Information Security Analyst (W2 Contract)
Information security analyst job in Indianapolis, IN
Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS-IT) under the guidance of the Security Manager.
The essential functions of this role are as follows:
Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;
Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.
Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.
Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).
Develops Standard Operating Procedures (SOP) for implementing security polices;
Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;
Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;
Develops and implements procedures for use of information security management software;
Proposes information security software enhancements;
Performs periodic audits to assure security policies and standards are being followed and are effective.
Develops recommendations for enhancements and generates reports where necessary;
Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;
Mentors and provides guidance to new or other staff as needed;
Performs related duties as assigned.
Assist on other task as assigned.
Thorough knowledge of information security management tools, policies, and standards of information security procedures;
Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;
Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;
Familiarity with domain structures, user authentication, and digital signatures;
Ability to develop and maintain information security standards;
Ability to understand and apply complex computer logic to work;
Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;
Experience in assessing security needs of teams and assist in their security training.
Ability to communicate effectively both orally and in writing;
Ability to be a team member as well as a team leader depending on the situation;
Degree in information security or technology preferred;
Security certification preferred (e.g. CISSP).
Network Admin experience preferred.
Senior IT Quality Assurance Analyst
Information security analyst job in Columbus, OH
Immediate need for a talented Senior IT Quality Assurance Analyst . This is a 06+ Months contract opportunity with long-term potential and is located in Columbus, OH (Remote). Please review the job description below and contact me ASAP if you are interested.
Job Diva ID: 25-94603
Pay Range: $60-$62 /hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
Establishes readiness, specifies skill needs, analyzes risk, provides estimates and plans work for testing efforts.
Participates in requirements reviews, design reviews, systems analysis and testing review discussions.
Determines scope and focus of testing effort and creates Test Strategy and risk analysis to guide testing efforts.
Prepares test tools, automation and environment assets to support testing effort.
Creates, uses and maintains automated scripts to increase efficiencies in testing, including troubleshooting problems with scripts.
Tests systems or system components utilizing black box testing methods.
Validates the function of system under test and observes results from various external and internal interfaces.
Gathers test activity information during execution and prepares summarized information about the testing effort.
Communicates regularly with project members and advocates for resolution of high priority problems with Project Sponsors, Service Manager and Project Manager.
Maintains assigned test assets and recognizes gaps in current test assets, identifying ways to create needed assets.
Creates effective ways to display data using various modeling, reporting, statistical perspectives and trending methods.
Performs in-depth analysis by weighing relevance and accuracy of information to provide alternative solutions while appropriately incorporating input from others.
Provide on the job support to others on a variety of testing topics.
Provides guidance on complex issues to others as needed
Collaboration & Communication:
Works effectively with cross-functional teams (security, architecture, infrastructure)
Can explain technical findings and recommendations to non-technical stakeholders
Curiosity-driven problem solving
Thrives on figuring things out without a full map
Resilience in ambiguity
Comfortable making progress with partial information
Bias toward action
Identifies and executes remediation steps without waiting for perfect clarity
Key Requirements and Technology Experience:
Skills; SQL Server Always Encrypted (AE), OWASP Top 10, Data-at-rest and data-in-transit encryption
SQL AE experience
Comfortable working with SQL Server Always Encrypted (AE)
Schema analysis and remediation for encryption compatibility
Experience designing security-focused test cases
Ability to validate encryption implementation and data protection mechanisms
Familiarity with automated testing frameworks that support security validation
Application Security Expertise
Deep understanding of OWASP Top 10 and secure coding practices
Experience with threat modeling and vulnerability remediation
Encryption Implementation
Hands-on experience with data-at-rest and data-in-transit encryption
Familiarity with key management and integration with enterprise security tools
Data-Driven Inquiry:
Demonstrates ability to analyze data and formulate meaningful questions
Brings insights and hypotheses back to the team to guide investigation and decision-making
Leads with curiosity to uncover root causes and improvement opportunities
Our client is a leading Insurance Industry , and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
By applying to our jobs, you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
Information Security Analyst
Information security analyst job in Indianapolis, IN
Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS-IT) under the guidance of the Security Manager.
The essential functions of this role are as follows:
• Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;
• Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.
• Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.
• Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).
• Develops Standard Operating Procedures (SOP) for implementing security polices;
• Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;
• Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;
• Develops and implements procedures for use of information security management software;
• Proposes information security software enhancements;
• Performs periodic audits to assure security policies and standards are being followed and are effective.
