Post job

Information security analyst jobs in East Saint Louis, IL - 91 jobs

All
Information Security Analyst
Information Technology Analyst
Cyber Security Specialist
Security Engineer
Securities Analyst
Cyber Security Analyst
Data Security Analyst
Information Assurance Analyst
Information Security Engineer
Senior Information Security Analyst
Security Architect
  • Information Security Specialist

    Collabera 4.5company rating

    Information security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 4h ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information Assurance Principal Analyst (Program Lead) - JOEPS

    Technology, Automation, and Management 3.6company rating

    Information security analyst job in Scott Air Force Base, IL

    The Information Assurance Principal Analyst/Program Lead will provide leadership, oversight, and operational management for the Joint Operation Planning and Execution System (JOPES) and the Transportation Visualizer (TransViz) Functional Management Support contract. This individual will act as the primary liaison between TeAM, government officials, and all contract stakeholders, ensuring the coordination, integration, and execution of all program activities in accordance with DoD and USTRANSCOM expectations. The Information Assurance Principal Analyst/Program Lead will be responsible for meeting all performance, schedule, and quality objectives as outlined in the contract's scope. Mission Objectives - The primary objective of this project is to support the operational effectiveness and mission readiness of the JOPES and TransViz platforms at Scott Air Force Base. As a critical contract team member, the Information Assurance Principal Analyst/Program Lead ensures seamless functional management, stakeholder coordination, and compliance with all contractual and security requirements while facilitating process improvements and the timely delivery of program services. This position supports USTRANSCOM and associated DoD agencies by optimizing system capabilities and user experience in support of national defense objectives. Position Responsibility Summary Serve as the principal point of contact (POC) for all programmatic, technical, and contractual matters, representing TeAM in communications with government officials and stakeholders. Serve as a Liaison for all meetings & events, coordinating & scheduling all course training for teams, and attending reviews of the program. Lead, supervise, and coordinate activities of the project team-overseeing System Administrators and the Database Administrator-to fulfill contract objectives. Ensure timely and accurate reporting of program performance, deliverables, metrics, and compliance with DoD security, safety, and operational requirements. Manage risks, mitigate issues, and implement corrective actions to maintain project schedule and instill quality control. Oversee and ensure workforce compliance with all mandatory security, safety, and DoD-mandated annual training, including but not limited to OPSEC, Antiterrorism Level I, CUI, and Emergency Operations. Develop and implement process improvements, leveraging industry best practices (e.g., ITIL) to enhance JOPES/TransViz functionality and user satisfaction. Foster a culture of open communication and collaboration across stakeholders, promoting continuous improvement in program delivery. Ensure all support activities are conducted on-site in compliance with established guidelines and within the designated geographic radius.
    $63k-92k yearly est. 60d+ ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Information security analyst job in Saint Louis, MO

    Job Description Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 2d ago
  • Data Security Analyst

    The Timberline Group

    Information security analyst job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Cyber Security Operations Specialist III

    Wcbinc

    Information security analyst job in Saint Louis, MO

    WCBinc is pursuing an opportunity with the National Geospatial-Intelligence Agency (NGA) for Transport & Cybersecurity Services (TCS) contract. The functional capabilities are to provide the information technology (IT) infrastructure services required to deliver timely, relevant, and accurate GEOINT in support of national security. TCS will provide innovative design, engineering, procurement, implementation, operations, sustainment and disposal of transport and cybersecurity IT services on multiple networks and security domains, at multiple locations worldwide to support the NGA GEOINT mission. What You'll Get to Do: Provide cyber threat intelligence services for the collection, fusion, analysis, creation, and distribution of threat intelligence from government entities, commercial feeds, open sources, and other partners to obtain situational awareness of the threat environment. Cyber threat intelligence services shall develop and disseminate reports and tippers to internal and external stakeholders based on events, alerts, and incidents on the customer systems and networks. Provide advanced cybersecurity analytics (ACA) services which aggregates and analyzes products, data, and information to identify trends and patterns, anomalous activity, provide situational awareness of the customers networks, missions and threats, and provide operational recommendations, visualizations, tuning requests, and custom signature creation to the CSOC and other internal and external stakeholders. Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems. Designs and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks. Advanced Cybersecurity Analytics will provide advanced cybersecurity services on an expanded 12x5service support level during core hours and on-call support with two-hour response time during non-core hours. Cyber Threat Intel Services will provide advanced cybersecurity services on an expanded 12x5 service support level during core hours and on-call support with two-hour response time during non-core hours. Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure. Develops new concepts and processes. Analyzes root causes and resolves issues. Supports more junior level technicians and specialists in their activities. Can perform all tasks of lower level technicians or specialists. Works individually, actively participates on integrated teams, and may also lead a task, project or team Requires guidance and direction from more expert level technicians, specialists, and managers only when dealing with new, uncertain situations. Provides guidance to lower level technicians and specialists.
    $68k-96k yearly est. 60d+ ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Information security analyst job in Saint Louis, MO

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 10d ago
  • Information Security Operations Analyst II

