Information Security Analyst
Information security analyst job in Charlotte, NC
WorkForce Unlimited is searching for a proactive Security Analyst to analyze vulnerabilities, optimize security tools, and help our client stay ahead of emerging threats.
The Security Analyst is responsible for independently managing third-party vulnerability data sources, executing scans using proprietary tools, and collaborating with IT teams to prioritize mitigation efforts. The role involves leveraging vulnerability management tools to generate metrics and reports that track progress and effectiveness. Additionally, the Security Analyst may contribute to reviewing project scopes to recommend security benchmarks, optimizing security tool alerts and policies, and integrating logs and large data sets into existing systems.
Role Responsibilities
Analyze vulnerabilities from various sources and input them into the vulnerability management tool using approved methods to ensure a complete overview of exposures.
Evaluate existing vulnerabilities to identify problem areas or opportunities for mass-mitigation.
Communicate with cross-functional teams to explain risks, opportunities, or required actions.
Escalate vulnerabilities that exceed defined time-to-resolve thresholds.
Configure vulnerability scanning tools and manage ongoing scan schedules.
Collect and maintain departmental metrics and KPIs.
Identify opportunities to apply AI technologies to improve vulnerability management processes.
Technical Qualifications
Strong familiarity and prior experience with:
HTTP, PKI, digital signatures/encryption, SMTP, DNS, CWEs, CVEs, and related security frameworks.
Vulnerability and security scanning tools such as Nessus, NMAP, ZAP, BurpSuite, Invicti, Nuclei, or similar.
Web application scanning and web application firewalls (WAFs).
Containers and associated security considerations.
CIS Benchmarks, STIGs, or other security hardening standards.
Additional desirable skills or experience:
Authentication and identity protocols: SAML, Kerberos, OAuth, OIDC, LDAP.
Scripting and automation using PowerShell and Python.
CI/CD tools such as Jenkins.
Splunk data onboarding (indexes, sourcetypes, data models, forwarders, apps, HECs).
Log ingestion and transport technologies: Azure Event Hubs, Kafka, syslog.
EDR/XDR tools such as Microsoft Sentinel, Microsoft Defender, CrowdStrike, or similar.
General Qualifications
Ability to conduct independent research, analyze data, and produce clear plans of action.
Strong systematic thinking and troubleshooting skills.
Ability to create clear and detailed documentation of designs and processes for diverse technical audiences.
Excellent communication skills, including the ability to clearly articulate requirements, priorities, and project status.
Education Requirements
Bachelor's Degree in Information Technology or a related field is preferred but not mandatory.
Information Security Analyst 2 - Contingent
Information security analyst job in Charlotte, NC
In this contingent resource assignment, candidate may:
Participate in low to moderately complex initiatives and identify opportunity for process improvements within Information Security Analysis.
Review and analyze basic or tactical Information Security Analysis assignments or challenges that require research, evaluation, and selection of alternatives, related to low-to-medium risk deliverables.
Present recommendations for resolving low to moderately complex situations and exercise some independent judgment while developing understanding of function, policies, procedures, and compliance requirements.
Provide information to client personnel in Information Security Analysis.
Required Qualifications:
2 plus years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education.
Desired Qualifications:
Hands-on experience with IAM Tools (SailPoint, Okta, CyberArk, Ping, Microsoft Entra ID)
Experience with authentication standards (LDAP, SAML, OAuth, Open ID, SCIM).
Experience with security compliance frameworks (ISO, NIST, SOX, PCI)
Ability to interact with various layers of leadership
Ability to prioritize work, meet deadlines, and achieve deliverables
Strong organizational, multi-tasking, and prioritizing skills
Customer service focus with the ability to respond to requests in a timely manner
Intermediate Microsoft Office (Word, Excel, Outlook, PowerPoint, Access, and Project) skills
Pay Range: $40- $45
The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
Information Technology Security Manager
Information security analyst job in Fort Mill, SC
CULTURE SNAPSHOT:
Broad River Retail is an organization of integrity, diversity and culture working together for the purpose of ‘
Furnishing Life's Best Memories'
. At Broad River, we call all our employees “Memory Makers.” We do this because we know everyone that works for our Company has the power to make positive memories not only for our Guests, but also for their families, co-workers, and communities.
We take pride in training and developing our teams so that they can provide a premier customer experience to every Guest. Our Memory Makers are the driving force that has led us to being the largest and fastest growing Ashley licensee in the U.S. and landing us on the Top Places to Work list two years in a row in our industry.
AT A GLANCE:
The IT Security Manager reports directly to the VP of IT/BI and is part of the IT/BI Department. The IT Security Manager is responsible for safeguarding the organization's digital assets by managing and monitoring, detecting, and responding to security threats. This role involves conducting risk assessments, managing incident responses, and implementing security protocols to ensure the integrity, confidentiality, and availability of enterprise systems and data.
DAY IN THE LIFE AS THIS MEMORY MAKER:
Monitor security networks and systems for breaches or suspicious activity.
Respond to security incidents and conduct thorough investigations.
Perform vulnerability assessments and penetration testing.
Develop and implement security measures and protocols.
Analyze security alerts and determine appropriate response actions.
Collaborate with IT teams to ensure secure system configurations.
Prepare regular security reports for management.
Conduct security awareness training for staff.
Lead and manage security-related projects and initiatives.
WHAT YOU'LL NEED TO SUCCEED:
Bachelor's degree in Computer Science, Information Technology, or related field.
5+ years of experience in cybersecurity or related roles.
3+ years of Information Technology Management or related field
Certifications such as CISSP, CISM, CEH, or GIAC preferred.
Strong understanding of cybersecurity frameworks (e.g., NIST, ISO-27001, PCI-DSS).
Experience with SIEM, IDS/IPS, firewalls, and endpoint protection tools.
Excellent analytical, problem-solving, and communication skills.
Ability to lead security-related projects and initiatives.
Clearly convey ideas, expectations, and feedback to teams, ensuring transparency and alignment across all levels.
Build strong relationships and a positive work culture.
Address and resolve conflicts within the team, mediating differences and finding mutually beneficial solutions.
Inspire and encourage team members, fostering a sense of purpose and driving performance toward shared goals.
Respond to change with flexibility and a positive outlook, guiding teams through transitions and unforeseen challenges.
Distribute tasks effectively based on team strengths, ensuring optimal workload balance and empowering others to take ownership.
Mentor and provide constructive feedback to help team members grow, enhancing their skills and career development.
WORKPLACE ENVIRONMENT:
While performing the duties of this job the employee is:
Prolonged periods sitting at a desk and working on a computer.
Must be able to lift up to 15 pounds at a time.
WORK SCHEDULE OUTLINED ON SITE, HYBRID, REMOTE WITH EXPECTATIONS
Ability to work independently, as well as, in a collaborative team environment within an office setting.
Physical requirements such as extended periods of sitting and computer use may be required.
Physical requirements such as extended periods of standing may be required.
Ability to communicate effectively verbally, in writing, and/or electronically.
Ability to use logical reasoning for simple and complex problem solving.
Travel up to 20% of your time.
In accordance with the Americans with Disabilities Act (ADA), reasonable accommodations may be made to empower individuals with disabilities to undertake the essential duties and responsibilities of the position.