• Develops recommendations for enhancements and generates reports where necessary;
• Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;
• Mentors and provides guidance to new or other staff as needed;
• Performs related duties as assigned.
• Assist on other task as assigned.
Thorough knowledge of information security management tools, policies, and standards of information security procedures;
• Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;
• Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;
• Familiarity with domain structures, user authentication, and digital signatures;
• Ability to develop and maintain information security standards;
• Ability to understand and apply complex computer logic to work;
• Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;
• Experience in assessing security needs of teams and assist in their security training.
• Ability to communicate effectively both orally and in writing;
• Ability to be a team member as well as a team leader depending on the situation;
• Degree in information security or technology preferred;
• Security certification preferred (e.g. CISSP).
• Network Admin experience preferred.
Supervisory Responsibilities/Direct Reports:
This role does not provide direct supervision to direct reports.
Information System Security Manager
Information security analyst job in Warren, MI
Day to Day:
Insight Global is looking for an ISSM to work for a DoD customer based out of Warren, MI.
The ISSM will provide support in the following areas:
Provide guidance to ISSOs, Information Technology team members, and the system owner regarding goals and objectives that will minimize the organizational risk present in the system
Compose, distribute, and execute local policies and procedures that will ensure system compliance with DoD RMF controls. These policies include, but are not limited to:
Vulnerability management
POA&M management
Personnel onboarding and offboarding
Incident response
Provide advisory to management regarding changes that may impact the security posture of the system
Preparation and submission of system security plans to upstream accrediting organizations
Must Haves:
Previous experience working as an ISSM for 3+ years
Strong Risk Management Framework (RMF) experience
Excellent written and verbal communication skills
Strong familiarity with NIST publications
Understanding of common operating systems, network technologies, and security tools
Secret Clearance
Security Analyst
Information security analyst job in Indianapolis, IN
Local candidates only.
Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS-IT) under the guidance of the Security Manager.
The essential functions of this role are as follows:
• Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;
• Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.
• Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.
• Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).
• Develops Standard Operating Procedures (SOP) for implementing security polices;
• Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;
• Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;
• Develops and implements procedures for use of information security management software;
• Proposes information security software enhancements;
• Performs periodic audits to assure security policies and standards are being followed and are effective.
• Develops recommendations for enhancements and generates reports where necessary;
• Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;
• Mentors and provides guidance to new or other staff as needed;
• Performs related duties as assigned.
• Assist on other task as assigned.
Thorough knowledge of information security management tools, policies, and standards of information security procedures;
• Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;
• Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;
• Familiarity with domain structures, user authentication, and digital signatures;
• Ability to develop and maintain information security standards;
• Ability to understand and apply complex computer logic to work;
• Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;
• Experience in assessing security needs of teams and assist in their security training.
• Ability to communicate effectively both orally and in writing;
• Ability to be a team member as well as a team leader depending on the situation;
• Degree in information security or technology preferred;
• Security certification preferred (e.g. CISSP).
• Network Admin experience preferred.
Supervisory Responsibilities/Direct Reports:
This role does not provide direct supervision to direct reports.
Senior Security Engineer
Information security analyst job in Columbus, OH
We are looking for a Senior Security Engineer to work for our client. The ideal candidate aligns with the responsibilities and qualifications outlined below.
Responsibilities:
Design, implement, and maintain security solutions to protect enterprise systems and data
Conduct vulnerability assessments, penetration testing, and risk analysis
Develop and enforce security policies, standards, and best practices
Collaborate with IT and development teams to integrate security into system architecture
Monitor and respond to security incidents, ensuring timely resolution
Qualifications:
5+ years of experience in cybersecurity engineering or related roles
Strong knowledge of network security, application security, and cloud security principles
Experience with security tools such as SIEM, IDS/IPS, and endpoint protection
Familiarity with compliance frameworks (ISO, NIST, SOC, HIPAA)
Excellent problem-solving and communication skills
What Our Client Offers:
A critical role in safeguarding enterprise systems and sensitive data
Opportunities to work with cutting-edge security technologies and methodologies
A collaborative environment focused on innovation and resilience
Competitive compensation and comprehensive benefits
Senior Platform Cyber Security Engineer
Information security analyst job in Sterling Heights, MI
The Panther Group is hiring a W2 Contract To Hire Senior Platform Cyber Security Engineer with one of our partners supporting the Department of Defense. This role requires an Active Security Clearance. This role is onsite in Sterling Heights, MI.