    Mastercard 4.7company rating

    Information security analyst job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Information Security Operations Analyst IIOverview The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff. The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset. Role In this Security Awareness position, you will: • Liaise between the Security Awareness team and all others at Mastercard. • Build new content and design awareness events to positively impact the security behaviors of Mastercard staff. • Partner with external providers to deliver effectives solutions with quality and integrity. • Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team. All About You The ideal candidate for this position should: • Possess advanced knowledge in security awareness concepts and principals. • Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors. • Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard. • Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings. • Lead vendor relationships with those providers of contract solutions for the Security Awareness program. • A professional certification in Security Awareness is not required but highly encouraged. Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed. • Report any suspected information security violation or breach. • Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations. Pay Ranges O'Fallon, Missouri: $76,000 - $127,000 USD
    $76k-127k yearly Auto-Apply 28d ago
  • Senior Information Security Analyst (Job ID: 3705)

    Valkyrie Enterprises 4.9company rating

    Information security analyst job in Scott Air Force Base, IL

    Senior Information Security Analyst (Job ID: 3705) Location: Scott AFB, IL Senior Information Security Analyst is contingent upon contract funding Purpose: * Valkyrie Enterprises has need for a Senior Information Security Analyst who will provide network and I.T. design support at Scott Air-Force Base, IL Job Description: * Oversees overall network security. Ensures protection from viruses or other security threats, corrupt data and maintain system backups. * Communicates hardware/software problems with outside support personnel, i.e.: vendors and technical support representatives. * Develop and implement security protocols to protect network infrastructure and data integrity. * Monitor network traffic for unusual activity and respond to potential threats in real-time. * Conduct vulnerability assessments and penetration testing to identify weaknesses in systems. * Collaborate with IT teams to design secure cloud infrastructure solutions. * Maintain and manage security tools such as PRTG, Juniper, and other monitoring systems. * Document security incidents and create reports for management review. * Stays up to date with the latest cybersecurity trends, threats, and technology advancements. * Assists in the development of disaster recovery plans and business continuity strategies. Qualifications * Must have a minimum of 10 years' experience in Cyber Security. * Must have demonstrated experience as a Cybersecurity Engineer or in a similar role. * Must have extensive knowledge of security protocols, cryptography, and security frameworks. * Must have significant experience in managing network IDS/IPS systems, including FireEye NX and Cisco FIREPOWER appliances. * Must possess advanced understanding of Microsoft OS & applications. * Must have extensive experience with hardware/software troubleshooting and analysis. * Must demonstrate initiative, the ability to manage multiple projects, meet deadlines, and determine priorities in a fast-paced environment. * Must have excellent people skills; communication and familiarity with a customer support environment are crucial. * Must have IAT Level II Certification Desired Qualifications * C&A, RMF Certifications are preferred. Security Requirements * TS/SCI security clearance Travel Requirements: * Occasional travel- less than 10% * If position requires travel by domestic flight or access to secure federal facilities/military bases, candidate must be able to obtain (by start of position) and maintain appropriate identification credentials, such as REAL ID. (More information regarding REAL ID can be found: *************************** ) Physical Requirements: * Remaining in a stationary position, often standing, or sitting for prolonged periods. * Required to use hands to finger, handle, or feel; reach with hands and arms. Valkyrie strictly adheres to a policy of equal employment opportunity. This policy is based on Valkyrie's commitment to hire and retain qualified employees consistent with position requirements; and to seek, employ, promote and treat all employees and applicants for employment without regard to race, color, religious creed, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental disability, age, military status or protected veteran status, marital status, registered domestic partner or civil union status, gender (including sex stereotyping and gender identity or expression), medical condition, genetic information or sexual orientation or other protected characteristics. Additionally, Valkyrie Enterprises provides a variety of benefits to eligible employees to support your best health, wellness, and future, to include medical/dental/vision options, company paid life and disability insurances, 401k with match, education reimbursement, as well as company paid holidays and paid time off (PTO). Pay Range: $34 - $44 per hour
    $34-44 hourly 60d+ ago
  • Managed Services Security Analyst

    GFI Digital

    Information security analyst job in Maryland Heights, MO

    The Managed Service Security Analyst is responsible for monitoring, detecting, and responding to security incidents to protect client environments. This role involves the identification of vulnerabilities, analyzing security risks, responding to security operations service tickets, and implementing protective measures. The Security Analyst will also assist with security audits, incident response, compliance-related activities and projects, and ensuring that all security services meet established performance and security standards. PRINCIPAL DUTIES AND RESPONSIBILITIES: Client Support: Provide security-related support to clients, addressing concerns, incidents, and queries in a timely manner. Security Monitoring: Perform continuous security monitoring of client systems, networks, and applications for malicious activities or security breaches. Incident Response: Respond to security incidents, conduct investigations, containment, and remediation efforts to mitigate risks and protect client environments. Vulnerability Management: Identify, assess, and prioritize vulnerabilities in client systems, recommending and implementing mitigation strategies. Threat Intelligence: Utilize threat intelligence tools to identify potential risks and provide proactive defense recommendations. Compliance Support: Ensure client systems adhere to regulatory and compliance standards (e.g., PII, HIPAA, PCI-DSS) as required. Security Audits: Assist with internal and external security audits, including the preparation and maintenance of audit documentation. Documentation: Maintain detailed records of security incidents, operational tasks, and system configurations in accordance with best practices. KNOWLEDGE, SKILLS AND ABILITIES: Education: Bachelor's degree in information technology, Computer Science, a related field, or additional years of relevant job experience. Experience: Minimum of 1 year of experience in an IT security or service role, preferably in a managed services environment. Certifications: Relevant certifications such as CASP+, CISSP, CEH, CompTIA Security+, or equivalent are preferred. Skills: Strong understanding of security frameworks (e.g., NIST, ISO 27001). Experience with security information and event management (SIEM) tools. Excellent analytical and problem-solving abilities. Strong communication and interpersonal skills for client-facing interactions. Ability to manage multiple security incidents and tasks simultaneously.
    $64k-88k yearly est. 60d+ ago
  • Security Analyst II

