Post job

Information security analyst jobs in Coeur dAlene, ID

- 380 jobs
All
Information Security Analyst
Information Systems Security Officer
Information Security Manager
Cyber Security Analyst
Senior Security Analyst
Intrusion Detection Analyst
Senior Information Assurance Analyst
Data Security Analyst
Senior Security Specialist
Security System Engineer
  • Cyber Security Analyst - Full time must include working one weekend day (Sunday)

    GDIT

    Information security analyst job in Washington

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cybersecurity, Event Security, Security Audit, Splunk (Inactive) Certifications: None Experience: 8 + years of related experience US Citizenship Required: Yes Job Description: Cyber Security Analyst - Full time position, but must include working one weekend day (Sunday) Own your career as a Cyber Security Analyst at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow. At GDIT, people are our differentiator. As a Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT Gather and handle forensic evidence in accordance with Rules of Evidence and perform forensic analysis of digital information. Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations. Identify acceptable use policy infractions. Review event logs to determine events of interest. Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII). Prepare case evidence and incident reports. Work on special projects as assigned. WHAT YOU'LL NEED TO SUCCEED: Bachelor's Degree and 8+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered. DoD Approved Baseline 8570 IAT level III (CASP, CISSP, CISA, etc.) certification is required prior to start date. DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior to start date. Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a Polygraph Preferred Skills: Splunk, Microsoft O365, Fidelis, Solera, Windows, and Linux Operating Systems Saturday and Sunday weekend Day Shift work required. Willing to work holidays supporting your assigned shift. Location: 100% On Customer Site Bolling AFB, Washington D.C. Reston, VA Colorado Springs, CO Riverdale, MD Pearl Harbor, HI Tampa is available for part time weekend only support GDIT IS YOUR PLACE: 401K with company match Comprehensive health and wellness packages Internal mobility team dedicated to helping you own your career Professional growth opportunities including paid education and certifications Cutting-edge technology you can learn from Rest and recharge with paid vacation and holidays The likely hourly rate for this position is between $61.30 - $82.94. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: Less than 10% Telecommuting Options: Onsite Work Location: USA DC Washington Additional Work Locations: USA CO Colorado Springs, USA FL MacDill AFB, USA HI Pearl Harbor, USA MD Riverdale, USA VA Reston Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $61.3-82.9 hourly Auto-Apply 14d ago
  • Cyber Systems SSO

    Janus Research Group 4.3company rating

    Information security analyst job in Washington

    is Subject to Contract Award JANUS Research Group is currently seeking a Cyber Systems SSO for a contract to support the Deputy Chief of Staff (DCS, G8. The DCS G-8 is the principal military advisor to the Chief of Staff, Army (CSA) and the Assistant Secretary of the Army, Financial Management and Comptroller (ASA(FMC)) for the Programming phase of the Planning, Programming, Budgeting, and Execution (PPBE) process. The DCS, G-8 coordinates with the Assistant Secretary of the Army, Acquisition, Logistics, and Technology (ASA(ALT)) on all proposed programming and process recommendations related to ongoing and future acquisition programs and science and technology initiatives. The DCS, G-8 coordinates with Army Futures Command (AFC) for program funding for all elements of the future force materiel modernization enterprise. Position Description: Manages Army cyber capability development within the Intelligence Division. Provides analytical and technical expertise on cyber defense, network operations, and offensive cyber modernization. Develops information papers, briefings, and SPAR/POM inputs addressing capability gaps, performance, and operational integration. Coordinates with ASA(ALT), T2COM, ARCYBER, INSCOM, and ARSTAF to align cyber initiatives with Army and Joint modernization strategies. Relevant Competencies / Skill Levels: A Bachelor's Degree in Engineering and/or Business A minimum of four (4) years of experience and expertise in Force Development duties Demonstrates expert analytical and technical skills in cyber systems architecture, network defense, and offensive cyber capabilities. Proficient in evaluating system performance, security posture, and modernization impacts to ensure resilient and adaptive cyber operations. Possesses advanced analytical and communication abilities to deliver clear, data-driven assessments that enhance Army cyber capability development and operational readiness Benefits: 401(k), Paid Time Off (PTO), Paid Holidays, Medical and Dental Plans, Life and Disability insurance, Education Assistance (and more). JANUS strives to provide opportunities for career growth through training and development. We also offer an attractive comprehensive benefit package to include health and welfare plans and financial products. As part of a total rewards program, employees can benefit from our referral bonus program, and other various employee awards. JANUS Research Group takes pride in our benefit package and rewards program which has earned us the certification of a Great Place to Work JANUS Research Group provides reasonable accommodation so that qualified applicants with a disability may participate in the selection process. Please advise us of any accommodations you request to express interest in a position by e-mailing: Judy Pagac, Chief Human Resources Officer at **************************** or calling **************. Please state your request for assistance in your message. Only reasonable accommodation requests related to applying for a specific position within JANUS Research Group will be reviewed at the e-mail address and phone number supplied. Thank you for considering a career with JANUS Research Group. JANUS Research Group participates in the Electronic Employment Verification Program. Please click the E-Verify link below for more information. E-Verify JANUS Research Group is an equal opportunity/ affirmative action employer. It is company policy to provide equal opportunity in all areas of employment practice without regard to race, color, religion, sex, sexual orientation, national origin, age, marital status, veteran status, citizenship, or disability. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment qualified individuals without regard to race, color, religion, sex, national origin, protected veteran status or disability.
    $103k-137k yearly est. 28d ago
  • Information Security Analyst

    Aditistaffing

    Information security analyst job in Bellevue, WA

    Aditi Staffing is an MBE certified, IT Staffing firm in the US offering contract, contract-to-hire & direct hire career opportunities with Fortune Firms. Recently recognized as one of the fastest growing staffing firms and top diversity firm by the Staffing Industry Analysts, Aditi Staffing has been a partner of choice for candidates and clients. Visit our website: http://www.aditistaffing.com/ Job Description Role: Information Security Analyst Location: Information Security Analyst 6-8 years of experience in information security / technology or related field. Advanced verbal and communication skills with diverse cross functioning groups. Strong background and experience in policy development, program administration. In depth knowledge and experience in incident response activities and compliance. Ability to plan, organize and prioritize tasks to complete independently and within time frame established. While technical knowledge of information technology and security issues is highly desirable, technical expertise and resources will be available from units such as Security Operations to support the information security and privacy program. Strong technical writing abilities. Very good understanding of security controls, control systems, and business drivers that impact security controls. Knowledge of SEC, FFC, Sarbanes-Oxley (SOX) and or Gramm-Leach Bliley Act regulatory policies & guidelines. Strong background in security authentication, security applications development methodologies, security architecture and operational procedures, organization, business continuity skills, disaster recovery skills, identity management skills and hands on experience implementing products / solutions e.g. NetIQ, Entrust, Netegrity, Oblix, PKI, and some director service, RSA, strong understanding of the development and maintenance of RBAC s (Role Based Access Controls). Ability to work collaboratively with a broad range of constituencies essential. A demonstrated ability to work with diverse cross functional groups of people is required. Good to Have: Knowledge of the following technologies a plus: Intrusion Detection / Prevention Systems for networks and hosts Security Event Management Systems Vulnerability Assessment Systems Secure transfer protocols such as SSH, SCP and Connect Direct Secure Plus Diagnostic tools such as packet capture/decode and WAN probes IP Networking Windows Systems administration and security tools Experience with remote access, terminal servers, etc a plus Experience in the administration of UNIX Solaris, HP/UX, or Linux and Windows operating systems a plus Experience in developing and administering an information security program desirable Working knowledge of and experience in the policy and regulatory environment of information security, especially in higher education is desirable Additional Information Regards, Arun Kumar R arunkr(AT)aditistaffing.com D: 425-457-7916
    $85k-126k yearly est. 60d+ ago
  • Cyber Security Analyst

    Zone It Solutions

    Information security analyst job in Seattle, WA

    Job Description We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems. Requirements Responsibilities: Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Requirements: Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g. CISSP, CISM) are preferred but not required. Benefits About Us Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************. Also, follow our LinkedIn page for new job opportunities and more. Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
    $80k-111k yearly est. Easy Apply 9d ago
  • Senior Security Analyst

    DBA Carta, Inc.

