Post job

Information security analyst jobs in Bowling Green, KY - 358 jobs

All
Information Security Analyst
Cyber Security Analyst
Senior Security Analyst
Senior Information Security Engineer
Information Technology Analyst
Data Security Analyst
Information Systems Security Officer
Cyber Security Engineer
Information Security Manager
Senior Security Specialist
  • Cyber Security Engineer

    Provisions Group 4.4company rating

    Information security analyst job in Knoxville, TN

    The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations. Technical Implementation: Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools. Implement and support security controls for network infrastructure such as routers, switches, and wireless access points. Configure, administer, and secure Active Directory and Azure AD environments. Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions. Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection. Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture. Security Operations: Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation. Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts. Lead technical response efforts during security incidents or breaches in coordination with the incident response team. Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access. Conduct routine vulnerability assessments and threat analysis to support continual improvement. Perform digital forensics and incident response activities as needed. Compliance: Ensure adherence to HIPAA and all applicable regulatory and security standards. Design and implement technical safeguards that protect sensitive information and support organizational objectives. Collaboration: Partner with IT and business teams to embed security controls into systems, applications, and workflows. Educate and support staff on cybersecurity awareness, best practices, and evolving threats. Documentation: Create and maintain accurate documentation for security configurations, procedures, and incident activity. Remain informed on current cybersecurity trends and recommend enhancements to existing controls. Security Audits: Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards. Security Standards and Policies: Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements. Security Infrastructure Maintenance and Monitoring: Configure, troubleshoot, and maintain security-related hardware and software. Implement and manage monitoring tools to detect intrusions and potential security breaches. Security Strategy Development: Support the planning, execution, and ongoing refinement of the organization's information security strategy. Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives. Perform additional duties as assigned. Minimum Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required. Minimum Experience: Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment. Certifications: Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
    $65k-87k yearly est. 1d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • IT Operations Center Analyst

    Medasource 4.2company rating

    Information security analyst job in Nashville, TN

    ITOC Analyst - Operations Center Our client is seeking a ITOC Analyst to join their Data Center Operations team on a contract basis. This role serves as the front line of support for monitoring, maintaining, and troubleshooting mission-critical data center infrastructure. The ideal candidate is hands-on, detail-oriented, and comfortable working in a 24/7 operations environment supporting both facility and IT infrastructure systems. Key Responsibilities Monitor and support data center physical facilities, including power, cooling, and environmental systems Perform hardware and server deployment, replacement, and troubleshooting Conduct preventative maintenance, routine inspections, and health checks on data center infrastructure Troubleshoot and resolve issues related to electrical and mechanical equipment Support and maintain network infrastructure, including cabling, racks, and patching Respond to incidents, alerts, and tickets as part of an operations center / NOC-style workflow Document work performed and escalate issues appropriately to engineering or facilities teams Adhere to operational procedures, safety standards, and change management processes Required Qualifications Experience working in a data center, NOC, or critical facilities environment Hands-on experience with server hardware, rack/stack, cabling, and break/fix Working knowledge of electrical and mechanical systems in a data center setting Ability to follow runbooks, procedures, and safety protocols Comfortable working shifts, on-call rotations, or non-standard hours if required Preferred Qualifications Experience with mission-critical environments (healthcare, financial services, enterprise IT, etc.) Familiarity with monitoring tools, ticketing systems, or CMDBs Basic understanding of networking concepts (switches, patch panels, fiber/copper) Certifications such as CompTIA A+, Network+, or data center-related training (nice to have, not required)
    $68k-89k yearly est. 3d ago
  • Data Analyst, II - Information Security Metrics and Reporting