    Touchette Regional Hospital, Inc. 3.9company rating

    Information security analyst job in Collinsville, IL

    Monitors the health of Touchette Regional Hospital and SIHF Healthcare's security threat posture and cybersecurity & network infrastructure. Develops a deep understanding of the threat landscape and ensures cybersecurity technology is monitored to detect threats. Works with the IS Security Officer and junior members of the team to ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with Touchette Regional Hospital and SIHF Healthcare IT and cybersecurity standards Develops, documents, maintains, and communicates Touchette Regional Hospital and SIHF Healthcare's governance models and compliance codes and standards. Develop, provide, and maintain necessary documentation for all network applications and network systems Assist with network security in a multi-hospital & multi-healthcare clinic environment Key responsibilities include: Monitors endpoint anti-virus & malware, content-filtering, data loss prevention solutions, multi factor authentication systems, device profiling systems, firewall rules, network ACLs, server configuration monitoring, network logging consolidation and event correlation systems. Analyze threat intelligence to anticipate and mitigate potential risks. Conduct root cause analysis of security incidents and recommend corrective actions. Conduct research on network products, services, protocols, and standards in support of network & security procurement and development efforts. Installs and maintains network & security operating systems; ensures that backup copies of all files are routinely made and securely stored at separate location; maintains system documentation. Develops vulnerability remediation documentation and assists in the remediation of vulnerabilities both on server and network systems both cloud and physical. Documents systems with vulnerability's that are not able to be remediated, develops an action plan to secure those devices and communicates this information to stakeholder's and the IS Security Officer. Develops the skills necessary to manage network security solutions. Develops expertise in scanning and monitoring networks or server systems for attacks, malicious software, intrusions, and threats. Develops an understanding of the organization's current threat posture and uses a variety of tools to understand emerging threat patterns and gauge potential impacts to day-to-day business processes. Develops attack and penetration technologies to reduce threat landscape while looking for creative ways to save money and time where possible. Works with the IS Security Officer to develop policies and training to ensure employees are following and understanding security policies and procedures. Provides cybersecurity and network support for operational systems and assists in business planning, maintenance, and troubleshooting. Executes risk management initiatives to assess risk and gather information/data for defining/updating policy/standards. Researches and interprets risks and impacts of new technology, emerging patterns and trends in the cybersecurity landscape and provides updates/reports to the IS Security Officer on a regular basis. Develops monitoring use cases, tests, and assesses the effectiveness of Digital controls. Develops expertise in working with Network Packet Analyzers, Next-Generation Antivirus, Endpoint Detection and Response, Cyber Threat Intelligence and Threat Hunting Tools. Engages and communicates effectively with internal personnel, external vendors, or contacts in day-to-day activities and fosters positive business relationships. Educates the various business units on the different IT or cybersecurity strategies, policies, processes, and procedures. Executes projects and programs for the Network and Security team as required. Prepares and works with the different stakeholders to develop business continuity, disaster recovery and incident response plans Develop methods or propose technologies to protect data at rest when required. Will be required to provide on-call support in rotating intervals and emergency support as needed. Ability to occasionally support routine or emergency network or security changes during normal business hours, after-hours, on weekends or during holidays is required. At the direction of your supervisor this may involve travel on-site to a pre-determined location to support these changes. Ability to participate in on-call rotation. Provides second-level technical support to users concerning network & security system operations. Performs all other duties as assigned. Qualifications Bachelor's degree preferred, preferably in computer science, cybersecurity, network engineering, engineering, mathematics, or equivalent work experience 5-6 years of experience in information security, cybersecurity, or a related IT role. Professional certifications preferred Cisco Certified CyberOps Professional (CCCP), Cisco Certified Network Professional - Security (CCNP Security), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED). In addition to the above qualifications, the successful candidate will demonstrate: Fundamental knowledge of networking & security concepts Understand the OSI model, well-known and reserved ports & network protocol specifications Understand encryption methods used in securing network traffic transiting unsecured networks Understand encryption methods to secure sensitive information stored digitally Hands-on technical troubleshooting capabilities (physical, virtual, logical) Ability to work independently under minimal supervision Familiarity with network monitoring tools Exceptional critical thinking and problem-solving ability Strong interpersonal skills to assist non-technical individuals with complex technical issues Ability to adapt and learn new skills rapidly in support of the IT organization across a variety of different operating systems, protocols, applications, or technologies. Enthusiasm Teamworking skills Attention to detail Physical Demands: Must be able to sit and/or stand for prolonged periods of time Must be able to wear personal protective equipment (PPE) (mask, gown, gloves) when required Must occasionally lift and/or move up to 50 pounds; 100 pounds with assistance.
    $60k-76k yearly est. Auto-Apply 8d ago
  • IT Analyst (WFS)

