Information Security/Privacy Analyst
Information security analyst job in Robins Air Force Base, GA
Responsibilities
Peraton is seeking an Information Security/Privacy Analyst for its' Product Data Systems Support program within our Cyber Mission Sector.
Location: Robins Air Force Base, GA. This is a full-time on-site role.
In this role, you will:
Ensure that security policies, procedures, and directives of the National Industrial Security Program Operating Manual NISPOM manuals are followed.
Maintain oversight and compliance of existing information systems through technical reviews and system auditing.
Interface with program management and customers on security requirements implementation, required documentation, and classification management.
Provide information systems security guidance awareness and training and participates in customer security inspections and reviews.
Manage, develop, prepare, implement, and maintain security plans, standard operating procedures (SOPs), security tests, and evaluation plans.
Collaborate with internal security and IT staff to ensure the continued compliance and secure operation of accredited information systems.
Keep abreast of industry best practices and trends, as well as new technologies, and then plans and advises for implementation.
Manage 3 A&A packages utilizing eMASS for system approval.
Submit POA&Ms for TCNO, STIG, or other system deficiencies.
Coordinate with systems administrators, developers, and other team members for issue resolution, coordination or clarification.
Review change requests for system security impacts.
Review System Access Requests for the systems administered by the organization.
Revalidate email organizational accounts.
Create and modify security group requests, adding and removing users to groups.
Answer cyber related security questions from team members within organization.
Ensure compliance with DoD/AF instructions, directives, EOs and other regulations.
Qualifications
Required:
Bachelor's degree with a minimum of 5 years of relevant experience, Master's degree with 3+ years of relevant experience, Associate's degree with an minimum of 7 years of relevant experience, or 9 years of relevant experience in lieu of a degree.
Familiarity with Risk Management Framework (RMF) and NIST SP 800-53 controls.
Experience in analysis of security plans and policies.
Demonstrated ability to be self-motivated, self-supervisory, and results oriented.
Demonstrated organizational skills and strong verbal/written communication skills.
The ability to obtain/maintain Security+ certification within 6 weeks of hire date.
The ability to obtain a Common Access Card (CAC).
U.S. citizenship required.
The ability to obtain a DoD level Secret security clearance.
Preferred:
General experience with DoD networks.
Current Security+ certification.
Current CISM, CIPA, CISSP professional certification.
An active DoD level Secret security clearance.
Experience with Enterprise Mission Assurance Support Service (eMASS).
Benefits:
At Peraton, our benefits are designed to help keep you at your best beyond the work you do with us daily. We're fully committed to the growth of our employees. From fully comprehensive medical plans to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Auto-ApplyCyber Security Analyst
Information security analyst job in Atlanta, GA
A Southern Company Security Analyst participates in monitoring, hunting and responding to cyber security events. He or She, provides a front-line role during cyber security incidents, identifying the extent of the threat, business impacts and advising or sometimes performing the most suitable course of action to contain, eradicate and remediate an incident. A Southern Company Security Analyst maintains a good knowledge of the threat landscape, helps enhance visibility and response capabilities by identifying new methods of detecting threats. A Southern Company Security Analyst is proactive and seeks out adversaries determined to negatively impact Southern Companies reputation, financial interest or threatens the safety of our employees and customers.
Candidates are expected to discuss and demonstrate they meet required qualifications for applicable roles.
Responsibilities
Take action on security events presented to Analyst via SIEM, user submissions, dashboards, etc.
Self-initiate hunting initiatives to discover potential breaches or undiscovered cyber threats
Remain abreast of emerging threat patterns and provide recommendations to detect threats
Assists with patching recommendations and workarounds for zero-day threats.
Coordinate mitigation or remediations task with stakeholders or supporting teams
Communicates with management on incident updates.
Monitors SIEM and analyzes security events to determine appropriate actions
Monitors emails containing links/attachments associated with potential phishing attempts to determine appropriate actions
Identify and tune false positives associated with current security events
Document analytical steps and findings associated with security event investigations
Qualifications Required for Cyber Security Analyst
2 years IT security experience
Minimum 2 years of experience in performing analysis on Windows and LINUX/UNIX systems
Minimum 2 years of experience and/or familiarity in the following areas:
Network/Endpoint: analysis tools
Scripting languages
Windows/Unix command line utilities
Reputation analysis associated with IP's, Domains, Email Addresses
Ticketing Systems
Required to submit to a background examination.
Experience operating within a security application such as Kali, Metasploit, and etc.
Familiar with and have worked within Cyber Security Frameworks such as:
NIST 800 - 61
Attack Life Cycle
SANS Security Controls
MITRE
SANS Security 500 Series or other industry standard equivalent
Experience with PCAP analysis
Experience investigating endpoint and network security events
Experience investigating user reported Phishing events (specifically investigating suspicious links and attachments)
Experience analyzing security events utilizing sandbox technology
Experience operating within a security application such as Kali, Metasploit, and etc.
Oral and written communication skills
Experience taking ownership of incidents from acknowledgement to resolution
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Experience initiating security event investigations
Preferred capabilities:
Oral and written communication skills
Ability to take ownership of incidents from acknowledgement to resolution
Ability to initiate security event investigations
Ability to comprehend and articulate business impact associated with security events
Interacting with vendors to support proof of concepts
Proficient in Microsoft Office products: Excel, Word, Outlook and etc.
Exposure, experience and/or knowledge of cloud technology
Familiar with NIST 800-61 and SANS Critical Security Controls
Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies
Desired certifications:
GIAC Security Essentials (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
Security+
Other certifications within IT Security
Characteristics of an Southern Company Cyber Analyst
Self-Motivated - Cyber Analysts do not only act when security tools trigger alerts, we are suspicious by nature and can generate security events based on self-initiated task.
Perseverance - Cyber Analysts identify resources that allow us to move through or around barriers as we analyze cyber security events.
Dependable - Cyber Analysts work within a team environment and thus, we rely on one another for knowledge-sharing and dependence.
Integrity - As Cyber Analysts, our reputation is our code of ethics. We are not perfect. We admit our mistakes. We do the right thing.
Sense of Humor - Although this may vary, just have one; I promise we can work with it. We have a lot of fun in what we do, so you will need a sense of humor to keep up.
This position falls under the company's Insider Threat Program and will have access to, and control over sensitive data, systems or assets. Enhanced personnel screening, which includes a background review, drug screen and psychological assessment, will be required if you are selected for this position
Auto-ApplyJunior Cyber Security Analyst
Information security analyst job in Atlanta, GA
Reliance
Worldwide
Corporation
Auto-ApplyInformation Security Analyst - IV
Information security analyst job in Alpharetta, GA
America Networks is a leading sensor and networking solutions partner for companies in any Industrial, Manufacturing, and Waste management space. We design and manufacture sensors for storage tanks, water metering, energy metering, gas monitoring, and asset management.
Our founders are hardcore telecommunications engineers with combined 200 + years of experience in designing, optimizing and performance engineering; for several mid - large wireless carriers internationally - that saw a need to provide low power, cost efficient sensors to collect data, create alerts, and predict needed actions. We have combined these sensors with low power, wide area (LPWA) networking technologies to provide clients various options to decrease re-occurring costs associated with operating an IoT network of sensors and connected devices.