    Unum 4.4company rating

    Information security analyst job in Chattanooga, TN

    Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures. Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company - not just insurers. We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo. Unum is changing, and we're excited about what's next. Join us. General Summary:The Information Security Metrics and Quality Data Analyst is responsible for simple to moderately complex data profiling, analysis and mapping with little to no oversight and exhibits a mastery of the tools and technical skillset subject matter expertise with data organization and visualization supporting information security (cyber security) risks and operations. This candidate works closely with Security Analysts, Security Engineers, Project Managers, and Global Information Security leadership. They deliver to high quality KRI/KPI and are able to accurately estimate work required to deliver on their responsibilities. They use critical thinking skills applied to data analysis in order to advance the delivery and maintenance of information security KRI and KPI. Job Specifications Bachelors Degree preferred, and/or equivalent experience 4+ years experience with demonstrated success at the Data Analyst 1 level or equivalent experience Mastery of data profiling and analysis concepts, including data anomalies, data mapping activities. Mastery of data modeling concepts Mastery of PowerBI data modeling and visualization development Clearly demonstrates data analytical ability and critical thinking skills Ability to manage multiple tasks by paying close attention to detail Ability to work as part of a team and interact effectively with others Ability to embrace change, adapt to the unexpected, and focus energies, people, and solutions on practical and positive results Takes an innovative approach to problem solving Strong communications skills Strong team player; able to work effectively within a team and more broadly with people from a variety of backgrounds and areas across the organization. Principal Duties and Responsibilities Responsible for data profiling and analysis to evaluate data sources to determine the best source for business information. Responsible for source to target data mapping specifications (e.g. source to target can be from one DBMS table to another DBMS table, from a DBMS table into a canonical message structure, etc.) Design simple to moderately complex, flexible data models (conceptual and logical) and visualizations through collaborations with analysts, engineers, and leadership. Leads sizing and estimation activities within the agile team. Create/Capture documentation (metadata) that is up-to-date. Collaborate with the test engineers to perform data validation and testing activities as appropriate. Develop and maintain knowledge of information security practices and the insurance industry. Develop and maintain knowledge of information security-owned and other relevant data sources. Adhere to approved architectural standards. Uses critical thinking skills to recommend and implement data management practices that advance business value. Thinks with the mind of the end customer at all times, ensuring solutions seek to improve the customer experience and delight their customers. #LI-TO1 #LI-MULTI IN4 Our company is built on helping individuals and families, and this starts with our employees. We want employees to maintain a positive balance, which is why we provide access to the benefits and resources they need to invest in themselves. From our onsite fitness facilities and generous paid time off to employee professional development programs, we are committed to helping employees live and work their best - both inside and outside the office. Unum is an equal opportunity employer, considering all qualified applicants and employees for hiring, placement, and advancement, without regard to a person's race, color, religion, national origin, age, genetic information, military status, gender, sexual orientation, gender identity or expression, disability, or protected veteran status. The base salary range for applicants for this position is listed below. Unless actual salary is indicated above in the job description, actual pay will be based on skill, geographical location and experience. $73,300.00-$150,500.00 Additionally, Unum offers a portfolio of benefits and rewards that are competitive and comprehensive including healthcare benefits (health, vision, dental), insurance benefits (short & long-term disability), performance-based incentive plans, paid time off, and a 401(k) retirement plan with an employer match up to 5% and an additional 4.5% contribution whether you contribute to the plan or not. All benefits are subject to the terms and conditions of individual Plans. Company: Unum
    $73.3k-150.5k yearly Auto-Apply 16d ago
  • Information Security and Fraud Analyst

    First Farmers & Merchants Bank 4.2company rating

    Information security analyst job in Columbia, TN

    Education Level: (1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC 2 ). Job Type: Full Time VEVRAA Federal Contractor Request Priority Referral of Protected Veterans EOE Protected Veterans/Disabled Robert C. Matthews, email: ******************************* Role: The Information Security and Fraud Analyst is responsible for developing and managing appropriate security measures for the bank's information systems, managing third-party vendor security risk, and investigating incidents of fraud and attempted fraud. Essential Functions & Responsibilities: E 35% Risk Management. Coordinates organizational risk assessments. Performs third party vendor risk assessments. Conducts information security Vendor Risk Assessments (VRA) on all in-scope third-party requests. Communicates at all levels and with all business units in providing support in the onboarding of third-party vendors with respect to the assessment of Information Security posture of the vendor. Creates and manages relationships with business units and stakeholders of the Third-Party Vendor Risk Management process. Performs assessment of third-party security and related due diligence documentation (such as SOC). E 30% Information Security. Monitors computer networks for security issues. Documents and investigates security breaches and other cybersecurity incidents. Stays current on IT security trends and news. Develops company-wide best practices for IT security. Research security enhancements and makes recommendations to management. Implements both internal and external security audits. Analyzes security issues thoroughly to identify the root cause. E 30% Fraud Investigations. Assists in the investigation of fraud incidents and recovery of funds; Maintains records of incidents, losses, recoveries, and prevention. Provides customer education to increase awareness of the fraud risk and effective techniques customers can use to mitigate the risk. Coaches staff on determination of fraud incidents and communication with customers. Interacts with external partners such as law enforcement agencies, vendors, and banks to validate information to check fraudulent activities. N 5% Performs other related duties as assigned or requested. Performance Measurements: 1. To comply with the letter and with the spirit of the bank's Code of Business Conduct and Ethics 2. To ensure that the bank suffers no losses due to failure to comply with operational procedures. 3. To provide friendly, professional, and accurate service and support to all customers both internal and external. 4. To maintain and build knowledge of auditing procedures through continued learning and research. 5. To acquire and maintain a working knowledge of regulations and bank procedures; to comply with the provisions of the Bank Secrecy Act and other laws and regulations. 6. To maintain the confidentiality of customer and any other sensitive information. 7. To complete required training and undertake additional training as needed to increase job knowledge and maximize productivity. Knowledge and Skills: Experience Three yeas to five years of similar or related experience. Education (1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC 2 ). Interpersonal Skills Work involves much personal contact with others inside and/or outside the organization for the purpose of first-level conflict resolution, building relationships, and soliciting cooperation. Discussions involve a higher degree of confidentiality and discretion, requiring diplomacy and tact in communication. Other Skills 1. Knowledge in all areas of accounting and audit procedures and the ability to work independently. 2. Working knowledge of spreadsheets and word processing software; must be able to use PC and other types of general office equipment. Physical Requirements The person in this position needs to frequently move about inside the office to interact with associates or clients and access office machinery and file cabinets. The person in the position constantly operates a computer and other office productivity machinery, such as a calculator, photocopier, and printer. Work Environment This job operates in a professional office environment and may require travel to branches and other locations. This role routinely uses standard office equipment such as calculators, computers, phones, photocopier, filing cabinets and fax machines.
    $69k-96k yearly est. Auto-Apply 11d ago
  • Analyst, Information Security