    Stratacuity

    Information security analyst job in Saint Louis, MO

    Apex Systems is seeking a Data Analyst to join a Workforce Analytics team for one of our clients. This role is ideal for someone passionate about data and supporting strategic initiatives focused on optimizing a dynamic workforce and improving the employee experience. You will play a key role in executing, designing, and improving workforce reports that drive organizational decisions. The Workforce Analytics team is responsible for bringing insight to help improve operations, fuel innovation, and execute organizational goals. We do this by focusing on three key areas: * Quality of source data * Integration and accessibility to information * Providing tools to assist in identifying connections and correlations that will provide insight into our current and future workforce Responsibilities * Assist with the design, development, and execution of dashboards, scorecards, presentations, communications, and reporting that drive decisions for organizational initiatives, resources, and programs. * Proactively monitor, analyze, and troubleshoot workforce data to identify and resolve issues ensuring objectives are met. * Gather reporting requirements and deliver the best analytical solution to help solve business needs. * Maintain full understanding of performance tools, systems, and enhancements that automate and streamline workforce data. * Design, develop, enhance, evaluate, and implement both scheduled reporting and ad-hoc reporting requests. * Maintain data integrity and ongoing quality control of systems, tools, and delivered reports through testing and validation. * Assist with presentations, explanations, and discussions of the results of analysis concisely and effectively to support decision-making. * Understand HRIS systems administration and reporting. * Partner with leadership to identify, implement, and ensure compliance on audits and reporting. * Assist with projects that support workforce initiatives. Required Skills * Commitment to incorporating security into all decisions and daily job responsibilities. * 2 or more years of related experience. * 1 or more years of experience reporting and analyzing workforce data in a professional environment using research and database software. * Experience with Talent Management systems (HRIS, performance management, talent acquisition, learning & development, vendor management). * Intermediate to advanced skill level in Microsoft Excel (VLOOKUPs, pivots, formulas). * Advanced level understanding of MS Office Suite. * Strong research, critical thinking, and problem-solving skills. * Excellent organizational and time management skills. * Ability to effectively communicate data results to stakeholders. * Ability to work independently or within a team, as needed. * Demonstrated ability to make sound and well-informed decisions regarding a broad range of factors. * Strong customer service orientation. * Ability to maintain confidentiality at all times. Preferred * Bachelor's degree in Human Resources, Computer Information Systems, Management Information Systems, or related field. * Intermediate skill level in Microsoft SharePoint (lists, views, and access security for data collection). Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details. Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide. Employee Type: Contract Remote: Yes Location: St. Louis, MO, US Job Type: Date Posted: December 12, 2025 Pay Range: $35 - $45 per hour Similar Jobs * Business Analyst * Contract Analyst * Business Analyst * SOC Analyst * Telecommunications Analyst
    $35-45 hourly 1d ago
  • Product Security Engineering 2

    The Structures Company, LLC 4.1company rating

    Information security analyst job in Saint Charles, MO

    JOB TITLE: Product Security Engineering 2 PAY RATE: $53-67/hour We are a national aerospace and defense staffing agency seeking highly qualified candidates for a position with a top-tier client. Job Details: Job Type: Contract (12 months with potential for extension) Clearance: Active Top Secret U.S. Security Clearance required (must be active within the last 24 months) Industry: Aerospace / Defense / Aviation Benefits: Medical, dental, and vision (Cigna) Perks: Bonus potential + Priority access via Tier 1 supplier Openings Nationwide: Thousands of opportunities across the U.S. Qualifying Questions: Are you a U.S. person as defined under ITAR regulations? Do you meet the educational and experience requirements for this role? Can you commute to the job location or relocate if necessary? Summary: Assess organization-wide security and privacy risks, updating assessment results on an ongoing basis. Perform system analysis and develop system tests for cyber threats, cybersecurity evaluations, and large-scale event assessments. Ensure adherence to the product security engineering development lifecycle, emphasizing clear requirements development and verification (using CAMEO). Conduct criticality analyses, collaborate with suppliers, identify critical components, and integrate them into overall system designs. Perform cyber risk assessments and develop mitigation plans (e.g., POA&Ms, SCRM) using tools including but not limited to CAMEO. Support and facilitate ATO/IATT packages, including processing IAVMs and CTOs. Perform software assurance tasks, including developing software assurance risk reports. Support proposal development efforts (e.g., BOE generation, GR&A development, trade studies). Assist with the engineering installation and analysis of patches, updates, and upgrades to assess system impact. Attend and facilitate program boards, collect data, and manage project documentation and collaboration. Apply Security Technical Implementation Guides (STIGs) and manage Cyber Tasking Orders (CTOs). Document and verify all installation and configuration steps for labs and operational deliveries. Provide feedback to Cyber Leadership and engineers to improve tools and processes. Collaborate with Information System Security Officers (ISSOs) to ensure compliance with cybersecurity standards and regulations. Support cyber threat intelligence, scanning, patching, remediation, and tool/application development. Assist in compliance activities including TEMPEST, DFARS, COMSEC, and CNSSI. Develop tools for cyber forensics and identify opportunities for efficiency and productivity improvements. Perform system analysis trade studies to define technical concepts and solutions. Requirements: Active Top Secret U.S. Security Clearance required (must be active within the last 24 months) Bachelor's degree (or equivalent technical education) in engineering, engineering technology, computer science, data science, mathematics, physics, or chemistry. 2 or more years of related experience, or an equivalent combination of education and experience. Current DoD 8570 certification at IAT Level II / IAM Level I or higher (e.g., Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA). 1+ years of experience in product security or cybersecurity engineering. 1+ years of experience with cybersecurity frameworks (NIST, OWASP, DFARS). Strong analytical, collaboration, communication, and organizational skills. ABET accreditation preferred but not required. Must be a U.S. Citizen (as defined by ITAR). Preferred Qualifications: Proficiency with CAMEO. 2+ years of Windows/RHEL system administration experience, including tuning and troubleshooting cyber tools (ESS/HBSS, ConfigOS, Splunk, etc.). 2+ years of experience configuring and scripting audit tools. Experience with Software Assurance (SwA) static and/or dynamic code analysis tools (e.g., Fortify). Familiarity with FISMA/RMF and NIST 800-53 requirements. Experience leading cyber test and evaluation at system or component level. Strong written and verbal communication skills with the ability to simplify complex technical issues. Understanding of DoD defense systems architectures, communications systems, and test/data analysis methods. About Us: The Structures Company is a premier national aerospace and defense staffing agency specializing in contract, contract-to-hire, and direct hire placements. We deliver expert workforce solutions across engineering, IT, production, maintenance, and support roles. As trusted partners to major aerospace OEMs and Tier 1 suppliers, we connect professionals with opportunities to grow and excel in the aviation and aerospace industries. Eligibility Requirements: Must be a U.S. Citizen, lawful permanent resident, or protected individual under 8 U.S.C. 1324b(a)(3) to comply with ITAR regulations. Keywords: aerospace, aviation, engineering, maintenance, aircraft design, defense Take your career to new heights-apply today! Engineers - #Hotjobs
    $53-67 hourly 60d+ ago
  • Vulnerability & Security Engineer

