Information security analyst jobs in Hendersonville, TN - 243 jobs
All
Information Security Analyst
Information Technology Analyst
Senior Security Analyst
Cyber Security Analyst
Securities Analyst
Senior Information Security Engineer
Certified Information Systems Security Professional
Security Engineer
Manager, Information Assurance
Senior Security Engineer
Cyber Security Engineer
Data Security Analyst
Information Systems Security Officer
Information Security Engineer
Information Security Director
Cyber Security Engineer
Provisions Group 4.4
Information security analyst job in Knoxville, TN
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and SecurityInformation and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's informationsecurity strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
$65k-87k yearly est. 1d ago
Looking for a job?
Let Zippia find it for you.
IT Operations Center Analyst
Medasource 4.2
Information security analyst job in Nashville, TN
ITOC Analyst - Operations Center
Our client is seeking a ITOC Analyst to join their Data Center Operations team on a contract basis. This role serves as the front line of support for monitoring, maintaining, and troubleshooting mission-critical data center infrastructure. The ideal candidate is hands-on, detail-oriented, and comfortable working in a 24/7 operations environment supporting both facility and IT infrastructure systems.
Key Responsibilities
Monitor and support data center physical facilities, including power, cooling, and environmental systems
Perform hardware and server deployment, replacement, and troubleshooting
Conduct preventative maintenance, routine inspections, and health checks on data center infrastructure
Troubleshoot and resolve issues related to electrical and mechanical equipment
Support and maintain network infrastructure, including cabling, racks, and patching
Respond to incidents, alerts, and tickets as part of an operations center / NOC-style workflow
Document work performed and escalate issues appropriately to engineering or facilities teams
Adhere to operational procedures, safety standards, and change management processes
Required Qualifications
Experience working in a data center, NOC, or critical facilities environment
Hands-on experience with server hardware, rack/stack, cabling, and break/fix
Working knowledge of electrical and mechanical systems in a data center setting
Ability to follow runbooks, procedures, and safety protocols
Comfortable working shifts, on-call rotations, or non-standard hours if required
Preferred Qualifications
Experience with mission-critical environments (healthcare, financial services, enterprise IT, etc.)
Familiarity with monitoring tools, ticketing systems, or CMDBs
Basic understanding of networking concepts (switches, patch panels, fiber/copper)
Certifications such as CompTIA A+, Network+, or data center-related training (nice to have, not required)
$68k-89k yearly est. 3d ago
Data Analyst, II - Information Security Metrics and Reporting
Unum Group 4.4
Information security analyst job in Chattanooga, TN
Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures.
Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company - not just insurers.
We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo.
Unum is changing, and we're excited about what's next. Join us.
General Summary:The InformationSecurity Metrics and Quality Data Analyst is responsible for simple to moderately complex data profiling, analysis and mapping with little to no oversight and exhibits a mastery of the tools and technical skillset subject matter expertise with data organization and visualization supporting informationsecurity (cyber security) risks and operations. This candidate works closely with SecurityAnalysts, Security Engineers, Project Managers, and Global InformationSecurity leadership. They deliver to high quality KRI/KPI and are able to accurately estimate work required to deliver on their responsibilities. They use critical thinking skills applied to data analysis in order to advance the delivery and maintenance of informationsecurity KRI and KPI.
Job Specifications
Bachelors Degree preferred, and/or equivalent experience
4+ years experience with demonstrated success at the Data Analyst 1 level or equivalent experience
Mastery of data profiling and analysis concepts, including data anomalies, data mapping activities.
Mastery of data modeling concepts
Mastery of PowerBI data modeling and visualization development
Clearly demonstrates data analytical ability and critical thinking skills
Ability to manage multiple tasks by paying close attention to detail
Ability to work as part of a team and interact effectively with others
Ability to embrace change, adapt to the unexpected, and focus energies, people, and solutions on practical and positive results
Takes an innovative approach to problem solving
Strong communications skills
Strong team player; able to work effectively within a team and more broadly with people from a variety of backgrounds and areas across the organization.
Principal Duties and Responsibilities
Responsible for data profiling and analysis to evaluate data sources to determine the best source for business information.
Responsible for source to target data mapping specifications (e.g. source to target can be from one DBMS table to another DBMS table, from a DBMS table into a canonical message structure, etc.)
Design simple to moderately complex, flexible data models (conceptual and logical) and visualizations through collaborations with analysts, engineers, and leadership. Leads sizing and estimation activities within the agile team.
Create/Capture documentation (metadata) that is up-to-date.
Collaborate with the test engineers to perform data validation and testing activities as appropriate.