Job Summary
The function of this position is to support the Cyber and Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) section with responsibility for Cyber architecture, technology, evaluation, testing and compliance across the US market and support the delivery of products and services to Ground Combat Platforms. This is an engineering management position to broadly execute guidance from platform Chief Engineer, Systems Engineering Manager, and functional management.
This position will require a US security clearance.
Responsibilities to Anticipate/Expect:
Exercise authority and responsibility for Cyber and tasks to help integrate cross-functional technical scope within schedule and other constraints. Help project team to ensure a balanced, integrated, and compliant Cyber design across the vehicle system.
Manage/support the identification, development and implementation of platform cyber-physical design best practices, tools and education across the entire engineering enterprise. This will be done with a cross functional team of engineering and program disciplines and form the basis for developing a cyber security culture within the engineering organization.
Develop and manage System requirements and interface allocations including Performance and Space, weight and Power-Cooling, Reliability and Maintenance SWaP-CRaM), and enforce across the design team; develop system specification requirements compliance documentation
Manage and coordinate requirements, architectures and system designs and any changes, conditions, inputs and final resolution for requirements, trades, and alternatives
Manage, develop, support and conduct trade studies/structured decisions for system and subsystem design including system-level impacts to include balance of space, weight, power, cost, reliability, and performance across a Cyber vehicle suite
Oversee/support development of verification plans and manage their execution including test and production and field site shakedown and verification
Participate in and lead design and integration troubleshooting/Root Cause Corrective Action (RCCA) and problem report/test incident resolution for production, development, test, or modification projects
Develop and evaluate checkpoint and design milestone artifacts and Contract Data Requirements List (CDRLs) and review to ensure technical accuracy and compliance with contract requirements
Coordinate with platform Design Integrated Product Teams (IPTs) where interface is required, such as in threat analysis, interface development and requirements decomposition and compliance
Evaluate new Cyber and C5ISR technologies for potential use on products
Manage and participate in peer reviews
Position Requirements:
(Candidates will be considered on the aggregate of the position requirements, it is not required that candidates possess experience in all categories):Bachelor of Science in Engineering, related science or equivalent (Relevant cyber technical certificates and management credentials will be considered)
Minimum of 7+ years' experience
Experience with engineering and/or military projects
Experience with Cameo Systems Modeler and modeling languages such as SysML
Experience with embedded system engineering Cyber space.
Experience with Threat Analysis and Risk Assessment (TARA)
Experience with Cyber Tabletop Exercise (CTTX) drills
Ensure compliance with federal regulations and standards, including NIST SP 800-37 and NIST SP 800-53, RMF.
Prepare and maintain System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and other required documentation.
Experience leading teams in technical development projects
Experience in military vehicle development and integration
Experience in interpreting higher level customer requirements and flowing them down to technology areas
Experience in developing and managing system level cyber requirements
Familiarity with various electrical line replaceable units and the development and troubleshooting of electronic hardware
Experience with cyber warfare, offensive and/or defensive
Experience with embedded systems, automotive and military related
Experience with software and computer science principles
Familiarity with cyber physical system security requirements
Familiarity with Microsoft Office software (Word, Excel, PowerPoint, Visio, Project)
Ability to travel (mostly domestic, some international) up to 15%
This position will require a US security clearance.
This position may require the candidate to be able to climb on/off, work in, and work around military vehicles is desired. Must be able to pass ASR test (Anthropometric Size Requirement for confined space)
Cloud Security Engineer - SRE
Information security analyst job in Columbus, OH
Job Posting Title: Cloud Security Engineer - SRE
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Sr Security Engineer
Information security analyst job in Columbus, OH
Design and implement advanced security architectures across cloud, on-prem, and hybrid environments while driving Zero Trust, SASE, and cloud-native security initiatives.
Lead global strategic programs, network modernization efforts, and rapid tactical responses to critical incidents, converting gaps into standards and governance.
Develop security reference architectures, HLD/LLD solution packages, and Infra-as-Code-driven delivery models aligned with enterprise transformation goals.
Conduct threat modeling, risk assessments, and gap analysis across applications, infrastructure, APIs, containers, and third-party integrations.