    Standard Aero 4.1company rating

    Information security analyst job in Maryville, TN

    Build an Aviation Career You're Proud Of At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term. Summary: As an IT Security Analyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization. What you'll do: Conduct risk and security assessments through vulnerability analysis and reporting Perform mitigation support for both internal and external security audits Investigate, analyze and document security incidents to identify and document the root cause Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary Partner with IT Operation teams to remediate system vulnerabilities Participates in the production of documentation and management reporting Research security enhancements and make recommendations for improved policy and process Analyze IT requirements and provide objective advice on the use of new IT security offerings Stay up-to-date on information technology and cybersecurity trends and standards Other IT Security-related duties as required Capable of identifying, evaluating and mitigating significant risks within an enterprise. Strong working experience with Microsoft Office Suite. Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience. Possess strong analytical skills attention to detail. Ability to prioritize assignments while working on multiple projects Ability to work independently and proactively to meet assigned objectives Flexible with the ability to multi-task, effectively prioritize and work under pressure Basic project management Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.) Analyze, report and respond to security alerts within the various IT technologies and global locations Proactively remediate information technology security threats as a member of the security team Assist in the designing, documenting, architecting and implementing IT security measures and controls Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources Threat mitigation; malicious code detection, response and prevention; operating system security oversight Minimum Qualifications: Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered. 5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering. 5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation. 5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks. 5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC). Preferred Qualifications: IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL SDLC, and understand application security. Containerization and Development Security Operations Benefits that make life better: Comprehensive Healthcare 401(k) with 100% company match; up to 5% vested Paid Time Off starting on day one Bonus opportunities Health- & Dependent Care Flexible Spending Accounts Short- & Long-Term Disability Life & AD&D Insurance Learning & Training opportunities Raising the Standard of Excellence since 1911 With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us. Inclusivity Is Our Standard It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
    $73k-103k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst

    Vergence 3.3company rating

    Information security analyst job in Indianapolis, IN

    Job Description . Must live in the Indianapolis area. Pay: $42.70/hour In this role you will: • Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement • Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment • Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53) • Develop Standard Operating Procedures (SOP) for implementing security polices • Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems • Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data • Develop and implement procedures for use of information security management software • Propose information security software enhancements • Perform periodic audits to assure security policies and standards are being followed and are effective • Develop recommendations for enhancements and generates reports where necessary • Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
    $42.7 hourly 21d ago
  • IT Compliance and Risk Management Analyst/ IT Security Analyst/ IT Auditor/ PCI Analyst (Cont to Hire)

    Collabera 4.5company rating

    Information security analyst job in Columbus, IN

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Location: Columbus, IN 47201 Job Title: Sr. IT Compliance and Risk Management Analyst Duration: 6 months (Contract to Hire) Job description: •Responsible for the execution of compliance audits. Reviews procedures and corresponding evidence to determine whether or not internal controls are being properly applied. •Leads or executes compliance audits and risk assessments within established control areas. •Tests and documents more complex computer system records for information system integrity and transaction accuracy; reports discrepancies. •Prepares less complex audit plans or assists with more complex plans. •Prepares formal written reports to communicate audit results to management, and makes recommendations as appropriate; defines compliance issues and identifies root causes for review by manager. •May provide technical guidance to contract audit staff to ensure that audit objectives are met. •May coach and mentor less experienced analysts. Qualifications • Bachelors Degree Required: PCI (Payment Card Industry)- this is a higher level position and only looking for PCI SME (Subject Matter Expert) experience. • Must Have IT Compliance Experience with PCI Management Side experience • This manager is looking for a candidate that has seasoned PCI Experience on is a subject matter ex]pert and worked with the management side if PCI with the ability to set the right type of internal controls. Additional Information If interested please contact: Himanshu Prajapat ************ himanshu.prajapat(@)collabera.com
    $65k-88k yearly est. 1d ago
  • Cyber Security Vulnerability Analyst

    ITR 4.2company rating

    Information security analyst job in Oak Ridge, TN

    Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities. This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week. Job Responsibilities: • Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role. • Mentor the DCO's junior staff, developing their technical and incident resolution skills. • Participate in incident response activities involving multiple teams and functions. • Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls. • Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status. • Automate key DCO functions using Tines technology • Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities. • Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities. • Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats. • Assist users with the creation, monitoring, and evaluation of policy and device exceptions. • Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements. • Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues Candidates must be able to obtain a federal security clearance so US citizenship is required.
    $69k-95k yearly est. 30d ago
  • Information Security Specialist

    Starplus Energy

    Information security analyst job in Kokomo, IN

    The Information Security Specialist supports the planning, implementation, and operation of StarPlus Energy's global and local security management systems. This position ensures compliance with international and Korean security regulations, establishes physical and IT infrastructure security systems, and coordinates with both corporate headquarters and Korean government authorities to prevent information leaks and respond to potential security threats. This position reports to the Information Security Manager. Roles & Responsibilities: Plan, develop, and operate corporate information security systems for facility and IT infrastructure protection Establish incident response procedures and maintain readiness against internal and external security threats Develop and operate the site's physical security management system, including access control, CCTV, and intrusion detection system Manage and oversee external security service providers (e.g., physical security guards, monitoring services, and system maintenance vendors) to sure proper performance and contract compliance Support vendor performance evaluations, documentation, and corrective actions when service issues arise Define and enforce information protection policies and procedures to ensure consistent implementation across the organization Establish and operate a security management framework for Korean National Core Technology (KNCT) compliance Assign protection grades, define and manage secure communication systems, and safeguard all data and documentation related to KNCT Coordinate and conduct security education and training for employees Develop and maintain incident response systems to address potential data or technology leakage Support internal and external security audits and inspections from Korean government and SDI Headquarters Perform security infrastructure vulnerability assessments and implement corrective actions as needed Prepare technical report, standard operating procedures (SOPs), and other documentation required for compliance and audit response Perform other position related duties as assigned
    $65k-92k yearly est. 1d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Information security analyst job in Bowling Green, KY

