Post job

Information security analyst jobs in Fort Knox, KY - 144 jobs

All
Information Security Analyst
Information Security Engineer
Cyber Security Analyst
Cyber Security Engineer
Security System Engineer
Information Systems Security Manager
Security Engineer
Data Security Analyst
Information Security Director
Information Systems Security Officer
Senior Security Specialist
Senior Information Security Consultant
Securities Analyst
Director Of Information Technology Security
  • Information Security Analyst

    Vergence 3.3company rating

    Information security analyst job in Indianapolis, IN

    . Must live in the Indianapolis area. Pay: $42.70/hour In this role you will: • Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement • Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment • Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53) • Develop Standard Operating Procedures (SOP) for implementing security polices • Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems • Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data • Develop and implement procedures for use of information security management software • Propose information security software enhancements • Perform periodic audits to assure security policies and standards are being followed and are effective • Develop recommendations for enhancements and generates reports where necessary • Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
    $42.7 hourly 42d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Analyst

    OSC Global

    Information security analyst job in Radcliff, KY

    OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team. OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge. Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world. OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits. Position Overview The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks. Major Activities Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager. Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks. Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions. Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements. Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations Review and investigate security alerts and incidents from Microsoft 365 Defender Utilize eMASS to maintain and update POA&M status Review device compliance status from HBSS Work with other NEC Operations team members to remediate and mitigate security vulnerabilities. Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture. Perform other duties as appropriate and as assigned. Knowledge/Skills/Abilities Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months. Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management. Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills. Great analytical, critical thinking and problem-solving abilities. Superior presentation and negotiation skills. Strong management and organizational skills. Adaptable and capable of working in fast-paced environments. Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint Required Qualifications Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS Must possess appropriate DISA ESS certifications and experience. Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP) Must be US citizen Must possess active secret security clearance or higher Must be able to pass pre-employment background check Preferred Qualifications Bachelor's degree in IT, IM, or Cyber Security ACAS certification obtained within the last three (3) years, preferred HBSS Administrator certification obtained within the last three (3) years, preferred E-Verify: OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization. Reasonable Accommodation: OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
    $64k-88k yearly est. 35d ago
  • Information Security Analyst

    Stratacuity

    Information security analyst job in Frankfort, KY

    Required Experience * Monitor network resources for security issues. * Monitor a Security Information and Event Management (SIEM)system to enhance the overall cybersecurity of CHFS: Data Collection, Event Correlations, Incident Detection, Investigation and Analysis, Response and Mitigation, Tuning and Optimization, Compliance Monitoring * Investigate security breaches and other cybersecurity incidents. * Develop an audit to determine whether information systems are protected, controlled, and provide value to the organization. * Conduct audit follow-up to evaluate whether risks have been sufficiently addressed. * Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs. * Communicate audit progress, findings, results, and recommendations to stakeholders. * Document security breaches and assess the damage they cause. * Work with the security team to perform tests and uncover network vulnerabilities. * Fix detected vulnerabilities to maintain a high-security standard * Develop cabinet-wide best practices for IT security. * Help colleagues install security software and understand information security management. * Research security enhancements and make recommendations to management. * Stay up to date on information technology trends and security standards. * Maintain and update relevant system and process documentation and develop ad-hoc reports as needed. * Assist in the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes. * Provide off-hours support on an infrequent, but as-needed basis. * Work trouble tickets in the ticketing system * Conduct meetings and work closely with system owners and departmental leads in all business areas where ePHI and other confidential system data is found. * Assist with continuous monitoring activities documenting within the eGRC tool whether security and other related activities are consistently performed. * Perform various support activities for other projects including obtaining information and documentation to demonstrate policies, procedures, and operational processes that adhere to various regulations, policies, standards, and other compliance requirements. * Collaborate with OATS Departmental and other cross-agency staff to disseminate and engage appropriate OATS Security Teams for any new projects, tasks, and/or initiatives. * Lead and coordinate any special projects and/or tasks as directed by management. * Prepare reports for management. Preferred Education & Experience: Bachelor's degree in computer science, Software Engineering, or a related field (equivalent professional experience may be considered for substitution for the required degree on an exception basis). Candidates with one or more of the following certifications is a plus: * Offensive Security Certified Professional (OSCP) * Offensive Security Defensive Analysis (OSDA)* * Cybersecurity Analyst (CySA+) * CompTIA Security+ * CompTIA Advanced Security Practitioner (CASP+ * CompTIA Pen Test+ * Certified Network Defender (CND) * GIAC Security Essentials (GSEC) * System Security Certified Practitioner (SSCP) Knowledge, Skills & Abilities. This is a partial listing of the necessary knowledge, skills, and abilities required to perform the job successfully. It is not an exhaustive list. * Ability to set the tone for the organization and motivate management and team. * Understanding of information security regulations, including the Federal Information Security Management Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), ISO 27001, COBIT NIST, and ITIL. * Maintaining security, assessing and evaluating security, and doing security incident forensic work. Knowledge of vendors and their products including: * Experience with Government agencies, particularly the Department of Defense (DoD) on information security matters. Experience with Government Classified systems and the associated security requirements. * Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; and participating in professional organizations. * Proficiency in Microsoft Office Suite (Word, Excel, Outlook, etc.) * Innovative and creative mindset * Basic network security knowledge (general principles) * Excellent documentation and communication skills. * Ability to organize tasks into milestones and successfully execute to project completion. * Can work independently with little direct supervision. * General cyber-security understanding Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details. Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide. Employee Type: Contract Remote: Yes Location: Frankfort, KY, US Job Type: Date Posted: January 7, 2026 Pay Range: $35 - $43 per hour Similar Jobs * Information Security Analyst * Information Security Data Analyst * Information Systems Security Officer * Information Systems Analyst * Application Security Analyst
    $35-43 hourly 2d ago
  • IT Compliance and Risk Management Analyst/ IT Security Analyst/ IT Auditor/ PCI Analyst (Cont to Hire)

    Collabera 4.5company rating

    Information security analyst job in Columbus, IN

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Location: Columbus, IN 47201 Job Title: Sr. IT Compliance and Risk Management Analyst Duration: 6 months (Contract to Hire) Job description: •Responsible for the execution of compliance audits. Reviews procedures and corresponding evidence to determine whether or not internal controls are being properly applied. •Leads or executes compliance audits and risk assessments within established control areas. •Tests and documents more complex computer system records for information system integrity and transaction accuracy; reports discrepancies. •Prepares less complex audit plans or assists with more complex plans. •Prepares formal written reports to communicate audit results to management, and makes recommendations as appropriate; defines compliance issues and identifies root causes for review by manager. •May provide technical guidance to contract audit staff to ensure that audit objectives are met. •May coach and mentor less experienced analysts. Qualifications • Bachelors Degree Required: PCI (Payment Card Industry)- this is a higher level position and only looking for PCI SME (Subject Matter Expert) experience. • Must Have IT Compliance Experience with PCI Management Side experience • This manager is looking for a candidate that has seasoned PCI Experience on is a subject matter ex]pert and worked with the management side if PCI with the ability to set the right type of internal controls. Additional Information If interested please contact: Himanshu Prajapat ************ himanshu.prajapat(@)collabera.com
    $65k-88k yearly est. 2d ago
  • Information Security Specialist