    Information security analyst job in Seattle, WA

    The Company You'll Join Carta connects founders, investors, and limited partners through world-class software, purpose-built for everyone in venture capital, private equity and private credit. Trusted by 65,000+ companies in 160+ countries, Carta's platform of software and services lays the groundwork so you can build, invest, and scale with confidence. Carta's Fund Administration platform supports 9,000+ funds and SPVs, representing nearly $185B in assets under management, with tools designed to enhance the strategic impact of fund CFOs. Recognized by Fortune, Forbes, Fast Company, Inc. and Great Places to Work, Carta is shaping the future of private market infrastructure. Together, Carta is creating the end-to-end ERP platform for private markets. Traditional ERP solutions don't work for Private Funds. Private capital markets need a comprehensive software solution to replace outdated spreadsheets and fragmented service providers. Carta's software for the Office of the Fund CFO does just that - it's a new category of software to make private markets look more like public markets - a connected ERP for private capital. For more information about our offices and culture, check out our Carta careers page. The Problems You'll Solve At Carta, our employees set out on a mission to unlock the power of equity ownership for more people in more places. We believe that the problems we solve today unlock the opportunities of tomorrow. As a Senior Security Analyst, you'll directly shape and strengthen our detection and response capabilities, help mature our security operations, and ultimately protect the organization from evolving threats. You'll play a critical role in leading incidents, developing internal tools and playbooks, and reducing response times through automation and continuous improvement. You'll serve as a point-of-contact for incidents and collaborate with stakeholders to shape the future of Carta's security posture. Here are some problems we'd love for you to help us solve: * Lead investigation and response efforts for security incidents, and coordinate with internal stakeholders and external partners when necessary. * Own detection use-case development and write and tune alerts to improve signal-to-noise ratio across our environments. * Maintain and continually improve security incident response plans, playbooks, and related documentation. * Apply Terraform to ensure consistent, secure, and scalable infrastructure deployment and detection pipelines. * Develop and maintain internal tooling and automations to improve analyst efficiency for alert triage, IOC enrichment, and evidence collection. * Elevate the Security team by coaching peers, mentoring junior analysts, and setting high standards for detection quality and incident handling. * Own and execute technical security projects, including scoping, building, testing, deploying, and iterating. * Conduct threat hunting and utilize threat intelligence to proactively identify and mitigate emerging risks. * Participate in on-call rotation and continuously improve readiness and handovers. The Team You'll Work With You will be part of a security-minded team that believes in progress over perfection and where security culture and mindset is key. Our team is rethinking how detection and response activities can be accomplished in innovative ways. We focus on solving business problems while minimizing and managing risk exposure for Carta. About You We're looking for candidates who have: * Deep experience in triaging, investigating, and remediating security events and incidents across multiple technology stacks. * Strong experience with SIEM (e.g., Splunk, Panther, Sentinel), EDR (e.g. SentinelOne, CrowdStrike), and other security tooling (e.g., CASB, SSE, SWG). * Working knowledge of Terraform and Infrastructure as Code principles to secure and scale detection/response infrastructure. * Solid understanding and a proven ability to apply detection engineering and threat modeling concepts using MITRE ATT&CK or similar frameworks. * Excellent judgement and the ability to handle ambiguity and make balanced decisions when working with complex situations. * Demonstrated ability to mentor peers, raise technical standards, and influence team maturity. * Proven ability to proactively collaborate with cross-functional teams to influence security priorities and guide risk-based decisions. * Excellent written and verbal communication skills, including the ability to effectively communicate cybersecurity risk across technical and non-technical audiences. * 6+ years of experience in incident management, detection engineering, and security operations. At Carta, you're not just an employee. You're a builder who is creating infrastructure that accelerates innovation and empowers more ownership. Cartans are helpful, relentless, unconventional and kind; representing Carta's Identity Traits. They work collaboratively and cross functionally to challenge the status quo; working towards a common goal of creating more owners in the private markets. Salary Carta's compensation package includes a market competitive salary, equity for all full time roles, exceptional benefits, and, for applicable roles, commissions plans. Our expected cash compensation (salary + commission if applicable) range for this role is: * $151,810 - $178,600 in Seattle, WA * $159,800 - $188,000 in San Francisco, CA; Santa Clara, CA; New York, NY We are hiring for multiple levels and locations, so final offers may vary from the amounts listed based on geography, experience and expertise, and other factors. Disclosures: * We are an equal opportunity employer and are committed to providing a positive interview experience for every candidate. If accommodations due to a disability or medical condition are needed, please connect with the talent partner via email. * Carta uses E-Verify in the United States for employment authorization. See the E-Verify and Department of Justice websites for more details. * For information on our data privacy policies, see Privacy, CA Candidate Privacy, and Brazil Transparency Report. * Please note that all official communications from us will come from an @carta.com or @carta-external.com domain. Report any contact from unapproved domains to ******************.
    $159.8k-188k yearly Auto-Apply 41d ago
  • Senior Information Assurance Analyst

    Serviss

    Information security analyst job in Washington

    At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Information Assurance Professional. Position Summary We are seeking a dynamic and versatile Information Assurance Professional to support a high-impact U.S. Government program. The ideal candidate brings a rare balance of hands-on technical acumen and governance expertise-able to move seamlessly between engineering, architecture, and GRC functions. This role is pivotal in ensuring that systems are not only compliant but also resilient, secure, and aligned with federal risk management frameworks. Key Responsibilities · Serve as a trusted IA advisor, bridging technical engineering efforts with cybersecurity policy, governance, and risk management. · Collaborate with system architects and engineers to design secure solutions that meet compliance and mission requirements. · Support the development, review, and maintenance of key authorization documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms). · Guide system owners and developers through the Risk Management Framework (RMF) process and associated controls (e.g., NIST 800-53, 800-171, CMMC, FedRAMP). · Translate complex technical risks and mitigation strategies into actionable GRC documentation and executive communications. · Conduct system security assessments, gap analyses, and continuous monitoring activities. · Coordinate with cybersecurity operations, incident response, and engineering teams to align IA strategy with operational realities. · Recommend and help implement security architecture improvements based on evolving threat and compliance landscapes. · Track and report on IA posture, risk status, and compliance progress across multiple systems or program areas. Required Qualifications · 10+ years of experience in information assurance, cybersecurity engineering, or GRC. · In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP). · Strong technical foundation with the ability to understand complex systems, architectures, and security configurations. · Excellent verbal and written communication skills, including experience preparing formal security documentation and reports. · Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams. · Bachelor's degree in Cybersecurity, Computer Science, Engineering, or a related field; or Associate's degree with 2+ years of additional relevant experience. Preferred Qualifications · Prior experience supporting U.S. federal agencies or DoD environments. · Professional certifications such as CISSP, CISM, CAP, CCSP, or Security+. · Experience with security automation tools and continuous compliance approaches. · Understanding of Zero Trust principles, DevSecOps environments, and modern system architecture. Why Join SERVISS Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way. Freedom to Thrive. · Be part of an exciting company with ground floor opportunities to include equity · Highly competitive compensation and best in class benefits · Opportunities for annual performance bonuses, growth incentives, and profit-sharing · 100% of medical, vision, dental, and life insurance premiums covered by SERVISS · 401(k) retirement plan with company match for the first 6% Note: This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025.
    $106k-143k yearly est. Auto-Apply 60d+ ago
  • Senior Security Specialist