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $78k-105k yearly est. Easy Apply 8d ago
  • Data Security Analyst

    Exeter Government Servi 4.1company rating

    Information security analyst job in Fort Knox, KY

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies. Required Qualifications: Experience in administrative support & MS Office proficiency Bachelor's degree or 5 years of experience U.S. citizen and MUST possess a current active DoD Secret clearance Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $64k-88k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Eli Lilly and Company 4.6company rating

    Information security analyst job in Indianapolis, IN

    At Lilly, we unite caring with discovery to make life better for people around the world. We are a global healthcare leader headquartered in Indianapolis, Indiana. Our employees around the world work to discover and bring life-changing medicines to those who need them, improve the understanding and management of disease, and give back to our communities through philanthropy and volunteerism. We give our best effort to our work, and we put people first. We're looking for people who are determined to make life better for people around the world. Join our Security Operations team in Indianapolis, IN where you will get to work on cutting edge cybersecurity technologies while driving exceptional customer experience and improving our enterprise security platform services. What You'll Be Doing Respond to support cases from customers experiencing issues with security tools Provide timely and effective technical troubleshooting and resolution Document case studies, playbooks, and solutions for future reference by team Develop and maintain knowledge base articles and operational procedures Communicate updates and status clearly and professionally to customers Collaborate with cross-functional teams (engineering, product, IT architects) to escalate and resolve complex issues Identify trends in customer issues and recommend product or process improvements Participate in training sessions, conferences, and workshops to expand skills and share learnings with the team Support & Troubleshooting Manage inbound security tool incidents across SIEM, IDS/IPS, EDR, Zscaler (ZIA/ZPA), Cloudflare WAF, Identity & Access Management, and/or other cloud security platforms Adaptability and willingness to learn new technologies and processes Develop proactive means of identifying security platform issues before business impact is realized Assist with developing automation scripts and workflows to increase operational efficiency Identify opportunities and drive initiatives to automate routine tasks and processes Documentation & Knowledge Sharing Create and update detailed playbooks, runbooks, and troubleshooting guides Contribute to an evolving knowledge base to empower peers and customers Document health metrics to measure security tool effectiveness and coverage Collaboration & Communication Foster strong teamwork by mentoring and coaching junior engineers Work closely with product managers and senior engineers to translate feedback into platform enhancements Liaise with enterprise IT, architects, Technical leads and stakeholders to align solutions with business needs Advocate innovative security solutions that balance user experience and protection Continuous Improvement Stay current on security threats, regulatory changes, and emerging technologies Drive adoption of creative, scalable solutions for complex global security platform challenges Analyze recurring issues, support tickets and operational data to identify improvement areas Propose and implement process optimizations and preventive measures Assist with testing and enablement of new tools, technologies and operational capabilities Evaluate new tools and/or feature sets for existing tools (e.g., Splunk, CrowdStrike, Zscaler (ZIA/ZPA), Cloudflare WAF) and recommend integrations Your Minimum Requirements: Bachelor's degree in Cybersecurity, Computer Science, IT, or similar degree and at least 1 year experience in technical support, security operations, or platform engineering OR Associate degree in Cybersecurity, Computer Science, IT or similar degree and at least 5 years experience in technical support, security operations, or platform engineering Hands-on with SIEM, IDS/IPS, EDR, web application firewalls, identity/access management, and cloud security Basic networking knowledge (TCP/IP, DNS, DHCP) Qualified candidates must be legally authorized to be employed in the United States. Lilly does not anticipate providing sponsorship for employment visa status (e.g., H-1B or TN status) What You Should Bring: Strong problem-solving skills and a methodical troubleshooting approach Excellent written and verbal communication; customer-focused mindset Scripting proficiency (Python, PowerShell) for automation and data processing Basic coding abilities for scripts, automation, and custom integration Experience with cloud platforms (AWS, Azure, GCP) and containerized environments Familiarity with IT Service Management (ITIL) practices Certifications such as CompTIA Security+, CISSP, CCSP, or GIAC Lilly is dedicated to helping individuals with disabilities to actively engage in the workforce, ensuring equal opportunities when vying for positions. If you require accommodation to submit a resume for a position at Lilly, please complete the accommodation request form (******************************************************** for further assistance. Please note this is for individuals to request an accommodation as part of the application process and any other correspondence will not receive a response. Lilly is proud to be an EEO Employer and does not discriminate on the basis of age, race, color, religion, gender identity, sex, gender expression, sexual orientation, genetic information, ancestry, national origin, protected veteran status, disability, or any other legally protected status. Our employee resource groups (ERGs) offer strong support networks for their members and are open to all employees. Our current groups include: Africa, Middle East, Central Asia Network, Black Employees at Lilly, Chinese Culture Network, Japanese International Leadership Network (JILN), Lilly India Network, Organization of Latinx at Lilly (OLA), PRIDE (LGBTQ+ Allies), Veterans Leadership Network (VLN), Women's Initiative for Leading at Lilly (WILL), en Able (for people with disabilities). Learn more about all of our groups. Actual compensation will depend on a candidate's education, experience, skills, and geographic location. The anticipated wage for this position is $64,500 - $158,400 Full-time equivalent employees also will be eligible for a company bonus (depending, in part, on company and individual performance). In addition, Lilly offers a comprehensive benefit program to eligible employees, including eligibility to participate in a company-sponsored 401(k); pension; vacation benefits; eligibility for medical, dental, vision and prescription drug benefits; flexible benefits (e.g., healthcare and/or dependent day care flexible spending accounts); life insurance and death benefits; certain time off and leave of absence benefits; and well-being benefits (e.g., employee assistance program, fitness benefits, and employee clubs and activities).Lilly reserves the right to amend, modify, or terminate its compensation and benefit programs in its sole discretion and Lilly's compensation practices and guidelines will apply regarding the details of any promotion or transfer of Lilly employees. #WeAreLilly
    $64.5k-158.4k yearly Auto-Apply 9d ago
  • Cyber Security Analyst

