Information security analyst jobs in Franklin, TN - 394 jobs
All
Information Security Analyst
Cyber Security Analyst
Information Technology Analyst
Information Systems Security Officer
Certified Information Systems Security Professional
Security Engineer
Manager, Information Assurance
Cyber Security Engineer
Information Security Manager
Information Security Director
Securities Analyst
Senior Information Security Engineer
Senior Security Engineer
Data Security Analyst
Information Assurance Analyst
Cyber Security Engineer
Provisions Group 4.4
Information security analyst job in Knoxville, TN
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and SecurityInformation and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's informationsecurity strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
$65k-87k yearly est. 4d ago
Looking for a job?
Let Zippia find it for you.
IT Operations Center Analyst
Medasource 4.2
Information security analyst job in Nashville, TN
ITOC Analyst - Operations Center
Our client is seeking a ITOC Analyst to join their Data Center Operations team on a contract basis. This role serves as the front line of support for monitoring, maintaining, and troubleshooting mission-critical data center infrastructure. The ideal candidate is hands-on, detail-oriented, and comfortable working in a 24/7 operations environment supporting both facility and IT infrastructure systems.
Key Responsibilities
Monitor and support data center physical facilities, including power, cooling, and environmental systems
Perform hardware and server deployment, replacement, and troubleshooting
Conduct preventative maintenance, routine inspections, and health checks on data center infrastructure
Troubleshoot and resolve issues related to electrical and mechanical equipment
Support and maintain network infrastructure, including cabling, racks, and patching
Respond to incidents, alerts, and tickets as part of an operations center / NOC-style workflow
Document work performed and escalate issues appropriately to engineering or facilities teams
Adhere to operational procedures, safety standards, and change management processes
Required Qualifications
Experience working in a data center, NOC, or critical facilities environment
Hands-on experience with server hardware, rack/stack, cabling, and break/fix
Working knowledge of electrical and mechanical systems in a data center setting
Ability to follow runbooks, procedures, and safety protocols
Comfortable working shifts, on-call rotations, or non-standard hours if required
Preferred Qualifications
Experience with mission-critical environments (healthcare, financial services, enterprise IT, etc.)
Familiarity with monitoring tools, ticketing systems, or CMDBs
Basic understanding of networking concepts (switches, patch panels, fiber/copper)
Certifications such as CompTIA A+, Network+, or data center-related training (nice to have, not required)
$68k-89k yearly est. 1d ago
Cyber Security Engineer/Information Systems Security Officer (ISSO)
Aerovironment 4.6
Information security analyst job in Redstone Arsenal, AL
AV is looking for a highly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of our team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency (MDA).
Job Description:
Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages.
Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems.
Ensure that system security artifacts are developed, reviewed, and updated as needed.
Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS).
Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions.
Interface with other cyber teams to review RMF Contract Data Requirements List (CDRL) submissions and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts.
Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed.
Perform vulnerability/risk analysis of systems using expertise in relevant information systems security.
Track and monitor Plan of Action and Milestones (POA&M).
Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings.
Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle.
Track deliverables (i.e., artifacts, schedules, metrics).
Required:
Bachelor's degree and 7+ years of related professional experience.
Active Secret clearance.
DoD 8570 compliant IAM Level II certification is required (Security +)
Experience with DoD's RMF and SSP processes
Desired:
Experience with MDA specific RMF and SSP processes
Self-Motivated
Customer-oriented
Clearance Level
Secret
ITAR Requirement:
T
his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements.
Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: **********************************
We also encourage you to review our company website at ******************** to learn more about us.
Principals only need apply. NO agencies please.
Who We Are
Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC.
Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed.
What We Do
Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition.
We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status.
ITAR
$61k-79k yearly est. Auto-Apply 4d ago
Cyber Security Analyst
Bellatrix HRM
Information security analyst job in Huntsville, AL
Bellatrix-Latin for "Female Warrior" Owned and operated in a HUBZone, with over 25 years in the HR, Talent Acquisition and Government Contracting. Like the Bellatrix Star in the Orion Constellation, our Team Members are the Brilliance of the company, and are all shareholders, leading the company to success. Bellatrix prides itself on being a Small Woman Owned HUBZone company. We believe big does not equal best. By staying small, we can focus on agility, efficiency, and our people. At Bellatrix we believe in advancement from within through training, mentorship, innovation and truly being a family. Bellatrix believes in excellence in customer service, and catering to the customer's needs. We realize not everyone fits into a box, and we think outside of the box to ensure, affordable and outstanding services. Human Resources, Retention and Recruiting, and Medical Coding/Billing are the HRM of Bellatrix. Come and join our team, where you are a team member and shareholder, working together for growth.