    Starplus Energy

    Information security analyst job in Kokomo, IN

    The Information Security Specialist supports the planning, implementation, and operation of StarPlus Energy's global and local security management systems. This position ensures compliance with international and Korean security regulations, establishes physical and IT infrastructure security systems, and coordinates with both corporate headquarters and Korean government authorities to prevent information leaks and respond to potential security threats. This position reports to the Information Security Manager. Roles & Responsibilities: Plan, develop, and operate corporate information security systems for facility and IT infrastructure protection Establish incident response procedures and maintain readiness against internal and external security threats Develop and operate the site's physical security management system, including access control, CCTV, and intrusion detection system Manage and oversee external security service providers (e.g., physical security guards, monitoring services, and system maintenance vendors) to sure proper performance and contract compliance Support vendor performance evaluations, documentation, and corrective actions when service issues arise Define and enforce information protection policies and procedures to ensure consistent implementation across the organization Establish and operate a security management framework for Korean National Core Technology (KNCT) compliance Assign protection grades, define and manage secure communication systems, and safeguard all data and documentation related to KNCT Coordinate and conduct security education and training for employees Develop and maintain incident response systems to address potential data or technology leakage Support internal and external security audits and inspections from Korean government and SDI Headquarters Perform security infrastructure vulnerability assessments and implement corrective actions as needed Prepare technical report, standard operating procedures (SOPs), and other documentation required for compliance and audit response Perform other position related duties as assigned
    $65k-92k yearly est. 1d ago
  • Information Security Analyst

    Novalink Solutions 3.1company rating

    Information security analyst job in Indianapolis, IN

    Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS -IT) under the guidance of the Security Manager. The essential functions of this role are as follows: • Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement; • Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment. • Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits. • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800 -53). • Develops Standard Operating Procedures (SOP) for implementing security polices; • Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems; • Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data; • Develops and implements procedures for use of information security management software; • Proposes information security software enhancements; • Performs periodic audits to assure security policies and standards are being followed and are effective. • Develops recommendations for enhancements and generates reports where necessary; • Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security; • Mentors and provides guidance to new or other staff as needed; • Performs related duties as assigned. • Assist on other task as assigned. Thorough knowledge of information security management tools, policies, and standards of information security procedures; • Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy; • Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation; • Familiarity with domain structures, user authentication, and digital signatures; • Ability to develop and maintain information security standards; • Ability to understand and apply complex computer logic to work; • Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management; • Experience in assessing security needs of teams and assist in their security training. • Ability to communicate effectively both orally and in writing; • Ability to be a team member as well as a team leader depending on the situation; • Degree in information security or technology preferred; • Security certification preferred (e.g. CISSP). • Network Admin experience preferred. Supervisory Responsibilities/Direct Reports: This role does not provide direct supervision to direct reports. Required / Desired Skills Skill Required / Desired Amount of Experience To be effectively with wide range of information technologists, including systems administrators, technical support, application development, end users Required 3 Years Network Admin experience Required 3 Years Security certification (e.g. CISSP, CRISC) Required 3 Years Ability to develop and maintain information security standards; Required 1 Years Ability to understand and apply complex computer logic to work Required 1 Years Degree in information security or technology Required 1 Years Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc.) Required Computer security compliance and auditing experience Required IRS, SSA computer security compliance and audit experience Required HIPAA experience Required
    $68k-98k yearly est. 40d ago
  • Data Security Analyst

    Exeter Government Servi 4.1company rating

    Information security analyst job in Fort Knox, KY

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies. Required Qualifications: Experience in administrative support & MS Office proficiency Bachelor's degree or 5 years of experience U.S. citizen and MUST possess a current active DoD Secret clearance Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $64k-88k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Eli Lilly and Company 4.6company rating