Develop and maintain knowledge of informationsecurity practices and the insurance industry.
Develop and maintain knowledge of informationsecurity-owned and other relevant data sources.
Adhere to approved architectural standards.
Uses critical thinking skills to recommend and implement data management practices that advance business value.
Thinks with the mind of the end customer at all times, ensuring solutions seek to improve the customer experience and delight their customers.
#LI-TO1
#LI-MULTI
IN4
Our company is built on helping individuals and families, and this starts with our employees. We want employees to maintain a positive balance, which is why we provide access to the benefits and resources they need to invest in themselves. From our onsite fitness facilities and generous paid time off to employee professional development programs, we are committed to helping employees live and work their best - both inside and outside the office.
Unum is an equal opportunity employer, considering all qualified applicants and employees for hiring, placement, and advancement, without regard to a person's race, color, religion, national origin, age, genetic information, military status, gender, sexual orientation, gender identity or expression, disability, or protected veteran status.
The base salary range for applicants for this position is listed below. Unless actual salary is indicated above in the job description, actual pay will be based on skill, geographical location and experience.
$73,300.00-$150,500.00
Additionally, Unum offers a portfolio of benefits and rewards that are competitive and comprehensive including healthcare benefits (health, vision, dental), insurance benefits (short & long-term disability), performance-based incentive plans, paid time off, and a 401(k) retirement plan with an employer match up to 5% and an additional 4.5% contribution whether you contribute to the plan or not. All benefits are subject to the terms and conditions of individual Plans.
Company:
Unum
$73.3k-150.5k yearly Auto-Apply 16d ago
Information Security and Fraud Analyst
First Farmers & Merchants Bank 4.2
Information security analyst job in Columbia, TN
Education Level: (1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree).
Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Job Type: Full Time
VEVRAA Federal Contractor
Request Priority Referral of Protected Veterans
EOE Protected Veterans/Disabled
Robert C. Matthews, email: *******************************
Role:
The InformationSecurity and Fraud Analyst is responsible for developing and managing appropriate security measures for the bank's information systems, managing third-party vendor security risk, and investigating incidents of fraud and attempted fraud.
Essential Functions & Responsibilities:
E 35% Risk Management. Coordinates organizational risk assessments. Performs third party vendor risk assessments. Conducts informationsecurity Vendor Risk Assessments (VRA) on all in-scope third-party requests. Communicates at all levels and with all business units in providing support in the onboarding of third-party vendors with respect to the assessment of InformationSecurity posture of the vendor. Creates and manages relationships with business units and stakeholders of the Third-Party Vendor Risk Management process. Performs assessment of third-party security and related due diligence documentation (such as SOC).
E 30% InformationSecurity. Monitors computer networks for security issues. Documents and investigates security breaches and other cybersecurity incidents. Stays current on IT security trends and news. Develops company-wide best practices for IT security. Research security enhancements and makes recommendations to management. Implements both internal and external security audits. Analyzes security issues thoroughly to identify the root cause.
E 30% Fraud Investigations. Assists in the investigation of fraud incidents and recovery of funds; Maintains records of incidents, losses, recoveries, and prevention. Provides customer education to increase awareness of the fraud risk and effective techniques customers can use to mitigate the risk. Coaches staff on determination of fraud incidents and communication with customers. Interacts with external partners such as law enforcement agencies, vendors, and banks to validate information to check fraudulent activities.
N 5% Performs other related duties as assigned or requested.
Performance Measurements:
1.
To comply with the letter and with the spirit of the bank's Code of Business Conduct and Ethics
2.
To ensure that the bank suffers no losses due to failure to comply with operational procedures.
3.
To provide friendly, professional, and accurate service and support to all customers both internal and external.
4.
To maintain and build knowledge of auditing procedures through continued learning and research.
5.
To acquire and maintain a working knowledge of regulations and bank procedures; to comply with the provisions of the Bank Secrecy Act and other laws and regulations.
6. To maintain the confidentiality of customer and any other sensitive information.
7.
To complete required training and undertake additional training as needed to increase job knowledge and maximize productivity.
Knowledge and Skills:
Experience
Three yeas to five years of similar or related experience.
Education
(1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Interpersonal Skills
Work involves much personal contact with others inside and/or outside the organization for the purpose of first-level conflict resolution, building relationships, and soliciting cooperation. Discussions involve a higher degree of confidentiality and discretion, requiring diplomacy and tact in communication.
Other Skills
1. Knowledge in all areas of accounting and audit procedures and the ability to work independently.
2. Working knowledge of spreadsheets and word processing software; must be able to use PC and other types of general office equipment.