We specialize in design, deployment, optimization, and support of these Networks. Whether an off-the-shelf or custom solution is needed, we'll create a solution and push the data on the best cloud platform to fit your needs, including your own.
Job Description
The responsibility of this position includes data protection, logging and monitoring for data security of our Big Data and Enterprise Data Warehouse platforms. Tools will be used to classify column level data according to confidentiality categories. This position will also be responsible for development and deployment of advanced data science algorithms to automatically detect and alert data usage anomalies. Encryption, tokenization, data masking, etc. will be applied to data according to confidentiality levels.
• B.S. or equivalent work experience
• 6+ years in related discipline
• Experience with all phases of the Software Development Lifecycle, including system analysis, design, coding, testing, debugging and documentation
• Teamwork & collaboration skills to work across organizations and lead cross-functional teams
• Communication & stakeholder management skills
• Problem solving skills to develop quick yet sound solutions to resolve complex issues
• Programming Language(s): KSH, JAVA
• Software: SHA 256, MD5, SSH, SSL, TLS, Teradata Tools and Utilities (BTEQ, MLoad, FastExport, FastLoad, TPT, TDCH, Query Grid, etc.), Hortonworks Hadoop software (Sqoop, HIVE, HBASE, SPARK, KAFKA, Kyvos, Ranger, Knox, Kerebos, etc.), Informatica software (Secure@Source, TDM, DDM, PowerCenter, BDM, EIC, IDL, IDQ, IIS, etc.), Aster, Tableau, Cognos, Qlik and other BI tools.. AWS cloud security for Hadoop/Teradata and HPE Voltage.
Demonstrated excellent teamwork and also ability to work independently with minimal supervision.
Expert knowledge of the wireless industry and data management activities.
Must have Hadoop and cloud security expertise with usage logging, monitoring, tokenization/encryption, access controls, and analysis.
Additional Information
Vivek Salvatore
vivek.salvatore(@)americanetworks.com
(
*************
Cyber Security Analyst
Information security analyst job in Atlanta, GA
Orange Business is here! About us
Join us at Orange Business! We are a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business.
Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
About the role
Orange Cyberdefense specializes in the design, implementation and support of the most reliable and innovative security solutions and services - we are seeking a SOC Analyst to join our global team for a major account.
As a SOC Analyst you are responsible for the detection, investigation and defense against cyber-attacks. In our SOC, you will work with security experts and use the latest technologies to analyze potential security incidents.
As the team is working based on FTS (follow-the-sun) model involving Brazil, France & Malaysia teams, shift work is required for this role.
Your key responsibilities as a SOC Analyst will include to:
Ensure that customer environments are always protected against cyber-attacks
Triage and investigate alarms generated by SIEM tools, endpoint protection tools, network anomaly detection tools, etc. by performing in-depth analysis
Undertake threat hunting investigations and campaigns
Escalate relevant threats to customers and providing advice based on these threats
Detect anomalies and attack patterns along the entire cyber-kill chain as described by MITRE ATT&CK
Support our customers during a security incident and ensure effective defense against attacks
Continuously develop improvements and detection methods to optimize detections
Report monthly on the status of customer environments
Advice customers on cyber trends.
About you
Cybersecurity needs to be your passion, securing the customers assets your mission. As security is often a tradeoff between different aspects, you need to be pragmatic and result driven to get your message delivered while reducing the risk for the customer.
Excellent English written/verbal and communication skills.
Minimum of 2 years of experience in a similar role
Experience using SIEM and/or EDR/XDR security tools - Knowledge in SPLUNK technology is a plus.
A degree in Computer Science, Cyber Security, Digital Forensics or Engineering - or equivalent industry recognized certification/experience
Ideally have experience with penetration testing, incident detection, incident response and malware analysis
Broad knowledge on threat analysis and experience in intelligence reporting.
Ideally have experience with penetration testing, incident detection, incident response and malware analysis.
Ideally have certifications such as CySA+, CEH, OSCP, OSDA, Splunk Power
Ideally have experience working within a SOC, if not then any experience within an IT Department providing customer support
Experience in reversing malware is a plus
Industry certifications like CISA, CISM, CISSP is a plus
What we offer
• Global Opportunities: Work in multi-national teams with opportunity to collaborate with colleagues and customers from all over the world.
• Flexible Work Environment: Flexible working hours and possibility to combine work from office and home (hybrid ways of working).
• Professional Development: training programs and upskilling/re-skilling opportunities.
• Career Growth: Internal growth and mobility opportunities within Orange.
• Caring and Daring Culture: Health and well-being programs and benefits, diversity & inclusion initiatives, CSR and employee connect events.
• Reward Programs: Employee Referral Program, Change Maker Awards.
Only your skills matter NA
Auto-ApplyLead Analyst, OT Cyber Security
Information security analyst job in Atlanta, GA
Our technology organization is transforming how we work at Smurfit Westrock. We align with our businesses to deliver innovative solutions that: * Address specific business challenges, integrate processes, and create great experiences * Connect our work to shared goals that propel Smurfit Westrock forward in the Digital Age
* Imagine how technology can advance the way we work by using disruptive technology
We are looking for forward thinking technologists that can accelerate our focus areas such as building stronger foundational technology capabilities, reducing complexity, employing digital transformation concepts, and leveraging disruptive technology.
How you will impact Smurfit Westrock:
* Work with mill and plant engineering SMEs and operational staff to design, implement and support the security of ICS networked systems.
* Participate in risk assessments, network design reviews, and security testing for networks, systems, and applications.
* Evaluate new security technology & emerging threats and provide recommendations to strengthen the OT security environment.
* Utilize existing and newly deployed OT security solutions to perform threat assessments, substantiate security incidents, and effectively respond.
* Evaluate available vendor security solutions to determine how they should be deployed in the OT environment.
* Consult on ICS security matters as needed and liaison between operations and corporate IT security teams.
* Respond and participate in ICS security incident response through phases, including investigating computer and network intrusions and remediation support.
* Perform proactive research to identify, categorize, and produce reports on new and existing threats.
* Monitor industry ICS trends and recognize opportunities for new and emerging technologies.
What you need to succeed:
* Bachelor\u2019s Degree or equivalent in a related field of study (including any of the following but not limited to): Information Systems, Network or Electrical Engineering, and Information Security.
* Certifications are a plus (GICSP, GRID, CISSP, Cisco, Fortinet, Palo, AWS, Azure)
* 3+ years of hands-on experience within the Industrial Controls Systems environment.
* 3+ years of previous experience developing and deploying mitigation techniques to defend networks.
* In-depth understanding of operating systems, network/system architecture, and IT architecture design.
* Experience with maintaining documents, policies, and standards governing the security operations for ICS equipment and networks.
* Experience with operational technologies such as Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA) software, and Distributed Control Systems (DCS).
* Network and system security architecture expertise.
* Experience with common security systems and vendors such as cisco, Fortinet, palo
* Understanding IT and OT network communication protocols (including TCP/IP, UDP, DNP3, Modbus, IEC 61850, OPC, OPC UA, and PROFINET).