    Information security analyst job in Indianapolis, IN

    At Lilly, we unite caring with discovery to make life better for people around the world. We are a global healthcare leader headquartered in Indianapolis, Indiana. Our employees around the world work to discover and bring life-changing medicines to those who need them, improve the understanding and management of disease, and give back to our communities through philanthropy and volunteerism. We give our best effort to our work, and we put people first. We're looking for people who are determined to make life better for people around the world. Join our Security Operations team in Indianapolis, IN where you will get to work on cutting edge cybersecurity technologies while driving exceptional customer experience and improving our enterprise security platform services. What You'll Be Doing Respond to support cases from customers experiencing issues with security tools Provide timely and effective technical troubleshooting and resolution Document case studies, playbooks, and solutions for future reference by team Develop and maintain knowledge base articles and operational procedures Communicate updates and status clearly and professionally to customers Collaborate with cross-functional teams (engineering, product, IT architects) to escalate and resolve complex issues Identify trends in customer issues and recommend product or process improvements Participate in training sessions, conferences, and workshops to expand skills and share learnings with the team Support & Troubleshooting Manage inbound security tool incidents across SIEM, IDS/IPS, EDR, Zscaler (ZIA/ZPA), Cloudflare WAF, Identity & Access Management, and/or other cloud security platforms Adaptability and willingness to learn new technologies and processes Develop proactive means of identifying security platform issues before business impact is realized Assist with developing automation scripts and workflows to increase operational efficiency Identify opportunities and drive initiatives to automate routine tasks and processes Documentation & Knowledge Sharing Create and update detailed playbooks, runbooks, and troubleshooting guides Contribute to an evolving knowledge base to empower peers and customers Document health metrics to measure security tool effectiveness and coverage Collaboration & Communication Foster strong teamwork by mentoring and coaching junior engineers Work closely with product managers and senior engineers to translate feedback into platform enhancements Liaise with enterprise IT, architects, Technical leads and stakeholders to align solutions with business needs Advocate innovative security solutions that balance user experience and protection Continuous Improvement Stay current on security threats, regulatory changes, and emerging technologies Drive adoption of creative, scalable solutions for complex global security platform challenges Analyze recurring issues, support tickets and operational data to identify improvement areas Propose and implement process optimizations and preventive measures Assist with testing and enablement of new tools, technologies and operational capabilities Evaluate new tools and/or feature sets for existing tools (e.g., Splunk, CrowdStrike, Zscaler (ZIA/ZPA), Cloudflare WAF) and recommend integrations Your Minimum Requirements: Bachelor's degree in Cybersecurity, Computer Science, IT, or similar degree and at least 1 year experience in technical support, security operations, or platform engineering OR Associate degree in Cybersecurity, Computer Science, IT or similar degree and at least 5 years experience in technical support, security operations, or platform engineering Hands-on with SIEM, IDS/IPS, EDR, web application firewalls, identity/access management, and cloud security Basic networking knowledge (TCP/IP, DNS, DHCP) Qualified candidates must be legally authorized to be employed in the United States. Lilly does not anticipate providing sponsorship for employment visa status (e.g., H-1B or TN status) What You Should Bring: Strong problem-solving skills and a methodical troubleshooting approach Excellent written and verbal communication; customer-focused mindset Scripting proficiency (Python, PowerShell) for automation and data processing Basic coding abilities for scripts, automation, and custom integration Experience with cloud platforms (AWS, Azure, GCP) and containerized environments Familiarity with IT Service Management (ITIL) practices Certifications such as CompTIA Security+, CISSP, CCSP, or GIAC Lilly is dedicated to helping individuals with disabilities to actively engage in the workforce, ensuring equal opportunities when vying for positions. If you require accommodation to submit a resume for a position at Lilly, please complete the accommodation request form (******************************************************** for further assistance. Please note this is for individuals to request an accommodation as part of the application process and any other correspondence will not receive a response. Lilly is proud to be an EEO Employer and does not discriminate on the basis of age, race, color, religion, gender identity, sex, gender expression, sexual orientation, genetic information, ancestry, national origin, protected veteran status, disability, or any other legally protected status. Our employee resource groups (ERGs) offer strong support networks for their members and are open to all employees. Our current groups include: Africa, Middle East, Central Asia Network, Black Employees at Lilly, Chinese Culture Network, Japanese International Leadership Network (JILN), Lilly India Network, Organization of Latinx at Lilly (OLA), PRIDE (LGBTQ+ Allies), Veterans Leadership Network (VLN), Women's Initiative for Leading at Lilly (WILL), en Able (for people with disabilities). Learn more about all of our groups. Actual compensation will depend on a candidate's education, experience, skills, and geographic location. The anticipated wage for this position is $64,500 - $158,400 Full-time equivalent employees also will be eligible for a company bonus (depending, in part, on company and individual performance). In addition, Lilly offers a comprehensive benefit program to eligible employees, including eligibility to participate in a company-sponsored 401(k); pension; vacation benefits; eligibility for medical, dental, vision and prescription drug benefits; flexible benefits (e.g., healthcare and/or dependent day care flexible spending accounts); life insurance and death benefits; certain time off and leave of absence benefits; and well-being benefits (e.g., employee assistance program, fitness benefits, and employee clubs and activities).Lilly reserves the right to amend, modify, or terminate its compensation and benefit programs in its sole discretion and Lilly's compensation practices and guidelines will apply regarding the details of any promotion or transfer of Lilly employees. #WeAreLilly
    $64.5k-158.4k yearly Auto-Apply 1d ago
  • Director Information Security Job Details | Farm Credit Mid-America

    FCS of Mid America 4.8company rating

    Information security analyst job in Jeffersontown, KY

    Farm Credit Mid-America is a financial services cooperative serving financial needs of farmers and rural residents in Arkansas, Indiana, Kentucky, Missouri, Ohio, and Tennessee. Our purpose is to secure the future of rural communities and agriculture. We are passionate about serving the needs of our rural communities and creating positive customer experiences. Farm Credit Mid-America is a great place to work! We have been named as a Best Places to Work in Kentucky for the past 13 years. At Farm Credit Mid-America we put our customers and team members at the heart of all we do. SCHEDULE: Full Time, Hybrid (Louisville, KY) TRAVEL REQUIRED: 0% - 25% COMPENSATION: $111,561.00 to $196,028.00 base salary plus potential for variable compensation. Base pay is determined by your skills, qualifications, experience, and location. Farm Credit Mid-America/Rural 1st may compensate outside of the salary range for bona fide reasons not related to membership in a protected class. About Our Opportunity The Director of Information Security has the responsibility for securing the technology and data resources of the organization. This includes the implementation of a sound security program that provides timely detection, containment and necessary incident response to mitigate exposures. Responsible for security and integrity of all corporate device endpoints, servers, and network systems including firewalls, switches, routers, wireless access points, and internet, retail office, partners, and data center connectivity, physical security consulting, recommendations, assessments, and awareness training. How You Will Spend Your Time * Collaborative and positive working relationships with functional leaders, peers, team members and other stakeholders to prioritize strategic projects, making sure teams are working on the right projects. * Departmental goals by adjusting departmental plans and priorities to address resource and operational challenges with focus on the next two to four years' priorities. * Accountability for performance and results in business function and operational areas by making decisions based on policies, procedures, business plan, resource availability and functional objectives; identifying and addressing opportunities for application of functional knowledge and existing methodologies to solve complex problems. * Efficiencies through leadership of vendor management of Security and Network technologies to enable the organization to keep pace with security and technology advancements. * By creating an environment that encourages team members to pursue excellence, be curious and have courage to propose creative solutions. * Processes and programs that promote and positively contribute to providing an excellent customer experience. * By maintaining, business and industry knowledge, and process development capabilities to inform decisions and enable the organization to keep pace with technology advancements. * By providing physical security consulting, recommendations, assessments, and awareness training. * Keeping customers and team members at heart, understanding that the key to our success is in the family and relationships of those they lead and serve. * Accepting and providing honest and supportive coaching and feedback, and participating in self- development while supporting team members in theirs. * Inspiring a shared purpose, setting team's direction, deploying resources, evaluating performance, reviewing pay and recommending employment decisions. * Modeling our values of honesty, respect, commitment and exemplifying a servant's heart. Minimum Education & Experience Bachelor's degree in computer science, business or related field. Plus 7 years experience in security and/or networking role(s) working with enterprise systems and demonstrates progressively increasing responsibilities including managing teams of technical specialists. CISSP preferred within 1.5 years. Mental & Physical Requirements While engaged in this position, team members will routinely sit, use hands for tasks, and communicate orally. Standing or walking is frequently required, while occasional demands include reaching with hands and arms, and lifting or moving up to ten pounds. Vision requirements encompass close and distance vision. The work environment typically has a moderate noise level. This role may entail a blend of mental and physical capabilities, requiring strong mental acuity, problem-solving skills, and occasional physical tasks such as standing, lifting, or extended computer usage. Some roles may require physical or mental requirements related to driving, such as a valid driver's license, and the ability to drive a long-distance. Reasonable accommodations will be considered for individuals as requested. Farm Credit Mid-America provides a competitive total rewards package to our team members. This includes an award winning 401(k) Plan. Our Health and Financial wellness benefits provide safety, security and peace of mind for you and your family. Here is a highlight of our Total Rewards and Benefits. Farm Credit Mid-America is an equal opportunity employer, and all applicants will receive consideration for employments without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, disability, or any other category protected by law. #LI-HYBRID Nearest Major Market: Louisville
    $111.6k-196k yearly 29d ago
  • Information Security Engineer