MEMORY MAKER PERKS & BENEFITS:
Salary Range based on background, skill, and experience
Medical, dental, vision, and life insurance options
Paid time off and 401K matching contribution
Employee discount (40%) at BRR locations
Internal Opportunities for career growth and advancement
OUR COMMITMENT TO YOU:
Broad River Retail is committed to creating a place where everyone feels respected, valued, and able to reach their full potential. Regardless of race, gender, religion, sexual orientation, age, disability, or if you're parenting the next generation of Memory Makers, we firmly believe our work is at its best when everyone feels free to be their most authentic self.
Cyber Security Analyst - Associate
Information security analyst job in Charlotte, NC
Job Level: Associate Job Function: Business Resilience & Security Employment Type: Full Time Role Description This role is part of a team responsible for administering security tools and projects for the safeguarding of the firm's information systems. The Security Engineer focuses on working closely with various stakeholders in IT and development communities across SMBC Group Companies to ensure the overall Cyber Security of the firm. The Security Engineer will also act as a subject matter expert of various tools who uses expertise to resolve complex problems in consideration of established policies, guidelines or processes.
Role Objectives
You will be part of a Cyber Security team responsible for ensuring IT Security systems are configured, deployed, and maintained in accordance with polices and standards. The position requires participation in technical research and development to enable continuing innovation for Cyber Security and Information Risk Management.
* Application Security and DevSecOps
* Understanding of OWASP Top 10
* Application Whitelisting
* Cloud Computing and Security
* Incident Response in the cloud.
* Database security and monitoring
* Email security
* SPF, DKIM, DMARC and third party email providers
* EndPoint Detection and Response
* File Share access and Group Membership access reviews and certification
* Firewall reviews and access and certification
* Identity and Access Management & Governance
* Incident Response end to end
* Multi Factor Authentication
* Zero Trust principles
* Network Access Control
* Network anomaly detection and response
* Deep packet analysis experience required using wireshark/tcpdump.
* Network Segmentation
* Privileged Access Management
* Python/Bash/PowerShell scripting required
* Secure Browsing
* Security Information and Event Management
* Vulnerability scanning, security compliance and vulnerability management
* Linux and Windows Security principles and Microsoft Active Directory.
Qualifications and Skills
* 3-5+ Years of hands-on architecting, implementation and design experience required, designing globally scalable security solutions.
* Solid Technical hands-on Cyber Security experience with implementation and management of several of the core security solutions mentioned above.
* Strong knowledge of enterprise Information Security pillars, including Perimeter security, Identity Management and Governance, Privileged Account Management, Compliance, Penetration testing, Encryption, Cloud Security, Incident Response, Vulnerability Management.
* Excellent communication skills, writing skills, and the ability to work with internal teams.
* Be a performance-driven team player with an excellent attitude.
* Able to follow priorities set by management.
* Strong ability to deliver on time.
* Strong ability to deliver quality.
* One of the following certifications is required - CISSP, CISM, CCSP, OSCP, GIAC GCIH, GCTIA, GDSA or equivalent.
* Ability to multi-task and work on several projects at the same time.
* Ability to work in a fast-paced environment.
* Ability to analyze vulnerabilities within the internal infrastructure and oversee timely remediation.
* Ability to communicate information security concepts across a broad range of technical and non-technical staff.
* Ability to translate business requirements into technical solutions.
* Ability to adapt information delivery based on audience.
* Good influencing, relationship and stakeholder management skill.
Additional Requirements
Nearest Major Market: Charlotte
Cyber Security Analyst
Information security analyst job in Charlotte, NC
Job Description
We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, Information Security, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
Easy ApplyCyber Security Analyst - Associate
Information security analyst job in Charlotte, NC
**Role Description** This role is part of a team responsible for administering security tools and projects for the safeguarding of the firm's information systems. The Security Engineer focuses on working closely with various stakeholders in IT and development communities across SMBC Group Companies to ensure the overall Cyber Security of the firm. The Security Engineer will also act as a subject matter expert of various tools who uses expertise to resolve complex problems in consideration of established policies, guidelines or processes.
**Role Objectives**
You will be part of a Cyber Security team responsible for ensuring IT Security systems are configured, deployed, and maintained in accordance with polices and standards. The position requires participation in technical research and development to enable continuing innovation for Cyber Security and Information Risk Management.
+ Application Security and DevSecOps
+ Understanding of OWASP Top 10
+ Application Whitelisting
+ Cloud Computing and Security
+ Incident Response in the cloud.
+ Database security and monitoring
+ Email security
+ SPF, DKIM, DMARC and third party email providers
+ EndPoint Detection and Response
+ File Share access and Group Membership access reviews and certification
+ Firewall reviews and access and certification
+ Identity and Access Management & Governance
+ Incident Response end to end
+ Multi Factor Authentication
+ Zero Trust principles
+ Network Access Control
+ Network anomaly detection and response
+ Deep packet analysis experience required using wireshark/tcpdump.
+ Network Segmentation
+ Privileged Access Management
+ Python/Bash/PowerShell scripting required
+ Secure Browsing
+ Security Information and Event Management
+ Vulnerability scanning, security compliance and vulnerability management
+ Linux and Windows Security principles and Microsoft Active Directory.
**Qualifications and Skills**
+ 3-5+ Years of hands-on architecting, implementation and design experience required, designing globally scalable security solutions.
+ Solid Technical hands-on Cyber Security experience with implementation and management of several of the core security solutions mentioned above.
+ Strong knowledge of enterprise Information Security pillars, including Perimeter security, Identity Management and Governance, Privileged Account Management, Compliance, Penetration testing, Encryption, Cloud Security, Incident Response, Vulnerability Management.
+ Excellent communication skills, writing skills, and the ability to work with internal teams.
+ Be a performance-driven team player with an excellent attitude.
+ Able to follow priorities set by management.
+ Strong ability to deliver on time.
+ Strong ability to deliver quality.
+ One of the following certifications is required - CISSP, CISM, CCSP, OSCP, GIAC GCIH, GCTIA, GDSA or equivalent.
+ Ability to multi-task and work on several projects at the same time.
+ Ability to work in a fast-paced environment.
+ Ability to analyze vulnerabilities within the internal infrastructure and oversee timely remediation.
+ Ability to communicate information security concepts across a broad range of technical and non-technical staff.
+ Ability to translate business requirements into technical solutions.
+ Ability to adapt information delivery based on audience.
+ Good influencing, relationship and stakeholder management skill.
**Additional Requirements**
EOE, including Disability/veterans
EMPLOYEE PRIVACY & DATA PROTECTION PROFESSIONAL (HYBRID-CHARLOTTE, NC)
Information security analyst job in Charlotte, NC
Job Description
A family of companies and experiences
As the leading foodservice and support services company, Compass Group USA is known for our great people, great service and our great results. If you've been hungry and away from home, chances are you've tasted Compass Group's delicious food and experienced our outstanding service. We have over 284,000 US associates who work in award-winning restaurants, corporate cafes, hospitals, schools, arenas, museums, and more in all 50 states. Our reach is constantly expanding to shape the industry and create new opportunities for innovation. Join the Compass family today!
great people. great services. great results.
Each and every individual plays a key role in the growth and legacy of our company. We know the next big idea can come from anyone. We encourage developing and attracting expertise that differentiates us as a company as we continue to raise the bar.
Job Summary:
Compass Group USA is seeking an experienced Privacy Professional to join our Legal & Compliance team. This role will focus on ensuring compliance with applicable US state and federal privacy laws governing the collection, processing, and use of employee/associate personal information. The ideal candidate will have a strong understanding of privacy frameworks and experience working in organizations with diverse industry exposure, and the ability to coordinate across multiple teams.