Bellatrix has the current position open as a direct W2, Fulltime position for one of our top clients in the Huntsville, AL Market. This position requires a Secret Clearance and is on location with the Missile Defense Agency
Title: Cyber SecurityAnalyst
Location: Onsite-Huntsville, AL
Program: MDA, C3BM and C2BMC
Number of Openings: 2
Immediate Direct Hire
Clearance: Secret
Travel: 25%
Salary Range: $150,000-165,000, DOE
General Overview:
Command, Control, Communications, and Battle Management (C3BM) cyber engineering efforts include engaging in Command, Control, Battle Management, and Communications (C2BMC) technical engineering and integration, future concepts, new functionality, and multi-national exchange designs. Cyber engineering tasking includes participation in reviews and assessments of C2BMC cyber security and documentation. Collaboration with MDS stakeholders is required to prepare C2BMC cyber products as part of the engineering objectives documentation and analysis processes as related to Defense Of Guam (DoG).Other activities include participation in engineering meetings, presenting engineering product development updates, providing analysis and failure review summaries.
Responsibilities:
Understand cybersecurity aspects of systems engineering development, as well as DoD cybersecurity requirements, and be capable of recommending changes to the Government about the contractor's system engineering development process.
Perform cybersecurity risk assessment reviews to include changes, modifications, and/or updates of software and/or hardware to individual information systems and/or enterprise environment.
Familiarity with Configuration Management to include oversight and engineering assessments of Cybersecurity fixes, patch development, and pre-release testing in support of DoG.
Performing cybersecurity risk assessment describing the posture of an individual information systems through an enterprise architecture in support of DoG.
Will directly support the Software Assurance program for C2BMC. Includes ability for assessments of code reviews and approvals/disapprovals of software products for use on Mission, Training and Test/Development C2BMC systems is support of DoG
Requirements:
Bachelor's degree in STEM program: Computer Science, Information Technology, Network Engineering or other similar program
5+ years of Related Experience
Secret Clearance
Familiarity with MDS cyber capabilities and policy
Familiarity with Missile Defense Agency, Ballistic Missile Defense System, and/or C3BM Program Office work efforts
Security +, CE with a preferred certification level of CISSP
Ability to work independently within a dynamic environment
Apply cyber engineering and solutions to support real-world test, integration, and operations
Work within a collaborative environment composed of Government, prime contractor, sub-contractor and supporting contractor personnel in a badge-less contractor environment
Bellatrix is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
$150k-165k yearly 60d+ ago
Information Security and Fraud Analyst
First Farmers & Merchants Bank 4.2
Information security analyst job in Columbia, TN
Education Level: (1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree).
Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Job Type: Full Time
VEVRAA Federal Contractor
Request Priority Referral of Protected Veterans
EOE Protected Veterans/Disabled
Robert C. Matthews, email: *******************************
Role:
The InformationSecurity and Fraud Analyst is responsible for developing and managing appropriate security measures for the bank's information systems, managing third-party vendor security risk, and investigating incidents of fraud and attempted fraud.
Essential Functions & Responsibilities:
E 35% Risk Management. Coordinates organizational risk assessments. Performs third party vendor risk assessments. Conducts informationsecurity Vendor Risk Assessments (VRA) on all in-scope third-party requests. Communicates at all levels and with all business units in providing support in the onboarding of third-party vendors with respect to the assessment of InformationSecurity posture of the vendor. Creates and manages relationships with business units and stakeholders of the Third-Party Vendor Risk Management process. Performs assessment of third-party security and related due diligence documentation (such as SOC).
E 30% InformationSecurity. Monitors computer networks for security issues. Documents and investigates security breaches and other cybersecurity incidents. Stays current on IT security trends and news. Develops company-wide best practices for IT security. Research security enhancements and makes recommendations to management. Implements both internal and external security audits. Analyzes security issues thoroughly to identify the root cause.
E 30% Fraud Investigations. Assists in the investigation of fraud incidents and recovery of funds; Maintains records of incidents, losses, recoveries, and prevention. Provides customer education to increase awareness of the fraud risk and effective techniques customers can use to mitigate the risk. Coaches staff on determination of fraud incidents and communication with customers. Interacts with external partners such as law enforcement agencies, vendors, and banks to validate information to check fraudulent activities.
N 5% Performs other related duties as assigned or requested.
Performance Measurements:
1.
To comply with the letter and with the spirit of the bank's Code of Business Conduct and Ethics
2.
To ensure that the bank suffers no losses due to failure to comply with operational procedures.
3.
To provide friendly, professional, and accurate service and support to all customers both internal and external.
4.
To maintain and build knowledge of auditing procedures through continued learning and research.
5.
To acquire and maintain a working knowledge of regulations and bank procedures; to comply with the provisions of the Bank Secrecy Act and other laws and regulations.
6. To maintain the confidentiality of customer and any other sensitive information.
7.
To complete required training and undertake additional training as needed to increase job knowledge and maximize productivity.
Knowledge and Skills:
Experience
Three yeas to five years of similar or related experience.
Education
(1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Interpersonal Skills
Work involves much personal contact with others inside and/or outside the organization for the purpose of first-level conflict resolution, building relationships, and soliciting cooperation. Discussions involve a higher degree of confidentiality and discretion, requiring diplomacy and tact in communication.
Other Skills
1. Knowledge in all areas of accounting and audit procedures and the ability to work independently.
2. Working knowledge of spreadsheets and word processing software; must be able to use PC and other types of general office equipment.