    Heaven Hill Brands 4.6company rating

    Information security analyst job in Louisville, KY

    Job Description: with a base location in Louisville, KY. What the Role Is The Information Security Engineer is responsible for strengthening and supporting Heaven Hill's cybersecurity program. This hands-on technical role focuses on implementation, monitoring, and continuous improvement of security controls across cloud and on-premise environments. The Engineer supports governance and risk management efforts and plays a key role in incident response and in deploying and maintaining secure technology solutions. This position will collaborate with IT and business units to ensure Heaven Hill's data and systems remain resilient against evolving threats, while helping enable secure and efficient access through identity and access management solutions. This role is instrumental in advancing Heaven Hill's overall security maturity and ensuring that cybersecurity enables, rather than limits, innovation and operational excellence. How You Will Spend Your Time? Security Engineering & OperationsDesign, implement, monitor, and maintain security controls across cloud, identity, endpoint, and network environments. Implement and manage Privileged Access Management (PAM) and Role-Based Access Control (RBAC) programs that align with business needs and support POLP (Principle of Least Privilege). Support and enhance Identity Management solutions, including user provisioning, Single Sign-On (SSO) integrations, and secure application configurations. Support secure configuration and hardening of Windows and Linux servers, as well as Windows and mac OS workstations. Manage and maintain DNS and domain registrar configurations to ensure secure and reliable name resolution and domain integrity. Implement, integrate, and manage authentication, including Kerberos, FIDO2, Smart Cards, passkeys, certificate-based authentication, and TLS or key management solutions. Administer and support Public Key Infrastructure (PKI), including certificate issuance, renewal, and lifecycle management. Perform vulnerability scanning and coordinate remediation activities. Administer and optimize core security platforms such as endpoint detection and response (EDR) and security information and event management (SIEM) systems, including alert tuning, integration, and incident response support. Develop and maintain automation or scripting (e. g. , PowerShell, Python) to improve efficiency in security monitoring, configuration management, and response processes. Monitor security events, investigate incidents, perform root cause analysis, and drive post-incident improvements. Collaborate with IT and business teams to ensure security considerations are integrated into infrastructure and project planning from the outset. Risk & GovernanceConduct and document formal risk assessments, identify, evaluate, and communicate risk mitigation strategies. Develop, update, and maintain cybersecurity policies, standards, and procedures aligned with the NIST framework. Partner across the business to build awareness, ensure accountability, and foster a risk-informed culture. Support security aspects of vendor assessments and technology evaluations. Collaboration & Continuous ImprovementProvide security guidance for new initiatives, integrations, and system changes. Contribute to incident response planning, tabletop exercises, and lessons-learned reviews. Develop, maintain, and refine security operations and incident response playbooks to support consistent and effective response activities. Stay informed on emerging threats, technologies, and best practices relevant to manufacturing and spirits production environments. Who You Are… Required Skills and Experience:Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or equivalent experience along with Information Technology related associate's degree. Minimum 5 years of experience in cybersecurity engineering and/or IT engineering. Strong cloud security experience, including the design input, configuration, and operation of controls in cloud and hybrid environments. Hands-on experience with Microsoft Entra ID (Azure AD), including Conditional Access, identity lifecycle management, and integration within hybrid Active Directory environments. Experience with enterprise email security, endpoint protection, network security, data protection. Experience implementing and managing Microsoft Purview for data protection, governance, and compliance. Experience supporting third-party risk management or vendor assessments. Strong understanding of identity, endpoint, and network security architectures and their integration across enterprise environments. Experience performing root cause analysis during and after security incidents. Experience developing or contributing to security documentation such as policies, standards, or procedures. Strong communication skills across technical and non-technical audiences. Experience in manufacturing or industrial environments. Familiarity with OT/ICS security principles, including network segmentation, asset visibility, and industrial protocol security. Valued but not Required Skills and Experience:Professional certifications such as CISSP, CISM, CRISC, or equivalent. Understanding secure application deployment or DevSecOps principles. Physical Requirements While performing duties of job, employee is occasionally required to:Stand; walk; use hands and fingers to handle or feel objects; use a computer; and reach with hands and arms. Occasionally lift and/or move up to 20 pounds. BenefitsPaid Vacation11 Paid HolidaysHealth, Dental & Vision eligibility from day one FSA/HSA401K match EAPMaternity/Paternity Leave Heaven Hill and its affiliates are committed to fostering a diverse workforce as an Equal Employment Opportunity company. We invite applications from candidates of all backgrounds, without regard to race, religion, color, sex, sexual orientation, natural origin, gender identity or expression, age, disability, veteran status, or any other legally protected characteristic.
    $69k-90k yearly est. 29d ago
  • Information Systems Security Manager