Responsibilities:
Regulatory Compliance:
Monitor and interpret state privacy and Artificial Intelligence laws (e.g., CCPA, CPRA, VCDPA, and similar) impacting employee personal information.
Advise business units on compliance obligations related to personal information collection, processing, and sharing.
Help build and maintain strong privacy controls and systems to maintain privacy compliance.
Manage the company DSAR process and tooling.
Policy Development & Implementation:
Draft, review, and maintain privacy policies, notices, and consent mechanisms across websites and mobile applications.
Embed privacy-by-design principles into marketing and technology initiatives and applications purchased and created by the company.
Risk Management:
Conduct Privacy Impact Assessments (PIAs) and maintain Records of Processing Activities (RoPA).
Support incident response and breach management in collaboration with IT and cybersecurity teams.
Training & Awareness:
Deliver privacy training to human resources, talent acquisition, benefits, and other teams, and educate the company around core privacy principles.
Promote a culture of compliance across diverse business units.
Qualifications:
Education & Experience:
A bachelor's from an accredited US college or university in related studies.
Minimum 3-5 years of experience advising US entities on topics of privacy, data protection, or similar compliance roles at a company governed by state and federal US privacy laws.
Privacy Expertise:
Required: Strong knowledge of U.S. state privacy laws.
Preferred: Experience with HIPAA compliance.
CIPP/US, CIPM, or similar privacy certification.
Skills:
Excellent analytical, communication, and project management skills.
The ability to translate complex privacy laws into business-applicable advice and controls.
Ability to work in fast-paced environments with diverse industry exposure.
Apply to Compass Group today!
Click here to Learn More about the Compass Story
Compass Group is an equal opportunity employer. At Compass, we are committed to treating all Applicants and Associates fairly based on their abilities, achievements, and experience without regard to race, national origin, sex, age, disability, veteran status, sexual orientation, gender identity, or any other classification protected by law.
Qualified candidates must be able to perform the essential functions of this position satisfactorily with or without a reasonable accommodation. Disclaimer: this job post is not necessarily an exhaustive list of all essential responsibilities, skills, tasks, or requirements associated with this position. While this is intended to be an accurate reflection of the position posted, the Company reserves the right to modify or change the essential functions of the job based on business necessity. We will consider for employment all qualified applicants, including those with a criminal history (including relevant driving history), in a manner consistent with all applicable federal, state, and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, the San Francisco Fair Chance Ordinance, and the New York Fair Chance Act. We encourage applicants with a criminal history (and driving history) to apply.
Compass Corporate maintains a drug-free workplace.
Applications are accepted on an ongoing basis.
Associates at Corporate are offered many fantastic benefits.
Medical
Dental
Vision
Life Insurance/ AD
Disability Insurance
Retirement Plan
Paid Time Off
Paid Parental Leave
Holiday Time Off (varies by site/state)
Personal Leave
Associate Shopping Program
Health and Wellness Programs
Discount Marketplace
Identity Theft Protection
Pet Insurance
Commuter Benefits
Employee Assistance Program
Flexible Spending Accounts (FSAs)
Associates may also be eligible for paid and/or unpaid time off benefits in accordance with applicable federal, state, and local laws. For positions in Washington State, Maryland, or to be performed Remotely, click here for paid time off benefits information.
Req ID: 1480673
Compass Corporate
Julia Vogel
[[req_classification]]
Senior Analyst, Security Compliance (SOX IT)
Information security analyst job in Charlotte, NC
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
VP, Chief Information Security Officer
Information security analyst job in Charlotte, NC
Discovery Education is seeking an experienced and strategic VP, Chief Information Security Officer to lead the continued maturation, implementation, and continuous improvement of our enterprise-wide information security and compliance programs. The person in this role will be responsible for protecting our corporate systems, customer-facing products, data assets, and brand reputation in an increasingly complex global environment.
The ideal candidate will bring a balanced blend of strategic leadership, technical expertise, and business acumen, ensuring security is both a foundation of trust and an enabler of innovation at Discovery Education.
In This Role You Will:
Security Strategy & Governance
Develop and execute a comprehensive information security strategy aligned with business goals and regulatory requirements.
Establish governance frameworks and policies to ensure consistent and effective security practices.
Enterprise & Product Security
Oversee IT security operations, including network security, endpoint protection, identity and access management, and disaster recovery.
Integrate security principles across the product development lifecycle, including secure coding, vulnerability management, and incident response.
Risk & Compliance Management
Lead programs to achieve and maintain compliance with ISO 27001, SOC 2, FERPA, COPPA, GDPR, and other relevant standards.
Conduct risk assessments and implement mitigation strategies across the organization.
Vendor & Third-Party Management
Oversee third-party risk assessments and ensure vendors meet security requirements.
Collaborate with Legal, IT, and Business Systems teams to manage vendor relationships.
Incident Response & Crisis Management
Lead proactive incident response planning and real-time management of security events.
Develop and maintain crisis communication protocols.
Data Privacy & Protection
Partner with Legal, Product, Engineering, and Data teams to uphold global data privacy standards.
Implement governance practices for data protection.
Security Awareness & Education
Promote a strong security culture through training, simulations, and executive tabletop exercises.
Leadership & Collaboration
Lead and develop a high-performing security team.
Partner with IT, Engineering, Legal, and Product Management to embed security into business operations.
Customer & Stakeholder Engagement
Respond to customer security inquiries and support audits and contract reviews.
Provide clear, actionable updates to executives and board-level stakeholders
Core Competencies for Success:
Strategic Mindset
Drives Results
Collaborates
Manages Complexity
Builds Effective Teams
Communicates Effectively
Instills Trust
Tech Savvy
Credentials and Experience:
10+ years of experience in information security leadership roles.
Proven expertise in cloud-native environments (AWS preferred), SaaS security, and modern software development.
Deep understanding of regulatory frameworks relevant to the education and technology sectors.
Strong communication skills with the ability to translate technical issues into business impacts.
Experience leading audits and certifications (ISO 27001, SOC 2 Type II).
Bachelor's degree in Computer Science, Information Security, or related field; advanced degree or certifications (CISSP, CISM, CISA) preferred.
Legal right to work in the United States
Experience in K-12, EdTech, SaaS, or regulated industries.
Familiarity with Microsoft Security Stack (Defender, Sentinel) and Hyperproof or similar compliance tools.
Knowledge of AI-related security threats and mitigation strategies.
M&A analysis experience.
High integrity, ownership, and accountability.
This role is designed to be hybrid in Charlotte, NC.
The hiring range for this position is between $225,000 - $250,000 annually, however, base pay offered may vary depending on job-related knowledge, skills, experience, and location. Additionally, this position is eligible for an annual bonus.
Information Systems Security Officer (ISSO)
Information security analyst job in Charlotte, NC
ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:
* Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades.
* Maintain responsibility for managing cybersecurity risk from an organizational perspective.
* Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.
* Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.
* Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).
* Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
* Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.
* Provide subject matter expertise for cyber security and trusted system technology.
* Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.
* Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes.
* Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.
* Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:
* Bachelor's Degree.
* A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.
* eMASS experience.
* Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.
* Strong desktop publishing skills using Microsoft Word and Excel.
* Experience with industry writing styles such as grammar, sentence form, and structure.
* Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:
* CISSP, CASP, or a similar certificate is preferred.
* Master's Degree in Cybersecurity or related field.
* Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.
* Demonstrated ability to work well independently and as a part of a team.
* Excellent work ethic and a high commitment to quality.
Our Commitment:
Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.
Health, Dental, and Vision
Life Insurance
401k
Flexible Spending Account (Health, Dependent Care, and Commuter)
Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!
Explore additional job opportunities with CGS on our Job Board:
*************************************
For more information about CGS please visit: ************************** or contact:
Email: [email protected]
#CJ
$92,213.33 - $125,146.66 a year
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Cyber Security Analyst Co-op - Fall 2026
Information security analyst job in Salisbury, NC
Ahold Delhaize USA, a division of global food retailer Ahold Delhaize, is part of the U.S. family of brands, which includes five leading omnichannel grocery brands - Food Lion, Giant Food, The GIANT Company, Hannaford and Stop & Shop. Our associates support the brands with a wide range of services, including Finance, Legal, Sustainability, Commercial, Digital and E-commerce, Technology and more.
Co-op Program Overview:
Get an insider view of the fast-changing grocery retail industry while developing relevant business, technical and leadership skills geared towards enhancing your career. This paid Co-op experience is an opportunity to help drive business results in an environment designed to promote and reward diversity, innovation and leadership. Our mission is to create impactful early talent programs that provide cohorts with meaningful project work, learning and development sessions, and mentorship opportunities.
Applicants must be currently enrolled in a bachelor's or master's degree program. Applicants must be currently authorized to work in the United States on a full-time basis and be available from July 13, 2026 through December 4, 2026. We have a hybrid work environment that requires a minimum of three days a week in the office. Please submit your resume including your cumulative GPA. Transcripts may be requested at a future date.
* Approximate 6-month Co-op session with competitive pay
* Impactful project work to develop your skills/knowledge
* Career assistance & mentoring in obtaining full time positions within ADUSA
* Leadership speaker sessions and development activities
* One-on-one mentoring in your area of interest
* Involvement in group community service events
* Networking and professional engagement opportunities
* Access to online career development tools and resources
* Opportunity to present project work to company leaders and gain executive visibility
Department/Position Description:
The Cybersecurity team is responsible for protecting our organization's systems, and data from internal and external threats. The team monitors network activity, manages security tools, responds to incidents, and ensures compliance with regulatory standards. We also implement proactive measures such as vulnerability assessments, threat intelligence, and employee training to reduce risk and maintain a strong security posture across the enterprise. The Co-op will support the Infrastructure Services team by assisting with day-to-day operations, documentation, and project-related tasks. During their session, they will gain hands-on experience with enterprise systems, collaborate across departments, and develop a deeper understanding of IT service delivery in a large-scale environment.
Qualifications:
* Currently pursuing a degree in Cybersecurity, Information Technology, Computer Science, or a related field.
* Familiarity with basic cybersecurity concepts such as threat detection, network security, and vulnerability management through coursework or labs.
* Exposure to tools or platforms like Wireshark, Splunk, or basic scripting for security automation is a plus.
* Strong attention to detail and analytical thinking, especially when reviewing logs or identifying anomalies.
* Excellent communication skills and a collaborative mindset, with a willingness to learn in a fast-paced, security-focused environment.
Individual cohort pay rates vary based on location, academic year, and position.
ME/NC/PA/SC Salary Range: $20.90 - $35.70
IL/MA/MD Salary Range: $22.80 - $37.30
#LI-DNI
At Ahold Delhaize USA, we provide services to one of the largest portfolios of grocery companies in the nation, and we're actively seeking top talent.
Our team shares a common motivation to drive change, take ownership and enable our brands to better care for their customers. We thrive on supporting great local grocery brands and their strategies.
Our associates are the heartbeat of our organization. We are committed to offering a welcoming work environment where all associates can succeed and thrive. Guided by our values of courage, care, teamwork, integrity (and even a little humor), we are dedicated to being a great place to work.
We believe in collaboration, curiosity, and continuous learning in all that we think, create and do. While building a culture where personal and professional growth are just as important as business growth, we invest in our people, empowering them to learn, grow and deliver at all levels of the business.
Information Security Specialist (US) - Crisis Management
Information security analyst job in Charlotte, NC
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications :
* Ability to coordinate with various incidents teams to manage crisis and provide updates to leadership
* Lead and manage incident response and coordination
* Previous Incident Management & Crisis Management Experience in Financial Services industry
* Detail-oriented with the ability to determine appropriate steps for timely escalation and/or resolution.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyCyber Security Analyst Lead
Information security analyst job in Charlotte, NC
Date Opened: Tuesday, December 02, 2025 12:00 AMClose Date: Tuesday, December 16, 2025 12:00 AMDepartment: Innovation and Technology DepartmentSalary: $122,936.00 - $153,669.00 Commensurate with Experience
Welcome to the City of Charlotte
Charlotte is America's Queen City, opening her arms to a diverse and inclusive community of residents, businesses and visitors alike. Here you will find a safe, family-oriented city where people work together to help everyone thrive. The mission of the City of Charlotte is to deliver quality public services and promote the safety, health, and quality of life for all residents.
Our guiding principles include:
Attracting and retaining a skilled and diverse workforce
Valuing teamwork, openness, accountability, productivity, and employee development
Providing all customers with courteous, responsive, accessible, and seamless quality services
Taking initiative to identify, analyze, and solve problems
Collaborating with stakeholders to make informed decisions
SUMMARY
Responsible for protecting information systems by researching and maintaining awareness of the latest cyber threats and vulnerabilities, identifying mitigating controls and advising on corrective actions. This position will work with all City technology teams to ensure that necessary technical security requirements are met. As a member of the Innovation and Technology Cyber Security team, this individual will focus on leading operational-related security initiatives to support technology infrastructure, and/or enterprise applications and services while also facilitating the use of technology to ward off attempts by attackers who are targeting sensitive consumer and corporate information. This individual will lead efforts to automate cyber security processes and plan, develop, and coordinate cyber security projects as needed.
ESSENTIAL DUTIES & RESPONSIBILITIES
Lead and execute security tasks related to technology projects or initiatives.
Configure and install cyber security systems to include scheduling and attendance of afterhours maintenance windows.
Lead validation cyber security architectures and documentation.
Conduct maintenance and monitoring of cyber security systems.
Provide leadership in response to cyber security incidents.
Develop remediation plans for any gaps reported in audits or recommended process improvements.
Lead collaboration with City departments to manage security vulnerabilities or investigations.
Conduct security research in keeping abreast of latest security issues.
Lead the coordination of managed security services to implement security initiatives.
Lead and execute security tasks related to Innovation and Technology security requests.
Provide advanced leadership in evaluation and implementation of cyber security requirements for technology systems.
Lead the development of scripts and software to automate cyber security processes.
Must be able to work efficiently, expeditiously, and independently with limited supervision.
Perform other related duties as assigned.
COMPETENCIES FOR SUCCESSFUL PERFORMANCE OF JOB DUTIES
Knowledge of:
English grammar, spelling, and punctuation.
Extensive experience with combining AI and ML models with broader system architectures, including cloud-based infrastructure, software applications, and APIs.
Extensive experience with cloud security concepts, including the ability to assess existing cloud implementations for security issues, engineering and implementing new cloud security tools, and providing security expertise for DevOps teams.
Extensive experience with Splunk Enterprise Security, including Search and Reporting, adding new log sources, developing custom parsing rules, administrating forwarders, and deployment servers.