    The Giant Bullseye

    Information security analyst job in Saint Louis, MO

    We are looking for experienced Vulnerability Development / Security Engineers with a background in healthcare IT to join our security team. You will focus on identifying, assessing, and remediating vulnerabilities across applications and cloud environments. Responsibilities: Conduct SAST and DAST scans and manage vulnerability remediation. Perform secure code reviews and implement best practices in Java and Python. Conduct threat modeling for applications, APIs, and cloud environments. Collaborate with development teams to ensure secure application delivery. Stay updated on security trends and healthcare-specific compliance requirements. Qualifications: 6-10 years of experience in application security or vulnerability management. Hands-on with SAST/DAST tools, patching, and secure coding. Strong knowledge of API and cloud security. Healthcare IT experience preferred (HIPAA, HITRUST, or related frameworks). Excellent analytical and communication skills.
    $71k-97k yearly est. 29d ago
  • IT Audit Analyst

    Partnered Staffing

    Information security analyst job in Saint Louis, MO

    At Kelly Services, we work with the best. Our clients include 99 of the Fortune 100TM companies, and more than 70,000 hiring managers rely on Kelly annually to access the best talent to drive their business forward. If you only make one career connection today, connect with Kelly. Job Description MUST have IT Audit experience MUST have CISA (Certified Information Systems Auditor Certification) SOX Audit and compliance experience on systems / infrastructure is preferred Open to candidate that is willing to relocate to St. Louis, MO US Citizen, Green Card holder, EAD OPT only Senior IT Audit Analyst The successful candidate, will have the opportunity to work with our client whom is a reputable global provider in integrated pharmacy benefit management, cost management as well as patient-care services worldwide. 6 months contract with possibility of renewal and/or contract to hire. Position is based in St. Louis, MO. General Summary: The Senior IT Audit Analyst will be responsible of: · Carrying out audit of IT infrastructure and systems within the organization. · Perform risk assessments for sensitive internal and external systems · Ensures that the security of information systems assets is in compliance with company policies, SAS70, Sarbanes Oxley, Payment Card Industry, HIPAA, NIHB and DIACAP · Ensures that user community understands and adheres to necessary procedures to maintain security Qualifications: · Bachelor's Degree in computer related field desired · Minimum 5 years' experience in IT audit experience, preferable in IT Systems. · Must be a Certified Information Security Auditor (CISA) · Familiarity with external regulations, e.g., DIACAP, HIPAA, Sarbanes-Oxley · Strong understanding of information security principles · Excellent organizational skills and ability to communicate with internal/external entities and executives a must Additional Information Why Kelly? As a Kelly Services candidate you will have access to numerous perks, including: Exposure to a variety of career opportunities as a result of our expansive network of client companies Career guides, information and tools to help you successfully position yourself throughout every stage of your career Access to more than 3,000 online training courses through our Kelly Learning Center Group-rate insurance options available immediately upon hire* Weekly pay and service bonus plans
    $63k-87k yearly est. 60d+ ago
  • IT Security Analyst