    Walt Disney Co 4.6company rating

    Information security analyst job in Seattle, WA

    At Disney, we're storytellers. We make the impossible, possible. The Walt Disney Company is a world-class entertainment and technological leader. Walt's passion was to continuously envision new ways to move audiences around the world-a passion that remains our touchstone in an enterprise that stretches from theme parks, resorts and a cruise line to sports, news, movies and a variety of other businesses. Uniting each endeavor is a commitment to creating and delivering unforgettable experiences - and we're constantly looking for new ways to enhance and protect these exciting experiences. The Enterprise Technology mission is to deliver technology solutions that align to business strategies while enabling enterprise efficiency and promoting cross-company collaborative innovation. Our group drives competitive advantage by enhancing our consumer experiences, enabling business growth, and advancing operational excellence. The Global Information Security (GIS) organization strives to secure the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the business by integrating enterprise and business segment-specific supported services to create a robust, efficient, and adaptable cybersecurity program. Our key objectives are to: * Secure the Magic by protecting information systems and platforms. * Reduce Risk by proactively assessing, preventing, and detecting to prevent harm to the Company and our Guests. * Strengthen the business through optimizing execution, application, and technology used to protect the Company. * Innovate by investing in core capabilities to enhance operational efficiency. Team Description: As a member of the Cyber Remediation Operations team, you will work closely with the Disney Entertainment business teams in protecting Disney's highly respected Disney Entertainment portfolio, including ESPN, Disney+, Hulu, and ABC. Responsibilities of Role: * Review reports, assessments, and findings to develop and prioritize appropriate remediation or corrective action plans. * Collaborate with IT, security teams, business partners, and operational teams to drive remediation of security deficiencies. * Regularly communicate portfolio health results to stakeholders, including technical and non-technical audiences. * Develop and document risk mitigation strategies when compliance cannot be achieved. * Analyze business areas and develop improvement plans to strengthen security posture. * Drive improvement to security baselines, policies and standards. * Verify implemented remediation and corrective action activity achieves compliance with TWDC policies and standards. * Stay updated on evolving cybersecurity threats, vulnerabilities, trends, technologies, and best practices and incorporate them into IT and business practices. * Consolidate data from multiple sources into clear, concise, actionable presentations for senior management, communicating data-driven insights. * Support the on-time delivery of security and compliance initiatives. Must Haves: * Minimum of 5+ Years of related cybersecurity experience * Demonstrated experience facilitating cyber remediation and vulnerability management. * Ability to handle confidential information with integrity. * Ability to work well with individuals and teams with varying technical and business backgrounds. * Understanding of security frameworks and standards. * Strong analytical, problem-solving, and critical-thinking skills with attention to detail. * Established problem-solving skills with an ability to develop creative alternatives to complex problems, as well as continuous process improvement skills. * Experience working in a security program for a large and complex organization. Nice to Haves: * Working knowledge of industry compliance programs such as PCI, SOX, etc. * One or more general security certifications including Security+, CySA+, AWS, GSEC, GICSP, CISSP, or other relevant certifications * One or more vulnerability assessment or auditing certification including CISA, CISM, GCCC, GSNA or other relevant certifications Education: * Bachelor's degree in Computer Science, Information Systems, Software, Electrical or Electronics Engineering, or comparable field of study, and/or equivalent work experience #DISNEYTECH The hiring range for this position in Glendale, CA is $117,500 to $157,500 per year and in Seattle, WA is $123,000 to $165,000 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered. About The Walt Disney Company (Corporate): At Disney Corporate you can see how the businesses behind the Company's powerful brands come together to create the most innovative, far-reaching and admired entertainment company in the world. As a member of a corporate team, you'll work with world-class leaders driving the strategies that keep The Walt Disney Company at the leading edge of entertainment. See and be seen by other innovative thinkers as you enable the greatest storytellers in the world to create memories for millions of families around the globe. About The Walt Disney Company: The Walt Disney Company, together with its subsidiaries and affiliates, is a leading diversified international family entertainment and media enterprise that includes three core business segments: Disney Entertainment, ESPN, and Disney Experiences. From humble beginnings as a cartoon studio in the 1920s to its preeminent name in the entertainment industry today, Disney proudly continues its legacy of creating world-class stories and experiences for every member of the family. Disney's stories, characters and experiences reach consumers and guests from every corner of the globe. With operations in more than 40 countries, our employees and cast members work together to create entertainment experiences that are both universally and locally cherished. This position is with Disney Worldwide Services, Inc., which is part of a business we call The Walt Disney Company (Corporate). Disney Worldwide Services, Inc. is an equal opportunity employer. Applicants will receive consideration for employment without regard to race, religion, color, sex, sexual orientation, gender, gender identity, gender expression, national origin, ancestry, age, marital status, military or veteran status, medical condition, genetic information or disability, or any other basis prohibited by federal, state or local law. Disney champions a business environment where ideas and decisions from all people help us grow, innovate, create the best stories and be relevant in a constantly evolving world. Apply Now Apply Later Current Employees Apply via My Disney Career Explore Location
    $123k-165k yearly 57d ago
  • Senior Cloud Security Analyst

    GW Cancer Center

    Information security analyst job in Washington

    GW Information Technology (GW IT) provides empowering tools and caring support for all members of The George Washington University (GW) community. We are focused on driving digital transformation and innovation to enable the academic and operational excellence of our students, faculty, staff, and researchers. At GW IT, we are committed to cultivating a team culture that values diversity, inclusion, respect and collaboration, and invests in each of our team members to grow in their technology and career skills. The Senior Cloud Security Analyst is a mid-level position within GW IT's Application Security team that will collaborate on application security risk assessments, threat modeling, vulnerability assessments specific to GW IT's cloud environment. Primary Responsibilities: Experience evaluating security controls and the application of commonly used cyber risk standards and frameworks: e.g., NIST 800-171, NIST -800-53, CIS , OWASP . Familiarity with cloud computing environments (e.g., AWS , Azure) Experience in the secure design of cloud-based solutions to measurable performance and security standards Familiarity with cloud-managed security services such as Amazon Inspector, AWS WAF and Shield, and AWS Directory Service. Ability to translate security risks and misconfigurations into product security rules and controls to map against standards, policies and procedures. Familiarity with AWS and Azure core cloud infrastructure capabilities, features, and services. Review cloud logging reports for events that occur in the cloud environment. Performs other related duties as assigned. The omission of specific duties does not preclude the supervisor from assigning duties that are logically related to the position Minimum Qualifications Qualified candidates will hold a Bachelor's degree in an appropriate area of specialization plus 5 years of relevant professional experience, OR, a Master's degree or higher in a relevant area of study plus 3 years of relevant professional experience, OR a Bachelor's degree in an appropriate area of specialization plus 3 years of relevant professional experience PLUS a relevant IT Security certification. Degree must be conferred by the start date of the position. Degree requirements may be substituted with an equivalent combination of education, training and experience. Preferred Qualifications 4 years of relevant experience with cloud security requirements Experience working within a distributed team via collaborative tools Certifications: 1+ security certification (e.g., CISSP ) Familiarity with Linux and Windows in cloud environments Experience in secure design of cloud-based solutions to measurable performance and security standards Ability to perform forensic file system analyses to identify indicators of compromise system timeline Experience evaluating log data and cloud-hosted virtual machines to detect security incidents and initiate appropriate steps as a first responder Experience assessing cloud-based security controls using security tools and threat modeling Work Schedule Monday - Friday, 8am - 5pm (occasional evenings and weekends)
    $96k-132k yearly est. 60d+ ago
  • Senior Cyber Intrusion Detection Analyst