Physical Requirements
The person in this position needs to frequently move about inside the office to interact with associates or clients and access office machinery and file cabinets. The person in the position constantly operates a computer and other office productivity machinery, such as a calculator, photocopier, and printer.
Work Environment
This job operates in a professional office environment and may require travel to branches and other locations. This role routinely uses standard office equipment such as calculators, computers, phones, photocopier, filing cabinets and fax machines.
$69k-96k yearly est. Auto-Apply 9d ago
Analyst, Information Security
Standard Aero 4.1
Information security analyst job in Maryville, TN
Build an Aviation Career You're Proud Of
At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT SecurityAnalyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization.
What you'll do:
Conduct risk and security assessments through vulnerability analysis and reporting
Perform mitigation support for both internal and external security audits
Investigate, analyze and document security incidents to identify and document the root cause
Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
Partner with IT Operation teams to remediate system vulnerabilities
Participates in the production of documentation and management reporting
Research security enhancements and make recommendations for improved policy and process
Analyze IT requirements and provide objective advice on the use of new IT security offerings
Stay up-to-date on information technology and cybersecurity trends and standards
Other IT Security-related duties as required
Capable of identifying, evaluating and mitigating significant risks within an enterprise.
Strong working experience with Microsoft Office Suite.
Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
Possess strong analytical skills attention to detail.
Ability to prioritize assignments while working on multiple projects
Ability to work independently and proactively to meet assigned objectives
Flexible with the ability to multi-task, effectively prioritize and work under pressure
Basic project management
Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
Analyze, report and respond to security alerts within the various IT technologies and global locations
Proactively remediate information technology security threats as a member of the security team
Assist in the designing, documenting, architecting and implementing IT security measures and controls
Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
Bachelor's degree in InformationSecurity, Computer Science, or a related field; equivalent experience may be considered.
5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
SDLC, and understand application security.
Containerization and Development Security Operations
Benefits that make life better:
Comprehensive Healthcare
401(k) with 100% company match; up to 5% vested
Paid Time Off starting on day one
Bonus opportunities
Health- & Dependent Care Flexible Spending Accounts
Short- & Long-Term Disability
Life & AD&D Insurance
Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
$73k-103k yearly est. Auto-Apply 60d+ ago
Journeyman Cyber Analyst
Ironmountain Solutions 4.2
Information security analyst job in Huntsville, AL
501588 Journeyman Cyber Analyst
Schedule: Full Time; 40 hours per week remote work not authorized
IronMountain Solutions is seeing a Journeyman Cyber Analyst to provide support for a Redstone Arsenal customer. Candidates should be highly motivated, a self-starter, and able to handle multiple tasks simultaneously. Candidates must have the ability to obtain and maintain a Secret-level security clearance.
Job Duties:
• Process / maintain records in Enterprise Misson Assurance Support Service (eMASS) in both NIPR & SIPR environments.
• Process / maintain records in Army Portfolio Management System (APMS)
• Run Assured Compliance Assessment Solution (ACAS) scans and maintains standalone ACAS server.
• Assist in the development, review, and maintenance of documentation for assigned information systems. System Security Plan, Software Fielding Plan, Continuous monitoring strategy,
• Security Control Implementation: Support the implementation and validation of security controls (technical, administrative, and physical) as outlined in the SSP.
• Vulnerability Management: Assist in vulnerability scanning and risk assessments, tracking remediation efforts, and reporting findings.
• Security Incident Response: Participate in incident response activities, including initial triage, documentation, and reporting.
• Configuration Management: Assist in maintaining accurate system configurations and documenting changes.
• Authorization Support: Assist in preparing systems for Authorization to Operate (ATO) and maintaining system authorizations.
• Compliance Monitoring: Assist in monitoring systems for compliance with security policies and procedures.
• Participate in Cyber and System Engineering working group meetings with other organizations and OEMs under contract with ATE PM.
• While performing the duties of this job, the employee is occasionally required to stand; walk; sit; use tools or controls; normal physical activity (reach with hands and arms; climb stairs); and communicate effectively with all levels of employees and leadership. The employee must occasionally lift or move office products and supplies, up to 25 pounds.
Basic Qualifications:
• 3 - 10 years of relevant experience
• BS or MS Degree required
• CompTIA Security+ certification is preferred.
• Other relevant certifications (e.g., Certified Ethical Hacker (CEH), A+, entry level) are a plus
• Familiarity with embedded RTOS
• Familiarity with protocols such as ARINC-429 & MIL-STD-1553 are a plus
• Develop strong working relationships with ATE personnel and management
• Ability to manage complex projects and work effectively with others
• Ability to research, report and troubleshoot cyber security related issues
• Have a Secret clearance. Per federal Per federal requirements, only U.S. citizens are eligible for this level of clearance.
IronMountain Solutions is an Equal Opportunity Employer
$67k-92k yearly est. Auto-Apply 12d ago
Cyber Security Vulnerability Analyst
ITR 4.2
Information security analyst job in Oak Ridge, TN
Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities.
This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week.
Job Responsibilities:
• Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role.
• Mentor the DCO's junior staff, developing their technical and incident resolution skills.
• Participate in incident response activities involving multiple teams and functions.
• Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls.
• Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status.
• Automate key DCO functions using Tines technology
• Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities.
• Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities.
• Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats.
• Assist users with the creation, monitoring, and evaluation of policy and device exceptions.
• Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements.
• Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues
Candidates must be able to obtain a federal security clearance so US citizenship is required.
$69k-95k yearly est. 28d ago
Mid-Level Cyber/Watch Floor Analyst
Noetic Strategies Inc.
Information security analyst job in Huntsville, AL
Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk.
BASIC QUALIFICATIONS:
Minimum of 5 year of Splunk/SOC experience.
Bachelor's in a computer science related field
Active Top Secret Clearance
Ability and willingness to do shift work
MAIN RESPONSIBILITIES:
Responsible for monitoring computer networks for security issues.
Investigating security breaches and other cybersecurity incidents.
Document security breaches and assess the damage they cause.
Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.
Fix detected vulnerabilities to maintain a high-security standard.
Recommend best practices for IT security.
Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
Decrypts data and provides technical summaries and input.
Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
PREFERRED QUALIFICATIONS
Microsoft Sentinel
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.
Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
Powered by JazzHR
6IxgcPuXI3
$64k-87k yearly est. 16d ago
Cyber Threat Emulation Analyst
Launchtech
Information security analyst job in Huntsville, AL
or
Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
What You'll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
Measure defense-in-depth effectiveness against known vulnerabilities
Generate vulnerability assessment reports and escalate findings for review
Support enterprise Incident Response in accordance with DoD regulations and instructions
Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
What You Bring
Basic Requirements:
Must have 6, or more, years of general (full-time) work experience
Must have 4 years of combined experience with:
Performing manual or automated penetration tests in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
Must have 1 year of experience in management or leadership in a team environment
Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
Must have, or obtain within 6 months of start date, a PenTest+ certification
Must have an active DoD Secret Security Clearance
Desired Requirements:
Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field
Have experience with Cyber Threat Emulation tools, policies, and procedures
Have experience operating custom software on a Linux platform
Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
Be able to mentor and train personnel in a high-paced environment
Be familiar with DoD Security Operations Centers (SOC/CSSP)
Be familiar with DCO/CSSP-guiding security policies and procedures
Have an active DoD Top Secret clearance
Why LaunchTech?
At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence.
We offer competitive benefits, including:
Medical, Dental, and Vision coverage
401(k) with company match
Paid Time Off (PTO)
Opportunities to make a meaningful impact while advancing your career
And more
Ready to Join the LaunchTech Crew?
If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you.
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Information security analyst job in Huntsville, AL
Ready to launch your career? RGNext operates, maintains, and sustains mission-critical systems to provide safe and effective launch, testing, and tracking of Department of Defense, civil, commercial and international space lift vehicles. We support ballistic missile, guided weapon and aeronautical tests and evaluations as well as support space situational awareness operations and experiments to defend the United States to ensure our nation's safety. Our employees serve on the forefront of global defense and space operations. We offer our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities.
This position is located on Kwajalein Atoll in the Marshall Islands. It is an unaccompanied position (no family accommodations or pets). Benefits of this unique location include free housing, three meals a day and potential for U.S. overseas tax incentives.
Essential Functions
Perform comprehensive DISA STIG compliance evaluations and technical security control validations to ensure rigorous system hardening.
Execute daily monitoring and provide critical security posture briefings to the Cyber Operations Team Lead and RETS Cybersecurity Manager.
Draft and update Cyber Operations Standard Operating Procedures (SOPs), creating standardized, repeatable processes that significantly enhance team productivity and mission readiness.
Partner with cross-functional technical teams to provide expert guidance on remediation strategies and cybersecurity best practices.
Support investigations into potential security violations and policy breaches, executing the Incident Response Plan to ensure rapid mitigation and containment.
Collaborate with the Cyber Operations team to ensure technical compliance with security mandates from SMDC, NETCOM, C5ISR, and RETS leadership.
Maintain technical proficiency in emerging Cyber Operations tools and methodologies to adapt to evolving mission requirements and threat landscapes.
Execute additional technical functions and mission-critical tasks as assigned to support organizational security objectives.
Other duties as assigned.
Required Skills
Proven ability to communicate complex technical concepts clearly to diverse stakeholders and collaborate effectively with cross-functional teams to streamline workflows.
Proficient in producing high-quality Standard Operating Procedures (SOPs) and comprehensive technical reports.
Expert at conducting DISA Security Technical Implementation Guide (STIG) evaluations using STIG Viewer, Xylok Security Suite, and SCAP Compliance Checker (SCC), supplemented by meticulous manual checklist reviews.
Skilled at identifying, documenting, and tracking non-compliant items while providing actionable technical recommendations for remediation or risk mitigation.
Hands-on experience utilizing Tenable Security Center (ACAS) to perform vulnerability scans and cross-reference findings against current STIG requirements.
Proficient in analyzing Windows and Linux system event logs via Splunk (or similar SIEM tools) to validate security controls, detect unauthorized configuration changes, and identify indicators of compromise (IOCs).
Evaluates high-impact Change Requests as a key member of the Technical Review Board (TRB).