    DMI Mobile Enterprise Solutions 4.0company rating

    Information security analyst job in Fort Knox, KY

    About DMI DMI is a leading provider of digital services and technology solutions, headquartered in Tysons Corner, VA. With a focus on end-to-end managed IT services, including managed mobility, cloud, cybersecurity, network operations, and application development, DMI supports public sector agencies and commercial enterprises around the globe. Recognized as a Top Workplace, DMI is committed to delivering secure, efficient, and cost-effective solutions that drive measurable results. Learn more at ************* About the Opportunity DMI (Digital Management, Inc.) is seeking an experienced and proactive Information Systems Security Manager (ISSM) who will report directly to the Program Manager.The ISSM will be the primary security leader for the program while achieving a new Authority to Operate (ATO) and maintaining the security posture for an application migrating to the Enterprise Cloud Management Agency (ECMA) cARMY environment. Responsible for navigating the unique challenges of securing systems in a DOW-approved cloud while ensuring compliance with all applicable DOW, DISA, and Army security policies. Primary focus will be on proactive risk management, continuous monitoring, and successfully managing the ATO lifecycle within the Army's cloud ecosystem. Duties and Responsibilities: * Cloud ATO Lifecycle Management: Lead all efforts to achieve and maintain the system's ATO within the ECMA cARMY environment. Primary driver for the RMF package, developing, maintaining, and updating all required documentation within the Enterprise Mission Assurance Support Service (eMASS). * Vulnerability Management & ACAS Remediation: Directly manage the vulnerability remediation process. This includes analyzing scan results from the Assured Compliance Assessment Solution (ACAS), prioritizing vulnerabilities, and coordinating with system administrators and developers for timely remediation within the cloud environment. * Cloud Security Controls & Compliance: Architect and validate the implementation of security controls, interpreting and applying them specifically to a cloud environment. Leverage control inheritance from the cARMY platform and ensure compliance with relevant Security Technical Implementation Guides (STIGs). * Incident Response: Serve as the lead for investigating and resolving security-related incidents and anomalies. * Risk Management Framework (RMF): Apply a deep understanding of the RMF to advise leadership on security posture, risk acceptance, and strategic planning for the system's successful operation in cARMY. * Collaboration & Support: Interfaces directly with government counterparts, including but not limited to the ECMA, the system's Information System Security Officer (ISSO), and Authorizing Official (AO) representatives. * Oversee all aspects of application and system security for a program hosted in a DOW cloud environment. * Manage the Plan of Action & Milestones (POA&M): Track vulnerabilities and ensure a clear path to remediation. * Ensure continuous compliance with all relevant DISA STIGs and Cloud Computing Security Requirements Guide (CCSRG) mandates. * Provide regular security posture reports and briefings to program leadership and Government customers. * Other security-related duties as assigned. Qualifications Education and Years of Experience: * 7+ years of progressive experience in cybersecurity, with at least 5 years in a direct ISSM or similar role supporting DOW programs. * A Bachelor of Science degree in Cybersecurity, Information Technology, or a related field is highly desirable. Required Skills/Certifications: * DoD 8570 IAM Level III certification (e.g., CISM, CISSP, or GSLC) is highly preferred * DoD 8570 IAT Level II certification is mandatory (CompTIA Security+ CE). * Demonstrable experience successfully guiding a system through the ATO process is strongly preferred. * eMASS Proficiency: Significant experience working within eMASS to manage the RMF package for a DOW IT system. * Demonstrated expertise with ACAS: Proven hands-on experience managing vulnerabilities identified by ACAS and driving the remediation process * Deep Understanding of RMF and STIGs: A thorough understanding of the DOW Risk Management Framework and the ability to effectively apply and validate DISA STIGs Citizenship and Clearance: * Citizenship Status: Must be a United States Citizen. * Security Clearance: Must possess an active SECRET security clearance. Physical Requirements: None required for this position. Location: Must reside within a one-hour driving time of Fort Knox, Kentucky. Working at DMI DMI is a diverse, prosperous, and rewarding place to work. Our culture is shaped by five core values that guide how we work, grow, and succeed together: * Do What's Right - We lead with honesty and integrity. * Own the Outcome - We take responsibility and deliver. * Deliver for Our Customers - We are relentless about delivering value. * Think Bold, Act Smart - We innovate with purpose. * Win Together - We collaborate and celebrate our success. These values aren't just ideals-they show up in how we support every part of your well-being: * Convenience/Concierge - Virtual health visits, commuter perks, pet insurance, and entertainment discounts that make life easier. * Development - Annual performance reviews, tuition assistance, and internal career growth opportunities to help you thrive. * Financial - Generous 401(k) matches, life and disability insurance, and financial wellness tools to support your future. * Recognition - Annual awards, service anniversaries, referral bonuses, and peer-to-peer shoutouts that spotlight your achievements. * Wellness - Healthcare coverage, wellness programs, flu shots, and biometric screenings to support your health. DMI values employees for their talents and contributions, and we take pride in helping our customers achieve their goals. Because when we live our values, we all win together. * No Agencies Please * Applicants selected may be subject to a government security investigation and must meet eligibility requirements for access to classified information. US citizenship may be required for some positions.
    $86k-111k yearly est. Auto-Apply 5d ago
  • Cyber Security Analyst

    Mantech 4.5company rating

    Information security analyst job in Crane, IN

    ManTech seeks a motivated, career and customer-oriented **Cyber Security Analyst** to join our team in **Crane, Indiana.** This is an onsite position. As a core member, you will assist in the research & design, engineering, integration, testing, training, logistics, laboratory research, field engineering, and acquisition and operations analysis in support of a variety of Navy and Marine Corps programs and projects with a focus on defensive cyber technologies, mission assurance, and resilience capabilities for the tactical network environment. Your effort will go towards dramatically increasing the warfighter's effectiveness. If you enjoy working on a highly collaborative and dynamic team and want to make a difference for the warfighter, then we would love to have you on our team! **Responsibilities include but are not limited to:** + Review and evaluate System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), systems and networks diagrams, Security Requirements Traceability Matrices (SRTMs), Risk Assessments, and associated Information Systems (IS) Certification and Accreditation (C&A) documents in accordance with Department of Defense (DoD), Intelligence Community (IC), National and Agency standards + Observe, evaluate, and document IS security certification testing and prepare Security Certification Test Reports (SCTRs) with findings and recommendations regarding systems; Approval To Operate (ATO) + Inspect systems, networks, sites for compliance to InfoSec standards and policies + Additional duties include producing periodic progress reports, preparing various forms of correspondence concerning deficiencies and statuses of SSPs/SSAAs, maintaining and reporting statistics on personal C&A efforts + Knowledge of DoD, IC, and National Security Policies, Regulations, Directives, and Instructions **Minimum Qualifications:** + High School Diploma + Knowledge of commonly used concepts, practices, and procedures within the particular field + 1+ years of experience in the field or in a related area + Hands-on experience with networking technologies such as routers, switches, firewalls, and VPNs **Preferred Qualifications:** + Bachelors Degree + Familiarity with network vulnerability scanners, web scanners, and database scanners is a plus + Knowledge of cloud computing concepts and technologies + CISSP, CISM, CCNA, CASP, or equivalent. **Clearance Requirements:** + Must have a current and active TS/SCI clearance **Physical Requirements:** + The person in this position must be able to remain in a stationary position 50% of the time. + Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $60k-77k yearly est. 60d+ ago
  • Senior Security Specialist