    Fabergent 4.0company rating

    Information security analyst job in Saint Louis, MO

    The position is in the Strategy, Planning and Execution (SPE) team, in the Information Risk Management (IRM) department. IRM is responsible for managing the Information Security risk for the organization. The SPE team leads the creation of the multi-year strategy and IRM roadmaps, and manages the execution of the plans. SPE also defines the corporate security standards, performs risk assessments, and measures organizational security performance. ESSENTIAL FUNCTIONS •Perform application and system risk assessments and security audits of internal and external facilities against established standards •Provides consultative advice to information security customers that enables them to make informed risk management decisions •Contribute in establishing policies and procedures necessary to ensure the security of information system assets, and to protect them from intentional or inadvertent access, disclosure, or destruction •Assists project teams in the implementation of security measures to meet corporate security policies and external regulations, e.g., Sarbanes Oxley, HIPAA •Weigh business needs against security concerns and articulate issues and options to management •Maintains appropriate security documentation for applications and systems •Ensures that user community understands and adheres to necessary procedures to maintain security •Communicates risk assessment findings to information security “customers,” or business partners •Active participation in strategic initiatives in accordance to the IRM roadmap Qualifications QUALIFICATIONS •At least 5 years of IT experience with a Bachelor's Degree in computer related field or equivalent •At least 3 years of experience in Information Security •PC skills including knowledge of Microsoft Office •Excellent organizational skills and ability to communicate with internal/external entities and executives a must •Effective leadership skills, demonstrated ability to coordinate people and teams to project/activity completion and the ability to work in a team environment, sharing workloads and responsibilities •Customer service-oriented; Ability to work in a flexible environment where requirements and procedures continuously evolve •Certification in information security (CISSP, CISM, GIAC, or equivalent) preferred Additional Information All your information will be kept confidential according to EEO guidelines.
    $67k-88k yearly est. 4h ago
  • Security Engineer IV

    Charter Spectrum

    Information security analyst job in Maryland Heights, MO

    This role requires the ability to work lawfully in the U.S. without employment-based immigration sponsorship, now or in the future. is not eligible for immigration sponsorship. Spectrum's Product and Technology team creates, develops, and operates the nation's fastest mobile service, most reliable internet service, most viewed live TV app, and the most advanced WiFi, serving nearly 100 million users and 500 million devices. We are transforming the next era of connectivity and entertainment experiences. The diversity of experience available within Spectrum's Product and Technology team is unmatched and there are opportunities to grow your career as a designer, architect, engineer, developer, operator, or data scientist. We are creative, disciplined, hard-working, complex-problem solvers that believe in collaborating to deliver the highest quality customer experience. BE A PART OF THE CONNECTION As a Security Engineer IV on the Information Security Engineering team, you'll drive security engineering activities that monitor, detect and alert on potential security threats and vulnerabilities concerning company database and application software systems. You'll work closely with database admins and technical operations staff to coordinate and communicate incident and remediation efforts and incident status to management. MAJOR DUTIES AND RESPONSIBILITIES * Designs and implements queries and use cases to correlate security relevant system and application log data to alert and report on potential security events. * Leads the security incident response lifecycle for any cyber security related events affecting Charter's databases and services. * Responsible for providing timely updates to security management according to Charter's Incident Response Plan. * Leads efforts to integrate and maintain scanning services with SEIM, ASPM and vulnerability management systems. * Implements, maintains and monitors threat intelligence data from various resources that is relevant to Charter's networks and systems. * Proactively hunts for security related threats and vulnerabilities that potentially affect Charter's databases and services. * Develops and coordinates the implementation of security counter-measures with the appropriate organizations. * Develops and recommends security policies, standards, and configurations to the security governance committee. * Leads and performs the advanced forensics analysis and data evidence gathering for critical security events. * Recommends, designs and implements security systems and tools used for Database Security * Manages security scanning infrastructure and integrations, mentoring others on management and providing ongoing system support. * Develops security requirements for new projects and performs the security testing prior to going into production. * Ensures compliance with security standards, policies and procedures. * Adheres to industry specific local, state, and federal regulations, as applicable Required Qualifications Education: * Bachelor's Degree or Master's in Computer Science or Information Systems or related field or equivalent experience * Minimum five (5) years of Information security experience * Minimum four (4) years of Information security operations experience PREFERRED JOB QUALIFICATIONS: * Current security certifications, such as CISSP, CEH, or SANS GIAC. * Oracle Certified Professional - Oracle Database Security Expert * Computer forensics * Cyber Security Risk Management and assessment methodologies * Understanding of AWS and cloud infrastructure Abilities: * Ability to read, write, speak and understand the English language to communicate with employees, customers, suppliers, in person, on the phone, and by written communications in a clear, straight-forward, and professional manner Skills: * Demonstrated knowledge of database management or database security * Experience with security scan assessment tools of Oracle, MSSQL, PostgreSQL or other relational or NoSQL databases. * Must understand what is required to prevent security exploits, how to detect security attacks and anomalies and how to respond to security incidents and intrusions * Expert knowledge of forensic methodologies and best practices to investigate intrusions, preserve evidence and coordinate a unified security response * Advanced knowledge of database management and administration. * Advanced knowledge of industry security standards and cyber security frameworks. * Demonstrated experience in managing information security events and incidents for large and sophisticated networks * Demonstrated leadership capabilities with the ability to work across functional boundaries, build consensus and drive results * Strong written and verbal communication skills and should have good presentation skills * Demonstrated understanding of file storage systems; block filesystems, NFS, S3 * Must be a problem solver, able to balance competing priorities, have a strong process orientation and be able to manage through complexity and rapid change Working Conditions: * Office Environment * Occasional off-hours incident response for critical security events. * May require some weekend and evening shift work for infrastructure administration * Minimal Travel Required SPECTRUM CONNECTS YOU TO MORE * Innovative Tools & Tech: Work with high-performing software and applications on the forefront of the digital telecommunications industry. * Dynamic Growth: The growth of our industry and evolving technology will power your career as you move up or around the company. * Supportive Teams: Who you are matters here. We aim to foster an inclusive workplace where every person is empowered to bring their best ideas. * Total Rewards: See all the ways we invest in you-at work and in life. #LI-SS5 #LI-SS5 ISE313 2025-62913 2025 Here, our employees don't just have jobs, they're building careers. That's why we offer a comprehensive pay and benefits package that rewards employees for their contributions to our success, supporting all aspects of their well-being at every stage of life. A qualified applicant's criminal history, if any, will be considered in a manner consistent with applicable laws, including local ordinances. Get to Know Us Charter Communications provides superior communication and entertainment products for residential and business customers through the Spectrum brand. Our offerings include Spectrum Internet, TV, Mobile and Voice. Beyond our connectivity solutions, we also provide local news, programming and regional sports via Spectrum Networks and multiscreen advertising solutions via Spectrum Reach. When you join our team, you'll be keeping our customers connected to what matters most in 41 states across the U.S. Watch this video to learn more. Grow Your Career Here We're committed to growing a workforce that reflects the customers and communities we serve - providing opportunities for employment and advancement to all team members. Spectrum is an Equal Opportunity Employer, including job seekers with disabilities and veterans. Learn about Life at Spectrum.
    $71k-97k yearly est. 11d ago
  • IT Audit Analyst