Required Experience
Bachelor's degree in computer science, cybersecurity, or related field; or equivalent combination of education and experience.
Two (2) or more years of experience in Information Assurance, Cybersecurity, or related field with a focus on similar responsibilities to those listed in the Essential Functions and Required Skills sections above.
Experience communicating security concerns and issues to non-technical audiences.
DoD 8140 Security+ certification required.
Additional Eligibility Qualifications
Must be able to obtain and maintain a DoD Secret Security Clearance which requires U.S. Citizenship.
Must be able to obtain/maintain a valid U.S. passport.
Must be able to relocate to the United States Army Kwajalein Atoll, Marshall Islands.
The flexibility to work occasional non-duty hours or on weekends to support specific mission or project requirements.
Benefits of Working at RGNext
RGNext offers our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities and growth. Employees enjoy a robust benefit package on day one, which includes medical, dental, vision, disability and life insurances, generous Paid Time Off and holiday pay, a retirement savings plan with a company match and vesting on day one! We are committed to providing employees a quality work/life balance in a productive, evolving environment.
Note: This job description describes the general nature of the duties and requirements of the job. It is not intended to be an exhaustive list or to limit the supervisor's ability to modify work assignments as appropriate.
RGNext is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, or any other applicable state or federal protected class.
$55k-82k yearly est. Auto-Apply 4d ago
Cyber Security Analyst
Pmu Recruitment
Information security analyst job in Alabama
Cyber SecurityAnalyst - (2400000X) Description AL-KHOBAR, KINGDOM OF SAUDI ARABIA Cyber SecurityAnalyst Department Information Technology Institution Prince Mohammad bin Fahd University Reports to Manager - Cyber Security introduction The Cyber SecurityAnalyst at Prince Mohammad bin Fahd University protects the university's digital assets, network, and data by identifying vulnerabilities, monitoring threats, and enforcing security measures. This role ensures compliance with security policies, supporting a safe environment for research and academic activities.
Job Purpose
The Cyber SecurityAnalyst role is to safeguard the university's IT infrastructure by proactively monitoring, identifying, and addressing security threats. This position involves implementing security measures, responding to incidents, and ensuring compliance with security policies to protect data and maintain the integrity of university systems. The analyst plays a key role in supporting a secure environment for all digital and academic activities.
Duties and Responsibilities
Major Duties/ Responsibilities:
· Monitor all networks and computer systems to prevent, detect, and investigate security breaches.
· Perform penetration testing to ensure the company's networks are free of bugs that malware authors can take advantage of.
· Design and implement multilevel security strategies to protect networks and data resources.
· Plan computer and network security upgrades and test hardware and software related to the upgrade.
· Stay up to date on new information technologies and apply those innovations in the company's security standards and best practices.
· Lead analysis of current architecture, risk exposure and defining mitigation measures in order to develop suitable recommendations.
· Highlight Cyber Security threats and prepare the official reports.
· Lead assessments of company's security posture including benchmarking/maturity assessments.
· Lead design of cyber security solutions and development of detailed technical specifications for the approved designs.
· Lead implementation, integration and testing of approved security solutions.
· Provide specialist technical support and address technical problems related to applications and production equipment to ensure any complex/escalated issues are handled with no or minimal downtime.
· Oversee/perform preventive maintenance as per schedule to ensure relevant security systems/processes remain fit for purpose.
· Provide subject matter expertise for cyber security related projects throughout its lifecycle to ensure delivery is as per plan/budget and client/TCC expectations.
· Prepare and deliver technical presentations for successful project delivery
· Lead cybersecurity evaluation and configuration review services
· Anticipate future problem areas by monitoring workflows and network traffic patterns.
· Prepare and perform cyber security awareness activities.
· Prepare work papers documenting procedures performed and that fully support audit findings.
· Assist IT operational audits in accordance with the annual audit plan.
· Follows up the action plan progress (such as penetration tests, vulnerability scans) and ensures that recommendations are implemented in a timely manner
· Assist staff members when they need help with security products and processes.
Job-Specific Skills:
· Working experience in a SOC or NOSC environment
· Must have strong working knowledge of information technology, including applications, networks and systems.
· Knowledge in performing IT Audit reports
· Experience in performing Risk Assessments reports.
· Experience in developing Business Continuity Plans and Disaster Recovery Plans
· Knowledge in the usage of vulnerability assessment and penetration testing tools
· Knowledge of security attacks techniques, familiar with MITRE ATT@CK framework
· Experience in using MS Office, MS Visio, Project Management tool.
· Experience in project management, problem-solving, training/coaching, presentation skills, and conflict resolution skills.
· General knowledge of ISO 27001, ITIL or other control frameworks
· Experience in writing SOP's - operation manuals
· Independent, motivated, and ambitious personality
Qualifications & Experience (Required)
Bachelor's degree in computer science, technology or computer engineering
5 to 8 years of experience in progressively more complex and responsible operational roles within a dynamic Enterprise function
Certified CompTIA Security+, CEH, CCNA, CCNP, CISSP (preferred)
Experience in Cisco ASA, WatchGuard, Juniper, CheckPoint Firewall
Knowledge of network and web protocols, and an in-depth knowledge of Linux/Unix tools and architecture
Experience in Patch Management and vulnerably assessment.