    OSC Global

    Information security analyst job in Radcliff, KY

    OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team. OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge. Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world. OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits. Position Overview The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks. Major Activities Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager. Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks. Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions. Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements. Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations Review and investigate security alerts and incidents from Microsoft 365 Defender Utilize eMASS to maintain and update POA&M status Review device compliance status from HBSS Work with other NEC Operations team members to remediate and mitigate security vulnerabilities. Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture. Perform other duties as appropriate and as assigned. Knowledge/Skills/Abilities Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months. Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management. Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills. Great analytical, critical thinking and problem-solving abilities. Superior presentation and negotiation skills. Strong management and organizational skills. Adaptable and capable of working in fast-paced environments. Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint Required Qualifications Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS Must possess appropriate DISA ESS certifications and experience. Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP) Must be US citizen Must possess active secret security clearance or higher Must be able to pass pre-employment background check Preferred Qualifications Bachelor's degree in IT, IM, or Cyber Security ACAS certification obtained within the last three (3) years, preferred HBSS Administrator certification obtained within the last three (3) years, preferred E-Verify: OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization. Reasonable Accommodation: OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
    $64k-88k yearly est. 43d ago
  • Senior Security Operations Analyst

    RWS 4.0company rating

    Information security analyst job in Indiana

    Job Purpose Job Purpose The Senior SecOps Analyst will support the organization's cybersecurity operations by managing and maintaining security tools, responding to incidents, and assisting in vulnerability management. About Product & Technology Product & Technology plays a pivotal role in aligning the organization with its strategic objectives and enhancing shareholder value. Product & Technology is responsible for establishing unified standards and governance practices throughout the company. Additionally, we oversee the development and maintenance of core applications essential for the seamless operation of various functions across the organization. We are committed to driving and executing future roadmaps that are in line with the overall strategic direction of RWS. With a global reach, Product & Technology provides support services to over 7500 end users worldwide. We take pride in managing the information security operation and safeguarding all our assets. Our core functions encompass Enterprise & Technical Architecture, Network & Voice, Infrastructure, Service Delivery, Service Operations, Data & Analytics, Security & Quality Compliance, Transformation, Application Development, Enterprise Platforms, With a dedicated team of over 500 staff, Product & Technology ensures a strong presence across all regions, enabling efficient and effective support to our global operations. Job Overview Key Responsibilities Operate and maintain cybersecurity monitoring and response tools to ensure optimal performance and recommend improvements where necessary. Utilize automation techniques to enhance the effectiveness and efficiency of operational security tasks. Collaborate with IT Infrastructure teams to implement automated solutions that improve security tooling and associated platforms. Respond to cybersecurity threats and incidents detected by security tools, processes, and Managed Detection and Response (MDR) partners. Follow established incident response processes and runbooks and contribute to their continuous improvement. Support the implementation and operation of the Vulnerability Management program. Monitor for new vulnerabilities, assess potential business impact, and assist in coordinating remediation activities. Perform core tasks such as monitoring and resolving support tickets related to security tooling. Ensure cybersecurity tools are up to date, healthy, and fully functional. Provide advice and guidance on cybersecurity to other areas of the organization when required. Assist with security audits by gathering and sharing information and evidence related to security control configuration and performance. Skills & Experience Experience in a similar role in Security Operations Experience of key cybersecurity controls such as Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability Management, SOAR/automation Understanding of common cybersecurity threats and mitigation techniques with a keen interest in keeping your knowledge and skills up to date Understanding of Cloud security fundamentals, including how to monitor and secure IaaS, PaaS and SaaS platforms, Azure AD, Microsoft 365 and Azure Security, CSPM Strong general IT skills and a good understanding of IT Infrastructure, including Windows laptops and servers, cloud platforms such as Microsoft Azure/Office 365/AWS, networking and firewalls. Experience or a strong desire to learn scripting and automation techniques such as Python An analytical mindset with strong problem-solving skills. Excellent communication skills, both written and verbal, able to explain technical information in a simplistic manner. Ability to show leadership and mentor less experienced members of the team. Life at RWS Life at RWS - If you like the idea of working with smart people who are passionate about growing the value of ideas, data and content by making sure organizations are understood, then you'll love life at RWS. Our purpose is to unlock global understanding. This means our work fundamentally recognizes the value of every language and culture. So, we celebrate difference, we are inclusive and believe that diversity makes us strong. We want every employee to grow as an individual and excel in their career. In return, we expect all our people to live by the values that unite us: to partner, putting clients fist and winning together, to pioneer, innovating fearlessly and leading with vision and courage, to progress, aiming high and growing through actions and to deliver, owning the outcome and building trust with our colleagues and clients. RWS embraces DEI and promotes equal opportunity, we are an Equal Opportunity Employer and prohibit discrimination and harassment of any kind. RWS is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions at RWS are based on business needs, job requirements and individual qualifications, without regard to race, religion, nationality, ethnicity, sex, age, disability, or sexual orientation. RWS will not tolerate discrimination based on any of these characteristics. RWS Values Get the 3Ps right - Partner, Pioneer, Progress - and we´ll Deliver together as RWS. Recruitment Agencies: RWS Holdings PLC does not accept agency resumes. Please do not forward any unsolicited resumes to any RWS employees. Any unsolicited resume received will be treated as the property of RWS and Terms & Conditions associated with the use of such resume will be considered null and void.
    $84k-113k yearly est. Auto-Apply 35d ago
  • IT Security Engineer SR