    Significance, Inc.

    Information security analyst job in OFallon, IL

    Job DescriptionSignificance is a woman-owned consulting firm serving the federal government. We are known for building trusted relationships within our teams and with our clients and hiring the highest-level experts who implement innovative solutions. We also like to have fun! Our focus on culture has contributed to Significance being named a Washington Business Journal Best Place to Work each of the last seven years. We are seeking an IT Audit Analyst to join our program in support of USTRANSCOM at Scott AFB. Work will be performed on a hybrid basis with onsite work expected 3 days per week. In this role you will: • Conduct reviews of a designated critical feeder and core accounting systems for compliance with applicable standards, ensuring compliance with: o DoD Instruction 8510.01 o NIST 800-53 RMF o FMFIA o Federal Information System Controls Audit Manual (FISCAM)• Support with the execution of test plans to evaluate design and operating effectiveness of IT controls. As findings are addressed, the Contractor shall assist in the development of a CAP.• Provide support in reviewing and mapping the Statement on Standards for Attestation Engagements 18 reports, reviewing and testing Complimentary User Entity Controls (CUEC), and providing the test results. • Support the development of CAPs and support remediation testing for CAPs that have been implemented by the programs. The results of the CUEC reviews are reported in the timeframe and format provided by OSD.• Support with FISCAM training as requested to program managers.Required Skills/Experience Interim Secret security clearance with ability to get a fully active secret security clearance 0-3 years experience in a related position, preferably supporting DoD agencies Bachelor's Degree (Information Systems, Accounting or relevant field) Must be currently located in the St. Louis metro area and able to report to Scott AFB at least 5 days/week Desired Skills Experience (can include internships) with IT audit or internal audit in the Federal Government At Significance, your base pay is one part of your total compensation package and is determined within a range. Our pay ranges are based on the local cost of labor benchmarks for each specific role, level, and geographic location. We carefully consider a wide range of factors when determining compensation, including but not limited to experience; job-related skill sets; relevant education or training; and other business and organizational needs. The salary range listed is for the level at which this job has been scoped. In the event that you are considered for a different level, a higher or lower pay range would apply. This position is also eligible for a comprehensive and generous benefits package. We are an E-Verify Employer********************************************** Contents/E-Verify_Participation_Poster.pdf************************************************************************************** We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $66k-91k yearly est. 17d ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Information security analyst job in Saint Louis, MO

    Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 60d+ ago
  • Security Analysts

    The Timberline Group

    Information security analyst job in Saint Louis, MO

    Security analysts are responsible for analyzing system and application security and making recommendations that optimize the protection of our computer systems and information resources. Security analysts develop, test, implement and maintain security policies and programs. They are responsible for staying current on security best practices and identifying security procedures to support business objectives and regulatory compliance. Responsibilities: The Information Security Office (ISO) Regulatory Compliance team is seeking a Security Analyst 2 to actively contribute to our organization's compliance efforts. This role calls for someone who can work closely with various business units, conduct thorough assessments, and assist in crafting effective remediation plans. Key Responsibilities: As a Security Analyst 2 on the Regulatory Compliance Team, you will: Coordinate audits with external assessors (QSA) and internal stakeholders to streamline assessment process related to collecting evidences Lead the validation of PCI requirements testing results and drive compliance gap remediation efforts Create and maintain documentation to support PCI program Conduct comprehensive internal compliance assessments, identify compliance gaps, and actively participate in developing remediation plans. Collaborate closely with different business units to ensure alignment with relevant regulations and standards. Support automation efforts across the compliance function. Regularly review policies and procedures to ensure ongoing compliance with regulatory requirements. Effectively manage and prioritize multiple projects related to regulatory compliance. Stay vigilant in monitoring and tracking regulatory changes, providing teams with guidance on updating policies and procedures as needed. Be a source of guidance and support for fellow members of the compliance team. Qualifications: Required: Must be presently authorized to work in the U.S. without a requirement for work authorization sponsorship by our company for this position now or in the future Must be committed to incorporating security into all decisions and daily job responsibilities 3+ years with leading, planning and execution of PCI assessments which includes review of control design with a focus on payment card compliance and security. Demonstrate the ability to work both independently with a strong sense of ownership and collaboratively within a team to achieve departmental and project objectives. Ability to maintain a high degree of confidentiality. Detail-oriented with strong project management skills, including project planning, directing project activities, and leading project teams. Proficient in documentation, communication skills, and a proven ability to deliver formal and informal presentations to a diverse audience. Ability to organize and prioritize multiple complex assignments and tasks for self and team members, ensuring deadlines are met. Excellent problem-solving and analytical skills, with the ability to define problems, collect data, establish facts, and draw valid conclusions. Demonstrated leadership, collaboration, and relationship management skills, representing goals within the team and outside the department. Ability to be flexible and adaptable to changing requirements and responsibilities while delivering high-quality results. Commitment to incorporating security into all decisions and daily job responsibilities. Proficiency with Microsoft Office applications, including Outlook, Word, PowerPoint, and Excel. Preferred: Bachelor's degree in Cyber Security, Computer Science, Computer Information Systems, Management Information Systems, or extensive security-related experience, or an equivalent combination of education and experience. Functional knowledge of productivity, documentation, and collaboration tools such as SharePoint, Jira, Confluence, and Jive. The Timberline Group Phone: ************ PO Box 385, Lebanon, MO 65536 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-88k yearly est. Easy Apply 60d+ ago
  • Principal Information Security Engineer (Security Product Owner)