Knowledge and understanding of relevant legal and regulatory requirements.
Knowledge of common informationsecurity management frameworks.
Experience in InformationSecurity and NCA controls implementation.
Having experience in IT, Operational IT, Cybersecurity, incident detection, incident response, and forensics.
Maintain quality service delivery by adhering to company standards and best practices.
Strong attention to detail with an analytical mind and outstanding problem-solving skills.
Familiarity with information technology concepts such as infrastructure, cyber security, and application controls.
Great awareness of cybersecurity trends and hacking techniques.
On-call network troubleshooting
Knowledge, Skills and Abilities (Required)
· Strong written and verbal communication skills
· Strong focus on first time quality
· Desire to grow technical skills and ability to learn new technologies swiftly
· High attention to detail, self-starter, result driven
· Ability to work in a cross-functional team
· Professional, polite, and attentive while also being accurate
· Always prepared and responsive, willing to meet each challenge directly
· Teamwork
· Problem solving, Leadership
· Perseverance and motivation
· Ability to work under pressure, Confidence
· Managing ambiguity, Resilience
· Analytical skills, IT skills
Disclaimer
PMU reserves the right to alter, amend and add responsibilities to this position in line with the institutional needs. Changes and amendments to this job description shall be within the academic framework and the general employment conditions. Primary Location: Al-KHOBARJob: AnalystOrganization: Information Technology DepartmentSchedule: Regular StandardJob Type: Full-time Job Posting: Feb 25, 2025, 9:10:34 AM
$64k-87k yearly est. Auto-Apply 60d+ ago
Cyber Security Analyst 2
Us Tech Solutions 4.4
Information security analyst job in Birmingham, AL
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cyber security modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
$67k-89k yearly est. 60d+ ago
Data Security Analyst
Exeter Government Servi 4.1
Information security analyst job in Fort Knox, KY
Provide support to the lead securityAnalyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies.
Required Qualifications:
Experience in administrative support & MS Office proficiency
Bachelor's degree or 5 years of experience
U.S. citizen and MUST possess a current active DoD Secret clearance
Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
$64k-88k yearly est. Auto-Apply 60d+ ago
Cyber Security Analyst
OSC Global
Information security analyst job in Radcliff, KY
OSC EdgeTech, LLC is seeking a talented Cyber SecurityAnalyst to join the team.
OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge.
Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world.
OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits.
Position Overview
The Cyber SecurityAnalyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks.
Major Activities
Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager.
Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks.
Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions.
Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements.
Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations
Review and investigate security alerts and incidents from Microsoft 365 Defender
Utilize eMASS to maintain and update POA&M status
Review device compliance status from HBSS
Work with other NEC Operations team members to remediate and mitigate security vulnerabilities.
Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture.
Perform other duties as appropriate and as assigned.
Knowledge/Skills/Abilities
Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months.
Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with SecurityInformation and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management.
Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills.
Great analytical, critical thinking and problem-solving abilities.
Superior presentation and negotiation skills.
Strong management and organizational skills.
Adaptable and capable of working in fast-paced environments.
Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint
Required Qualifications
Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience
Demonstrated work experience as Cyber SecurityAnalyst in DoD or Federal government environments
Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS
Must possess appropriate DISA ESS certifications and experience.
Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP)
Must be US citizen
Must possess active secret security clearance or higher
Must be able to pass pre-employment background check
Preferred Qualifications
Bachelor's degree in IT, IM, or Cyber Security
ACAS certification obtained within the last three (3) years, preferred
HBSS Administrator certification obtained within the last three (3) years, preferred
E-Verify:
OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.
Reasonable Accommodation:
OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
Information security analyst job in Redstone Arsenal, AL
Support the Missile Defense Agency (MDA) with development and analysis of programmatic data for program management support, to include monitoring and reporting against the acquisition program baselines, and assistance with program oversight and execution briefings. Alternative responsibilities may encompass development and execution of acquisition strategies/plans, contract requirements packages (e.g., writing SOWs, CDRLs, special provisions, source selection evaluation plans) and supporting prime contract monitoring/management activities. CompTIA Certification Preferred.
Certified Authorization Professional (CAP) certification (or ability to attain within 90 days after employment)
Provide interpretation and execution of MDA Acquisition policy, directives, guidance, and instructions
Provide program management support in developing, maintaining, and reporting against program baselines, gathering and analyzing programmatic data for internal Agency oversight reviews of programs (e.g., MDAR, DPR, PER, PMRs, internal reviews)
Prepare briefings and correspondence in response to internal taskings and external RFIs (e.g., GAO/Congressional/DoDIG/DoD oversight organizations)
Analyze acquisition requirements and provide recommendations during pre-solicitation phase through contract execution
Support program and contract management processes through the preparation and/or review of acquisition and program management documentation, briefings, white papers, reports, metrics
Provide support through all phases of the acquisition cycle with an emphasis on cybersecurity throughout the process
Requirements
Prior MDA experience preferred.