Extensive experience with basic red team tools such as Nmap, Nessus, Metasploit, or other related tools.
Extensive experience with red team and penetration testing processes.
Extensive experience with Security Information and Event Management (SIEM) technologies, including building, administering, operating, and tuning such systems.
Extensive experience with endpoint hardening techniques, including security controls implemented locally and via policy management systems.
Extensive experience with endpoint protection and endpoint detection and response (EDR) systems, including building, administering, operating, and tuning such systems.
Extensive experience with web application security concepts and flaws, including an understanding of how to detect and exploit the most common security flaws found in web applications.
Extensive experience with risk-based, technical assessments of applications using both dynamic and static scanning tools, as well as manual assessment and penetration testing techniques.
Extensive experience with IT system security review processes, including threat modeling, and other risk identification techniques.
Extensive experience with IT system auditing processes for compliance with applicable policies, standards, and regulations.
Extensive experience with privileged access management and password management systems, including building, administering, operating, and tuning such systems.
Extensive experience with information security policy and process development, including the ability to clearly document policies and processes.
Extensive experience with security product evaluation, including requirements development and proof of concept execution.
Extensive experience with project management concepts, including the ability to coordinate and execute IT security projects.
Extensive experience with secure system architecture development, including evaluation of system architectures for security threats, advising IT project teams on necessary security measures, and diagraming architectures.
Extensive experience with system administration, including management of a system's hardware and software, performing routine maintenance, troubleshooting problems, and management of a system's full lifecycle.
Skill in:
Strong analytical and problem-solving skills to tackle complex, multi-layered challenges.
Interpersonal skills necessary to develop and maintain effective and appropriate working relationships.
Excellent communication and interpersonal skills.
Able to communicate technical subject matter to an audience with limited technology background.
Cross-platform skillsets, able to navigate and troubleshoot issues in any modern operating system (Linux, MacOS, Windows).
Developing automated processes utilizing a Security Orchestration, Automation and Response (SOAR) platform such as Splunk.
PowerShell and Python scripting languages.
Applying modern cryptography best practices and certificate management.
Identifying, analyzing, and evaluating cybersecurity threats and applying software controls to mitigate those risks.
Requirements:
High School Graduate or Equivalent and nine (9) years of related work experience
OR
2 Year College Degree and seven (7) years of related work experience
OR
Bachelor's Level Degree and five (5) year of related work experience
OR
Master's Level Degree and three (3) year of related work experience or an equivalent combination of education and relevant experience that provides the necessary knowledge, skills, and abilities to successfully perform the essential job duties.
Must be located in or near Charlotte, NC.
Must work in office at minimum two days a week. Subject to change due to business needs.
CONDITIONS OF EMPLOYMENT
The City's Background Check Policy requires background checks to be conducted on final internal or external candidate(s) applying for any position with the City of Charlotte. The type of information that will be collected as part of a background check includes, but is not limited to: reference checks, social security verification, education verification, criminal conviction record check, and, if applicable, a credit history check, sex offender registry and motor vehicle records check.
Background checks must be in compliance with all federal and state statutes, such as the Fair Credit Reporting Act (FCRA). The checks must be consistent with the guidelines set forth by these laws requiring organizations to obtain a candidate's written authorization before obtaining a criminal background report, motor vehicle records check or credit report; and to properly store and dispose of information derived from such reports.
Final candidates must pass a pre-employment drug-screening test and physical examination. During the selection process, candidates may be asked to take a skills test, and/or participate in other assessments.
The City of Charlotte is an Equal Opportunity Employer and does not unlawfully discriminate on the basis of race, religion, color, sex, national origin, marital status, age, disability, sexual orientation, political affiliation or on the basis of actual or perceived gender as expressed through dress, appearance, or behavior.
Our culture is to serve the community honorably.
HOW TO APPLY
Apply online.
Federal law requires employers to provide reasonable accommodations to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job.
You are welcome to visit the City of Charlotte Human Resources Department lobby, where self-service application kiosks are available. They are located in our office at 700 East 4th Street, Suite 200, Charlotte, NC 28202. We are open Monday through Friday, from 9:30 a.m. to 3:30 p.m. (EST), excluding official City holidays.
For questions about your application or the hiring process, please email **************************.
The City of Charlotte is committed to making our services and programs accessible to all. Upon request, auxiliary aids, written materials in alternate formats, language access, and other reasonable accommodations or modifications will be provided. To make a request, please fill out the Innovation & Technology ADA request form or call ************.
BENEFITS
The City of Charlotte provides a comprehensive benefits package to eligible employees.
Click here to learn more about the City of Charlotte's benefits.
The City of Charlotte is a drug and alcohol-free workplace.
Auto-ApplyStratascale Associate Security Analyst - Operations
Information security analyst job in Charlotte, NC
About UsAs a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.Job Description SummaryThe Stratascale Associate Security Analyst - Operations manages and enhances the SIEM environment, performs in-depth security analysis, and supports incident handling to mitigate threats. This role involves collaborating with clients and internal teams to address security concerns, participating in threat hunting, providing training on best practices, and supporting automation and process improvement projects to enhance security operations and client success.
This position will report to the Charlotte, NC office on a hybrid schedule.
Role Description
• Manage and enhance the Security Information and Event Management (SIEM) environment, including log collection, aggregation, and infrastructure support.
• Perform in-depth analysis of security alerts and incidents, utilizing SIEM and SOAR technologies to identify and mitigate threats.
• Support the incident handling process across various platforms, ensuring timely investigation, escalation, and remediation of security incidents.
• Assist in maintaining an inventory of information assets and support scheduled security testing and risk management processes.
• Collaborate with clients and internal teams to address security program concerns and provide actionable recommendations.
• Provide coaching and training to team members and clients on security best practices and incident response strategies.
• Identify and address gaps in client environments, data ingestion, and configurations to improve security alert quality.
• Participate in threat hunting activities and stay informed about emerging cybersecurity threats and mitigation techniques.
• Develop and communicate high-quality reports and recommendations to stakeholders, ensuring clear understanding and resolution of security issues.
• Support projects aimed at automation and process improvements to enhance security operations and client success.
Behaviors and Competencies
Problem-Solving: Can identify problems, propose solutions, and take action to resolve them without explicit instructions.
Data Analysis: Can identify patterns and trends in data, propose hypotheses, and use statistical techniques to test them.
Self-Motivation: Can identify personal or professional growth opportunities, propose self-improvement strategies, and take action without explicit instructions.
Collaboration: Can actively participate in team discussions, respect differing opinions, and collaborate with others to achieve common goals.
Communication: Can effectively communicate complex ideas and information, and can adapt communication style to the audience.
Training: Can identify learning gaps within a team, propose training solutions, and take action to implement them without explicit instructions.
Initiative: Can identify opportunities for improvement, propose solutions, and take action without explicit instructions.
Detail-Oriented: Can identify errors or inconsistencies in work and make necessary corrections.
Organization: Can prioritize daily tasks, manage personal workflow, and utilize basic tools to keep track of responsibilities.
Follow-Up: Can independently track and follow up on tasks without requiring reminders, ensuring responsibilities are fulfilled.