    Mastercard 4.7company rating

    Information security analyst job in OFallon, MO

    **Our Purpose** _Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential._ **Title and Summary** Principal Information Security Engineer (Security Product Owner) Who is Mastercard? Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all. Overview: The Security Threat & Response Management (STRM) program within Mastercard's Corporate Security organization is looking for a Security Product Owner to lead execution of our preventative security control strategy. The ideal candidate is driven, proactive about security, analytical, and brings strong technical cyber security expertise. This role is central to shaping and executing the roadmap and strategy for our program's primary security tools and defenses. We are looking for a technically proficient and forward-thinking professional who proactively monitors evolving security trends, modern modern defenses, and leverages advanced knowledge of security tools to foster innovation and strengthen resilience throughout our environments. Role - Define and drive the roadmap for the 'Defend' product, which covers preventative and detective security controls and configurations across dozens of security tools and platforms including SIEM, SOAR, DLP, Application Control, XDR, NGFW, UEBA, NDR, and more. - As the Defend product owner, you will be the team lead ensuring the Defend product feature team's work is prioritized, aligned to strategy, and properly road mapped. - Partner with stakeholders from engineering, endpoint, identity, and cloud teams to deploy and optimize security technologies and controls. - Translate security requirements, risk policies, and threat models into actionable work items and initiatives. - Lead capability assessments and recommend technologies aligned with business needs and program strategies. - Configure, integrate, and optimize security tools (e.g., EDR/XDR, NGFW, IDS, DLP, Application Control) in accordance with strategic objectives and initiatives. - Monitor control effectiveness and continuously tune policies to reduce friction and increase coverage. - Ensure alignment with internal standards, regulatory frameworks, and industry best practices. All About You The ideal candidate for this position should: - Be an advanced technical expert with hands-on experience across multiple SecOps teams and functions such as Security Operations Center, Security Engineering, Incident Response, Detection Engineering, Threat Hunting, and Insider Threat for a large, global enterprise. - Understand modern agile methodologies and how to define, assign, and track work for product feature teams and partner engineering teams. - Be skilled at translating complex security requirements into clear, actionable technical plans in accordance with relevant security strategies and objectives. - Be confident in how to approach complex security tooling and dependencies such as configuring access controls, tuning detection policies, and integrating tools into detection models and lifecycles. - Be a strong communicator, able to articulate vision and strategy to technical and non-technical stakeholders at all levels. Additional capabilities that will set you apart: - Experience with proactive security strategies and security technology products, platforms, and key technology. - Expertise in successfully integrating and leveraging threat intelligence data into security controls and tools for proactive, targeted security prevention. - Deep understanding of modern SecOps concepts and strategies such as 'SOC 3.0', posture management domains, attack surface reduction, adaptive protections, automated triage and response, zero trust, cloud-native security, etc. - Familiarity with regulatory compliance standards and frameworks (e.g., NIST, ISO, ATT&CK, D3FEND, PCI). - Ability to collaborate effectively with SOC, IR, Engineering, and other key stakeholders. - Passion for innovation and continuous improvement in security technology optimization. Corporate Security Responsibility: Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: - Abide by Mastercard's security policies and practices; - Ensure the confidentiality and integrity of the information being accessed; - Report any suspected information security violation or breach; - Complete all periodic mandatory security training in accordance with Mastercard's guidelines. Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. **Corporate Security Responsibility** All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: + Abide by Mastercard's security policies and practices; + Ensure the confidentiality and integrity of the information being accessed; + Report any suspected information security violation or breach, and + Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. **Pay Ranges** O'Fallon, Missouri: $165,000 - $264,000 USD
    $62k-82k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in East Saint Louis, IL?

The average information security analyst in East Saint Louis, IL earns between $63,000 and $120,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in East Saint Louis, IL

$86,000

What are the biggest employers of Information Security Analysts in East Saint Louis, IL?

The biggest employers of Information Security Analysts in East Saint Louis, IL are:
  1. Collabera
Job type you want
Full Time
Part Time
Internship
Temporary