Advanced level - Master's degree required and/or 15 years' experience
Intermediate level - Bachelor's degree required and/or 10 years' relevant experience
Knowledge and experience in acquisition, procurement, and contracting highly desirable
Solid background in MS Office tools suite (e.g., Word, Excel, PowerPoint, Access) essential
Must possess exceptionally strong communications and analytical skills, be a self-starter, detail oriented, work well with a team, interacts with multiple levels and functional areas and able to manage customer and contractor relationship
SECRET or above Security Clearance required.
$64k-87k yearly est. 60d+ ago
Manager, Information Security Policy and Controls Governance
Unum 4.4
Information security analyst job in Chattanooga, TN
Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures.
Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company - not just insurers.
We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo.
Unum is changing, and we're excited about what's next. Join us.
General Summary:The Manager - InformationSecurity Policy and Controls Governance is responsible for strategic enhancement and day-to-day operation of key governance, risk, and compliance capabilities, including policy and standards governance, enterprise and application-level risk assessments, and controls management and attestation programs. This role will oversee the full lifecycle of governing documents, manage policy exceptions, coordinate external and regulatory assessments, and ensure strong alignment between security controls and regulatory requirements. The manager will also drive consistent, timely issues management across all domains. This leader will partner closely with stakeholders across the organization to mature processes, strengthen compliance posture, and ensure effective, repeatable execution of GRC activities. They will manage a small to mid-size team of IT security and risk management professionals.
Job Specifications
Bachelors degree in computer science, or relevant technical experience
Has 5+ years experience in an IT Risk Management field, or equivalent relevant work experience
Has a security technology background with strong knowledge of relevant technical security disciplines
Exhibits courage by taking smart risks and encouraging others to do so; empowers innovative approaches by motivating others to be proactive and resourceful
Able to effectively coach, mentor, identify, and address skills needs and gaps
Proficient in methods and techniques for running effective meetings and for understanding and influencing the roles played by participants
Displays good interpersonal skills at all levels of contact and in a wide variety of situations, able to listen and influence, and to relate to customers in their own language
Demonstrates the ability to champion change and support teams through change.
Demonstrates the ability to think critically, challenge conventional thinking and generate and apply unique business insight to create competitive advantage for the organization
Has solid knowledge of regulations, including, GLPA, HIPAA, GDPR, CCPA, and other cyber security regulatory compliance requirements and related programs
Has in-depth knowledge of security and control frameworks such as the NIST Cyber Security Framework, NIST SP 800-53, ISO 17799/27001, CobIT, and ITIL
CRISC, CISSP, CISM, CISA, and other security related certifications are a plus
Principal Duties and Responsibilities
Oversees and evaluates the delivery and effectiveness of the organizations policy governance, risk assessments, control attestation, and issues management capabilities, taking action to address performance or quality gaps as needed.
Ensures the team maintains a well‑defined, risk‑aligned backlog of work that advances program maturity and meets regulatory, audit, and business needs.
Guides team members in prioritizing assessments, policy lifecycle activities, and control-related work based on risk, business value, and regulatory timelines.
Proactively removes obstacles and operational roadblocks that hinder timely completion of assessments, attestations, and governance processes.
Partners with business and technology stakeholders to translate security, compliance, and risk management objectives into actionable work items.
Ensures best‑practice execution, including structured assessment methodologies, clear control documentation, consistent issue tracking, adherence to policy standards, and high‑quality evidence collection.
Encourages creativity and continuous improvement in maturing governance, assessment, and control processes; fosters a culture of innovation within the team.
Uses operational metrics, assessment cycle data, and workflow insights to understand team performance and drive process efficiency.
Partners with leadership to ensure strong talent is in place to support the organization's governance, risk and compliance obligations.
Mentors, coaches, and motivates team members to elevate their GRC expertise, business partnership skills, and overall performance.
Identifies skill gaps related to risk frameworks, regulatory requirements, control design, and assessment techniques, ensuring development plans address these needs.
Promotes cross‑training and shared ownership of GRC functions to reduce single‑points‑of‑failure and increase team resilience.
While accountable for the team's output, actively cultivates a self‑organizing, autonomous, and collaborative team that consistently demonstrates accountability and continuous improvement.
Conducts regular 1:1s and development discussions to monitor progress, reinforce strengths, and close skill gaps.
Collaborates with peers to evaluate the effectiveness of resourcing models, proposing enhancements to better support team operations.
Maintains a strong understanding of emerging regulatory trends, risk frameworks (e.g., NIST CSF, HIPAA, SOC, ISO), and control expectations to inform program improvements.
Reinforces disciplined prioritization by ensuring the team focuses on the highest‑value, highest‑risk activities and commitments.
Designs and operates GRC processes with partner teams' knowledge and needs in mind, ensuring risk governance activities are clear, intuitive, and easy to complete.
#LI-TO1
#LI-MULTI
IN4
Our company is built on helping individuals and families, and this starts with our employees. We want employees to maintain a positive balance, which is why we provide access to the benefits and resources they need to invest in themselves. From our onsite fitness facilities and generous paid time off to employee professional development programs, we are committed to helping employees live and work their best - both inside and outside the office.