* Knowledge of IT and OT security best practices and knowledge of the differences.
* Understanding threats, vulnerabilities, and exploits in ICS environments and appropriate mitigation techniques.
* Superior organization and follow-up skills.
* Excellent verbal and written communication skills
* Strong oral and written communication skills.
* Willingness to travel (up to 50%)
What we offer:
* Corporate culture based on loyalty, integrity, & respect.
* Comprehensive training with numerous learning and development opportunities
* An attractive salary reflecting skills, competencies, and potential.
* A career with a global packaging company where Sustainability, Safety and Inclusion are business drivers and foundational elements of the daily work.
Smurfit Westrock (NYSE:SW) is a global leader in sustainable paper and packaging solutions. We are materials scientists, packaging designers, mechanical engineers and manufacturing experts with a shared purpose: Innovate Boldly. Package Sustainably. Guided by our values of safety, loyalty, integrity, and respect, we use leading science and technology to move fiber-based packaging forward.
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by state or federal law.
Cyber Security Analyst
Information security analyst job in Atlanta, GA
Role Value Proposition:
The Incident Response Analyst will be a member of UpTime365's Global Cyber Incident Response Team. In this role, an analyst will use cutting edge tools and solutions, and collaborate with global team members across the organization to perform cyber incident response and protect UpTime365's partners against cyber threats.
Key Responsibilities:
Response to cyber security events and incidents by analyzing forensic data, logs, and threat intel to validate security threats, assess impact, determine root cause, and help coordinate remediation actions.
Maintain awareness of emerging threats.
Willingness and self -motiviation to learn and take advantage of all training opportunities provided.
Perform proactive threat hunting to identify potential threats to UpTime365 and its partners.
Partner with global incident response teams to coordinate global incident response.
Eventual participation on a rotating on -call roster for off hour escalations.
Requirements
Essential Business Experience and Technical Skills:
A bachelor's degree in cyber security or computer science, or 2 -4 years of combined IT and Cyber Security related work experience.
1 -3 years of experience analyzing logs (e.g. endpoint, network, identity), performing data correlation, and using SIEM or log management tools.
Basic understanding of the Windows operating system and command line tools, network fundamentals, and cyber security concepts and frameworks.
Scripting experience for analysis and automation of repeatable processes.
Security specific certifications from SANS and other industry recognized organizations are desirable.
Benefits
Dental insurance
Medical insurance
Vision insurance
401K
Paid vacation and sick leave
Tuition fee reimbursement
Students loan assistance
Information Security Analyst - Threat Intelligence
Information security analyst job in Alpharetta, GA
Are you passionate about the changing threat landscape, love the challenge of understanding how the latest malware works, and can evangelize the risks and issues across a broad organization? Are you looking for a challenging leadership position that will allow you to shape the future of security across the internet? Do you thrive on working with a close-knit, highly-motivated team?
Come join Lancope's threat intelligence team to help protect Lancope's customers against cyber-attacks. The successful candidate will join a global team of senior security analysts focusing on the changing threat landscape and effect on Lancope's customers. This position requires a professional with a strong security software and threat analysis background that is capable of identifying and establishing the relationships and processes within and external to Lancope to build an investigative threat research structure and flow. The team will source data across Lancope, i.e. internal product and traffic monitoring groups, as well as through external partner and qualified third-party relationships.
Lancope is looking for a full time Information Security Analyst for Lancope's Threat Intelligence Team. Analysts in this role will have experience in threat research and a desire to own innovative ideas from invention, through proof-of-concept, and to deployment.
Primary Responsibilities
Conduct literature reviews and keep abreast of state of the hack, data sources, data analysis techniques and big data
Invent and/or apply new techniques to telemetry data on a global scale and identify new security threats
Develop and document proofs-of-concept (POCs) to demonstrate the efficacy, performance, and scalability of new techniques
Publish and present research findings, including methodology and measured efficacy improvements
Help guide the development by working with product teams
Partner to turn successful POCs into product features and actionable intelligence.
Education and Experience
The ideal candidate for this role brings considerable experience, motivation, and organization along with both intense curiosity and desire to make an impact in internet security. Researchers in this role enjoy considerable latitude and work hands-on to complete all phases of applied research. The successful applicant will have demonstrable skills in some of the below areas:
At least 2 years relevant experience
Network administration, System administration (Windows or Unix)
IT security with a focus on computer forensics, incident response, malicious code/exploits, anti-virus, etc.
Knowledge of the current security threat landscape, especially network and web-based threats
Familiar with Windows exploits, malware and malicious code trends
Knowledge of TCP/IP and application in securing systems, investigating security incidents
Solid understanding of computer science fundamentals, software engineering
Knowledge of one or more programming/scripting languages
Web application and script development
Log and data analysis
Strong written and verbal communication
Self-motivated and highly ambitious
Creative problem solving skills and excellent troubleshooting/debugging skills
Excellent teamwork and people skills
Ability to manage multiple tasks and work towards long-term goals
Incident response experience a definitive plus
Cyber Threat Analyst II
Information security analyst job in Gordon, GA
Requires US Citizenship Employment Term and Type: Regular, Full Time Required Security Clearance: TOP SECRET/SCI w/CI Poly Required Education: BS in engineering with specialization in Communications systems
JOB DESCRIPTION:
Cyber Threat Analyst III. Supports cyber response team, performing tasks to mitigate threats utilizing various tools, such as Gabriel Nimbus, End Point Security, Security Incident Event Monitoring, etc. Provides briefs, prepares, submits, and presents reports and issue papers.
REQUIRED EXPERIENCE:
Experience performing threat analyses and developing threat models. Conducted research and analysis of intelligence and related data support of threat studies.
Experience providing advice, guidance and direction to threat studies team. Possesses detailed knowledge of advanced threat analysis technology in such areas as telecommunications, IT, and cyber warfare.
Education BS/BA 10+ Years
Required Certification:
IAT Level II and CSSP, e.g. CySA+ or SEC+ and a CEH.
US Citizenship and an active DoD TOP SECRET/SCI w/CI Poly Clearance are required for the position.
Physical and Environmental Conditions:
Normal Office Environment. Requires Sitting, Standing, Near Acuity, Speaking with colleagues and customers, Listening, Sight, Use of hands/fingers.
This position description is not intended as, nor should it be construed as, exhaustive of all responsibilities, skills, efforts, or working conditions associated with this job. This and all positions are eligible for organization-wide transfer. Management reserves the right to assign or reassign duties and responsibilities at any time.
Company Overview: Athena Technology Group, Inc. (ATG) is a Service-Disabled Veteran Owned Small Business (SDVOSB) focused on Information Technology and Communications consulting, system engineering, integration, deployment and operation of state of the art command and control and information systems that deliver critical network centric solution to the warfighter. With a proven track record of technical support to our customers, we are looking for innovative industry professionals to join our team.
ATG offers a generous compensation package including health, dental, vision, 401(k), group life insurance, educational reimbursement, among other benefits.
We value our employees and strive to offer many opportunities for professional growth.
ATG is an Equal Opportunity/Affirmative Action Employer Minorities/Females/Vets/Disability
Systems Cybersecurity
Information security analyst job in Warner Robins, GA
Job Description
At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future.