Implement cloud and DevSecOps security controls, integrating tooling into CI/CD pipelines and enforcing secure coding and IaC policies.
Build security automation, SOAR playbooks, and SIEM integrations to streamline detection, vulnerability management, compliance, and response workflows.
Enhance detection engineering through custom rules, behavioral analytics, log enrichment, and purple-team/adversary emulation exercises.
Provide cross-functional leadership for initiatives involving cloud migration, AI/ML, M&A, and digital modernization, presenting strategies and risk posture to executive stakeholders.
Information Technology Analyst
Information security analyst job in Germantown, OH
The Dupps Company is currently seeking an experienced IT Analyst to support and enhance our enterprise technology infrastructure, with a focus on ERP systems, cloud platforms, identity management, and network administration. This position will be an onsite role.
Key Responsibilities:
ERP & Business Systems
Design and implement custom Epicor Kinetic ERP solutions including Data Directives, Method Directives, BPM workflows, and BAQ/UBAQ queries to automate business processes
Develop and maintain REST API integrations and App Studio customizations within Epicor Kinetic
Administer multiple Epicor modules including CRM, SRM, WMS, MES, ECO, FS, APS, AMM, AP, AR, and MRP
Cloud Infrastructure & Platform Management
Administer Microsoft Azure environment including IaaS/PaaS services (VMs, App Services, VNets, NSGs, Load Balancers, Storage)
Manage Microsoft Entra ID (Azure AD) including directory synchronization, conditional access policies, MFA enforcement, and RBAC
Oversee Microsoft 365 tenant administration (Exchange Online, SharePoint Online, Teams) with focus on security and compliance
Identity & Access Management
Administer Auth0 platform managing SAML 2.0 SSO, enterprise B2B connections, and API integrations for 400+ users
Manage Cisco Duo MFA deployment with adaptive authentication policies and zero-trust access controls
Network & Security Administration
Manage enterprise network infrastructure across multiple sites including Cisco/Fortinet firewalls, switches, and VPN tunnels (IKEv2/IPsec)
Design and implement firewall policies, NAT rules, VLAN segmentation, and 802.1x authentication
Application Development & Database Management
Design and optimize SQL Server databases with replication strategies for data integrity and high availability
Develop full-stack applications using Node.js, React, and RESTful APIs to modernize legacy systems
Create automation scripts using C#, JavaScript, PowerShell, and VB to reduce manual administration efforts
Education & Certifications Desired:
Bachelor's degree in Computer Science, Information Systems, Information Technology, or related field desired but not required.
Relevant certifications (CompTIA Security+, AWS Cloud Practitioner, or equivalent) preferred
Technical Skills Needed:
Strong proficiency in Epicor Kinetic ERP administration and development
Experience with Salesforce administration and CRM integrations
Expertise in Microsoft Azure, Microsoft 365, and Entra ID administration
Knowledge of identity and access management platforms (Auth0, Okta, Cisco Duo)
Proficiency in networking concepts including VLAN, VPN, routing protocols, and firewall management
Experience with VMware vSphere/ESXi virtualization
Strong database skills with Microsoft SQL Server
Programming/scripting abilities in JavaScript, Python, C#, SQL, PowerShell, and Bash
Bachelor's degree desired but not required.
3+ years of IT experience.
Preferred Experience:
2+ years of experience in enterprise IT environment
Experience with MuleSoft or similar integration platforms
Familiarity with RMM tools (NinjaOne, Kaseya)
Understanding of VoIP/SIP systems
Analyst, IT Security Compliance
Information security analyst job in Indiana
3M has a long-standing reputation as a company committed to innovation. We provide the freedom to explore and encourage curiosity and creativity. We gain new insight from diverse thinking, and take risks on new ideas. Here, you can apply your talent in bold ways that matter.
:
JOB DESCRIPTION:
What You'll Do
As a key member of the IT Security Compliance team, reporting to the Team Lead - Security Compliance, you will:
* Execute day-to-day cybersecurity risk, compliance, and assurance activities.
* Support global cybersecurity certifications including ISO 27001 and ISO 27017, evaluating control effectiveness and reviewing evidence of controls.
* Assist in achieving ISO 27001 certification by identifying risks and implementing controls.
* Maintain and continuously improve 3M's Information Security Management System (ISMS).
* Create, update, and manage ISMS documentation, reports, and audit records.