Unum is an equal opportunity employer, considering all qualified applicants and employees for hiring, placement, and advancement, without regard to a person's race, color, religion, national origin, age, genetic information, military status, gender, sexual orientation, gender identity or expression, disability, or protected veteran status.
The base salary range for applicants for this position is listed below. Unless actual salary is indicated above in the job description, actual pay will be based on skill, geographical location and experience.
$89,400.00-$183,500.00
Additionally, Unum offers a portfolio of benefits and rewards that are competitive and comprehensive including healthcare benefits (health, vision, dental), insurance benefits (short & long-term disability), performance-based incentive plans, paid time off, and a 401(k) retirement plan with an employer match up to 5% and an additional 4.5% contribution whether you contribute to the plan or not. All benefits are subject to the terms and conditions of individual Plans.
Company:
Unum
$89.4k-183.5k yearly Auto-Apply 14d ago
Senior Security Analyst
Neptune Technology Group 4.4
Information security analyst job in Tallassee, AL
Neptune Technology Group Inc. is a technology company serving water utilities across North America. Since 1892, we have continually focused on the evolving needs of water utilities - revenue optimization, operational efficiencies, and improved customer service. With our portfolio of smart water meters, data collection systems and software, we make data actionable for our customers - so they can remain focused on the business of water. For additional information, please visit the company website at ******************
Senior SecurityAnalyst
Position Summary
As a Senior SecurityAnalyst, you will be a key member of Neptune's 24×7 Security Operations program, supporting incident response, SIEM management, and threat detection across a hybrid environment (on-prem, cloud, SaaS). You'll work closely with the SOC Manager to execute detection, response, and reporting processes that protect Neptune and meet compliance requirements.
Responsibilities:
Threat Detection & Monitoring
* Monitor and analyze security alerts from SIEM and EDR platforms
* Investigate anomalies and suspicious activity across endpoints, networks, and cloud environments
* Maintain high-fidelity alerting and reduce false positives through tuning
Incident Response & Management
* Execute playbooks for triage, containment, and remediation of security incidents
* Assist in forensic investigations and contribute to post-mortem reports
* Participate in tabletop exercises and readiness drills
SIEM & Security Logging
* Maintain SIEM health and ensure reliable telemetry across all assets
* Develop and refine detection rules and correlation logic
* Support automation and orchestration workflows for incident handling
Identity & Access Management
* Monitor identity-related events for anomalies and privilege escalation attempts
* Support IAM lifecycle processes and enforce least privilege principles
Threat Intelligence & Modeling
* Integrate threat intelligence feeds into detection workflows
* Assist in threat modeling to identify potential attack paths
Reporting & Metrics
* Document incidents and provide timely updates to SOC Manager for reporting to parent company
* Track and report operational metrics (MTTD, MTTR, alert volumes, etc.)
Security Standards & Architecture
* Apply secure-by-design principles in collaboration with engineering teams
* Support zero trust initiatives and network segmentation projects
Relevant Platforms (experience with several is expected):
* SIEM/SecOps: e.g. Google SecOps (Chronicle)
* EDR & Identity: e.g. CrowdStrike, Microsoft AD/Entra
* Network Security: e.g. FortiGate NGFW, FortiSASE
* Secure Browsing: e.g. Prisma
* Patching & Config: e.g. Automox
* Secrets Management: e.g. Keeper
* Asset Management: e.g. Axonius, Cyclops
* Email & Data Security: e.g. Mimecast, Microsoft Purview
Minimum Qualifications:
* Bachelor's degree (or equivalent experience)
* 3+ years in Security Operations or Incident Response
* Hands-on experience with SIEM, EDR, and threat detection
* Familiarity with NIST, ISO, MITRE ATT&CK, and zero trust principles
* Strong analytical and communication skills
Preferred Qualifications:
* Security certifications (e.g., GCIH, GCIA, CISSP)
* Experience with cloud security (AWS, Azure, GCP)
* Exposure to SOAR automation and scripting
* Travel Requirements: Typically requires overnight travel less than 10% of the time.
Travel Requirements: Typically requires overnight travel less than 10% of the time.
Location: Duluth, GA, Tallassee, AL
$73k-100k yearly est. 40d ago
Temporary- Cyber Security Analyst
Tennessee Board of Regents 4.0
Information security analyst job in Nashville, TN
Title: Temporary - Cyber SecurityAnalyst
Under the directive of the InformationSecurity Officer, the cyber securityanalyst will implement security strategies and best practices in accordance with regulatory standards.
ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in informationsecurity and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in informationsecurity, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of InformationSecurity Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 60d+ ago
Temporary- Cyber Security Analyst
The College System of Tennessee 3.9
Information security analyst job in Nashville, TN
Title: Temporary - Cyber SecurityAnalyst Under the directive of the InformationSecurity Officer, the cyber securityanalyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in informationsecurity and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in informationsecurity, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of InformationSecurity Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 22d ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Franklin, TN?
The average information security analyst in Franklin, TN earns between $57,000 and $110,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Franklin, TN