    Orange Business 3.3company rating

    Information security analyst job in Indiana

    Orange Business is here! About us Join us at Orange Business! We are a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities. About the role We are building a specialized Security Change Qualification Team to support one of our major customers with high-quality technical expertise. This team will play a critical role in ensuring the seamless qualification and coordination of changes across complex IT infrastructures. The Security Change Qualification Specialist will act as a key bridge between the customer and the operational SOC team, ensuring that all security change requests are accurately qualified and clearly defined for seamless implementation. The ideal candidate will possess a mix of technical expertise, coordination capabilities, and communication skills to excel in this highly visible and critical role. Primary responsibility is to provide Tier 2 network security support of Firewall/Proxy/LB environments. This position interfaces with external clients and is highly visible. Responsible for general architecture, initial configurations and subsequent management of one or more Firewall/VPN based/IPS/Proxy/DLP/Sandbox systems. Provide 24x7 production support to accept, operate and maintain security elements. There are off shift activities and pager rotation. Troubleshoot end to end network security issues and find the root cause. Conduct risk assessments on all work performed. Conduct daily, weekly, and monthly proactive maintenance activities including configuration changes and version upgrades as per business directive. Good to have certification on security domain like ITIL,Firewall, Proxy, Cloud Security etc. Good written and verbal communication skills / fluent English. 4-10 years of experience. About you Palo Alto- (5220, 5240, 5310) (Firewall, Panaroma, Global Protect) and Pulse Secure (Ivanti). Proxy:- •Zscaler (ZIA, ZPA, ZDX)- PAC file, NSS, MCAS, Various Policy Types- URL & Cloud app, DLP, Sandbox, Advance Cloud Firewall etc. APP Segment, APP Connector. Load Balancers:- F5 (1600,3600,3900,6400) Leading Industry security Certifications (CCSA, CCNP Security, PCNSA/PCNSE, BCCPA, ZCCA-IA, ZCCP-IA, ZCCA-PA) You bring a can-do attitude, tackle challenges head-on and challenge the status quo with new and innovative ideas. What we offer • Global Opportunities: Work in multi-national teams with opportunity to collaborate with colleagues and customers from all over the world. • Flexible Work Environment: Flexible working hours and possibility to combine work from office and home (hybrid ways of working). • Professional Development: training programs and upskilling/re-skilling opportunities. • Career Growth: Internal growth and mobility opportunities within Orange. • Caring and Daring Culture: Health and well-being programs and benefits, diversity & inclusion initiatives, CSR and employee connect events. • Reward Programs: Employee Referral Program, Change Maker Awards. Only your skills matter Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neuroatypia, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
    $91k-131k yearly est. Auto-Apply 6d ago
  • SP28 Senior Information Systems Security Officer (ISSO)

    Amentum

    Information security analyst job in Crane, IN

    Amentum is looking for a Sr. Information System Security Officer (ISSO) to support Program Offices within Department of Defense Strategic Systems Programs (SSP). The ISSO will support non-enterprise information systems of large-scaled programs of record (POR), as well as multiple Science and Technology (S&T) programs. The System ISSO will provide direct support to the Program Office Technical Lead onsite at NSWC Crane and will be expected to travel regularly to SPHQ or Field Activities. The System ISSO is responsible for ensuring that the appropriate operational Cybersecurity posture is maintained for the systems under their purview. They ensure that the applicable system level security objectives are defined for implementation and assist in creating the security authorization package. Job Duties and Responsibilities: Ensure systems are accredited, and the standard operating procedures include required security procedures. Ensure that the systems are operated and maintained such that they stay within the accepted level of residual Cybersecurity risk. Ensure that Cybersecurity documentation is developed, maintained, and updated as required. Implement SSP responses to DoD IAVAs and IAVBs. Initiate investigative procedures for security events, and institute protective or corrective measures when a security incident or vulnerability is discovered. Report in conjunction with the User Representative (UR) to the branch ISSM on Cybersecurity incidents. Work with the URs to ensure that incident response plans and contingency plans are developed and tested prior to system operation and annually thereafter, and results documented in the Security Authorization Package. Participate in all engineering reviews for systems under their cognizance. In alignment with the Risk Management Framework (RMF), implement security controls, document security measures, and oversee the security posture of information systems operating under Interim Authorization to Test (IATT), preparing authorization packages, and working with various stakeholders to ensure the system's security. Collaborate with System Administrators to ensure security configurations, patches, and access controls are implemented and maintained during testing. Develop requirements for large-scale or service specific pilot projects. Support (prepare, review, and present) the Program Office's DoD Acquisition process in the development of the Objective Quality Evidence (OQE) (i.e. Cyber Security Strategy, GAO responses, Clinger Cohen Act, Cyber Test & Evaluation Strategy, etc.) for multiple programs, in compliance with SSP Regulations. Support the Program Office Technical Lead as needed identifying issues and action items, document OQE, and participating in ISSO discussions. Provide customer interactions with Program Offices and associated contractors/subcontractors. Customer interactions will be a combination of teleconferences and on-site meetings. Interface with the SSP Functional Authorizing Official (FAO, formerly AODR) Coordinate and collaborate with the stakeholders, including SSP representativ.es and contractors/subcontractors through assessments, subject matter expert input to proposals, technical interchange meetings, status teleconferences, email correspondence, and other meetings as required. Support development of technical presentations and provide comments on the technical content. Develop System Security Plans detailing the security controls implemented for each information system. Work with SSP programs to develop and maintain lifecycle plans. Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner. Evaluate performer deliverables and presentations. Required Qualifications: Bachelor of Science Degree in Cybersecurity, Computer Science, Computer Engineering or equivalent 5+ years of relevant experience Must be able to obtain and maintain a US Government Top Secret/Critical Nuclear Weapons Design Information Clearance OR a TS/SCI Clearance. Interim Top-Secret Clearance is required to begin work. Please note US Citizenship is required to obtain and maintain a Top-Secret Clearance. CompTIA Security+ or equivalent certification Ability to collaborate with large and highly competent technical teams. Strategic high-level thinking Ability/experience with planning an initiative involving large-scale, networked systems. Must be a United States citizen to obtain clearance. Willing and able to travel 40% or more. Preferred Qualifications: 10+ years of relevant experience Graduate degree in Cybersecurity, Certified Information Systems Security Professional (CISSP) certification, or Certified Information Security Manager (CISM) certification Active Top Secret Clearance Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.
    $60k-81k yearly est. Auto-Apply 60d+ ago
  • Senior Manager, Information Security Office Consultant

    Dev 4.2company rating

    Information security analyst job in Valparaiso, IN

    Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located. Company Name: Capital One Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. What You'll Do: Act as a central Information Security point of contact for the Enterprise Platform team Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment Work with line of business leadership to anticipate their objectives and needs to better serve the line of business Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization Basic Qualifications: High School Diploma, GED or equivalent certification At least 8 years of experience working in cybersecurity or information technology At least 7 years of experience providing guidance and oversight of Security concepts At least 7 years of experience performing security risk assessments and security architecture reviews At least 7 years of experience with architecture, software design, networking, and cloud infrastructure At least 5 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 4+ years of experience in IAM or related areas Experience building software utilizing public cloud (e.g. AWS, GCP, Azure) Familiarity with Cloud patch management practices such as system rehydration and image management Experience utilizing Agile methodologies Experience with Software Security Architecture Experience with Application Security Experience with Threat Modeling Experience with Penetration Testing or Vulnerability Management Experience with integrating SaaS products into an Enterprise Environment Experience with securing Container services Splunk-Fu / Enterprise Monitoring experience Financial services industry experience Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP) Experience in Offensive and Defensive Security techniques Experience in a regulated environment Strong conceptual thinking, influence and communication skills At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to [email protected] Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $89k-121k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Indianapolis, IN

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 54d ago
  • Information Systems Security Manager