    Dollar General Corporation 4.4company rating

    Information security analyst job in Goodlettsville, TN

    The Senior Security Engineer is responsible for designing and leading advanced security solutions to safeguard Dollar General's digital infrastructure, with a focus on cloud, network, and system security in a dynamic retail environment. This role drives layered security integration, mentors junior team members, and utilizes tools such as Palo Alto Networks, Splunk, and F5 ASM to address complex security risk. The ideal candidate brings a balance of technical depth, critical thinking, and pragmatism to strengthen Dollar General's overall security posture. Job Details Duties & Responsibilities: What major responsibilities does this position have and what percentage of time is spent on completing them? (Typically 5 - 7) * Design and implement security architectures across on-premises and cloud environments (Google GCP, Azure) utilizing tools such as Palo Alto firewalls, F5 ASM, and Akamai App & API Protector. * Promote modern security fundamentals by embedding security into CI/CD pipelines using Terraform and championing secure design practices for applications and APIs. * Perform advanced risk analysis and vulnerability management, leveraging tools such as ExtraHop RevealX, Palo Alto Cortex XDR, and Sysdig Secure to identify and mitigate threats. * Manage and respond to security incidents and perform forensic analysis using Splunk and Proofpoint Email Security while leveraging CyberArk for privileged access control. * Develop and enforce security policies related to network security (Palo Alto, Fortinet), DNS (Akamai), and identity management (Clearpass), with emphasis on PKI and conditional access frameworks. * Mentor junior security engineers, fostering critical thinking and hands-on problem-solving skills while collaborating with IT and business units to embed security into organizational processes. * Research emerging threats and evaluate technologies to inform and enhance Dollar General's security strategy and posture. Knowledge, Skills and Abilities (KSAs): What KSAs are required to perform this job? * Deep expertise in network security (Palo Alto, Fortinet, Meraki MX), application firewalls (F5 ASM, Akamai App & API Protector, Cloud Armor), and data protection (Digital Guardian DLP, Microsoft DLP). * Advanced proficiency in cloud security (GCP, Azure) and container security (Sysdig Secure), including tools such as VPC Service Controls and Cloud Armor. * Strong scripting skills in Python, Bash, or PowerShell, and hands-on experience in Terraform for automating security infrastructure. * In-depth understanding of PKI, VPN/remote access technologies (CyberArk Alero, GlobalProtect), and DNS security (Akamai DNS, Akamai GLB). * Exceptional analytical and critical thinking skills with the ability to solve complex security challenges in a pragmatic and business-aligned manner. * Proven leadership and communication skills, with the ability to mentor team members and influence cross-functional stakeholders. * Excellent written, oral, and inter-personal communications skills with the ability to clearly communicate complex topics across technical and non-technical audiences. * Capability to adapt to rapidly changing technologies and threat landscapes, with occasional availability for non-standard hours or travel (up to 5%). Qualifications Work Experience &/or Education: What are the minimum education and/or experience requirements necessary to perform this job? * Bachelor's degree in Computer Science, Information Security, or a related field; or equivalent combination of education and relevant experience. * Minimum 7 years of experience in information security, including at least 2 years in a senior or leadership capacity. * Advanced hands-on experience with at least five of the following: * Palo Alto Networks firewalls and Panorama * Akamai App/API Protector * F5 Application Security Manager (ASM) * Sysdig Secure (or equivalent) * Google Cloud Platform (GCP) native security tools * Microsoft Azure native security tools * Microsoft Defender * CyberArk Privileged Access * HCL BigFix * Splunk Enterprise and Enterprise Security * Data security methodologies * DLP technologies * Proven track record in risk analysis, mitigation planning, and implementing secure configurations across cloud, network, and application layers. * Preferred certifications: CISSP, CISM, CISSP-ISSAP, Palo Alto PCNSE, Splunk Certified Architect, or GCP Cloud Security Engineer.
    $91k-114k yearly est. 3d ago
  • Cyber Security Analyst

