) of which must be in the DoD or other USG ISR/SOF Organizations. Excellent written and verbal communication skills Job may require the employee to be: Willingness to travel if needed. In a stationary position 50% of the time Able to ascend/descend stairs as needed Able to move equipment not to exceed 25 lbs. as needed. Please join us, as together we build a better world one mission at a time powered by technology and its people! #LI-Onsite #veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs Benefits Health Care Plan (Medical, Dental & Vision) Retirement Plan (401k, IRA) Life Insurance (Basic, Voluntary & AD&D) Paid Time Off (Vacation, Sick & Public Holidays) Family Leave (Maternity, Paternity) Short Term & Long Term Disability
    $76k-103k yearly est. 1d ago
  • Information Security Analyst

    360 It Professionals 3.6company rating

    Information security analyst job in Atlanta, GA

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile. Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us. We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change. Job Description The candidate will be a member of the Application Security Assessment (ASA) Team enforcing Global Cyber Security & Fraud at First Data. This includes automated vulnerability scanning mixed with manual penetration testing against web-based applications, web services, and thick client applications. Job Specific Responsibilities Utilize dynamic and static application security testing tools effectively, including IBM AppScan Standard, Fortify SCA, Burp Suite Pro, and Qualys. Host developer-focused appsec training workshops on topics including secure coding and vulnerability remediation. Coordinate testing objectives, reporting deliverables, and remediation efforts as the liaison between the financial institution(s), First Data, and third-party assessors. Provide documented guidance to development teams that define effective remediation solutions for vulnerabilities. Contribute to maintaining First Data Corporation's PCI-DSS certifications through addressing regulatory requirements. Availability to work occasional off-hours to complete assessments tied to meeting critical business objectives. Interview Required: Yes Information Technology-Info Security Analyst - Information Technology-Info Security Analyst Qualifications Bachelors Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent. Hands on technical experience with dynamic and static security testing tools, including source code assessments. Deep analytical skills, strong out-of-the-box thinking. Ability to effectively perform detailed-oriented technical information security work on a full-time basis. Excel independently in a fast-paced environment. Effective oral and written communication skills. Preferred Qualifications Masters Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent. Proficient web-application developer with demonstrable knowledge of HTML, C/C++, Java, VB, Ruby, etc. CEH, Security+, GWAPT Additional Information Regards, Vikas Kumar vikas.kumar(@)360itpro.com
    $81k-109k yearly est. 60d+ ago
  • Senior Security Analyst

    Neptune Technology Group 4.4company rating

    Information security analyst job in Duluth, GA

    Neptune Technology Group Inc. is a technology company serving water utilities across North America. Since 1892, we have continually focused on the evolving needs of water utilities - revenue optimization, operational efficiencies, and improved customer service. With our portfolio of smart water meters, data collection systems and software, we make data actionable for our customers - so they can remain focused on the business of water. For additional information, please visit the company website at ****************** Senior Security Analyst Position Summary As a Senior Security Analyst, you will be a key member of Neptune's 24×7 Security Operations program, supporting incident response, SIEM management, and threat detection across a hybrid environment (on-prem, cloud, SaaS). You'll work closely with the SOC Manager to execute detection, response, and reporting processes that protect Neptune and meet compliance requirements. Responsibilities: Threat Detection & Monitoring * Monitor and analyze security alerts from SIEM and EDR platforms * Investigate anomalies and suspicious activity across endpoints, networks, and cloud environments * Maintain high-fidelity alerting and reduce false positives through tuning Incident Response & Management * Execute playbooks for triage, containment, and remediation of security incidents * Assist in forensic investigations and contribute to post-mortem reports * Participate in tabletop exercises and readiness drills SIEM & Security Logging * Maintain SIEM health and ensure reliable telemetry across all assets * Develop and refine detection rules and correlation logic * Support automation and orchestration workflows for incident handling Identity & Access Management * Monitor identity-related events for anomalies and privilege escalation attempts * Support IAM lifecycle processes and enforce least privilege principles Threat Intelligence & Modeling * Integrate threat intelligence feeds into detection workflows * Assist in threat modeling to identify potential attack paths Reporting & Metrics * Document incidents and provide timely updates to SOC Manager for reporting to parent company * Track and report operational metrics (MTTD, MTTR, alert volumes, etc.) Security Standards & Architecture * Apply secure-by-design principles in collaboration with engineering teams * Support zero trust initiatives and network segmentation projects Relevant Platforms (experience with several is expected): * SIEM/SecOps: e.g. Google SecOps (Chronicle) * EDR & Identity: e.g. CrowdStrike, Microsoft AD/Entra * Network Security: e.g. FortiGate NGFW, FortiSASE * Secure Browsing: e.g. Prisma * Patching & Config: e.g. Automox * Secrets Management: e.g. Keeper * Asset Management: e.g. Axonius, Cyclops * Email & Data Security: e.g. Mimecast, Microsoft Purview Minimum Qualifications: * Bachelor's degree (or equivalent experience) * 3+ years in Security Operations or Incident Response * Hands-on experience with SIEM, EDR, and threat detection * Familiarity with NIST, ISO, MITRE ATT&CK, and zero trust principles * Strong analytical and communication skills Preferred Qualifications: * Security certifications (e.g., GCIH, GCIA, CISSP) * Experience with cloud security (AWS, Azure, GCP) * Exposure to SOAR automation and scripting * Travel Requirements: Typically requires overnight travel less than 10% of the time. Travel Requirements: Typically requires overnight travel less than 10% of the time. Location: Duluth, GA, Tallassee, AL
    $77k-104k yearly est. 10d ago
  • Cyber Security Analyst - GRC Support