Skill Level Requirements
• The ability to understand and implement best practices and measures for system security to protect organizational data and infrastructure - Intermediate
• Proficiency in working with and understanding security solutions from leading vendors such as Okta, Crowdstrike, Palo Alto, Proofpoint, CyberArk, SailPoint, Fastly, FireEye, and Fortinet - Intermediate
• Proficiency in configuring and managing Windows Server and Linux operating systems
• Ability to create clear and effective technical documentation - Intermediate
• Ability to simplify and effectively communicate complex problems to stakeholders across various functions and levels - Intermediate
• Experience in managing and maintaining computer systems and networks to ensure optimal performance and security - Intermediate
• Experience in understanding, managing, and correlating log data for effective security monitoring and analysis - Intermediate
Other Requirements
• 2-4 years of experience in Information Technology
• 2-4 years of experience in cybersecurity
• 2-4 years of experience in alert management
• Ability to travel to SHI, Partner, and Customer Events
• Ability to travel internationally
• Ability to travel 20%
• Advanced certification such as the following preferred:
o Industry certifications:
CIAM
CISM / CISA / CRISC
SANS (GSEC, GREM, GCIH)
TCM (PJMR)
o Vendor Solutions and product specific certifications or experience (or equivalent):
Microsoft Sentinel or Splunk
Sentinel One/Tanium
MSSP/MDR security engineering experience.
The estimated annual pay range for this position is $60,000 - $90,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Auto-ApplyCyber Security Engineer
Information security analyst job in Charlotte, NC
Cyber Security Engineer Job Description: The Cyber Security Engineer is responsible for second level security event/incident response along with the collection, analysis, and dissemination of cyber threat intelligence. These capabilities will include timely collection of advanced warning of impeding IT vulnerabilities or threats, a thorough correlation, analysis, and storage of threat intelligence information, and operational support of the incident response process. The candidate They will deliver and sustain the enterprise management strategy and solutions from a governance, process, discipline and technology standpoint, to support enterprise environments and our presence in various cloud instances and on-premises data centers covering threats / FIM / configuration management / incident response / vulnerability management. Secondary roles include IPS, EDR, TIP tools, and other information security solutions.
Essential Functions of the Job:
Responding to SOC alerts performing an analysis, and containment of security events.
Provide tier II support for escalated security incidents.
Support the Cyber Incident Response Team (CIRT) in the effective detection, analysis, and containment of attacks.
Operate the configuration management program to track configuration drift over time, working with asset custodians to correct any configuration deviation from baseline.
Operate the File Integrity Management program to track changes to file systems on critical systems.
Operate the processes necessary to collect threat intelligence, analyze the data for patterns and actionable information, and create intelligence products for other teams to consume using MITRE ATT&CK Framework.
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents.
Integrate appropriate systems and logs into the global threat management platform or Security Event and Incident Management system to properly protect critical assets.
Design, test and develop specific content and alerting to identify threats against critical assets.
Document incident response playbooks for new threat content and alerts.
Maintain an understanding of attacks, vectors and emergent threats.
Obtain and share cyber security intelligence with security partners, vendors and law enforcement as necessary.
Produce weekly and monthly operational metrics.
Work with vendors and internal customers to respond to escalations.
Recommends Preventative Security Actions.
Recommends Corrective Security Actions.
Knowledge and Skills Requirements:
Three-year minimum working in cyber threat or information security.
Vulnerability Scanning & Assessment: Perform vulnerability scans using tools like Tenable Nessus, analyze results, and prioritize findings for remediation.
Configuration Assessment: Evaluate system configurations against industry standards (e.g., CIS benchmarks) and ensure compliance.
File Integrity Monitoring (FIM): Implement and maintain FIM solutions, analyze file changes, and investigate suspicious activities.
Familiar with compliance regulations such as SOX, PCI-DSS, GLBA, and Federal Banking regulations.
Proficient with cloud security and monitoring capabilities in Azure
Proficient with Incident Response in Azure
Proficient with configuration management scanning tools.
Knowledgeable with Tripwire or other file integrity management tools.
Excellent team skills and integrity in a professional environment.
Ability to Map threats and vulnerabilities to MITRE.
Familiar with STRIDE.
Familiar with the Open Systems Interconnection (OSI) model.
Understanding of security technologies: IDS/IPS, firewalls, AV, proxies, EDR.
Understanding of scripting languages like JavaScript, Perl, etc.
Understanding of cloud configuration and vulnerability scanning tools.
CISSP, GSEC, GCIH, CEH or other security certifications preferred, but not required.
Powered by JazzHR
TgYUGCicn0
Windows Security Engineer - Rapid7 Expert for America's largest recycler
Information security analyst job in Charlotte, NC
The Talent Mine is recruiting for a Windows Security Engineer with strong Rapid7 skills for an immediate FTE role in the Charlotte area. This is for the nation's #1 recycler of any product, and a company with unmatched job security and stable growth.
This is for an immediate FTE role in the Charlotte, Dallas and Cincinnati ares (At work 3-4 days/week, home 1-2 days/week)
If you are the kind of engineer that wants to be a part of the circular economy, enjoys hardening systems from an application and infrastructure standpoint, and has a growth, team first mindset, read on!
Overview:
In this role you will monitor endpoint and end user security and respond to alerts generated within our client's tools and from their MSSP SOC. You will work with operations and infrastructure teams to coordinate response to teammates. You will also work within the security team and with operations teams to support our vulnerability management tools and processes. All members of the security team participate in incident response and on-call rotation providing coverage after hours and on weekends. This role will require some travel as needed.
Safety is the most important part of all jobs with our client. Candidates must be able to demonstrate the ability to initiate, lead, and uphold safety policies, practices, procedures, and housekeeping standards at all times.
The best candidates should have most of the following credentials:
3+ years of professional experience with endpoint management and security tools (Microsoft InTune, Defender for Endpoint, Defender for Servers, and Carbon Black App Control)
Experience with SIEM tools (Microsoft Sentinel, Splunk, or similar)
Experience with open-source tools particularly as applied to cybersecurity incident response.
Strong with vulnerability management tools (Rapid 7 InsightVM, QualysGuard, Nessus)
Knowledge of common cyber threats, attack methods, defense practices, and interest in continuously learning in these areas.
Professional experience with endpoint management and security tools (Microsoft InTune, Defender for Endpoint, Defender for Servers, and Carbon Black App Control)
COMPENSATION
NOTE: A nice Re-location package IS available!
TOTAL COMPENSATION =
$128,000- $168,000
, broken down as follows
:
Base salary range -
$100,000 - $120,000
Annual bonus of 28-32% over the past 5 years!
Educational assistance (up to $10K per year for you and your family members)
Other Benefits:
Medical and dental
Scholarship and tuition reimbursement
Hybrid work schedule
If you feel qualified and interested in this immediate FTE role, let's chat! The team at the Talent Mine has a stellar track record of placing very successful security engineers with this client, and knows all the nuances of this role to help you successfully interview prep and land this exciting role. Leverage our 17+ years of tech recruiting success to your advantage, and let's chat today!
Application Security Engineer
Information security analyst job in Charlotte, NC
As a leading provider of insurance and reinsurance with worldwide operations and employees in Bermuda, U.S., U.K., Continental Europe and Asia, we recognize that our success is derived directly from those who matter the most: our people. At Sompo International, our values of integrity, collaboration, agility, execution and excellence underpin our culture and our commitment to providing an employee experience that attracts and engages the best talent in the industry. As we continue to grow, we strive to find diverse, innovative and driven professionals to join our teams and offer a broad range of career and development opportunities at all levels, in multiple business areas, in each of our locations throughout the world. Our compensation and benefits programs are market driven and competitive, with excellent family friendly policies and flexible working provisions.