* Act as Subject Matter Expert (SME) for PCI DSS, advising stakeholders, conducting internal assessments, and driving PCI DSS v4.0.1 reviews, gap assessments, and control evaluations.
* Provide high-level knowledge support on other frameworks and standards including NIST, SOX, SWIFT, and TISAX.
* Deliver timely written reports, metrics, and updates to cybersecurity management.
* Collaborate and communicate effectively across teams and with stakeholders.
What We're Looking For
* Education: Bachelor's degree with a minimum of 4 years of experience in Information Security, GRC, or related roles.
* Certifications (preferred): ISO 27001 Lead Auditor/Implementer, PCI ISA, CISA, CISM, CRISC, or equivalent.
* Skills & Knowledge:
* Strong knowledge of information security risk standards, frameworks, and methodologies.
* Experience working with GRC tools such as OneTrust, Archer (or similar).
* Excellent written and verbal communication skills.
* Ability to manage multiple priorities and adapt to evolving business needs.
Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M.
Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement.
Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement
Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
Auto-ApplyIT Compliance and Risk Management Analyst/ IT Security Analyst/ IT Auditor/ PCI Analyst (Cont to Hire)
Information security analyst job in Columbus, IN
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Location: Columbus, IN 47201
Job Title: Sr. IT Compliance and Risk Management Analyst
Duration: 6 months (Contract to Hire)
Job description:
•Responsible for the execution of compliance audits. Reviews procedures and corresponding evidence to determine whether or not internal controls are being properly applied.
•Leads or executes compliance audits and risk assessments within established control areas.
•Tests and documents more complex computer system records for information system integrity and transaction accuracy; reports discrepancies.
•Prepares less complex audit plans or assists with more complex plans.
•Prepares formal written reports to communicate audit results to management, and makes recommendations as appropriate; defines compliance issues and identifies root causes for review by manager.
•May provide technical guidance to contract audit staff to ensure that audit objectives are met.
•May coach and mentor less experienced analysts.
Qualifications
• Bachelors Degree Required: PCI (Payment Card Industry)- this is a higher level position and only looking for PCI SME (Subject Matter Expert) experience.
• Must Have IT Compliance Experience with PCI Management Side experience
• This manager is looking for a candidate that has seasoned PCI Experience on is a subject matter ex]pert and worked with the management side if PCI with the ability to set the right type of internal controls.
Additional Information
If interested please contact:
Himanshu Prajapat
************
himanshu.prajapat(@)collabera.com
IT Security Analyst - IT Solutions - Indianapolis, IN
Information security analyst job in Indianapolis, IN
Join American Structurepoint and become part of a team that goes the extra mile for our clients and communities. We live by our values - respect, staff development, results and family. Our team is encouraged to explore new ideas and turn our clients' dreams into reality. With exceptional benefits, training, and mentorship, we pave the way for a rewarding career. Ready for more than just a job? Explore opportunities with us and help improve the quality of life in the communities we serve.
Group: Information Technology
Position: IT Security Analyst
Location: Indianapolis, IN
Are you passionate about cybersecurity and ready to protect the digital backbone of an innovative engineering firm? We're looking for a skilled IT Security Analyst to join our team and help secure mission-critical systems, proprietary data, and infrastructure. Join a team where your cybersecurity expertise directly supports groundbreaking engineering projects. Apply now or message us to learn more!
Responsibilities
• Monitor and analyze network traffic for threats and vulnerabilities
• Conduct regular security assessments and penetration testing
• Work collaboratively with Infrastructure team to learn and review firewalls, antivirus, and intrusion detection/prevention systems - Maintain Secure by Design Approach
• Investigate and respond to security incidents
• Continually develop (update) and implement cybersecurity policies and procedures
• Collaborate with engineering and IT teams to secure sensitive project data
• Stay ahead of emerging threats and technologies
• Be passionate about:
o Learning new technologies
o Working collaboratively in a team atmosphere
Qualifications
Must-Haves:
• Bachelor's degree in Computer Science, Cybersecurity, or related field
• 3+ years of experience in IT security roles
• Strong knowledge of network protocols, firewalls, and endpoint protection
• Experience with SIEM tools - Understand and develop queries and expressions
• Basic Understanding of NIST, SOC2, CMMC or similar frameworks
• Excellent communication and problem-solving skills
• Excellent written and documentation skills
Nice-to-Haves:
• Certifications: CISSP, CISM, CEH, or Security+
• Experience with cloud security (AWS, Azure)
• Scripting knowledge (Python, PowerShell)
• Exposure to engineering software platforms (AutoCAD, SolidWorks)
• Familiarity with Zero Trust architecture
Auto-ApplyCyber Security Analyst III
Information security analyst job in Pontiac, MI
We are growing our Information Security Threat Intelligence and Compliance team here at UWM. This is a new position where you will be responsible for translating threat intelligence into actionable defensive measures, creating and maintaining procedural documentation and mentoring more junior analysts. Additionally, you will be detecting and analyzing suspicious or malicious events. This role will also actively participate on the Incident Response team.