We are privately held, are repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success.
Credence has an immediate need for a Systems Cybersecurity at the journeyman level to support the mission of the Global Hawk (AFLCMC/WIAG) and U-2 (AFLCMC/WIA) Division is to provide continuous, high altitude long endurance (HALE), all-weather, day/night, wide area reconnaissance and surveillance remotely piloted aircraft (RPA) systems. Global Hawk and U-2 Division is located at both Wright Patterson AFB, OH and Robins AFB, GA. The mission of the Sustainment Branch (AFLCMC/WIAGA) is to provide sustainment support to the operational Global Hawk fleet to include aircraft, payloads, and ground assets. Sustainment Branch is located at Robins AFB, GA. The mission of the International & New Business Branch (AFLCMC/WIAPC) is to avail exportable versions of all-weather, day/night, wide area reconnaissance HALE RPA capabilities to international US partners. International & New Business Branch is located at Wright Patterson AFB, OH.
This job is onsite on Robins AFB, GA.
Requirements
Responsibilities include, but are not limited to the duties listed below
At the initiation of the period of performance and throughout the period of performance of the contract, the Systems Cybersecurity will ensure, as a minimum, 50% of the total labor provided to deliver cybersecurity services is certified in accordance with DoD 8570.01-M standards. (CDRL A001).
Will ensure all system deliverables comply with DoD and Air Force cybersecurity policy, specifically DoDI 8500.01, Cybersecurity, and AFI 33-200, Air Force Cybersecurity Program Management.
To ensure cybersecurity policy is implemented correctly on systems, you will ensure compliance with DoD and Air Force Certification and Accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.01, Risk Management Framework (RMF) for DoD Information Technology, and AFI 33-210, The Risk Management Framework (RMF) for Air Force Information Technology.
Will support activities and meet the requirements of DoDI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication.
Education, Requirements and Qualifications
Active TS/SCI required
Bachelor's or master's degree in a related field and at least three (3) years of experience in the respective technical / professional discipline being performed, three (3) of which must be in the DoD or other United States Government (USG) ISR/SOF Organizations.
OR, seven (7) years of directly related experience with proper certifications as described in the PWS labor category performance requirements, five (5) of which must be in the DoD or other USG ISR/SOF Organizations.
Excellent written and verbal communication skills
Job may require the employee to be:
Willingness to travel if needed.
In a stationary position 50% of the time
Able to ascend/descend stairs as needed
Able to move equipment not to exceed 25 lbs. as needed.
Please join us, as together we build a better world one mission at a time powered by technology and its people!
#LI-Onsite
#veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Family Leave (Maternity, Paternity)
Short Term & Long Term Disability
Information Security Analyst
Information security analyst job in Atlanta, GA
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
The candidate will be a member of the Application Security Assessment (ASA) Team enforcing Global Cyber Security & Fraud at First Data. This includes automated vulnerability scanning mixed with manual penetration testing against web-based applications, web services, and thick client applications.
Job Specific Responsibilities Utilize dynamic and static application security testing tools effectively, including IBM AppScan Standard, Fortify SCA, Burp Suite Pro, and Qualys.
Host developer-focused appsec training workshops on topics including secure coding and vulnerability remediation.
Coordinate testing objectives, reporting deliverables, and remediation efforts as the liaison between the financial institution(s), First Data, and third-party assessors.
Provide documented guidance to development teams that define effective remediation solutions for vulnerabilities.
Contribute to maintaining First Data Corporation's PCI-DSS certifications through addressing regulatory requirements.
Availability to work occasional off-hours to complete assessments tied to meeting critical business objectives.
Interview Required: Yes
Information Technology-Info Security Analyst - Information Technology-Info Security Analyst
Qualifications
Bachelors Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Hands on technical experience with dynamic and static security testing tools, including source code assessments.
Deep analytical skills, strong out-of-the-box thinking.
Ability to effectively perform detailed-oriented technical information security work on a full-time basis.
Excel independently in a fast-paced environment.
Effective oral and written communication skills.
Preferred Qualifications Masters Degree in Information Security, Computer Science, I.T., I.S., Engineering, Analytics or equivalent.
Proficient web-application developer with demonstrable knowledge of HTML, C/C++, Java, VB, Ruby, etc.
CEH, Security+, GWAPT
Additional Information
Regards,
Vikas Kumar
vikas.kumar(@)360itpro.com
9117- Information Assurance I
Information security analyst job in Warner Robins, GA
Job Name: Information Assurance I (100 miles south of Atlanta and 16 miles south of Macon). Security Clearance: Secret Security Clearance required. IndraSoft, Inc. is seeking a highly qualified Information Assurance I with an active Secret Security to work on our project at Robins Air Force Base, GA. The selected candidate will be able to communicate effectively (written/verbal), possess strong interpersonal skills, be self-motivated, and be innovative in a fast-paced environment. Must hold and maintain a valid Secret Security Clearance. The candidate will provide Information System Security Engineering expertise throughout the system's entire lifecycle in accordance with DoD Information Assurance Certification and Accreditation Process (DIACAP). He/she will conduct security engineering of IA of DoD and Federal Information Systems, which will include developing security requirements, data gathering and documenting system security plans, risk assessments, contingency plans, security test and evaluation plans, and security concepts of operation. Develops, reviews and maintains security policies and standards on commonly deployed systems and generates or reviews DIACAP packages. The candidate must be familiar with a variety of the field's concepts, practices, and procedures and will rely on his/her experience to plan and accomplish goals. Qualifications: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential Qualifications Required: • Associates or Bachelor's Degree in Information Technology or equivalent experience with
5+ years' experience performing Information Assurance functions for complex networked
systems or no degree with 2 years ISR experience performing information assurance
functions.
• 5 years of performing Information Assurance functions for complex networked systems
and software development environment.
• Security+ or other 8570 certification required.
• Experience with or knowledge of RPASOC, AF DCGS, or FPED systems required.
• Knowledge of ICD 503 and NIST publications.
• Experience in continuous monitoring using ACAS and NESSUS scan utility preferred.
• Familiarity with audit reduction tools preferred.
• Experience with EITDR, eMASS, and XACTA preferred.
• Experience in preparing Assessment and Authorization (A&A) packages preferred.
• Must have experience with ensuring system security requirements are addressed during all
phases of the system life cycle.
• Ability to utilize computer skills to prepare appropriate reports and documents.
• Familiar with a variety of the field's concepts, practices and procedures.
• Able to work in a fast-paced production environment with ability to handle multiple
competing tasks and demands simultaneously.
• Excellent communication, business analytical and problem-solving/trouble shooting skills.
• Effective Customer Service and management skills/capabilities; including a demonstrated
ability to work cross-functionally (internally) and/or externally.
• Strong English language skills (both written and verbal).
• Interest in new technologies and the ability to adopt to those new technologies.
• High level of drive and ability to learn.
• Ability to lead a team and carry development workload.
• ***Candidate MUST HAVE a Secret Clearance and maintain such
clearance. Qualifications Desired: • Master's Degree in Information Assurance or equivalent.