Job Description
Are you looking for your next opportunity?
Sompo has a unique opportunity for an Application Security Engineer in our Information Security team.
Location: This position will be based out of one of our US locations preferably the NYC / Purchase, NY / Garden City, NY / Morristown, NJ / Boston, MA / Conshohocken, PA or Charlotte, NC office. We strive for collaboration which is why we offer a work environment where our employees thrive and develop long lasting careers.
Our business, your impact, our opportunity:
What you'll be doing:
* Develop and implement application-focused security controls during all phases of Sompo's Secure Software Development Lifecycle and production operations.
* Collaborate, as needed, with development teams to enhance their secure coding practices, application design patterns, and technology selection.
* Maintain a strong familiarity with:
* Sompo's full stack of security technologies and common application architectures
regulatory requirements for security and privacy technologies.
* The various Sompo teams who are non-technical subject matter experts on those regulations.
* Industry-standard approaches for aligning development, operations, and security.
* Be responsible for continuously improving our suite of troubleshooting documents, SOPs, and support tools so that the IT support teams can self-resolve/diagnose application-level issues related to security incidents and/or controls.
* Application security review (development lifecycle, technology selection)
* Application security testing and instrumentation (production operations)
* Support of security tooling and automation
What you'll bring:
* Minimum of 5 years of experience in information security.
* Systematic thinking - the ability to take a complex sequence of events and isolate the critical/relevant stages.
* Excellent interpersonal skills - the ability to engage with both end users and IT colleagues to understand a problem and determine fact patterns, measurable requirements, and success criteria.
* Strong understanding of:
* HTTP, HTML, REST, SOAP, JSON, XML, YAML, and other data formats, web authentication patterns, especially SAML and OAuth, TLS/X509, and cookies, DNS, TCP/IP, and related tools (e.g., interpreting packet captures), Encryption at rest and in flight.
* Development and direct work experience with:
* Languages for automation, especially Python and Powershell, Query tools.
* Excel for ad-hoc analysis. Must be comfortable aggregating disparate sets of logs and other data for unified analysis.
* Packet captures for low level network troubleshooting
* Application development building blocks, Web application security components
* Native security controls in the Microsoft stack (OS, Office, Edge)
* Ability to write ad hoc queries using one or more of the following:
* Splunk, Powershell, Regular expressions, SQL, XPATH
* Ability to write practical audience-relevant documentation related to troubleshooting.
* B.S. in Computer Science or Software Engineering
Salary Range: $115,000 - $165,000 Actual compensation for this role will depend on several factors including the cost of living associated with your work location, your qualifications, skills, competencies, and relevant experience.
At Sompo, we recognize that the talent, skills, and commitment of our employees drive our success. This is why we offer competitive, high-quality compensation and benefit programs to eligible employees.
Our compensation program is built on a foundation that promotes a pay-for-performance culture, resulting in higher incentive awards, on average, when the Company does well and lower incentive awards when the Company underperforms. The total compensation opportunity for all regular, full-time employees is a combination of base salary and incentives that gets adjusted upfront based on overall Company performance with final awards based on individual performance.
We continuously evaluate and update our benefit programs to ensure that our plans remain competitive and meet the needs of our employees and their dependents. Below is a summary of our current comprehensive U.S. benefit programs:
* Two medical plans to choose from, including a Traditional PPO & a Consumer Driven Health Plan with a Health Savings account providing a competitive employer contribution
* Pharmacy benefits with mail order options
* Dental benefits including orthodontia benefits for adults and children
* Vision benefits
* Health Care & Dependent Care Flexible Spending Accounts
* Company-paid Life & AD&D benefits, including the option to purchase Supplemental life coverage for employee, spouse & children
* Company-paid Disability benefits with very competitive salary continuation payments
* 401(k) Retirement Savings Plan with competitive employer contributions
* Competitive paid-time-off programs, including company-paid holidays
* Competitive Parental Leave Benefits & Adoption Assistance program
* Employee Assistance Program
* Tax-Free Commuter Benefit
* Tuition Reimbursement & Professional Qualification benefits
In today's world, what do we stand for?
Ethics and integrity are the foundation of delivering on our commitment to you. We believe that core values drive success, and that when relationships are held in the highest regard, there is nothing that cannot be accomplished. At Sompo, our ring is more than a logo, it is a symbol of our promise. Click here to learn more about life at Sompo.
Sompo is an equal opportunity employer and we intentionally value inclusion and diversity. Above all, we want you to work in an environment that respects everyone's unique contributions - we are passionately committed to equal opportunities. We do not discriminate based on race, color, religion, sex orientation, national origin, or age.
Auto-ApplyIT Data Security Engineer
Information security analyst job in Charlotte, NC
Click here to experience a Day in the Life of our Teammates! Uncap Your Potential at America's Largest Coca-Cola Bottler - Pour Your Passion into Purpose! We're more than beverages-we're building meaningful careers and vibrant communities. Join our team where your talent meets purpose, and every teammate directly shapes our success.
* Career Growth: Clear pathways to advance and develop your career
* Competitive Benefits: 401(k) match + health coverage + employee stock purchase plan
* Purpose-Driven: Create meaningful impact in the communities you serve
* Professional Development: Dedicated training + personalized mentorship
Join us - your refreshing new chapter starts here!
Job Overview
The IT Cyber Security Engineer - Data serves as a leader to develop and implement strategies, best practices, and education programs to safeguard company data, computer assets, networks, and information from cyber threats. Cyber strategies will also be engineered to be compliant with all government regulations. Typical responsibilities include continual assessment of existing strategies, assessments of new technologies, and recommendations of new strategies, and execution of projects to mitigate security gaps. The role will also mentor cyber analysts and internal IT development teams. Evaluate controls to make sure they are still solid, strategies; more senior-level role.
Duties & Responsibilities
* Develops and enforces data security strategies and controls to ensure the confidentiality, integrity, and availability of sensitive information across all systems and platforms, including structured and unstructured data repositories.
* Monitors the health of existing cyber controls, assesses gaps, and recommends improvements to policies and strategies, including risk and cost assessments
* Performs product evaluations as necessary
* Designs user training programs and communication strategies
* Designs and coordinates implementation on cyber security projects to achieve desired risk mitigation results
* Conducts penetration testing, simulating an attack on the system to find exploitable weaknesses, and monitors networks and systems for security breaches
* Coordinates closely on any other additional CAAS testing projects- SOX, PIAA, and PCI
* Works cross-functionally with vendors internally and externally
* Develops strategies to respond to and recover from a security breach, leads incident response, including steps to minimize the impact, and then conducting a technical and forensic investigation
* Develops and maintains security architecture standards and best practices in the development of new solutions and onboarding of new vendor solutions
* Mentors IT development teams on security best practice
Knowledge, Skills, & Abilities
* 2 to 5 years of cyber security engineering experience
* Experience must include familiarity with applicable NIST information security documentation
* Proven ability to design and implement data security controls and encryption strategies to protect sensitive information across databases, cloud environments, and enterprise applications.