    Vets Hired

    Information security analyst job in Washington

    A Senior Cyber Intrusion Detection Analyst is needed to provide advanced incident response and monitoring support. This is a hybrid position based in Washington, D.C., covering 5th shift work (7am7pm Saturday & Sunday, Friday 11pm7am, and Tuesday 7am3pm). Responsibilities Respond to cyber incidents, including SOC incident response calls and emails. Serve as Subject Matter Expert (SME) in investigations escalated from SOC Tier I & II analysts. Investigate phishing attempts and other potential cyber threats. Collaborate with SOC federal staff and Incident Handlers to triage, contain, and remediate incidents. Participate in Splunk engineer working groups to improve alerting rules and reduce false positives. Work closely with Threat Hunt and Security Intelligence teams to strengthen SOC capabilities. Follow established incident response procedures, while identifying process improvement opportunities. Manage incidents involving enterprise systems and sensitive data, including PII breaches. Detect, collect, analyze, and report cybersecurity incidents. Investigate and remediate malware infections. Analyze a variety of logs and alerts (firewall, IDS, malware, HIPS, PCAP, proxy, Windows/Active Directory, etc.) to identify anomalous activity and document findings. Conduct advanced log and malicious code reviews to support containment and recovery. Assist with cybersecurity workforce development by reviewing tickets and annotations. Required Qualifications Bachelors degree with 8+ years of cybersecurity experience (or equivalent). At least 6 years of intrusion detection examination experience. Experience with a wide range of security technologies and logging data, including WANs, IPS/IDS/HIPS, web logs, raw data logs, and event reviews. Strong knowledge of Splunk SIEM with 3+ years of advanced analytics experience (queries, Grep skills, firewall ACL review, Snort IDS events, PCAPs, and web server logs). Strong written and verbal communication skills. One or more advanced certifications, such as: CERT Certified Computer Security Incident Handler CEH (Certified Ethical Hacker) CISSP GCIH (Certified Incident Handler) GISF (Information Security Fundamentals) Clearance Must be able to obtain and maintain a Public Trust clearance. Working Place: Washington, D.C., District of Columbia, United States Company : 2025 Sept 11 Virtual Career Fair - GovCIO
    $91k-124k yearly est. 60d+ ago
  • Information Security Analyst

    Livingston Healthcare 4.0company rating

    Information security analyst job in Montana

    Responsible for monitoring, assessing, and enhancing the security posture of Livingston HealthCare s information systems, networks, and data assets. This role ensures that the organization s security controls, compliance obligations, and risk management practices align with healthcare regulatory requirements, industry frameworks, and internal security policies. The analyst collaborates with IT, clinical, administrative, and third-party partners to identify threats, respond to security incidents, and implement proactive measures to protect the confidentiality, integrity, and availability of systems supporting patient care. Schedule: 1.0FTE (40 hours) Mon-Fri Occasional After-Hours or Weekend Work Compensation: $28.37/hr + DOE Robust Benefits Package ESSENTIAL FUNCTIONS, DUTIES, AND RESPONSIBILITIES: Security Monitoring and Incident Response a. Monitor security tools, alerts, logs, and system events to identify potential threats or anomalous activity. Lead or support security incident response activities, including triage, containment, eradication, recovery, documentation, and post-incident review. Coordinate with internal teams and external partners (e.g., Microsoft 365, security vendors) to validate and remediate alerts. Vulnerability and Risk Management Conduct regular vulnerability scans, review results, and collaborate with system owners to prioritize remediation. Maintain vulnerability management processes and track remediation activities across enterprise assets. Support risk assessments, control evaluations, and mitigation planning. Governance, Compliance, and Policy Support Assist in maintaining compliance with regulatory standards including HIPAA and HiTech. Contribute to the development, review, and enforcement of information security policies, procedures, and standards. Participate in internal and external audits by providing evidence, documentation, and technical explanations. Secure System and Application Lifecycle Support Review new software, devices, integrations, and cloud services for security risks prior to implementation. Assess vendor security posture and ensure appropriate safeguards in Business Associate Agreements. Support configuration hardening, endpoint security, and secure deployment practices. Identity, Access, and Data Protection Assist with administration and review of identity and access controls across systems, including Microsoft 365 and on-premises resources. Support data loss prevention (DLP), email security, encryption, and privileged access management efforts. Monitor access logs and conduct periodic access audits. Security Awareness and Training Contribute to the development and delivery of security awareness programs, phishing simulations, and targeted training initiatives. Provide guidance to staff on secure practices and emerging threats. Operational and Technical Support Assist with deployment and management of enterprise security tools such as EDR, SIEM, DLP, vulnerability scanners, and MFA solutions. Maintain security documentation, asset inventories, and operational records. Collaborate with IT Operations on patch management, endpoint configuration, and network security improvements. Supports other duties as assigned ADDITIONAL RESPONSIBILITIES: Assists with the production of accurate and timely Information Security risk exposure reports. Facilitates the preparation of the annual Security Risk Assessment. Maintains professional and technical knowledge in field of expertise. Ensures that newly proposed Information Technology complies with Information Security requirements QUALIFICATIONS (Required): Bachelor s degree in Information Security, Information Technology, Computer Science, or related field; or equivalent combination of education and experience. Minimum 2 4 years of experience in information security, IT infrastructure, or system administration roles; healthcare experience preferred. Working knowledge of cybersecurity principles, security operations, and threat landscapes. Familiarity with HIPAA Security Rule, and healthcare regulatory environments. Hands-on experience with tools such as EDR/XDR, SIEM, vulnerability scanners, and Microsoft 365 security capabilities. Strong analytical, investigative, and technical problem-solving skills. Ability to communicate security concepts clearly to both technical and non-technical audiences. Ability to manage competing priorities and adapt to rapidly changing threats ADDITIONAL DESIRABLE QUALIFICATIONS: Security-related certifications such as Security+, CySA+, SSCP, CEH, or similar. Higher-level certifications (e.g., CISSP, CISM) are advantageous but not required.
    $28.4 hourly 5d ago
  • Manager - Information Security Engineering