    Savannah River National Laboratory 4.5company rating

    Information security analyst job in Aiken, SC

    Savannah River National Laboratory (SRNL) is seeking an energetic individual with good interpersonal skills to join the Cyber Assurance, Governance, Risk Management and Compliance team! The selected individual will assist the Information Systems Security Officer (ISSO) and GRC team with NIST Risk Management Framework (RMF) processes to ensure a secure operational security posture is in place and maintained throughout the lifecycle of the system and/or network. Minimum Qualifications: Bachelor's degree in Computer Science, Information Assurance, or related field 4-6 years of relevant experience in NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) as a federal-contractor employee For ability to obtain and maintain a security clearance, US Citizenship is Legally Required Preferred Qualifications: Working knowledge and experience with the NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) in a federal contractor role Attention to detail and strong written communication skills (clear, concise for evidence/control implementation descriptions) Experience with information assurance tools (GRC, Tenable.SC, Nessus, Splunk, etc.) Ability to quickly learn new technologies, concepts, and processes Demonstrated ability to work collaboratively in a team environment with good interpersonal skills Active DOE L clearance Data entry, updates and maintenance of System Security Plans and other documents/evidence in the GRC tool Executing scans security scans (compliance and vulnerability related) Tracking status of temporary risk findings to closure and gathering remediation evidence Pulling configuration compliance reports, STIG checklists, CIS benchmarks Assist with RMF Continuous Monitoring activities and new project Risk Assessments Assist Project Security Officers and ISSOs with preparation of authorization packages for new projects and accreditation boundary Assist with entry of new risks, updates or maintenance in the risk register Assist in performing security impact analysis using approved security policies and SSPs and provide recommendations for meeting requirements with adequate security controls that align with business objectives. Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts. Participate/assist with compliance assessments/audits and data calls. Interact with customers and peers in a professional and responsive manner.
    $59k-83k yearly est. Auto-Apply 3d ago
  • Information Systems Security Officer (ISSO)

    Contact Government Services, LLC

    Information security analyst job in Atlanta, GA

    ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment. Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality. Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: ******************* #CJ
    $68k-93k yearly est. Auto-Apply 60d+ ago
  • Network Security Analyst

    Cymertek

    Information security analyst job in Augusta, GA

    Network Security AnalystLOCATIONFort Eisenhower, GA 30905CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Monitor network traffic for anomalies Investigate and resolve security incidents Maintain and update security systems Generate and analyze security reports Assist in developing incident response plans Ensure adherence to security policies REQUIRED SKILLS Proficiency in monitoring tools like IDS/IPS Strong analytical and problem-solving skills Understanding of network protocols (TCP/IP, DNS) Knowledge of malware analysis tools Ability to interpret security logs Familiarity with vulnerability scanning tools DESIRED SKILLS Experience with advanced threat detection Knowledge of forensics methodologies Understanding of regulatory frameworks (e.g., GDPR, HIPAA) Experience with SOC workflows Familiarity with automation and scripting Knowledge of threat intelligence platforms PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $67k-89k yearly est. Easy Apply 60d+ ago
  • Director of Information Security