Physical Requirements
The person in this position needs to frequently move about inside the office to interact with associates or clients and access office machinery and file cabinets. The person in the position constantly operates a computer and other office productivity machinery, such as a calculator, photocopier, and printer.
Work Environment
This job operates in a professional office environment and may require travel to branches and other locations. This role routinely uses standard office equipment such as calculators, computers, phones, photocopier, filing cabinets and fax machines.
$69k-96k yearly est. Auto-Apply 11d ago
Analyst, Information Security
Standard Aero Aviation Holdings Inc. 4.1
Information security analyst job in Maryville, TN
Build an Aviation Career You're Proud Of
At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT SecurityAnalyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization.
What you'll do:
Conduct risk and security assessments through vulnerability analysis and reporting
Perform mitigation support for both internal and external security audits
Investigate, analyze and document security incidents to identify and document the root cause
Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
Partner with IT Operation teams to remediate system vulnerabilities
Participates in the production of documentation and management reporting
Research security enhancements and make recommendations for improved policy and process
Analyze IT requirements and provide objective advice on the use of new IT security offerings
Stay up-to-date on information technology and cybersecurity trends and standards
Other IT Security-related duties as required
Capable of identifying, evaluating and mitigating significant risks within an enterprise.
Strong working experience with Microsoft Office Suite.
Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
Possess strong analytical skills attention to detail.
Ability to prioritize assignments while working on multiple projects
Ability to work independently and proactively to meet assigned objectives
Flexible with the ability to multi-task, effectively prioritize and work under pressure
Basic project management
Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
Analyze, report and respond to security alerts within the various IT technologies and global locations
Proactively remediate information technology security threats as a member of the security team
Assist in the designing, documenting, architecting and implementing IT security measures and controls
Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
Bachelor's degree in InformationSecurity, Computer Science, or a related field; equivalent experience may be considered.
5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
SDLC, and understand application security.
Containerization and Development Security Operations
Benefits that make life better:
Comprehensive Healthcare
401(k) with 100% company match; up to 5% vested
Paid Time Off starting on day one
Bonus opportunities
Health- & Dependent Care Flexible Spending Accounts
Short- & Long-Term Disability
Life & AD&D Insurance
Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
$73k-103k yearly est. Auto-Apply 60d+ ago
Cyber Security Vulnerability Analyst
ITR 4.2
Information security analyst job in Oak Ridge, TN
Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities.
This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week.
Job Responsibilities:
• Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role.
• Mentor the DCO's junior staff, developing their technical and incident resolution skills.
• Participate in incident response activities involving multiple teams and functions.
• Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls.
• Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status.
• Automate key DCO functions using Tines technology
• Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities.
• Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities.
• Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats.
• Assist users with the creation, monitoring, and evaluation of policy and device exceptions.
• Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements.
• Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues
Candidates must be able to obtain a federal security clearance so US citizenship is required.
$69k-95k yearly est. 30d ago
Data Security Analyst
Exeter Government Servi 4.1
Information security analyst job in Fort Knox, KY
Provide support to the lead securityAnalyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies.
Required Qualifications:
Experience in administrative support & MS Office proficiency
Bachelor's degree or 5 years of experience
U.S. citizen and MUST possess a current active DoD Secret clearance
Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
$64k-88k yearly est. Auto-Apply 60d+ ago
Sr. Security Analyst
Maximus 4.3
Information security analyst job in Bowling Green, KY
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in informationsecurity, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$78k-105k yearly est. Easy Apply 8d ago
Cyber Security Analyst
OSC Global
Information security analyst job in Radcliff, KY
OSC EdgeTech, LLC is seeking a talented Cyber SecurityAnalyst to join the team.
OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge.
Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world.
OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits.
Position Overview
The Cyber SecurityAnalyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks.
Major Activities
Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager.
Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks.
Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions.
Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements.
Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations
Review and investigate security alerts and incidents from Microsoft 365 Defender
Utilize eMASS to maintain and update POA&M status
Review device compliance status from HBSS
Work with other NEC Operations team members to remediate and mitigate security vulnerabilities.
Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture.
Perform other duties as appropriate and as assigned.
Knowledge/Skills/Abilities
Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months.
Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with SecurityInformation and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management.
Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills.
Great analytical, critical thinking and problem-solving abilities.
Superior presentation and negotiation skills.
Strong management and organizational skills.
Adaptable and capable of working in fast-paced environments.
Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint
Required Qualifications
Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience
Demonstrated work experience as Cyber SecurityAnalyst in DoD or Federal government environments
Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS
Must possess appropriate DISA ESS certifications and experience.
Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP)
Must be US citizen
Must possess active secret security clearance or higher
Must be able to pass pre-employment background check
Preferred Qualifications
Bachelor's degree in IT, IM, or Cyber Security
ACAS certification obtained within the last three (3) years, preferred
HBSS Administrator certification obtained within the last three (3) years, preferred
E-Verify:
OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.
Reasonable Accommodation:
OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
$64k-88k yearly est. 43d ago
Information Security Engineer
Heaven Hill Brands 4.6
Information security analyst job in Louisville, KY
Job Description: with a base location in Louisville, KY. What the Role Is The InformationSecurity Engineer is responsible for strengthening and supporting Heaven Hill's cybersecurity program. This hands-on technical role focuses on implementation, monitoring, and continuous improvement of security controls across cloud and on-premise environments.
The Engineer supports governance and risk management efforts and plays a key role in incident response and in deploying and maintaining secure technology solutions.
This position will collaborate with IT and business units to ensure Heaven Hill's data and systems remain resilient against evolving threats, while helping enable secure and efficient access through identity and access management solutions.
This role is instrumental in advancing Heaven Hill's overall security maturity and ensuring that cybersecurity enables, rather than limits, innovation and operational excellence.
How You Will Spend Your Time? Security Engineering & OperationsDesign, implement, monitor, and maintain security controls across cloud, identity, endpoint, and network environments.
Implement and manage Privileged Access Management (PAM) and Role-Based Access Control (RBAC) programs that align with business needs and support POLP (Principle of Least Privilege).
Support and enhance Identity Management solutions, including user provisioning, Single Sign-On (SSO) integrations, and secure application configurations.
Support secure configuration and hardening of Windows and Linux servers, as well as Windows and mac OS workstations.
Manage and maintain DNS and domain registrar configurations to ensure secure and reliable name resolution and domain integrity.
Implement, integrate, and manage authentication, including Kerberos, FIDO2, Smart Cards, passkeys, certificate-based authentication, and TLS or key management solutions.
Administer and support Public Key Infrastructure (PKI), including certificate issuance, renewal, and lifecycle management.
Perform vulnerability scanning and coordinate remediation activities.
Administer and optimize core security platforms such as endpoint detection and response (EDR) and securityinformation and event management (SIEM) systems, including alert tuning, integration, and incident response support.
Develop and maintain automation or scripting (e.
g.
, PowerShell, Python) to improve efficiency in security monitoring, configuration management, and response processes.
Monitor security events, investigate incidents, perform root cause analysis, and drive post-incident improvements.
Collaborate with IT and business teams to ensure security considerations are integrated into infrastructure and project planning from the outset.
Risk & GovernanceConduct and document formal risk assessments, identify, evaluate, and communicate risk mitigation strategies.
Develop, update, and maintain cybersecurity policies, standards, and procedures aligned with the NIST framework.
Partner across the business to build awareness, ensure accountability, and foster a risk-informed culture.
Support security aspects of vendor assessments and technology evaluations.
Collaboration & Continuous ImprovementProvide security guidance for new initiatives, integrations, and system changes.
Contribute to incident response planning, tabletop exercises, and lessons-learned reviews.
Develop, maintain, and refine security operations and incident response playbooks to support consistent and effective response activities.
Stay informed on emerging threats, technologies, and best practices relevant to manufacturing and spirits production environments.
Who You Are… Required Skills and Experience:Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or equivalent experience along with Information Technology related associate's degree.
Minimum 5 years of experience in cybersecurity engineering and/or IT engineering.
Strong cloud security experience, including the design input, configuration, and operation of controls in cloud and hybrid environments.
Hands-on experience with Microsoft Entra ID (Azure AD), including Conditional Access, identity lifecycle management, and integration within hybrid Active Directory environments.
Experience with enterprise email security, endpoint protection, network security, data protection.
Experience implementing and managing Microsoft Purview for data protection, governance, and compliance.
Experience supporting third-party risk management or vendor assessments.
Strong understanding of identity, endpoint, and network security architectures and their integration across enterprise environments.
Experience performing root cause analysis during and after security incidents.
Experience developing or contributing to security documentation such as policies, standards, or procedures.
Strong communication skills across technical and non-technical audiences.
Experience in manufacturing or industrial environments.
Familiarity with OT/ICS security principles, including network segmentation, asset visibility, and industrial protocol security.
Valued but not Required Skills and Experience:Professional certifications such as CISSP, CISM, CRISC, or equivalent.
Understanding secure application deployment or DevSecOps principles.