    Mantech 4.5company rating

    Information security analyst job in Crane, IN

    ManTech seeks a motivated, career and customer-oriented **Cyber Security Analyst** to join our team in **Crane, Indiana.** This is an onsite position. As a core member, you will assist in the research & design, engineering, integration, testing, training, logistics, laboratory research, field engineering, and acquisition and operations analysis in support of a variety of Navy and Marine Corps programs and projects with a focus on defensive cyber technologies, mission assurance, and resilience capabilities for the tactical network environment. Your effort will go towards dramatically increasing the warfighter's effectiveness. If you enjoy working on a highly collaborative and dynamic team and want to make a difference for the warfighter, then we would love to have you on our team! **Responsibilities include but are not limited to:** + Review and evaluate System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), systems and networks diagrams, Security Requirements Traceability Matrices (SRTMs), Risk Assessments, and associated Information Systems (IS) Certification and Accreditation (C&A) documents in accordance with Department of Defense (DoD), Intelligence Community (IC), National and Agency standards + Observe, evaluate, and document IS security certification testing and prepare Security Certification Test Reports (SCTRs) with findings and recommendations regarding systems; Approval To Operate (ATO) + Inspect systems, networks, sites for compliance to InfoSec standards and policies + Additional duties include producing periodic progress reports, preparing various forms of correspondence concerning deficiencies and statuses of SSPs/SSAAs, maintaining and reporting statistics on personal C&A efforts + Knowledge of DoD, IC, and National Security Policies, Regulations, Directives, and Instructions **Minimum Qualifications:** + High School Diploma + Knowledge of commonly used concepts, practices, and procedures within the particular field + 1+ years of experience in the field or in a related area + Hands-on experience with networking technologies such as routers, switches, firewalls, and VPNs **Preferred Qualifications:** + Bachelors Degree + Familiarity with network vulnerability scanners, web scanners, and database scanners is a plus + Knowledge of cloud computing concepts and technologies + CISSP, CISM, CCNA, CASP, or equivalent. **Clearance Requirements:** + Must have a current and active TS/SCI clearance **Physical Requirements:** + The person in this position must be able to remain in a stationary position 50% of the time. + Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $60k-77k yearly est. 60d+ ago
  • Senior Specialist Tokenization Cyber Security

    Standard Chartered 4.8company rating

    Information security analyst job in Indiana

    Apply now Work Type: Office Working Employment Type: Permanent We're seeking a skilled Cyber Security Lead to develop and execute our enterprise-wide security strategy, managing incident response, and protecting our banking assets globally. If you're searching for a career with high visibility, a steep learning curve and the opportunity to change the future of a global business, you've found it. Join our Cyber Defence team and you'll be given the resources you need to protect our most valuable assets - our people and our products. It's a demanding job. Our security needs are broad, unique and constantly evolving. That's why you'll have the freedom to work autonomously and enjoy access to resources like cyber hub, our dedicated learning programme. Get ready to pioneer better, faster and safer ways to enhance our resilience against threats while keeping our business moving forward. About our Technology & Operations Team Our Technology & Operations (T&O) team is the powerhouse for the Bank. We aim to go further, faster, to ensure we're agile and ready for tomorrow, today. Our diverse network enables us to innovate and build banking solutions that support communities to prosper. We're a place where talented people are encouraged to grow, learn, and thrive, to drive their own career journeys, to reach their full potential. When you work with us, you're protecting the reputation and legacy of a 170-year organisation and building on it. We're driven by progress and continuously evolving to ensure we're agile and ready for tomorrow, today. Key Responsibilities * As Cyber Security Lead, you'll be responsible for real-time monitoring of Security Information and Event Management (SIEM) alerts to identify potential enterprise threats. * You'll perform analysis of alerts and logs gathered from various operating systems, network devices, applications, databases and security tools. * Perform Security Operations Centre (SOC) investigations for Cyber Security cases escalated by management and other teams. * Extend analytical support to security incident calls across the enterprise. * Analyse suspicious emails. * Participate in incident response, including detection, containment, eradication, and post incident reporting. Skills and Experience * You'll have extensive experience in Cyber Security and strong leadership skills, ideally with substantial experience in financial services or banking. * You'll have a deep knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. * You'll have managed large teams and budgets in complex, regulated environments. * You'll have a proven track record of developing and implementing enterprise-wide security strategies and programmes, including experience with digital transformation initiatives. * You'll be knowledgeable in security architecture concepts including topology, protocols, components, and principles (e.g., application of defence-in-depth). * In addition, you will have deep technical expertise across key security domains including network security, identity and access management, and security operations. About Standard Chartered We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion. Together we: * Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do * Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well * Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What we offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. * Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. * Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. * Flexible working options based around home and office locations, with flexible working patterns. * Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits * A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. * Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential. Apply now Information at a Glance * * * * *
    $79k-107k yearly est. 60d+ ago
  • Sr. Information Security Engineer