    Georgia Gwinnett College 4.3company rating

    Information security analyst job in Lawrenceville, GA

    About Us Since our founding in 2005, Georgia Gwinnett College (GGC) has been dedicated to providing an exceptional educational experience to our students. At GGC, we believe that our students' success is our success, and we are committed to creating a culture that supports and uplifts them throughout their academic journey. As a member of our faculty or staff, you will become part of a dedicated and passionate community of educators and professionals. Together, we work towards a common goal of empowering our students to achieve their full potential, both academically and personally. We take pride in our student body, which represents a multitude of backgrounds, perspectives, and experiences. Whether you are involved in teaching or providing essential services, your contribution will make a significant impact on the lives of our students and the broader community. In addition to our commitment to student success, we also value the well-being and professional growth of our employees. We offer a comprehensive benefits package, designed to support the needs of our faculty and staff. From competitive compensation to health and wellness programs, and professional development opportunities to work-life balance initiatives, we strive to create an environment where everyone can thrive and feel valued. Located in the thriving community of Gwinnett County, GGC offers a rich cultural and social landscape that enhances the overall college experience. Our backdrop is a beautiful, modern 260-acre campus located just 30 miles northeast of downtown Atlanta. Our students and employees benefit from the close proximity to various local amenities, including shopping, dining, entertainment, and outdoor recreational opportunities. This vibrant community serves as an extension of our campus, providing a stimulating environment for personal and professional growth. Join GGC and become part of a dynamic team that plays a pivotal role in shaping the lives and celebrating the achievements of our students. Together, let's make a positive impact and empower the next generation of leaders. Job Summary Based on industry standards and best practices, the Director of Information Security sets the vision and leads the strategy for a comprehensive enterprise cybersecurity and IT risk management program. The Director will provide direction and oversight to ensure confidentiality, integrity, and availability of data, systems, and services; manage organizational risk; and ensure alignment with GGC's mission, goals, and business needs. This position reports to the Chief Information Officer (CIO) and serves as a member of the IT Leadership Team. The Director is responsible for developing and executing security governance, incident response, and awareness programs, and for fostering a culture of security throughout the college. This position collaborates with colleagues frequently and regularly interacts with internal and external stakeholders. This position leads and develops one or more direct reports. Working outside standard business hours will be required on an as-needed basis. Responsibilities * Lead and develop a comprehensive information security and IT risk management program that ensures the confidentiality, integrity, and availability of GGC data and infrastructure. * Lead and develop education, training, and awareness programs for all college constituents on institutional policy, guidelines, federal and state laws and regulations, and best practices in information security. Serve as a spokesperson for cybersecurity and provide guidance to college leaders and other stakeholders. Regularly share data, reports, and updates with stakeholders. * Lead the development and implementation of the college's security governance, including policies and procedures, in consultation with IT leadership, technology professionals, and other stakeholders. * Lead security information and event management, security operations, and other related functions. Lead, mentor, and develop security operations staff and related personnel, fostering a collaborative and high-performing team. * Collaborate with ITS, audit, public safety, and academic and business units to comply with USG security policies, regulations, and college standards; collaborate with Legal Affairs and Purchasing to embed risk assessment and data security in supplier agreements and renewals. * Proactively lead incident management and response by systematically detecting, analyzing, containing, and eradicating threats, restoring systems,and coordinating communication and documentation of incidents. Employ a 24/7/365 on-call schedule as needed. Conduct post incident analysis and propose cost-effective solutions to prevent or mitigate future incidents. * Collaborate with colleagues inside and outside IT to embed cybersecurity best practices in technical solutions. * Use standard tools and processes to lead projects to successful completion through effective planning for user experiences, change management, communication, and documentation. * Additional duties as assigned. Required Qualifications * 4 Year / Bachelor's