    St. Public Branding

    Information security analyst job in Seattle, WA

    Salary range is $104k to $206k with a midpoint of $155k. New hires typically receive between minimum and midpoint, however, we may go slightly higher based on experience, internal equity and market. Sound Transit also offers a competitive benefits package with a wide range of offerings, including: Health Benefits: We offer two choices of medical plans, a dental plan, and a vision plan all at no cost for employee coverage; comprehensive benefits for employees and eligible dependents, including a spouse or domestic partner. Long-Term Disability and Life Insurance. Employee Assistance Program. Retirement Plans: 401a - 10% of employee contribution with a 12% match by Sound Transit; 457b - up to IRS maximum (employee only contribution). Paid Time Off: Employees accrue 25 days of paid time off annually with increases at four, eight and twelve years of service. Employees at the director level and up accrue additional days. We also observe 12 paid holidays and provide up to 2 paid floating holidays and up to 2 paid volunteer days per year. Parental Leave: 12 weeks of parental leave for new parents. Pet Insurance discount. ORCA Card: All full-time employees will receive an ORCA card at no cost. Tuition Reimbursement: Sound Transit will pay up to $5,000 annually for approved tuition expenses. Inclusive Reproductive Health Support Services. Compensation Practices: We offer competitive salaries based on market rates and internal equity. In addition to compensation and benefits, you'll find that we provide work-life balance, opportunities for professional development and recognition from your colleagues. GENERAL PURPOSE: Under general direction, the Information Security Engineering Manager oversees and operates several essential Information Security functions including Security Engineering and information security tool management. The Information Security Engineering Manager's role is to lead and support service owners, system owners, and relevant stakeholders in ensuring their respective (or proposed) systems are compliant with the Agency's information security standards. In addition, the Information Security Engineering Manager supports the operations of several other functions of the Agency's Information Security Management System (ISMS). ESSENTIAL FUNCTIONS: The following duties are a representative summary of the primary duties and responsibilities. Incumbent(s) may not be required to perform all duties listed and may be required to perform additional, position-specific duties. Acts as Service Owner for related Information Security Engineering services of the Information Security business unit. Support Information Security Architecture and Security Operations services Manages personal for the Information Security Engineering components of the Information Security Division. Provides guidance to the technical professionals that comprise the Security Engineering functions of the Information Security Division Participates in the overall implementation of the agency's information security program, under the direction of the Chief Information Security Officer (or delegate), where appropriate. Participates in the creation of information security governance documents (policies, standards, baselines, guidelines, and procedures) under the direction of the Chief Information Security Officer (or delegate), where appropriate. Identifies and assesses technology-related risks to information security associated with prospective technology solutions; and recommends appropriate mitigating controls. Influences the design of any prospective technology solution for adherence to documented agency standards, policies, and regulatory responsibilities. Evaluates, implements, and supports security-focused tools and services required to support information security controls. Collaborates with other IT engineering and administration disciplines to ensure security best practices are incorporated into design, implementation and sustainment of systems and services within the agency. Consults with internal customers on risk assessment, threat modeling and mitigation of vulnerabilities Conducts security assessments, evaluates controls, and provide feedback to management and system owners on the design and effectiveness of control processes. Conducts regular security reviews of both software and processes. Reviews and creates threat models and recommends security enhancements consistent with information security strategy and evolving threats Participates in ongoing information security education, awareness, and outreach activities. Participate with information security incident investigation and response efforts, leading as needed. Participate with computer and network forensic investigations in support of incident response activities. Prepares regular reports on relevant metrics for different stakeholders. Coaches, manages, mentors, and develops staff. Focuses on keeping professional skills current. Keeps up to date on latest information security threats and countermeasures. Champions and models Sound Transit's core values and demonstrates values-based behaviors in everyday interactions across the agency. Contributes to a culture of diversity, equity and inclusion in alignment with Sound Transit's Equity & Inclusion Policy. It is the responsibility of all employees to follow the Agency safety rules, regulations, and procedures pertaining to their assigned duties and responsibilities, which could include systems, operations, and/or other employees. It is the responsibility of all employees to integrate sustainability into everyday business practices. Other duties as assigned. MINIMUM QUALIFICATIONS: Education and Experience: Bachelor's degree in Computer Science, Information Technology, Business Administration, Engineering, or closely related field. Five years of information technology experience with a focus on security engineering and operations, OR an equivalent combination of education and experience. Three years of leadership, budgetary, planning and workforce management experience. Required Licenses or Certifications: Certified Information Systems Security Professional (CISSP), orobtain within 12 months of hire. Preferred Licenses or Certifications: One or more of the following certifications is strongly preferred: Certified Information Security Manager (CISM) Information Technology Infrastructure Library (ITIL) Certified Ethical Hacker (CEH) Certified Cyber Forensics Professional (CCFP) GIAC Certified Incident Handler (GCIH) Required Knowledge and Skills: Strong command of ITIL core processes and principles. Strong command and experience with information security architecture and engineering principles General knowledge of the NIST 800 series standards, PCI DSS standard, and the ISO 27001/2 frameworks. Demonstrated work experience in a few of the following areas: Information Security, Security Architecture, Security Engineering, Security Operations and implementing best practices, tools and technology. Strong understanding of information technology and security controls. Strong understanding of and experience with security-related technologies, systems, and tools. Proven competency in the use of MS Office applications (Microsoft Project, Word, Excel, PowerPoint, and SharePoint) Strong team leadership and communicational (verbal/written) skills. Ability to work in highly collaborative environments. Strong workload prioritization and self-organization skills Strong project management skills. Preferred Knowledge and Skills: Understanding of Cloud Computing environments (Microsoft Azure preferred). Physical Demands / Work Environment: Work is performed in a hybrid office environment. This position is responsible for communicating with stakeholders, and using specialized security tools; may be subject to bending, hearing, sitting, standing, talking, seeing, and carrying and lifting 25 lbs or less. The Agency promotes a safe and healthy work environment and provides appropriate safety and equipment training for all personnel as required. Sound Transit is an equal employment opportunity employer. No person is unlawfully excluded from employment action based on race, color, religion, national origin, sex (including gender identity, sexual orientation and pregnancy), age, genetic information, disability, veteran status or other protected class.
    $104k-206k yearly 18d ago
  • Information Systems Security Officer

    Demand Drive Solutions 3.1company rating

    Information security analyst job in Washington

    Job Title: Information Systems Security Officer (ISSO) Salary: - $110,000 $120,000 / yr Roles and Responsibilities: Services to support IS Security performed by the Senior Cloud Information System Security Officer (ISSO), at a minimum, shall consist of the following activities: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS Provide liaison support between the system owner and other IS security personnel Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Ensure that system security documentation is developed, maintained, reviewed, and updated continuously Conduct required IS vulnerability scans according to risk assessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs) Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an agency IS, its environment, and operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR Provide baseline security controls to the system owner, contingent upon the ISs security categorization, type of information processed, and entity type Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems impact levels and ISs authorization boundary Ensure that new entities are created in the GRC application with the security categorization of agency ISs Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreements (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS Perform an independent review of the System Security Plan (SSP) and make approval decisions Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the agency Authorizing Official Schedule security control assessments in coordination with the system owner. Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number Advise the agency's authorized official on IS vulnerabilities and residual risks. Ensure that all POA&M actions are completed and tested Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official Ensure the removal and retirement of agency ISs being decommissioned in coordination with the SO, ISSM, ISSE, and ISSR What are the 3-4 non-negotiable requirements of this position? Active U.S. Government (DoD-Issued) Top Secret Security Clearance with SCI and a CI-Polygraph eligibility. At least 5 years serving as an Information Systems Security Officer (ISSO) at a cleared facility DoD Instruction 8570.1 Information Assurance Management (IAM) Level III Certification What are the nice-to-have skills? A bachelors and/or advanced degree in computer science, business management, or IT-related discipline
    $110k-120k yearly 60d+ ago
  • Sr Ent Information Security Manager