• 5+ Years' experience working on DoD programs is highly desired. Essential Functions and Responsibilities: • Provide Information System Security Engineering expertise throughout the system's entire
lifecycle in accordance with DoD Information Assurance Certification and Accreditation
Process (DIACAP), Certification and Accreditation (C&A) methodologies and DoD
Instruction 8570.1-M.
• Conduct Security Engineering of IA of DoD and Federal Information Systems, which will
include developing security requirements, data gathering and documenting system
security plans, risk assessments, contingency plans, security test and evaluation plans,
security concepts of operations.
• Develops, reviews, and maintains security policies and standards on commonly deployed
systems.
• Assists in the development of and reviews DIACAP packages.
• Utilize background and knowledge in RPASOC, AF DCGS and FPED systems.
• Assist in monitoring ACAS and NESSUS scan utility.
• Prepare Assessment and Authorization packages.
• Ensure all system security requirements are addressed during all phases of the system
life cycle.
• Provide assistance and guidance to Information Assurance I, when needed on more
difficult technical problems and tasks.
• Maintains job knowledge by studying state-of-the-art development tools, programming
techniques, and computing equipment, participating in educational opportunities, reading
professional publications, maintaining personal networks and participating in
professional organizations.
About Us
At IndraSoft, you will be joining a team of highly qualified individuals who solve today's challenges, transform to future state, and execute innovate technology solutions for our federal customers. For more than 16 years, we provide cutting-edge solutions in areas of DevSecOps, Cybersecurity, Advanced Data Analytics, emerging Cloud technologies and Enterprise IT to our Defense and Civilian customers. You will be leading our efforts to integrate and innovate technology solutions to solve our clients' toughest technology problems.
EEO Commitment
IndraSoft is an equal employment opportunity/affirmative action employer, we are committed to providing a workplace that is free from discrimination based on race, color, ethnicity, religion, sex, national origin, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, pregnancy, genetic information, or any other status protected by applicable federal, state, local, or international law. These protections also extend to applicants. Follow the links below to find out more;
EEO is Law Poster
EEO is Law Supplement
Pay Transparency Nondiscrimination Provision
Accommodations
If you are an individual with a disability and would like to request a reasonable workplace accommodation, please send an email to ****************. Indicate the specifics of the assistance needed.
Senior Security Analyst
Information security analyst job in Duluth, GA
Neptune Technology Group Inc. is a technology company serving water utilities across North America. Since 1892, we have continually focused on the evolving needs of water utilities - revenue optimization, operational efficiencies, and improved customer service. With our portfolio of smart water meters, data collection systems and software, we make data actionable for our customers - so they can remain focused on the business of water. For additional information, please visit the company website at ******************
Senior Security Analyst
Position Summary
As a Senior Security Analyst, you will be a key member of Neptune's 24×7 Security Operations program, supporting incident response, SIEM management, and threat detection across a hybrid environment (on-prem, cloud, SaaS). You'll work closely with the SOC Manager to execute detection, response, and reporting processes that protect Neptune and meet compliance requirements.
Responsibilities:
Threat Detection & Monitoring
* Monitor and analyze security alerts from SIEM and EDR platforms
* Investigate anomalies and suspicious activity across endpoints, networks, and cloud environments
* Maintain high-fidelity alerting and reduce false positives through tuning
Incident Response & Management
* Execute playbooks for triage, containment, and remediation of security incidents
* Assist in forensic investigations and contribute to post-mortem reports
* Participate in tabletop exercises and readiness drills
SIEM & Security Logging
* Maintain SIEM health and ensure reliable telemetry across all assets
* Develop and refine detection rules and correlation logic
* Support automation and orchestration workflows for incident handling
Identity & Access Management
* Monitor identity-related events for anomalies and privilege escalation attempts
* Support IAM lifecycle processes and enforce least privilege principles
Threat Intelligence & Modeling
* Integrate threat intelligence feeds into detection workflows
* Assist in threat modeling to identify potential attack paths
Reporting & Metrics
* Document incidents and provide timely updates to SOC Manager for reporting to parent company
* Track and report operational metrics (MTTD, MTTR, alert volumes, etc.)
Security Standards & Architecture
* Apply secure-by-design principles in collaboration with engineering teams
* Support zero trust initiatives and network segmentation projects
Relevant Platforms (experience with several is expected):
* SIEM/SecOps: e.g. Google SecOps (Chronicle)
* EDR & Identity: e.g. CrowdStrike, Microsoft AD/Entra
* Network Security: e.g. FortiGate NGFW, FortiSASE
* Secure Browsing: e.g. Prisma
* Patching & Config: e.g. Automox
* Secrets Management: e.g. Keeper
* Asset Management: e.g. Axonius, Cyclops
* Email & Data Security: e.g. Mimecast, Microsoft Purview
Minimum Qualifications:
* Bachelor's degree (or equivalent experience)
* 3+ years in Security Operations or Incident Response
* Hands-on experience with SIEM, EDR, and threat detection
* Familiarity with NIST, ISO, MITRE ATT&CK, and zero trust principles
* Strong analytical and communication skills
Preferred Qualifications:
* Security certifications (e.g., GCIH, GCIA, CISSP)
* Experience with cloud security (AWS, Azure, GCP)
* Exposure to SOAR automation and scripting
* Travel Requirements: Typically requires overnight travel less than 10% of the time.
Travel Requirements: Typically requires overnight travel less than 10% of the time.
Location: Duluth, GA, Tallassee, AL
DevSecOps Cyber Security Engineer
Information security analyst job in Gordon, GA
Job Title: DevSecOps Cyber Security Engineer Clearance: Active DoD Top Secret (SCI eligible preferred) The Information Systems Security Engineer (ISSE) is the hands-on security engineering lead for mission systems at Fort Gordon. This role bridges classic RMF/ATO work with modern DevSecOps practices.
You will work with developers, system engineers, and operations teams to design, engineer, and validate secure architecture for both hardware and software systems, ensuring they meet DoD RMF requirements and can obtain and maintain an Authorization to Operate (ATO). Experience with DevSecOps, automation, or cloud is a plus, but this is first and foremost an ISSE / cyber engineering role.
If you have strong security engineering/RMF chops and some exposure to automation, CI/CD, or cloud (or a clear desire to grow there), you're the kind of person we want.
Key Responsibilities
Serve as the security engineering lead for systems going through the RMF/ATO process (both hardware-centric and software/application systems).
Capture, analyze, and refine security requirements and ensure they are integrated into system architecture, design, and implementation.
Work with system engineers and developers to build security into designs from the outset (Defense-in-Depth, Zero Trust principles where applicable).
Develop and maintain RMF security documentation (e.g., SSPs, SARs, control implementation statements, POA&Ms) in support of initial and ongoing ATOs.
Engineer and validate technical control implementations (e.g., identification and authentication, logging and monitoring, boundary protection, vulnerability management).
Support or integrate security into CI/CD pipelines and DevSecOps workflows (e.g., adding static/dynamic analysis, container scanning, IaC checks, and automated compliance validations).
Work with infrastructure teams to secure and assess virtualized, containerized, and cloud-hosted environments (e.g., VMware, Hyper-V, Kubernetes, AWS, Azure).