    North Star Staffing Solutions

    Information security analyst job in Goodlettsville, TN

    Job Requirements & Qualifications: •Designs, put into practice, administers, and supports multiple information security platforms, systems, and applications. Supports a variety of technologies in a hands-on manner. •Performs internal security risk assessments, security risk assessments of third party business partners, and detailed security risk assessments of various technologies. (Examples include directory services, database platforms, client and server operating systems, programming languages, web services, firewalls, remote access technologies, messaging platforms, encryption solutions, wireless technologies, internally-hosted applications, externally-hosted applications, and cloud services). •Supports defined Company operating principles via effective, pragmatic information security controls. Analyzes, defines, implements, and administers efficient business processes related to information security programs. Represents the information security function through pragmatic consultation and participation in a defined SDLC. •Maintains knowledge of current and up-and-coming security, compliance, and technical developments. Identifies present and prospective future vulnerabilities and collaborates with suitable leaders to identify, recommend, and develop risk remediation plans, ad to track remediation outcomes and timelines. •Works with the information security management team to administer, maintain, and continuously improve HIPAA, PCI DSS, SOX, and internal controls compliance programs, investigate known or suspected security incidents, support internal and external audits, and assist in the development of appropriate audit response Management Action Plans. •Promotes security best practices via awareness, example, and compliance with policies and regulatory requirements. •Uses project management best practices to initiate, manage, and close projects, often simultaneously across a variety of projects. Creates and maintains a variety of documents related to projects and information security. •Guide and cross-train junior department team members lead meetings construct and uphold strong partnerships with multiple departments coordinate vendor support engagements etc. Knowledge, Skills, and Abilities •Knowledgeable with and ability to apply time-proven, generally-accepted security management concepts, techniques, and methodologies. •Strong understanding of pragmatic implementation of information security controls, holistic defense-in-depth strategies, protocols used to interconnect networks, and publish application resources. •Strong, efficient written and verbal communication skills that enables effective communications to multiple audiences. •Ability to occasionally work unscheduled shifts and in an on-call capacity and be available for occasional travel (up to 25%). •Strong internal (security recommendations) and external (vendor support) negotiation skills. •Ability to influence and encourage others. •Strong understanding of PCI, HIPAA, and SOC regulatory requirements. •Development/analysis proficiency in one or more scripting languages. •Development/analysis proficiency in TSQL. •Capability to learn and preserve new skills required to adapt to growing business and technical environments. •Strong perceptive of present and emergent information security technologies and trends. Qualifications Work Experience and/or Education •Bachelor's and/or Master's degree in information security or computer information systems. •6+ years of information security generalist experience (broad and deep in data, application, system, and network security domains) with complex technical initiatives. •Active CISA, CISSP, or CISM certification. •Experience identifying and addressing security risks associated with host and network operating systems (e.g. Windows, Linux, AS400, PAN OS, AIX, Cisco IOS, etc.) enterprise services (e.g. directory services, email, web publishing, database, virtualization, etc.) content management, client-server, and collaboration, thin-client, and web-based applications enterprise applications (e.g. Lawson) cloud services (e.g. SaaS, IaaS, etc.) data storage, etc. •Hands-on SME/lead experience with the design, implementation, and administration of at least 5 of the following technologies: Palo Alto Networks, IBM Tivoli Endpoint Manager (BigFix), IBM QRadar (SIEM), Qualys Vulnerability Scanning Solutions, Tenable Nessus, Juniper SSL VPN GlobalScape EFT Server Symantec Data Loss Prevention (Vontu), RSA SecurID, and CyberArk Password Management. Additional Information
    $88k-117k yearly est. 1d ago
  • Temporary- Cyber Security Analyst

    Tennessee Board of Regents 4.0company rating

    Information security analyst job in Nashville, TN

    Title: Temporary - Cyber Security Analyst Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned. REQUIRED QUALIFICATIONS High School Diploma or GED One year of experience in information security and compliance regulations. Proficiency with Microsoft applications. PREFERRED QUALIFICATIONS Certificate in information security, i.e., Security+, Pen+, Ethical Hacker. Experience with SIEM (Microsoft Defender). Experience in phishing campaign/training. KNOWLEDGE, SKILLS AND ABILITIES Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels. Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures. Open Until Filled: Yes Rate of Pay: $20.00 per hour Work Hours: Up to 28 hours per week Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check. Nashville State offers flexible work arrangements for positions that qualify.
    $20 hourly 60d+ ago
  • Temporary- Cyber Security Analyst

    The College System of Tennessee 3.9company rating

    Information security analyst job in Nashville, TN

    Title: Temporary - Cyber Security Analyst Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned. REQUIRED QUALIFICATIONS High School Diploma or GED One year of experience in information security and compliance regulations. Proficiency with Microsoft applications. PREFERRED QUALIFICATIONS Certificate in information security, i.e., Security+, Pen+, Ethical Hacker. Experience with SIEM (Microsoft Defender). Experience in phishing campaign/training. KNOWLEDGE, SKILLS AND ABILITIES Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels. Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures. Open Until Filled: Yes Rate of Pay: $20.00 per hour Work Hours: Up to 28 hours per week Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check. Nashville State offers flexible work arrangements for positions that qualify.
    $20 hourly 24d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Bowling Green, KY?

The average information security analyst in Bowling Green, KY earns between $57,000 and $110,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Bowling Green, KY

$79,000
Job type you want
Full Time
Part Time
Internship
Temporary