    Direct Staffing

    Information security analyst job in Bellevue, WA

    Bellevue Telecommunications Services Exp 10-15 years Deg Bachelors Relo Bonus Job Description The Information Security Manager, working with in Corporate Information Security Team will be responsible for liaising with assigned business units on behalf of Corporate Information Security (CIS). These responsibilities will include understanding business-driven projects that involve network and information security, applications, networking and web based technologies. They will be responsible for understanding the Business Unit's processes and priorities and working with them to manage business impact and threats, through a risk based methodology. Ensures through positive engagement that business goals are met in a secure and compliant manner, according to industry standard regulations Qualifications Ideal Candidate will have: Candidate must have strong technical, influential and organizational skills. Prefer six years' experience in information security related discipline, in addition to several years' relevant systems and/or network administration experience. Expert relationship building and partnering skills, including persuasion, negotiation and consensus building. Experience translating emerging IT and business trends into meaningful risk reduction opportunities. Demonstrated ability to work effectively in a complex matrixed environment. Outstanding verbal and written communication skills. Ability to interpret business strategy and align to appropriate security enhancements to achieve business enablement. Ability to translate security requirements into business risks and impacts. Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA. Strong understanding of encryption, obfuscation and/or tokenization technologies or compensating controls. Appropriate industry certifications, such as CISSP, CISA or CCIE. Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline. Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred. Skills and Qualifications: A broad, enterprise-wide view of the wireless (or similar) business and understanding of strategy, processes and capabilities, enabling technologies, and governance. Experience in telecommunications, internet service provider, or application service providers a plus. The ability to apply Information Security principles to business solutions. Extensive experience planning and deploying both business and technology security initiatives. Exceptional communication skills and the ability to convey results in a summarily and persuasive manner to business owners. This includes written and verbal communications as well as visualizations. The ability to act as liaison conveying information needs of the business to technology teams and technology constraints to the business. Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus. Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI. Good understanding & experience applying CoBIT, ISO, ITIL, NIST frameworks. Understanding of Local (Wired & Wireless), Wide area, and mobile networks. A good understanding of Network Security, Firewalls, Intrusion Detection and Prevention, AVS, VLANS. Strong background and experience in IP Networking and Routing Protocols. Fluency in the use of all MS Office applications, including SharePoint services. Qualifications · Preferred: Any of the following CISSP, CISA, CISM, C-RISC, CCNA, CCIE, Six Sigma Yellow/Green/Black Belt Education Minimum Required High School Diploma/GED Education/Vocational Training/Experience Preferred Bachelor's degree in Computer Science, Information Technology or related field from an accredited 4-year college or university 10 years of system, network, and application design and architecture experience. Preferably in the wireless communications space CISSP and or CISM Certification (required; experience may be substituted for Cert requirements (4 years minimum) CISA Certification (preferred but not required; experience may be substituted for Cert requirements (4 years minimum) Responsibilities What you will do: Make proactive assessments of threat information in and outside the public domain, understanding the threat as it relates to its customers, and implementing measures to combat the threat. Understand the operations of the business and comprehend how these create value and risk for the organization. Collaborate with team members, peers and the business unit management team to determine technical information security requirements, planned remediation, and advocate for the program to gain resources to implement appropriate protection technologies and processes. Implement and monitor controls necessary to ensure operational processes are performed and are effective to protect the environment from all forms of malicious cyber activity. Assist the Governance group in the development and refinement of technical security standards, key performance indicators and other necessary processes to maintain effective operational security, as it relates to the business. Make risk-based decisions on a daily basis that has the potential to impact our ability to operate and communicate. Ensure the information and network security controls for us are appropriate and operating as intended; includes solutions that are directly controlled as well as security solutions that are operated by other internal and external groups. Provide status reports on a weekly, monthly and quarterly basis to business managers and other management activities that demonstrate the health of the program. Interact with internal audit, third party auditors, and appropriate regulatory bodies. Support the Information Security policy lifecycle throughout, including all aspects of intake, creation, review, approval, implementation, publishing, communication and maintenance. Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures. Additional Information All your information will be kept confidential according to EEO guidelines. Direct Staffing Inc
    $110k-159k yearly est. 7h ago
  • FSR Information Systems Security Officer (ISSO)

    PVM, Inc.

    Information security analyst job in Washington

    FSR ISSO On-Site: Washington, DC TS Clearance with SCI eligibility required PVM, Inc. is looking for a dedicated and motivated Information System Security Officer (ISSO) to join our team. In this role, you will collaborate with engineers and key stakeholders to ensure security policies and settings are properly implemented, build standardized security documentation, and generate compliance evidence. As an ISSO, you will play a critical role in deploying software solutions that support our customers' most mission-critical needs. Responsibilities Secure Authorization to Operate (ATO) approvals for software across multiple customer projects with minimal oversight. Collaborate with engineers to assess software, interpret security requirements, and implement effective security controls. Deliver exceptional customer service, provide policy guidance, and produce high-quality security documentation. Act as the primary on-site cybersecurity and compliance point of contact for one or more customers, addressing security-related inquiries and requirements. Independently analyze vulnerability scan results from tools such as ACAS (Tenable Nessus) and SCAP (STIG benchmark) and manage the Plan of Actions and Milestones (POA&M) to track and remediate security findings. Requirements Active U.S. DoD Top Secret clearance with SCI eligibility. Active DOD 8140 or 8570 Certification (e.g. CISSP or Security+). Active IAT II certification. Minimum 2 years experience directly supporting a customer's ATO/RMF process. Proven experience using the eMASS or XACTA accreditation management software systems. Be at customer site 5 days per week. Tools Proficiency in interpreting and communicating government policy to a diverse audience. Specific experience working in both traditional on premises environments and cloud environments such as Amazon Web Services (AWS). Experience accrediting IT systems against U.S. Government standards including NIST SP 800-53, CNSSI 1253, and the DISA STIGs, using frameworks like DOD RMF, ICD 503, or DIACAP. Skills Strong communication skills with the ability to break down, explain, and demonstrate complex concepts in an easy-to-understand manner Ability to multitask under pressure, using time management and organizational skills. Initiative in proactively identifying problems before they arise and creativity in proposing solutions. Ability to travel up to10% of the time if needed Ability to work independently and as part of a team. Why PVM? At PVM, we mean it when we say we value diversity. As a PVM team member, you will work with people from all different backgrounds that are passionate about the problems we solve for our customers and are focused on delivering value for our clients. Our culture encourages problem solving, leadership, and innovation, and creates an environment that will support your professional and personal growth. Here are a few highlights of the advantages of being a part of the PVM community: Opportunities for growth and advancement Tuition/Training reimbursement Peer bonus program Remote and on-site positions available Unlimited PTO Flexible work schedule PVM delivers digital services that help government agencies unlock the power of their data for good and maximize the value of their technology investments. We design, develop, and deploy solutions to solve mission-critical problems. PVM is a black- and service-disabled veteran-owned small business and was founded by a retired Naval officer out of frustration with the status quo with one goal in mind: to help his fellow Shipmates solve the problems they were facing every day. Today, we continue to be driven by that same goal, and are focused on taking on our clients' missions as our own to make a difference in the communities we serve. PVM believes in equal opportunity employment. We won't discriminate against any employee or applicant based on race, gender, nationality, age, religion, disability, military status, or sexual orientation. As a company and as individuals, we're committed to providing an inclusive and welcoming environment for our team, our family members, and our clients.
    $80k-110k yearly est. Auto-Apply 55d ago
  • Information Systems Security Officer - TS Clearance