WHAT YOU WILL BE DOING
* Review and analyze logs from a variety of sources
* Monitor detection systems for signs of attack or unusual activity
* Create documentation to assist with repeatable tasks and decision making
* Actively participates in incident response
* Monitors and analyzes threat intelligence sources and recommends appropriate actions
* Use penetration testing tools and techniques
* Works closely with other teams to understand the flow of sensitive data between systems and applications
* Translate threat intelligence into actionable defensive measures
* Mentor other Security Analysts
* Ability to provide on-call support on a rotating basis
WHAT WE NEED FROM YOU
Required:
* 5+ years of professional IT experience
* 2+ years of information security experience
* Subject matter expert in SIEM, forensics, malware analysis or incident handling
* Understanding of network protocols (TCP, UDP, DNS, FTP, SMTP, DHCP, etc.)
* Familiarity with industry regulations (eg. GLBA, NYCRR, etc.)
* Microsoft Windows troubleshooting skills
* GIAC or equivalent certification
* On-site attendance
* Computer related degree or equivalent
* 100% onsite attendance
THE PLACE & THE PERKS
Ready to join thousands of talented team members who are making the dream of home ownership possible for more Americans? It's all happening on UWM's campus, where our award-winning workplace packs plenty of perks and amenities that keep the atmosphere buzzing with energy and excitement.
It's no wonder that out of our six pillars, People Are Our Greatest Asset is number one. It's at the very heart of how we treat each other, our clients and our community. Whether it's providing elite client service or continuously striving to improve, our pillars provide a pathway to a more successful personal and professional life.
From the team member that holds a door open to the one that helps guide your career, you'll feel the encouragement and support on day one. No matter your race, creed, gender, age, sexual orientation and ethnicity, you'll be welcomed here. Accepted here. And empowered to Be You Here.
More reasons you'll love working here include:
* Paid Time Off (PTO) after just 30 days
* Additional parental and maternity leave benefits after 12 months
* Adoption reimbursement program
* Paid volunteer hours
* Paid training and career development
* Medical, dental, vision and life insurance
* 401k with employer match
* Mortgage discount and area business discounts
* Free membership to our large, state-of-the-art fitness center, including exercise classes such as yoga and Zumba, various sports leagues and a full-size basketball court
* Wellness area, including an in-house primary-care physician's office, full-time massage therapist and hair salon
* Gourmet cafeteria featuring homemade breakfast and lunch
* Convenience store featuring healthy grab-and-go snacks
* In-house Starbucks and Dunkin
* Indoor/outdoor café with Wi-Fi
DISCLAIMER
All the above duties and responsibilities are essential job functions subject to reasonable accommodation and change. All job requirements listed indicate the minimum level of knowledge, skills and/or ability deemed necessary to perform the job proficiently. Team members may be required to perform other or different job-related duties as requested by their team lead, subject to reasonable accommodation. This document does not create an employment contract, implied or otherwise. Employment with UWM is "at-will." UWM is an Equal Opportunity Employer. By selecting "Apply for this job online" you provide consent to UWM to record phone call conversations between you and UWM to be used for quality control purposes.
Auto-ApplyData Security analyst
Information security analyst job in Columbus, OH
US Tech Solutions is a global staff augmentation firm providing a wide-range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit our website ************************ We are constantly on the lookout for professionals to fulfill the staffing needs of our clients, sets the correct expectation and thus becomes an accelerator in the mutual growth of the individual and the organization as well.
Keeping the same intent in mind, we would like you to consider the job opening with US Tech Solutions that fits your expertise and skillset.