Degree in a related field * 8+ years of relevant experience * 5+ years of supervisory experience Preferred Qualifications * Graduate degree in a related field * Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information * Systems Auditor (CISA) or similar credential. * Knowledge of auditing, information security and regulatory standards, best practices, and assessment methodologies. * Experience with service management, project management, change management processes and procedures, and well-honed documentation skills. * Experience directing, leading, and mentoring IT professionals. * Experience working in higher education, preferably a campus in the University System of Georgia. Proposed Salary 109,000 - 139,000 Salary offer will be dependent on candidate's experience and qualifications, internal equity considerations, budget availability, and salary administration guidelines. Knowledge, Skills, & Abilities * Ability to develop and propose solutions in a clear, concise, and organized manner. * Excellent presentation and communication skills, both verbal and written, with the ability to convey complex technology concepts clearly to non-technical audiences. * Ability to handle the pressures of work, maintain composure, and demonstrate good judgment. * Broad technical knowledge and experience administering enterprise technologies. * Up to date knowledge of federal, state, and other applicable compliance requirements. * Effective customer service skills. * Knowledge of, and experience in, using modern endpoint management platforms; knowledge of, and experience with, Active Directory/Microsoft Entra ID (formerly Azure Active Directory). * Knowledge of, and experience with, Windows Administration including Office 365, Privileged Identity Management, Microsoft Defender and Sentinel, Identity Governance and Administration, and Information Protection. * Knowledge of, and experience with, Vulnerability Scanning and Management Solutions, such as Tenable Nessus and BitSight Technologies. * Ability and initiative to engage in continuous professional development. * Knowledge of enterprise level networking and security best practices. * Knowledge and application of cybersecurity best practices. * Skills in change leadership as well as project, time, and change management. * Ability to develop, implement, and scale solutions. * Ability to foster a work environment based on trust, respect, and competence. * Ability to forge effective collaborations with a wide range of internal and external stakeholders. * Ability to lead productive meetings and produce deliverables and outcomes that meet organizational needs. * Ability to demonstrate attention to detail and manage competing priorities effectively. * Ability to manage relationships with vendors for quotes, maintenance renewals and other activities. USG Core Values The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at ************************************************************************** Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at ************************************************ Conditions of Employment Hiring is contingent upon eligibility to work in the United States and proof of eligibility will be contemporaneously required upon acceptance of an employment offer. Offers of employment are contingent upon completion of a background investigation including a criminal background check demonstrating your eligibility for employment with Georgia Gwinnett College (GGC). Eligibility of employment is determined by GGC in its sole discretion, and includes but is not limited to confirmation of credentials and employment history reflected in your application materials; and, if applicable, a satisfactory credit check. Applicants may be subject to a pre-employment drug test. Offers are subject to the applicable federal laws, state laws, statutes, rules and regulations of this institution, and to the bylaws and policies of the Board of Regents (BOR) of the University System of Georgia (USG), which are available for your inspection upon request. Equal Employment Opportunity Georgia Gwinnett College is an equal employment, equal access, and equal opportunity employer. It is the policy of Georgia Gwinnett College to recruit, hire, train, and promote persons without regard to race, color, national or ethnic origin, age, disability, gender, religion, sexual orientation, gender identity or veteran status as required by applicable state and federal laws (including Title VI, Title VII, Title IX, Sections 503, and 504, ADEA, ADA, E.O. 11246, and Rev. Proc. 75-50). For individuals requiring disability-related accommodations for participation in any event including the application, interview process, or to obtain print materials in an alternative format, please contact HR at ************** or email **********. Background Check * Position of Trust + Education Other Information Due to the volume of applications, applicants may not receive a reply from the College unless an applicant is selected for an interview. Review of applications will continue until positions are filled. Georgia is an open records state.
    $74k-94k yearly est. Easy Apply 26d ago
  • Information Security Analyst 2