    Svd Solutions

    Information security analyst job in Washington

    SVD Solutions is focused on providing comprehensive Information Security/Assurance advisory services to Senior Executives of government and commercial organizations. We are an intelligence-driven management consulting firm that leverages its expertise in security to ensure that executive, organizational, and technical goals and objectives are fully achieved. At SVD Solutions, our core competency is focused on all security matters; from IT Security Surveillance to Intelligence Handling, Incident Response to Forensics, and from Physical Security to Investigations, we handle it all. Job Description ***REQUIRES APPLICANT TO POSSESS CURRENT/ACTIVE TS CLEARANCE PRIOR TO APPLYING*** SVD Solutions is seeking a qualified security-focused professional that can help our federal client achieve mission success through expert level risk avoidance. The ideal candidate will have hands-on experience leading IT security efforts for federal clients and be able to foster a corporate culture of IT security acceptance through interdepartmental relationship building. The candidate will be challenged to apply defense-in-depth techniques, including both process and technical based, on a daily basis securing federal information systems. All work will be performed both on site in the D.C. Metro Area with limited/occasional local travel as necessary. This position may have the ability for some hybrid/remote options. Inquire for more details. Seeking Individuals with experience: Delivering high-quality client solutions to support the design of security architectures for federal clients Performing compliance monitoring, analysis, tracking and reporting Applying the NIST Risk Management Framework and NIST SP 800-53 security controls Analyzing and re-mediating weaknesses while working with system administrators and other personnel in the organization to implement risk mitigation Configuring, designing, or analyzing security controls relevant to networked systems 10+ years of IT experience preferred Qualifications Must be able to obtain and maintain a Top Secret/SCI clearance Preference given to individuals with certifications like the CISSP, CISM, CISA, CEH, or Security+ Must be able to demonstrate integration of regulations and processes such as NIST 800 series special publications, Risk Management Framework (RMF), and Federal Information Security Act (FISMA) reporting for national security systems (NSS) Must have exceptional writing capabilities on technical and process security controls Must be able to articulate risk mitigation and answer IT Security questions in a professional manner Experience briefing Federal Executive Staff on IT Security matters is a plus BS in Computer Science Information Systems or related field is a plus Additional Information This is an immediate fill position. Interviews for qualified candidates are being conducted now. We offer great benefits, including medical, dental, vision, federal holidays observed, and paid time off.
    $80k-110k yearly est. 7h ago
  • Information Systems Security Officer (ISSO)

    Anavation

    Information security analyst job in Washington

    Be Challenged and Make a Difference In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture. Description of Task to be Performed:AnaVation is seeking a mid-level ISSO for our mission critical customer in Washington, DC. You will work as part of a highly talented team providing security compliance expertise on high priority projects. Daily duties include, but are not limited to:· Developing, maintaining, and assessing Security Assessment & Authorization (SA&A) packages resulting in an authority to operate (ATO) for IT systems.· Creating and maintaining SSPs and supporting documentation in accordance with agency guidelines and directives. This includes writing implementation statements, creating supporting documentation (e.g., contingency Plans, Incident Response Plans, Account Management Plans, etc.), and performing self-assessments, while working with system stakeholders.· Develop, coordinate, test, and train personnel on Incident Response Plans and Contingency Plans.· Ensuring that information systems are accredited, maintain their ATO, and are being continuously monitored.· Performing risk assessments for government systems, to include cloud-based systems.· Performing security control assessments to include collecting supporting artifacts/evidence and interviewing system owner/owner representatives.· Having an in-depth knowledge of the Risk Management Framework (RMF).· Maintaining and tracking system POA&Ms.· Conducting vulnerability management and analysis.· Reviewing and analyzing government policy.· Improving on processes and procedures and making recommendations to improve the security posture of the agency's IT systems and applications. This position requires a Top-Secret clearance with SCI eligibility and the ability to obtain a CI Poly. This position is on-site in Washington DC with no remote option.Required Qualifications: Bachelor's in Computer Science, or other related analytical, scientific, or technical discipline 4+ years' experience with NIST, FISMA, and Security Assessment & Authorization. Knowledgeable on various security-related NIST publications (e.g., SP 800-53r5, SP 800-53A, SP 800-18r1, etc.) In-depth knowledge of information security principles, methodologies, and best practices. Experience in conducting risk assessments and implementing security controls. Proficiency in using security tools and technologies, such as firewalls, intrusion detection systems, SIEM, and vulnerability management tools. Knowledge of incident response procedures. Obtain a CI Poly. Can be on-site 5 days a week. Preferred Qualifications: Desirable Qualifications (Education/Certificates, Experience, Physical, etc.): Certifications: CISSP FedRAMP and Cloud experience (e.g., Azure, AWS, Oracle (OCI)) Hands-on experience using a Governance, Risk, and Compliance tool, such as CSAM or eMASS. Ability to conduct gap analysis on non-federated vendor audit results, such as SOC Type 2, HIPAA comparison review and analyst against NIST SP 800-53 Revision 5 security controls. Ability to accurately manage complex workstreams, comprehend the application of the RMF, and understand the application of security controls across the interface, application, operating system, network, and database layers of modern information systems. Understand the applicable artifacts used as evidence to assess compliance. Experience with multiple tools providing security functions such as vulnerability management (e.g., Nessus), configuration management (e.g., BigFix, SCCM, ePO), endpoint protection (e.g., antivirus, ATP), data loss prevention, and intrusion detection software and hardware. Ability to evaluate data flows, network diagrams, and logical security boundaries. Familiarity with the use of data analysis tools, including the use of Microsoft Excel or PowerBI to combine data from multiple sources. Benefits · Generous cost sharing for medical insurance for the employee and dependents · 100% company paid dental insurance for employees and dependents · 100% company paid long-term and short term disability insurance · 100% company paid vision insurance for employees and dependents · 401k plan with generous match and 100% immediate vesting · Competitive Pay · Generous paid leave and holiday package · Tuition and training reimbursement · Life and AD&D Insurance About AnaVation AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team. If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you! AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
    $80k-110k yearly est. Auto-Apply 60d+ ago
  • Information System Security Officer / ISSO