    DMI 3.5company rating

    Information security analyst job in Fort Knox, KY

    DMI is a leading provider of digital services and technology solutions, headquartered in Tysons Corner, VA. With a focus on end-to-end managed IT services, including managed mobility, cloud, cybersecurity, network operations, and application development, DMI supports public sector agencies and commercial enterprises around the globe. Recognized as a Top Workplace, DMI is committed to delivering secure, efficient, and cost-effective solutions that drive measurable results. Learn more at ************* About the Opportunity DMI (Digital Management, Inc.) is seeking an experienced and proactive Information Systems Security Manager (ISSM) who will report directly to the Program Manager. The ISSM will be the primary security leader for the program while achieving a new Authority to Operate (ATO) and maintaining the security posture for an application migrating to the Enterprise Cloud Management Agency (ECMA) cARMY environment. Responsible for navigating the unique challenges of securing systems in a DOW-approved cloud while ensuring compliance with all applicable DOW, DISA, and Army security policies. Primary focus will be on proactive risk management, continuous monitoring, and successfully managing the ATO lifecycle within the Army's cloud ecosystem. Duties and Responsibilities: Cloud ATO Lifecycle Management: Lead all efforts to achieve and maintain the system's ATO within the ECMA cARMY environment. Primary driver for the RMF package, developing, maintaining, and updating all required documentation within the Enterprise Mission Assurance Support Service (eMASS). Vulnerability Management & ACAS Remediation: Directly manage the vulnerability remediation process. This includes analyzing scan results from the Assured Compliance Assessment Solution (ACAS), prioritizing vulnerabilities, and coordinating with system administrators and developers for timely remediation within the cloud environment. Cloud Security Controls & Compliance: Architect and validate the implementation of security controls, interpreting and applying them specifically to a cloud environment. Leverage control inheritance from the cARMY platform and ensure compliance with relevant Security Technical Implementation Guides (STIGs). Incident Response: Serve as the lead for investigating and resolving security-related incidents and anomalies. Risk Management Framework (RMF): Apply a deep understanding of the RMF to advise leadership on security posture, risk acceptance, and strategic planning for the system's successful operation in cARMY. Collaboration & Support: Interfaces directly with government counterparts, including but not limited to the ECMA, the system's Information System Security Officer (ISSO), and Authorizing Official (AO) representatives. Oversee all aspects of application and system security for a program hosted in a DOW cloud environment. Manage the Plan of Action & Milestones (POA&M): Track vulnerabilities and ensure a clear path to remediation. Ensure continuous compliance with all relevant DISA STIGs and Cloud Computing Security Requirements Guide (CCSRG) mandates. Provide regular security posture reports and briefings to program leadership and Government customers. Other security-related duties as assigned. Qualifications Education and Years of Experience: 7+ years of progressive experience in cybersecurity, with at least 5 years in a direct ISSM or similar role supporting DOW programs. A Bachelor of Science degree in Cybersecurity, Information Technology, or a related field is highly desirable. Required Skills/Certifications: DoD 8570 IAM Level III certification (e.g., CISM, CISSP, or GSLC) is highly preferred DoD 8570 IAT Level II certification is mandatory (CompTIA Security+ CE). Demonstrable experience successfully guiding a system through the ATO process is strongly preferred. eMASS Proficiency: Significant experience working within eMASS to manage the RMF package for a DOW IT system. Demonstrated expertise with ACAS: Proven hands-on experience managing vulnerabilities identified by ACAS and driving the remediation process Deep Understanding of RMF and STIGs: A thorough understanding of the DOW Risk Management Framework and the ability to effectively apply and validate DISA STIGs Citizenship and Clearance: Citizenship Status: Must be a United States Citizen. Security Clearance: Must possess an active SECRET security clearance. Physical Requirements: None required for this position. Location: Must reside within a one-hour driving time of Fort Knox, Kentucky. Working at DMI DMI is a diverse, prosperous, and rewarding place to work. Our culture is shaped by five core values that guide how we work, grow, and succeed together: Do What's Right - We lead with honesty and integrity. Own the Outcome - We take responsibility and deliver. Deliver for Our Customers - We are relentless about delivering value. Think Bold, Act Smart - We innovate with purpose. Win Together - We collaborate and celebrate our success. These values aren't just ideals-they show up in how we support every part of your well-being: Convenience/Concierge - Virtual health visits, commuter perks, pet insurance, and entertainment discounts that make life easier. Development - Annual performance reviews, tuition assistance, and internal career growth opportunities to help you thrive. Financial - Generous 401(k) matches, life and disability insurance, and financial wellness tools to support your future. Recognition - Annual awards, service anniversaries, referral bonuses, and peer-to-peer shoutouts that spotlight your achievements. Wellness - Healthcare coverage, wellness programs, flu shots, and biometric screenings to support your health. DMI values employees for their talents and contributions, and we take pride in helping our customers achieve their goals. Because when we live our values, we all win together. ***************** No Agencies Please ***************** Applicants selected may be subject to a government security investigation and must meet eligibility requirements for access to classified information. US citizenship may be required for some positions.
    $82k-108k yearly est. Auto-Apply 4d ago
  • Bank- Director Information Technology Security - To 150K - Crown Point, IN - Job

    The Symicor Group

    Information security analyst job in Crown Point, IN

    Bank- Director Information Technology Security - To $150K - Crown Point, IN - Job # 3653Who We AreThe Symicor Group is a boutique talent acquisition firm based in Schaumburg, IL & Rockport, TX. Our nationally unique value proposition centers around providing the very best available banking and accounting talent. In fact, most of our recruiters are former bankers or accountants themselves!We know how to evaluate the very best banking and accounting talent available in the market. Whether you are a candidate seeking a new opportunity or a bank or company president trying to fill an essential position, The Symicor Group stands ready to deliver premium results for you.The PositionOur bank client is seeking to fill a Bank IT Director role in the Crown Point, IN area. The position is responsible for managing select technical aspects of third-party implementations, ensuring that these initiatives are completed on time, within scope, and with high-quality deliverables.This opportunity has a generous salary of up to $150K and a benefits package. (This is not a remote position).Bank- Director Information Technology Security responsibilities include: Oversee the development and execution of enterprise-wide security awareness and training programs. Develop and lead the enterprise-wide Information Security Program aligned with FFIEC, GLBA, NIST, and other security frameworks and regulatory standards. Establish and maintain a governance framework that includes policies, standards, and procedures to manage information security risk. Lead the Bank's cybersecurity risk management program, including risk assessments, threat modeling, and vulnerability management. Manage and oversee third-party risk related to cybersecurity as part of the information security program, which includes security due diligence and risk assessments, contract review for security clauses, handling and usage of data, and continuous monitoring of a vendor's security posture. Serve as the primary liaison for all internal and external audits, regulatory examinations, and third-party assessments related to cybersecurity. Define and execute a multi-year cybersecurity strategy that aligns with business goals and evolving threat landscapes. Lead the design and implementation and provide oversight of the Bank's incident response plan, ensuring readiness and resilience. Collaborate with business units to integrate security into digital transformation, data usage, product development, and third-party risk management. Monitor and respond to emerging threats, vulnerabilities, and regulatory changes, ensuring proactive adaptation of security controls. Lead a culture of security across the organization, fostering collaboration and accountability at all levels. Manage and oversee the cybersecurity budget, ensuring alignment with strategic priorities and cost-effective use of resources. Resolve high-impact cybersecurity issues and incidents with authority and strategic oversight. Define acceptable risk thresholds and ensure alignment with enterprise risk appetite. Lead the evaluation and adoption of advanced security technologies, including AI-driven threat detection, zero-trust architecture, and secure cloud frameworks. Ensure compliance with all applicable laws and regulations, including GLBA, PCI-DSS, and state privacy laws. Who Are You?You're someone who wants to influence your own development. You're looking for an opportunity where you can pursue your interests and your passion. Where a job title is not considered the final definition of who you are, but merely the starting point for your future.You also bring the following skills and experience: Expertise in cybersecurity frameworks (NIST CSF 2.0, ISO 27001/27002, CIS Controls) Strong understanding of financial services regulations and compliance requirements Proven ability to communicate complex security topics to non-technical audiences, including the Board of Directors Experience with cloud security, security architecture and engineering, and identity and access management, and secure software development Strong analytical, problem-solving, and decision-making skills Demonstrated success in building and leading diverse, high-performing teams The next step is yours. Email us your current resume along with the position you are considering to:************************
    $150k yearly Auto-Apply 60d+ ago
  • GIT Security - Security Analyst