* 1+ years of this functional experience must have included securing and evaluating information management systems, security design
* 3+ years of working experience in the following:
* Hands-on experience identifying, exploiting, and remediating Network and Application based attacks
* Network auditing and monitoring, including SIEM experience
* Active Directory
* Cloud security (AWS, Azure)
* Experience recommending, communicating, and tracking remediation of IT Threats
Minimum Qualifications
* 2 years of education beyond high school in college or technical school
* Knowledge acquired through 5 to up to 7 years of work experience
* At least five years of experience in the IT field
* Certification Requirements: Preferably one of the following security-related certifications:
* CISA - Certified Information Systems Auditor (CISA)
* CEH - Certified Ethical Hacker (CEH)
* ISSAP - Information Systems Security Architecture Professional (ISSAP)
* ISSEP - Information Systems Security Engineering Professional (ISSEP)
Preferred Qualifications
* A two year degree or equivalent experience (Associates)
* Four year degree (Bachelors)
Work Environment
Office Environment
4 days in office, 1 day remote
South Park, Charlotte
#LI-AF1
Equal Opportunity Employer - All qualified applicants will be considered for employment without regard to disability, protected veteran status, or any other characteristic protected by applicable law.
Nearest Major Market: Charlotte
Information Security Manager
Information security analyst job in Cornelius, NC
Job Description
FLSA Status: Exempt Immediate Supervisor: CISO Date Revised: February 18, 2025 The Information Security Manager is a hands-on/ working manager position that defines, implements and monitors security policy for on-prem, cloud, and remote access deployments. The primary duty of the job is to maintain a security posture that allows the business to thrive while preventing a security breach. The IS Manager hires, retains, and trains an IS Engineer to assist with day-to-day duties. The IS team maintains on-premises firewall rules and active directory as well as overseeing vulnerability management. In the cloud, the IS Manager is responsible for designing security measures, and the IS team is responsible for their implementation and monitoring. The IS team also designs, implements, and maintains a remote access VPN for associates when working outside the corporate offices.
Essential Functions:
Demonstrate an understanding of all applications deployed, and data stored within the enterprise.
Demonstrate an understanding of security measures that are in place and their role in securing the enterprise.
Assess the threat of zero-day vulnerabilities and third-party risk to the enterprise. Take action to remediate such vulnerabilities. Effectively report status to executive management in terms of the threat level and associated risk.
Assess risks related to general threat landscape. Identify, design and implement controls to mitigate those threats and prevent security breaches.
Measure, monitor, and report on vulnerabilities that have been identified within the enterprise.
Maintain on-premises firewall rules; maintain cloud security settings and restrictions; maintain remote access rules and restrictions.
Identify new security related vendors as needed and assist in evaluating new and existing vendors from a security perspective.
Participate and communicate effectively in external audits, third-party vulnerability scans, and regulatory examinations.
Maintain, comply with, and develop Infovisa's policies, procedures, and strategies to provide a safe and efficient environment for Infovisa software to run and associates to work.
Liaison with IT-ISAC, InfraGard, and other industry groups.
Manage projects and create detailed technical documentation.
Hire, train, mentor and manage associates on the security team.
Qualifications:
10 years of information security experience required.
Three years of management experience.
Displays strong technical aptitude with IT Security, VPN, Endpoint Detection and Response, IIS, networking concepts and technologies, and other third-party and internally developed tools and technologies.
Prefer familiarity with Check Point technologies.
Prefer one or more applicable network security certifications.
Valid driver's license.
Four-year degree in information technology / systems, or computer science.
Preferred Talents:
Analytical and detailed.
Effective communicator technically, in the board room, and with customers and coworkers.
Organized.
Independent with good judgment.
Proven ability to multitask and prioritize projects.
Self-directed and takes initiative.
Working Environment:
Mostly indoor work with occasional exposure to outdoor elements or hazards.
Medium workload - lifting and/or carrying up to 20 pounds frequently and exerting up to 75 pounds of force occasionally.
Some travel required.
Weekend, evening and on-call.
About Infovisa
Infovisa is a leading provider of financial technology solutions delivered to forward-thinking trust, wealth management, and retirement professionals. Infovisa's solutions empower its clients to acquire new customers, invest assets effectively, manage trust and investment portfolios efficiently, and flexibly report results to customers. For more information about Infovisa, visit ***************** Follow us on LinkedIn.
We are interested in every qualified candidate who is lawfully eligible to work in the United States. However, we are unable to sponsor visas.
Infovisa, Inc. is an Equal Opportunity Employer.
Powered by JazzHR
RoeJ7o0DcN
Information Security Manager
Information security analyst job in Cornelius, NC
FLSA Status: Exempt Immediate Supervisor: CISO Date Revised: February 18, 2025 The Information Security Manager is a hands-on/ working manager position that defines, implements and monitors security policy for on-prem, cloud, and remote access deployments. The primary duty of the job is to maintain a security posture that allows the business to thrive while preventing a security breach. The IS Manager hires, retains, and trains an IS Engineer to assist with day-to-day duties. The IS team maintains on-premises firewall rules and active directory as well as overseeing vulnerability management. In the cloud, the IS Manager is responsible for designing security measures, and the IS team is responsible for their implementation and monitoring. The IS team also designs, implements, and maintains a remote access VPN for associates when working outside the corporate offices.
Essential Functions:
Demonstrate an understanding of all applications deployed, and data stored within the enterprise.
Demonstrate an understanding of security measures that are in place and their role in securing the enterprise.
Assess the threat of zero-day vulnerabilities and third-party risk to the enterprise. Take action to remediate such vulnerabilities. Effectively report status to executive management in terms of the threat level and associated risk.
Assess risks related to general threat landscape. Identify, design and implement controls to mitigate those threats and prevent security breaches.
Measure, monitor, and report on vulnerabilities that have been identified within the enterprise.
Maintain on-premises firewall rules; maintain cloud security settings and restrictions; maintain remote access rules and restrictions.
Identify new security related vendors as needed and assist in evaluating new and existing vendors from a security perspective.
Participate and communicate effectively in external audits, third-party vulnerability scans, and regulatory examinations.
Maintain, comply with, and develop Infovisa's policies, procedures, and strategies to provide a safe and efficient environment for Infovisa software to run and associates to work.
Liaison with IT-ISAC, InfraGard, and other industry groups.
Manage projects and create detailed technical documentation.
Hire, train, mentor and manage associates on the security team.
Qualifications:
10 years of information security experience required.
Three years of management experience.
Displays strong technical aptitude with IT Security, VPN, Endpoint Detection and Response, IIS, networking concepts and technologies, and other third-party and internally developed tools and technologies.
Prefer familiarity with Check Point technologies.
Prefer one or more applicable network security certifications.
Valid driver's license.
Four-year degree in information technology / systems, or computer science.
Preferred Talents:
Analytical and detailed.
Effective communicator technically, in the board room, and with customers and coworkers.
Organized.
Independent with good judgment.
Proven ability to multitask and prioritize projects.
Self-directed and takes initiative.
Working Environment:
Mostly indoor work with occasional exposure to outdoor elements or hazards.
Medium workload - lifting and/or carrying up to 20 pounds frequently and exerting up to 75 pounds of force occasionally.
Some travel required.
Weekend, evening and on-call.
About Infovisa
Infovisa is a leading provider of financial technology solutions delivered to forward-thinking trust, wealth management, and retirement professionals. Infovisa's solutions empower its clients to acquire new customers, invest assets effectively, manage trust and investment portfolios efficiently, and flexibly report results to customers. For more information about Infovisa, visit ***************** Follow us on LinkedIn.
We are interested in every qualified candidate who is lawfully eligible to work in the United States. However, we are unable to sponsor visas.
Infovisa, Inc. is an Equal Opportunity Employer.
Auto-Apply