Job Description
Scope/Responsibilities/Duties:
• 0-2 years general experience, bachelor' s degree or equivalent combo of education/experience;
• Some experience in desired tech area; position functions with high level of supervision;
• Assesses security and/or compliance of university systems; responsible for assessing, monitoring and analyzing data, identifying security, risk or compliance issues and/or events
• Leveraging job aids for common issues or incidents
• Demonstrated ability to work in a team, attention to detail, solid written communications and some technology experience
• To perform system based risk assessments.
• Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial.
Qualifications
• Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial.
Additional Information
Thanks & Regards,
Kushal Kumar
Talent Acquisition Specialist
Tel: ************
IT Analyst
Information security analyst job in Bluffton, IN
This position is responsible for ensuring the continuous availability of the communications and network information systems environment for first shift at Bluffton facility. The primary focus is to configure, maintain, control, troubleshoot and monitor the facility's MES shop floor systems, office employees and LAN and WAN resources. A seconday focus is to coordinate with Corporate Information Systems (IS) team members to configure and maintain the local infrastructure for voice and data communications environment.
Principal Accountabilities:
Ability to work independently as well as in a team with minimal supervision
An ability to use a logical and analytical approach to troubleshooting/problem solving
Perform "on call" assignments and alternate shift coverage, as required, by responding to problem situations, following procedures for problem resolution and reporting, and engaging in follow-up analysis to determine and eliminate causes of errors
Adheres to and enforces Corporate IT Policies, Procedures and Guidelines
Minimum of five years of shop floor experience trouble shooting equipment
Working knowledge of SQL with a minimum of three years practical experience
Basic level of network trouble shooting and administration
Strong oral and written communication skills
Information Security Expert
Information security analyst job in Columbus, OH
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst 2
Information security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
Information Security Analyst 2
Job Duties
* Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
* Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
* Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
* Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
Minimum Qualifications
* 2-4 years related experience
* Associate's degree (Information Technology, Cyber Security, Computer Science)
* Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
Preferred Qualifications
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
Work Authorization:
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
Compensation and Benefits:
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Nearest Major Market: Lima
Nearest Secondary Market: Findlay
Job Segment: Information Security, Data Entry, Help Desk, Information Technology, Computer Science, Technology, Administrative
Director of Information Security
Information security analyst job in Fort Wayne, IN
Division Steel Dynamics Information technology plays a vital role at Steel Dynamic (SDI). SDI's information technology environment is highly distributed and diverse. The scale and decentralized nature of the environment requires broad-based strategy and oversight leadership, disciplined execution and related documentation, and clear governance principles across the entire organization. We are seeking an experienced, collaborative, successful, and forward-thinking strategic individual to provide effective results-oriented leadership, strategic insight, and broad-based planning as the Director of Information Security (DIS).
The DIS will report directly to the company's Senior Vice President and Treasurer, working collaboratively with senior leaders throughout the organization. The DIS champions SDI's enterprise information security needs and is responsible in coordination with the company's executive, technical, and operational leadership for a comprehensive risk-oriented strategy that enhances the organization's information and technical security posture. The DIS leads the cyber security team while leveraging company-wide resources, facilitates information security governance, advises senior leadership on security direction and resource investments, and oversees policies to manage information security risk. This role requires exceptional communication skills, clear executive-level thinking, and a proven ability to drive timely successful outcomes.
Responsibilities
Company and Program Leadership
* Lead information security strategic vision and planning processes to maintain an inclusive and comprehensive information security program for the entire company.
* Maintain and enhance security and compliance goals, define security strategies, metrics, reporting mechanisms and program services; and create maturity models and a roadmap for continual program improvements. Develop, and maintain a structured Information Security Roadmap of initiatives including sequencing, documented scopes, timelines, risks, and evidence of completion suitable for audit and compliance review.
Outreach, Education and Training
* Manage the end-user education and awareness programs and advise the organization on security issues and trends, best practices, and current and evolving vulnerabilities. Work with the organizational IT groups to build awareness and a sense of common purpose around information security. Deliver concise, high-quality written materials, for both executive and board level summaries, as well as materials for organizational IT groups.
Risk Management and Incident Response
* Develop, implement, and administer technical security standards, as well as a suite of security services and tools to address and mitigate information security risk.
* Provide leadership, direction and guidance in assessing and evaluating information security risks and security standards and policies. Maintain repeatable processes for control testing, log source validation, vendor performance verification, and security questionnaire responses. Ensure incident response documentation is complete, current, and aligned with enterprise expectations, including tabletop exercises and after-action reporting with corrective actions and deadlines.