    SMC Corporation 4.6company rating

    Information security analyst job in Noblesville, IN

    PURPOSE The Security Analyst role will use various security analysis techniques to monitor the SMC enterprise for security incidents and events. The Security Analyst will follow SMC response documentation and tools to resolve or minimize the impact of these events. They will coordinate with other SMC teams and entities across the globe, maintaining and enhancing the security infrastructure for SMC. ESSENTIAL DUTIES Use an operational checklist and runbook to discover and react to security events Vigilant adherence to SMC IT security policies and procedures Collaborate with our users and partners in response to passive and active security incident response activities Evaluate security run books for continuous improvement Review ticket queue for resolution, closure, and escalation Execute malware scans, analyze scan results and work with senior analyst for response Leverage enterprise tools to assist with vulnerability management & patching Using metrics, report on the MDR (Managed Detection and Response) (Managed Detection and Response) effectiveness to drive continuous improvement All other duties as assigned PHYSICAL DEMANDS / WORK ENVIRONMENT Collaborative team environment in a shared workspace General office, computer room, warehouse, and factory areas Off-hours work and travel as required Sitting for long periods Minimum lifting requirements of 15 pounds MINIMUM REQUIREMENTS Associate degree in a business, management, or technology field or relevant work experience 1+ years of experience in a customer service or technical support role Basic understanding ITSM Principles or ITIL4 Foundations certification Experience with Endpoint detection & response and email security tools (Cortex, ZTap, Proofpoint, Tanium) A+ and / or MCSA Certification is preferred Experience with Cortex, ZTap, Proofpoint, Tanium is preferred Successful completion of security training, including attainment of Security+ certification is preferred Excellent interpersonal communication skills For internal use only: IT001
    $59k-80k yearly est. 60d+ ago
  • Systems Engineer - Physical Security

    People Driven Technology, Inc.

    Information security analyst job in Carmel, IN

    People Driven Technology, Inc is a fast-growing, family-owned technology integrator delivering innovative IT outcomes across the Midwest. With decades of combined experience in business, technology, and engineering, we focus on creating simple, scalable outcomes for our customers. Guided by values of integrity, passion, and teamwork, we prioritize the success of our customers over revenue, building lasting relationships with both customers and strategic partners. The Systems Engineer - Physical Security will be responsible for working alongside project management and enterprise architects to install, commission and test various physical security systems in a variety of environments. Candidates need to be proactive, customer-focused, and resourceful with a strong understanding of how physical security technology protects business assets. The Physical Security Engineer will be involved in the entire project delivery cycle, including leading projects implementation, commissioning, and maintenance. Ideal candidate will be located near West Lafayette area. What You Would Do Deploy access control and video management systems based on industry best practice standards Install low-voltage wire and hardware for access control and video surveillance systems Setup, program, and configure network appliances and related software Commission and test newly installed access control and video surveillance systems Review, interpret and properly execute project plans: drawings, specifications, project data Participate in project meetings with stakeholders, both internal and external Create training documents and instruct end-users in the use of systems Maintain accurate installation and service records and create precise as-built documentation Provide subject matter expertise related to access control and video surveillance systems Respond to phone, email, voicemail, and verbal inquiries and collaborate closely with vendors to inspect, troubleshoot, and assure timely resolution of service issues Safely operate and maintain assigned company vehicle Obtain and maintain industry certifications and licenses Perform other related duties as assigned What We Are Looking For High School Diploma/GED or Bachelor's degree or equivalent experience Certification in one or more of the following: Genetec, Avigilion, and Milestone Previous access control and/or video surveillance system installation experience preferred Demonstrated ability to build and maintain strong customer relationships; will serve as the primary point of contact for a high-touch customer Mechanically inclined and resourceful Analytical and critical thinker Proficient with Microsoft Office Suite Self-starter that is excited to be part of the initial group of employees for a high-growth company Excellent verbal and written communication skills with the ability to effectively interact with all stakeholders Comfortable managing multiple and changing priorities, and meeting deadlines in an entrepreneurial environment What We Would Offer You Comprehensive medical, dental, and vision plans for you and your dependents. 401(k) Retirement Plan with Employer Match, Health Savings Account, Life Insurance, and Long-Term Disability. Competitive compensation. Collaborative and welcoming office culture. Work-life balance and unlimited paid time off. Company vehicle and necessary equipment. Recruitment Agency Notification People Driven Technology, Inc does not accept unsolicited agency resumes. Do not forward resumes to our careers email address, People Driven employees, or any other company location. People Driven Technology, Inc is not responsible for any fees related to unsolicited resumes. Equal Opportunity Employer People Driven Technology, Inc is proud to be an equal opportunity workplace and is an affirmative action employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. All hiring decisions are based on merit, qualifications, and our business needs. People Driven Technology, Inc is dedicated to working with and providing reasonable accommodations to individuals with disabilities. If you need reasonable accommodations because of a disability for any part of the employment process, please contact the recruiter and let us know the nature of your request and your contact information.
    $78k-107k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Fort Knox, KY?

The average information security analyst in Fort Knox, KY earns between $58,000 and $111,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Fort Knox, KY

$80,000
Job type you want
Full Time
Part Time
Internship
Temporary