    Primerica Inc. 4.6company rating

    Information security analyst job in Duluth, GA

    Join Our Team In 2025, USA Today recognized Primerica as a Top Workplace USA for the fifth year in a row, and Newsweek named Primerica one of America's Greatest Workplaces for Diversity for the second consecutive year. In 2024, the Atlanta Journal-Constitution named Primerica as a Top Workplace for the eleventh consecutive year, and Forbes recognized Primerica as one of America's Best Employers for Women for the fifth year in a row. In addition, for the tenth time Primerica has been voted a Best Employer by Gwinnett Magazine. Primerica is a great place to work! Join our team to experience what it's like to work at "one of the best places to work in the metro Atlanta". About this Position The Information Security Engineering Analyst is an integral part of the IS Engineering team. This position will lead security efforts to design, implement, administer, and support information security technologies and processes that will ensure data and systems are adequately protected. It requires performing a broad range of security duties requiring a working knowledge of cyber security and several supporting technologies. The Analyst will work with project teams to define security requirements for programs, applications, processes, and new platform systems in line with the enterprise information security architecture. Responsibilities & Qualifications * Support and manage security infrastructure, including but not limited to; Proxies, NextGen Firewalls, IDS/IPS, SIEM, Sandboxing technologies, APT solution, etc. * Participate in Vulnerability and Threat Management program * Perform root cause analysis on security incidents * Apply effective communication to translate complex technical security deficiencies into business risks that are understood by business stakeholders when making decisions for future security investments * Use an information security architecture framework and methodology to enable reuse of information security components across the enterprise * Assist proof-of-concept activities for innovation initiatives to ensure coverage of information security requirements * Perform additional security-related duties as requested * Bachelor's degree in Computer Science, Information Systems, CyberSecurity, or 2-3 years related experience * CISSP or other Security Certifications are preferred, or willing to obtain * Experience with SIEM technologies, including development * Experience with Host based Security controls * Experience in the vulnerability assessment lifecycle from the point of identification to remediation including penetration testing and source code analysis tools * Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate * Able to work independently and be a self-starter; managing multiple tasks according to priorities; results oriented and proven ability to meet deadlines Hybrid role Location: Atlanta, GA FLSA status: This position is exempt (not eligible for overtime pay): Yes Our Benefits: * Day one health, dental, and vision insurance * 401(k) Plan with competitive employer match * Vacation, sick, holiday and volunteer time off * Life and disability insurance * Flexible Spending Account & Health Savings Account * Professional development * Tuition reimbursement * Company-sponsored social and philanthropy events It has been and will continue to be the policy of Primerica, Inc., and its subsidiaries to be an Equal Opportunity Employer. We provide equal opportunity to all qualified individuals regardless of race, sex, color, religious creed, religion, national origin, citizenship status, age, disability, pregnancy, ancestry, military service or veteran status, genetic or carrier status, marital status, sexual orientation, or any classification protected by applicable federal, state or local laws. At Primerica, we believe that diversity and inclusion are critical to our future and our mission - creating a foundation for a creative workplace that leads to innovation, growth, and profitability. Through a variety of programs and initiatives, we invest in each employee, seeking to ensure that our people are not only respected as individuals, but also truly valued for their unique perspectives.
    $66k-93k yearly est. Auto-Apply 9d ago
  • Security Systems Engineer / Estimator

    Netplanner Systems, Inc. 3.9company rating

    Information security analyst job in Norcross, GA

    Security Systems Engineer / Estimator About Us We're looking for a highly motivated and skilled Security Systems Engineer / Estimator to join our team. This is a full-time, on-site position focused on designing, engineering, estimating, and supporting integrated electronic security solutions. What You'll Do System Design & Engineering Design and configure integrated security systems (CCTV, access control, intrusion detection, intercoms). Prepare scopes of work (SOWs), bills of materials (BOMs), cost estimates, and design narratives. Analyze blueprints, drawings, and specifications to deliver compliant solutions. Provide accurate and competitive proposals in response to RFPs. Support CAD teams with drawings, device details, and schedules. Pre-Sales & Client Engagement Partner with sales during pre-bid opportunities, site walks, and customer meetings. Act as a technical resource for discovery and client-facing discussions. Present technical information clearly to clients and internal teams. Build lasting client relationships with expert advice and support. Project Execution & Support Work with project managers and operations teams for smooth project handoff. Provide technical support during installation, commissioning, and post-deployment. Troubleshoot hardware, software, and networking issues. Ensure compliance with industry standards and client requirements. Continuous Improvement Stay current on emerging technologies, trends, and vendor offerings. Attend manufacturer training and pursue relevant certifications. Help drive adoption of new processes and tools. What You'll Bring Education & Experience Associate or Bachelor's degree in Electrical Engineering, IT, or related field, or equivalent work experience. 3-5+ years in security system engineering, design, or estimating. Experience in pre-sales design/estimating and client proposals. Technical Expertise Hands-on with Lenel, Genetec, Avigilon, Milestone, Axis, Hanwha, Panasonic, HID, Software House. Basic knowledge of IP networking, PoE, subnetting, and system integration. Familiar with electrified door hardware, locking devices, relay connections, and voltage limitations. Understanding of wireless communications, switches, routers, firewalls is a plus. Ability to read and interpret blueprints and wiring diagrams. Skills & Competencies Proficiency in Microsoft Office Suite. Strong problem-solving, troubleshooting, and attention to detail. Excellent communication skills, written and verbal. Self-motivated, reliable, and deadline-driven. Strong organizational and time management abilities. Preferred Certifications LenelS2, Genetec, Avigilon, Milestone, Software House. AutoCAD or system design software (Bluebeam, System Surveyor). Knowledge of cybersecurity principles for physical security systems. Join Our Team If you're passionate about security technology and want to contribute to delivering best-in-class solutions, we'd love to hear from you. Apply today!
    $83k-115k yearly est. Auto-Apply 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Athens, GA?

The average information security analyst in Athens, GA earns between $62,000 and $120,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Athens, GA

$86,000
Job type you want
Full Time
Part Time
Internship
Temporary