Policy, Compliance and Audit
* Work collaboratively with IT, Internal Audit, Treasury, and outside consultants as appropriate on security assessments and audits.
* Work collaboratively with company leadership to build cohesive security and compliance programs for the organization to effectively address evolving risks.
* Oversee the team's implementation of the comprehensive compliance matrix of organizational requirements (NIST CSF, CIS, insurance obligations, contractual controls, and company policies) and provide quarterly attestations. Resolve audit findings, third-party testing findings, and internal remediation items
* Perform special projects and other duties as needed.
Qualifications
* Bachelor's degree, preferably but not essential, in one of the following areas, Computer Science, Information Systems, Telecommunications, Networking, Engineering or a related field. • Preferably, a minimum of five years of experience working in an information security and IT risk management role. • Collaborative and strategic experience and perspective. • Strong analytical and problem-solving skills.• Effective written and verbal communication skills.• excellent interpersonal and leadership skills.
Preferred:
* Demonstrated experience executing a structured security program with documented deliverables and measurable outcomes.• Familiarity with security info and event management systems , endpoint protection, identity governance, cloud security, email security, OT/IT segmentation, and vulnerability management sufficient to validate vendor and team performance.• Strong project management skills: running multiple concurrent initiatives, setting realistic timelines, and holding internal teams and vendors accountable.
Steel Dynamics, Inc., and all affiliated entities are equal opportunity employers.
IT Security & Operations Analyst
Information security analyst job in Auburn, IN
CX Institutional, LLC d/b/a Credent Wealth Management is a $4.0 billion Registered Investment Advisor (RIA) headquartered in Indiana, offering a uniquely human-centric approach to wealth management through commission-free, transparent, and impactful financial planning and investment strategies. Since its inception in 2018, Credent has grown rapidly through a combination of organic growth and 10+ strategic acquisitions focused on providing advisors with a customized, cooperative transition as they build their succession plans. Credent's culture creates lasting, meaningful relationships, enabling advisors to do their best work while ensuring clients can maintain their standard of living without financial worry. In 2024, Forbes recognized Credent as one of the top RIA firms in the U.S. For more information, visit Credent Wealth Management.
Job Title: IT Security and Operations Analyst
Purpose:
Responsible for the day-to-day operations of the technology infrastructure, information security, business productivity software, and the support of the IT Service Desk. Defines hardware andsoftware standards and ensures standards are followed and updates are maintained. Technical lead on the implementation of information security processes, tools procedures. Monitors request queue to ensure service delivery objectives are met. Acts as an escalation point for leadership for critical infrastructure and security issues.
Responsibilities:
Monitor tickets in support queue and resolve appropriate tickets
Manage and maintain O365 including security and access management
Support onboarding and offboarding of new hires with PCs and User/email setup
Maintain standards for computer and business productivity software (Zoom, Calendly, Box, SharePoint, CodeTwo)
Enforce information security policies and procedures to ensure governance and consistency in standards while leveraging common systems and tools
Manage and track security training
Manage relationships with technology vendors and service providers, ensuring alignment with business requirements and service level agreements
Stay up to date on latest security trends and make recommendations to leadership on methods to continuously improve information security
Support and coaching of junior team members
Comply with company-wide policies and SEC regulations
Equipment Used:
Standard office equipment
Microsoft Tools: M365, Windows, Intune, Azure Active Directory
File Collaboration: Box, SharePoint
PC Hardware, Network and Phones: Dell, Cisco Meraki, Zoom
Email Security: AppRiver, Global Relay, Zix
Online Security Training: KnowBe4
Cloud-based storage software
Microsoft Office Suite
Education:
Bachelors Degree in Information Technology, Computer Science, Cyber Security or related field is preferred
3+ years of professional IT/Security Operations experience
Knowledge, Skills, and Abilities:
Extensive experience with Microsoft 365, Defender, Azure, Windows, and Office
File Sharing Platforms (Box and SharePoint Preferred)
Analytical and troubleshooting skills
Mentorship and coaching of others
Excellent communication skills
Adaptable, able to multitask, and creative problem-solving
Zoom conferencing and phone systems (or similar)
Dell computer hardware (or similar)
Hours:
Monday through Friday; 8 AM to 5 PM
Auto-Apply