    Nxtkey 3.9company rating

    Information security analyst job in Washington

    NXTKey provides commercial and government entities with the horsepower to drive their business machine faster and more efficiently to successful outcomes. To support our customers needs; we excel at providing Cyber Security, Enterprise Information Management, ICT Consulting, Development, Project Management and Business Process Services and Solutions. Job Description Information System Security Officer / ISSO duties include: Perform Certification & Accreditation (C&A), System Assessment & Authorization (SA&A) as part of NIST SP 800-37 Risk Management Framework (RMF) system and application accreditation Prepare Vulnerability Scanning test plans, coordinate testing, and conduct scans using Nessus, Foundstone, WebInspect, Hailstorm and other scan applications Evaluation of the assigned information systems' security control compliance with the federal requirements and the client's monitoring strategy Management of emerging and defined risks associated with the administration and use of assigned information systems Coordination with the client's Cybersecurity Unit to achieve and maintain the information systems' compliance and authorization to operate (ATO) Ensuring systems are operated, maintained, and disposed of in accordance with policies outlined in the approved security authorization package Performing annual assessments to ensure compliance with the client's policies and standards Serve as a member of the Configuration Control Board (CCB) to ensure configuration management for Cybersecurity-relevant software, hardware, and firmware is maintained and documented Ensuring information system security requirement are addressed during all phases of information systems lifecycle Establishing audit trails, ensuring their review, and making them available while retaining audit logs in accordance of DOJ and component policies Generate and interpret documentation needed to address the items detailed within the GRC tool Work within a team environment to provide technically sound guidance order to adhere to the cybersecurity industry best practices and the client's monitoring strategy Analyze collected information to identify vulnerabilities and potential for exploitation and effectively present the results and guidance derived from scans to system owners or other leadership, as required Effectively communicate orally and in writing to track and detail the demands, efforts, and shortcomings in meeting the goals of the client's information system monitoring strategy Support the integration/testing, operations, and maintenance of systems security Develops, updates, and maintains internal Standard Operating Procedures for all internal assigned functions Aligns business processes and information technology strategy with the conditions and circumstances of the functional environment and establishes effective performance measures Contributes to the definition and implementation of planning processes and/or systems at the enterprise level including both strategic and operational activities Provides system operation support, administers hardware and software inventory Qualifications Required Skills • B.A. or B.S. in Computer Science or a related field • System authorizations and configuration management • Experience creating or modifying information security documentation • Experience testing and documenting information security controls (NIST SP 800-53) Additional Information Active Public Trust clearance, adjudicated within past 5 years. Must have worked on US Federal Government Projects.
    $80k-107k yearly est. 7h ago
  • Information Systems Security Officer

    Plexsys 4.1company rating

    Information security analyst job in Camas, WA

    At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe. As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture. GENERAL DESCRIPTION The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security posture for information systems and as such, works in close collaboration with the ISSM, CPSO, and FSO. The ISSO must have detailed knowledge and expertise required to manage the security aspects of an information system and is assigned the day-to-day responsibility for assigned systems. Responsibilities include implementation of the requirements of Risk Management Framework, including the Joint Special Access Program (SAP) Implementation Guide (JSIG), NIST 800-53, or other security requirements as assigned. This position will report to the Corporate Information Assurance Manager and work in close collaboration with the AFSO and FSO. The ISSO is responsible for developing and updating the security authorization package, managing and controlling changes to the system, and assessing the security impact of those changes. Ensure systems are operated, maintained, and disposed of following security policies and procedures as outlined in the security authorization package. Report all security-related incidents to the ISSM. Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure audit records are collected, reviewed, and documented. Duties also include physical and environmental protection, personnel security, and incident handling. DUTIES & RESPONSIBILITIES Lead the information system security program for their assigned location to include implementation and validation of automated informational security, ensuring security requirements as contracted are satisfied Maintain and establish the accreditation of classified information systems Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring, trainings, and self-inspections Develop, implement and maintain security emergency action plans Provide security education and training to local employees Maintain administrative security records and documents for local employees Conduct self-inspections to ensure current security measures and policies are effective Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees Conduct system audits in accordance with security accreditation package requirement Lead the information system security program for their assigned location to include implementation and validation of automated informational security, ensuring security requirements as contracted are satisfied Maintain and establish the accreditation of classified information systems Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring, trainings, and self-inspections Develop, implement and maintain security emergency action plans Provide security education and training to local employees Maintain administrative security records and documents for local employees Conduct self-inspections to ensure current security measures and policies are effective Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees Conduct system audits in accordance with security accreditation package requirements Conduct vulnerability scans and analysis Conduct maintenance on the networks, systems, and hardware Perform software upgrades on networks, systems, and hardware Perform security assignments in accordance with the Automated Information System requirements and local regulations Understand and follow NISPOM/ODAA/RMF/JAFAN/ICD/NIST/JSIG classified system accreditation and certification requirements Other duties as assigned REQUIREMENTS Bachelor's degree in related field or 4 years' experience in related field DoD 8570 compliant, IAT Level II Experience with Windows based administration of Information Systems Ability to work within compliance standards; previous experience with RMF, HIPAA , PCI DSS, or equivalent compliance standard preferred Strong experience in networking, active directory, centralized logging solutions, vulnerability scanning and anti-virus solutions Experience with security audits for information systems Strong communication and problem-solving skills Ability to work in both a team environment as well as independently Must be organized and detail oriented Ability to obtain and maintain Top Secret clearance with the ability to obtain approval for SAP/SCI access DESIRABLE Have previous experience with DoD Security Regulations and Policies PERKS As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals. Medical/Vision/Prescription/Dental Benefits Life, AD&D and Long Term Disability Coverage Paid Holidays, Military Leave, and Paid Time Off 401k Plan with eligibility from first day of employment Education reimbursement for job-related courses for full-time employees PriceClub/COSTCO/Sam's Club annual membership
    $88k-116k yearly est. 60d+ ago
  • Security Engineer, Operating Systems

    Anthropic

    Information security analyst job in Seattle, WA

    Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems. About the Role We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training. This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale. What You'll Do: Design and implement hardened OS configurations for AI workloads across diverse hardware platforms Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms Implement and maintain full-disk encryption solutions for diverse storage systems Build security infrastructure for AI systems, research environments, and production services Create OS-level attestation and integrity monitoring systems Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations Design secure boot processes and trusted execution environments Work with container teams to ensure proper workload isolation at the kernel level Design privilege separation and mandatory access control policies Implement secure update mechanisms for OS components Build tooling for security configuration management and compliance verification Serve as a subject matter expert for OS security questions and designs Who You Are: 5+ years of experience in operating systems security or kernel development Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.) Experience with kernel hardening techniques and exploit mitigation Strong programming skills in C and systems programming languages Experience with eBPF for security monitoring and enforcement Understanding of virtualization and containerization security Track record of identifying and fixing OS-level security vulnerabilities Experience with security-focused Linux distributions Strong candidates may also have: Kernel development experience or contributions to Linux kernel Experience with real-time or embedded operating systems Knowledge of hardware security features and their OS integration Experience with secure boot technologies Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX) Background in vulnerability research, exploit development, or fuzzing Experience with formal methods for OS verification Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves) Deadline to apply: None. Applications will be reviewed on a rolling basis. The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation. Annual Salary:$300,000-$405,000 USDLogistics Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience. Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices. Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this. We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team. How we're different We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills. The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences. Come work with us! Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
    $79k-113k yearly est. Auto-Apply 18d ago
  • Data Security Analyst 3

    Washington State University 4.3company rating

    Information security analyst job in Pullman, WA

    Required Qualifications A Bachelor's degree and three (3) years professional experience OR a combination of education and experience totaling seven (7) years from which comparable knowledge and abilities are acquired. Preferred Qualifications Experience developing operational information security procedures and technical training materials. Demonstrated experience with working within formal project management frameworks. Experience with the Splunk application, to include developing searches, reports, and other automated routines. Experience with security reviews of firewall, file system, and other forms of access control lists. Experience with digital forensics software and processes. Demonstrated ability to appropriately prioritize multiple tasks, projects, or assignments. Expert knowledge of Windows, Linux, and Apple operating systems.
    $58k-77k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Coeur dAlene, ID?

The average information security analyst in Coeur dAlene, ID earns between $58,000 and $122,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Coeur dAlene, ID

$84,000
Job type you want
Full Time
Part Time
Internship
Temporary