Perform and support security testing and continuous monitoring: review scan results, track findings, and help design pragmatic remediation paths.
Coordinate with ISSOs, ISSMs, Control Assessors, system owners, and mission partners to keep security, performance, and mission needs in balance.
Contribute to security patterns, reference architectures, and standard operating procedures to make future RMF/ATO cycles smoother and more repeatable.
Required Qualifications
We don't expect one person to check every box, but you should recognize yourself in most of these:
Security Engineering / RMF Experience
Hands-on experience supporting DoD systems under RMF, including control selection, implementation, and/or validation.
Direct involvement in one or more ATO efforts (initial ATO, re-authorization, or significant system change).
Technical Foundation
Experience administering or engineering on Linux and/or Windows systems in an enterprise or mission environment.
Experience with at least one scripting or automation language (e.g., Python, PowerShell, Bash, Ansible, etc.).
Familiarity with virtualization platforms (e.g., VMware, Hyper-V, KVM) and/or containerization technologies (e.g., Docker, Kubernetes).
DevOps / Automation Exposure
Experience with or exposure to CI/CD tools and workflows (e.g., GitLab, GitHub, Azure DevSecOps, Jenkins), OR clear experience automating infrastructure/configuration (e.g., Ansible, Terraform).
Comfort working in or near Agile / DevSecOps teams: participating in sprints, grooming security tasks, and integrating security into pipelines rather than treating it as an afterthought.
Cyber Standards & Controls
Working knowledge of NIST SP 800-53 controls, DoD STIGs, and vulnerability management practices.
Ability to read security requirements and turn them into concrete technical tasks for developers and system engineers.
Clearance & Certifications
Active DoD Top Secret clearance (SCI eligible preferred).
Meets or can meet DoD 8570/8140 requirements for an ISSE/IASAE or IAT/IAM Level III role (e.g., SecurityX, CASP, CISSP, etc.) within a reasonable onboarding window.
Preferred / Nice-to-Have Qualifications
These are not hard gates; they're signals you'll be able to hit the ground running faster:
Experience integrating security controls into automated build and deployment pipelines (e.g., SAST/DAST, container and IaC scanning, dependency checking).
Experience with cloud environments (AWS, Azure, GCC/GCC High) from a security engineering or compliance perspective.
Experience with vulnerability and patch management tools (e.g., Nessus, Tenable, Ivanti, or similar).
Experience supporting Army, Cyber, or Intelligence Community programs, especially at Fort Gordon.
Familiarity with Zero Trust Architecture concepts and their impact on system design.
Experience writing or maintaining SOPs, playbooks, or O&M checklists tied to security operations and control sustainment.
Comfort mentoring developers or admins on secure configuration and coding practices.
Education & Experience
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, Engineering, or a related field
OR
Equivalent combination of relevant military, government, or hands-on industry experience in cybersecurity engineering, systems engineering, and/or DevOps.
Kwaan Bear IT Solutions, LLC (KBITS) is an Equal Opportunity Employer and Prohibits Discrimination and Harassment of Any Kind. KBITS is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions at KBITS are based on business needs, job requirements and individual qualifications, without regard to race, color, religion or belief, national, social or ethnic origin, sex (including pregnancy), age, physical, mental or sensory disability, HIV Status, sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, past or present military service, family medical history or genetic information, family or parental status, or any other status protected by the laws or regulations in the locations where we operate. KBITS will not tolerate discrimination or harassment based on any of these characteristics.
Information Systems Security Officer (ISSO)
Information security analyst job in Atlanta, GA
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyNetwork Security Analyst
Information security analyst job in Augusta, GA
Network Security AnalystLOCATIONFort Eisenhower, GA 30905CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyDirector of Information Security
Information security analyst job in Lawrenceville, GA
About Us Since our founding in 2005, Georgia Gwinnett College (GGC) has been dedicated to providing an exceptional educational experience to our students. At GGC, we believe that our students' success is our success, and we are committed to creating a culture that supports and uplifts them throughout their academic journey.
As a member of our faculty or staff, you will become part of a dedicated and passionate community of educators and professionals. Together, we work towards a common goal of empowering our students to achieve their full potential, both academically and personally. We take pride in our student body, which represents a multitude of backgrounds, perspectives, and experiences. Whether you are involved in teaching or providing essential services, your contribution will make a significant impact on the lives of our students and the broader community.
In addition to our commitment to student success, we also value the well-being and professional growth of our employees. We offer a comprehensive benefits package, designed to support the needs of our faculty and staff. From competitive compensation to health and wellness programs, and professional development opportunities to work-life balance initiatives, we strive to create an environment where everyone can thrive and feel valued.
Located in the thriving community of Gwinnett County, GGC offers a rich cultural and social landscape that enhances the overall college experience. Our backdrop is a beautiful, modern 260-acre campus located just 30 miles northeast of downtown Atlanta. Our students and employees benefit from the close proximity to various local amenities, including shopping, dining, entertainment, and outdoor recreational opportunities. This vibrant community serves as an extension of our campus, providing a stimulating environment for personal and professional growth.
Join GGC and become part of a dynamic team that plays a pivotal role in shaping the lives and celebrating the achievements of our students. Together, let's make a positive impact and empower the next generation of leaders.
Job Summary
Based on industry standards and best practices, the Director of Information Security sets the vision and leads the strategy for a comprehensive enterprise cybersecurity and IT risk management program. The Director will provide direction and oversight to ensure confidentiality, integrity, and availability of data, systems, and services; manage organizational risk; and ensure alignment with GGC's mission, goals, and business needs. This position reports to the Chief Information Officer (CIO) and serves as a member of the IT Leadership Team. The Director is responsible for developing and executing security governance, incident response, and awareness programs, and for fostering a culture of security throughout the college. This position collaborates with colleagues frequently and regularly interacts with internal and external stakeholders. This position leads and develops one or more direct reports.
Working outside standard business hours will be required on an as-needed basis.
Responsibilities
* Lead and develop a comprehensive information security and IT risk management program that ensures the confidentiality, integrity, and availability of GGC data and infrastructure.
* Lead and develop education, training, and awareness programs for all college constituents on institutional policy, guidelines, federal and state laws and regulations, and best practices in information security. Serve as a spokesperson for cybersecurity and provide guidance to college leaders and other stakeholders. Regularly share data, reports, and updates with stakeholders.
* Lead the development and implementation of the college's security governance, including policies and procedures, in consultation with IT leadership, technology professionals, and other stakeholders.
* Lead security information and event management, security operations, and other related functions. Lead, mentor, and develop security operations staff and related personnel, fostering a collaborative and high-performing team.
* Collaborate with ITS, audit, public safety, and academic and business units to comply with USG security policies, regulations, and college standards; collaborate with Legal Affairs and Purchasing to embed risk assessment and data security in supplier agreements and renewals.
* Proactively lead incident management and response by systematically detecting, analyzing, containing, and eradicating threats, restoring systems,and coordinating communication and documentation of incidents. Employ a 24/7/365 on-call schedule as needed. Conduct post incident analysis and propose cost-effective solutions to prevent or mitigate future incidents.
* Collaborate with colleagues inside and outside IT to embed cybersecurity best practices in technical solutions.
* Use standard tools and processes to lead projects to successful completion through effective planning for user experiences, change management, communication, and documentation.
* Additional duties as assigned.
Required Qualifications
* 4 Year / Bachelor's Degree in a related field
* 8+ years of relevant experience
* 5+ years of supervisory experience
Preferred Qualifications
* Graduate degree in a related field
* Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information
* Systems Auditor (CISA) or similar credential.
* Knowledge of auditing, information security and regulatory standards, best practices, and assessment methodologies.
* Experience with service management, project management, change management processes and procedures, and well-honed documentation skills.
* Experience directing, leading, and mentoring IT professionals.
* Experience working in higher education, preferably a campus in the University System of Georgia.
Proposed Salary
109,000 - 139,000
Salary offer will be dependent on candidate's experience and qualifications, internal equity considerations, budget availability, and salary administration guidelines.
Knowledge, Skills, & Abilities
* Ability to develop and propose solutions in a clear, concise, and organized manner.
* Excellent presentation and communication skills, both verbal and written, with the ability to convey complex technology concepts clearly to non-technical audiences.
* Ability to handle the pressures of work, maintain composure, and demonstrate good judgment.
* Broad technical knowledge and experience administering enterprise technologies.
* Up to date knowledge of federal, state, and other applicable compliance requirements.
* Effective customer service skills.
* Knowledge of, and experience in, using modern endpoint management platforms; knowledge of, and experience with, Active Directory/Microsoft Entra ID (formerly Azure Active Directory).
* Knowledge of, and experience with, Windows Administration including Office 365, Privileged Identity Management, Microsoft Defender and Sentinel, Identity Governance and Administration, and Information Protection.
* Knowledge of, and experience with, Vulnerability Scanning and Management Solutions, such as Tenable Nessus and BitSight Technologies.
* Ability and initiative to engage in continuous professional development.
* Knowledge of enterprise level networking and security best practices.
* Knowledge and application of cybersecurity best practices.
* Skills in change leadership as well as project, time, and change management.
* Ability to develop, implement, and scale solutions.
* Ability to foster a work environment based on trust, respect, and competence.
* Ability to forge effective collaborations with a wide range of internal and external stakeholders.
* Ability to lead productive meetings and produce deliverables and outcomes that meet organizational needs.
* Ability to demonstrate attention to detail and manage competing priorities effectively.
* Ability to manage relationships with vendors for quotes, maintenance renewals and other activities.
USG Core Values
The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at **************************************************************************
Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at ************************************************
Conditions of Employment
Hiring is contingent upon eligibility to work in the United States and proof of eligibility will be contemporaneously required upon acceptance of an employment offer. Offers of employment are contingent upon completion of a background investigation including a criminal background check demonstrating your eligibility for employment with Georgia Gwinnett College (GGC). Eligibility of employment is determined by GGC in its sole discretion, and includes but is not limited to confirmation of credentials and employment history reflected in your application materials; and, if applicable, a satisfactory credit check. Applicants may be subject to a pre-employment drug test.
Offers are subject to the applicable federal laws, state laws, statutes, rules and regulations of this institution, and to the bylaws and policies of the Board of Regents (BOR) of the University System of Georgia (USG), which are available for your inspection upon request.
Equal Employment Opportunity
Georgia Gwinnett College is an equal employment, equal access, and equal opportunity employer. It is the policy of Georgia Gwinnett College to recruit, hire, train, and promote persons without regard to race, color, national or ethnic origin, age, disability, gender, religion, sexual orientation, gender identity or veteran status as required by applicable state and federal laws (including Title VI, Title VII, Title IX, Sections 503, and 504, ADEA, ADA, E.O. 11246, and Rev. Proc. 75-50).
For individuals requiring disability-related accommodations for participation in any event including the application, interview process, or to obtain print materials in an alternative format, please contact HR at ************** or email **********.
Background Check
* Position of Trust + Education
Other Information
Due to the volume of applications, applicants may not receive a reply from the College unless an applicant is selected for an interview. Review of applications will continue until positions are filled. Georgia is an open records state.
Easy ApplyInformation Security Analyst 2
Information security analyst job in Duluth, GA
Join Our Team
In 2025, USA Today recognized Primerica as a Top Workplace USA for the fifth year in a row, and Newsweek named Primerica one of America's Greatest Workplaces for Diversity for the second consecutive year. In 2024, the Atlanta Journal-Constitution named Primerica as a Top Workplace for the eleventh consecutive year, and Forbes recognized Primerica as one of America's Best Employers for Women for the fifth year in a row. In addition, for the tenth time Primerica has been voted a Best Employer by Gwinnett Magazine. Primerica is a great place to work! Join our team to experience what it's like to work at “one of the best places to work in the metro Atlanta”.
About this PositionThe Information Security Engineering Analyst is an integral part of the IS Engineering team. This position will lead security efforts to design, implement, administer, and support information security technologies and processes that will ensure data and systems are adequately protected. It requires performing a broad range of security duties requiring a working knowledge of cyber security and several supporting technologies. The Analyst will work with project teams to define security requirements for programs, applications, processes, and new platform systems in line with the enterprise information security architecture. Responsibilities & Qualifications
Support and manage security infrastructure, including but not limited to; Proxies, NextGen Firewalls, IDS/IPS, SIEM, Sandboxing technologies, APT solution, etc.
Participate in Vulnerability and Threat Management program
Perform root cause analysis on security incidents
Apply effective communication to translate complex technical security deficiencies into business risks that are understood by business stakeholders when making decisions for future security investments
Use an information security architecture framework and methodology to enable reuse of information security components across the enterprise
Assist proof-of-concept activities for innovation initiatives to ensure coverage of information security requirements
Perform additional security-related duties as requested
Bachelor's degree in Computer Science, Information Systems, CyberSecurity, or 2-3 years related experience
CISSP or other Security Certifications are preferred, or willing to obtain
Experience with SIEM technologies, including development
Experience with Host based Security controls
Experience in the vulnerability assessment lifecycle from the point of identification to remediation including penetration testing and source code analysis tools
Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate
Able to work independently and be a self-starter; managing multiple tasks according to priorities; results oriented and proven ability to meet deadlines
Hybrid role
Location: Atlanta, GA
FLSA status:
This position is exempt (not eligible for overtime pay):
YesOur Benefits:
Day one health, dental, and vision insurance
401(k) Plan with competitive employer match
Vacation, sick, holiday and volunteer time off
Life and disability insurance
Flexible Spending Account & Health Savings Account
Professional development
Tuition reimbursement
Company-sponsored social and philanthropy events
It has been and will continue to be the policy of Primerica, Inc., and its subsidiaries to be an Equal Opportunity Employer. We provide equal opportunity to all qualified individuals regardless of race, sex, color, religious creed, religion, national origin, citizenship status, age, disability, pregnancy, ancestry, military service or veteran status, genetic or carrier status, marital status, sexual orientation, or any classification protected by applicable federal, state or local laws.
At Primerica, we believe that diversity and inclusion are critical to our future and our mission - creating a foundation for a creative workplace that leads to innovation, growth, and profitability. Through a variety of programs and initiatives, we invest in each employee, seeking to ensure that our people are not only respected as individuals, but also truly valued for their unique perspectives.
Auto-ApplySecurity Systems Engineer / Estimator
Information security analyst job in Norcross, GA
Security Systems Engineer / Estimator
About Us We're looking for a highly motivated and skilled Security Systems Engineer / Estimator to join our team. This is a full-time, on-site position focused on designing, engineering, estimating, and supporting integrated electronic security solutions.
What You'll Do
System Design & Engineering
Design and configure integrated security systems (CCTV, access control, intrusion detection, intercoms).
Prepare scopes of work (SOWs), bills of materials (BOMs), cost estimates, and design narratives.
Analyze blueprints, drawings, and specifications to deliver compliant solutions.
Provide accurate and competitive proposals in response to RFPs.
Support CAD teams with drawings, device details, and schedules.
Pre-Sales & Client Engagement
Partner with sales during pre-bid opportunities, site walks, and customer meetings.
Act as a technical resource for discovery and client-facing discussions.
Present technical information clearly to clients and internal teams.
Build lasting client relationships with expert advice and support.
Project Execution & Support
Work with project managers and operations teams for smooth project handoff.
Provide technical support during installation, commissioning, and post-deployment.
Troubleshoot hardware, software, and networking issues.
Ensure compliance with industry standards and client requirements.
Continuous Improvement
Stay current on emerging technologies, trends, and vendor offerings.
Attend manufacturer training and pursue relevant certifications.
Help drive adoption of new processes and tools.
What You'll Bring
Education & Experience
Associate or Bachelor's degree in Electrical Engineering, IT, or related field, or equivalent work experience.
3-5+ years in security system engineering, design, or estimating.
Experience in pre-sales design/estimating and client proposals.
Technical Expertise
Hands-on with Lenel, Genetec, Avigilon, Milestone, Axis, Hanwha, Panasonic, HID, Software House.
Basic knowledge of IP networking, PoE, subnetting, and system integration.
Familiar with electrified door hardware, locking devices, relay connections, and voltage limitations.
Understanding of wireless communications, switches, routers, firewalls is a plus.
Ability to read and interpret blueprints and wiring diagrams.
Skills & Competencies
Proficiency in Microsoft Office Suite.
Strong problem-solving, troubleshooting, and attention to detail.
Excellent communication skills, written and verbal.
Self-motivated, reliable, and deadline-driven.
Strong organizational and time management abilities.
Preferred Certifications
LenelS2, Genetec, Avigilon, Milestone, Software House.
AutoCAD or system design software (Bluebeam, System Surveyor).
Knowledge of cybersecurity principles for physical security systems.
Join Our Team
If you're passionate about security technology and want to contribute to delivering best-in-class solutions, we'd love to hear from you. Apply today!
Auto-ApplyIT Audit Analyst
Information security analyst job in Atlanta, GA
Company Cox Automotive - USA Job Family Group Finance Job Profile Audit Analyst I Management Level Individual Contributor Flexible Work Option Hybrid - Ability to work remotely part of the week Travel % No Work Shift Day Compensation Compensation includes a base salary of $49,200.00 - $73,800.00. The base salary may vary within the anticipated base pay range based on factors such as the ultimate location of the position and the selected candidate's knowledge, skills, and abilities. Position may be eligible for additional compensation that may include an incentive program.
Job Description
Cox Automotive is seeking an IT Audit Analyst to support and monitor technology risks to the company's operations and financial statements. This individual would be responsible for gathering assurance and evidence that identified risks are appropriately defined and mitigating controls are designed and operating effectively. The ideal candidate will coordinate with other risk related groups (i.e. Information Security, Technology, etc) to ensure accuracy of financial statements and compliance with regulatory requirements and drive business ownership of internal controls.
Primary Responsibilities and Essential Functions
* Identify, document, assess and monitor key technology controls supporting the financial environment.
* Maintain and prepare detailed and accurate documentation, including system descriptions, control descriptions, risk and control matrices, process flowcharts, and management responses and remediation.
* Assess and respond to control design certification changes by updating internal controls documentation, addressing remediation needs, and collaborating with business cycle and process owners to implement effective solutions.
* Conduct walkthroughs of processes and internal controls to effectively identify and validate key control activities.
* Partner with the Audit team to ensure the operating effectiveness of key control activities.
* Define and identify control gaps and provide recommendations (remediation/mitigation) for control process improvements.
* Partner with the Information Security team to facilitate the Service Organization Control (SOC) audits and the report issuance
* Monitor task status in AuditBoard (governance and risk tool) related to the design and operational effectiveness of key controls.
* Effectively communicate results of activities in an accurate and concise manner verbally and in writing.
* Support multiple ad-hoc projects (i.e. system implementations, risk-based projects) and tasks, ensuring each engagement is conducted efficiently and effectively.
Qualifications:
Minimum:
* Bachelor's degree in a related discipline (Accounting, Management Information Systems, etc) and up to 2 years' experience in external audit, internal audit, SOX compliance or a related field.
* Strong knowledge of Microsoft Word, Excel, and PowerPoint
* Solid interpersonal, leadership, and presentation skills
Preferred:
* Intention of pursuing CISA or CIA certification preferred
* Experience in external audit, internal audit, SOX compliance or a combination of relevant experience, education and certification
Drug Testing
To be employed in this role, you'll need to clear a pre-employment drug test. Cox Automotive does not currently administer a pre-employment drug test for marijuana for this position. However, we are a drug-free workplace, so the possession, use or being under the influence of drugs illegal under federal or state law during work hours, on company property and/or in company vehicles is prohibited.
Benefits
The Company offers eligible employees the flexibility to take as much vacation with pay as they deem consistent with their duties, the company's needs, and its obligations; seven paid holidays throughout the calendar year; and up to 160 hours of paid wellness annually for their own wellness or that of family members. Employees are also eligible for additional paid time off in the form of bereavement leave, time off to vote, jury duty leave, volunteer time off, military leave, and parental leave.
About Us
Through groundbreaking technology and a commitment to stellar experiences for drivers and dealers alike, Cox Automotive employees are transforming the way the world buys, owns, sells - or simply uses - cars. Cox Automotive employees get to work on iconic consumer brands like Autotrader and Kelley Blue Book and industry-leading dealer-facing companies like vAuto and Manheim, all while enjoying the people-centered atmosphere that is central to our life at Cox. Benefits of working at Cox may include health care insurance (medical, dental, vision), retirement planning (401(k)), and paid days off (sick leave, parental leave, flexible vacation/wellness days, and/or PTO). For more details on what benefits you may be offered, visit our benefits page. Cox is an Equal Employment Opportunity employer - All qualified applicants/employees will receive consideration for employment without regard to that individual's age, race, color, religion or creed, national origin or ancestry, sex (including pregnancy), sexual orientation, gender, gender identity, physical or mental disability, veteran status, genetic information, ethnicity, citizenship, or any other characteristic protected by law. Cox provides reasonable accommodations when requested by a qualified applicant or employee with disability, unless such accommodations would cause an undue hardship.
Applicants must currently be authorized to work in the United States for any employer without current or future sponsorship.
Auto-Apply