Physical Requirements While performing duties of job, employee is occasionally required to:Stand; walk; use hands and fingers to handle or feel objects; use a computer; and reach with hands and arms.
Occasionally lift and/or move up to 20 pounds.
BenefitsPaid Vacation11 Paid HolidaysHealth, Dental & Vision eligibility from day one FSA/HSA401K match EAPMaternity/Paternity Leave Heaven Hill and its affiliates are committed to fostering a diverse workforce as an Equal Employment Opportunity company.
We invite applications from candidates of all backgrounds, without regard to race, religion, color, sex, sexual orientation, natural origin, gender identity or expression, age, disability, veteran status, or any other legally protected characteristic.
$69k-90k yearly est. 6d ago
Director of Information Security
SRM Concrete 4.1
Information security analyst job in Smyrna, TN
Director of InformationSecurity Job Summary Smyrna Ready Mix (SRM) is seeking an accomplished and forward-thinking Director of InformationSecurity to lead the strategy, implementation, and continuous improvement of SRM's cybersecurity posture across a rapidly growing enterprise environment. This leadership role will oversee all aspects of informationsecurity governance, risk management, compliance, and operations, ensuring that SRM's systems, data, and infrastructure remain secure, resilient, and aligned with business objectives. The Director of InformationSecurity will collaborate with IT Leadership and operational teams to develop scalable security policies, incident response capabilities, and proactive defense measures across both on[1]premises and cloud (Azure/OCI) environments. This role requires a balance of technical expertise, leadership acumen, and business insight to protect SRM's expanding digital footprint. This position reports directly to the Chief Information Officer (CIO) and partners closely with senior IT and business leadership. The Director of InformationSecurity will play a pivotal role in safeguarding SRM's operations and empowering the company's continued growth through secure, reliable, and innovative technology practices.
Responsibilities
• The Director of InformationSecurity is responsible for the full lifecycle of SRM's cybersecurity program - from strategic planning and design through implementation, monitoring, and continuous improvement.
• Develop and execute SRM's enterprise-wide informationsecurity strategy, roadmap, and governance framework, ensuring consistent control design, secure system integration, and architectural alignment with Zero Trust principles.
• Lead and mentor the informationsecurity team, fostering a culture of collaboration, accountability, and ongoing professional development.
• Establish and maintain cybersecurity policies, standards, and procedures in alignment with industry best practices (NIST, CIS, ISO 27001).
• Design and oversee the implementation of security controls across network, system, application, and cloud infrastructures (Azure, OCI, O365).
• Collaborate with IT leadership to integrate security into all technology projects, ensuring secure design, configuration, and deployment practices.
• Manage risk assessments, vulnerability management, and remediation activities, prioritizing mitigation efforts based on business impact.
• Oversee identity and access management (IAM) strategy, ensuring proper integration with Microsoft Entra ID (Azure AD), Active Directory, and role-based access controls, as well as other identity strategies to be evaluated and implemented.
• Oversee enterprise security operations and incident response, leveraging SIEM, threat intelligence, and analytics to detect and mitigate risks, while leading disaster recovery planning, simulation exercises, periodic threat assessments and penetration testing, and post-incident reviews to strengthen organizational resilience.
• Coordinate audits and compliance efforts related to security, privacy, and data protection (SOX, PCI, GDPR, etc. as applicable).
• Define and track risk metrics on key cybersecurity performance indicators (KPIs) including health, incidents, and strategic initiatives and provide executive reports to CIO and IT leadership regularly and C-suite as needed.
• Partner with CIO and IT Leadership, along with Legal and HR teams to ensure adherence to evolving data privacy and regulatory requirements.
• Develop security strategies for operational technology (OT) and industrial IoT environments, including plant networks, weigh systems, and telemetry.
• Develop and manage enterprise-wide security awareness and training programs to promote a strong security culture.
• Evaluate emerging threats and technologies, recommending appropriate security solutions and investments.
• Establish and oversee third-party and supply-chain risk management processes, ensuring that vendor systems and services meet SRM's security and privacy requirements.
• Collaborate across IT disciplines (systems, networking, applications) to ensure end-to-end resilience, visibility, and alignment of security priorities with operational needs.
Qualifications / Requirements
• Bachelor's degree in InformationSecurity, Computer Science, or related field (Master's preferred).
• 10+ years of progressive experience in IT and informationsecurity, including at least 5 years in a leadership or management role.
• Strong technical foundation in network, system, and cloud security, including firewalls, SIEM, endpoint protection, identity management, and incident response.
• Proven experience implementing and managing security programs across hybrid (on-prem/cloud) infrastructures.
• Deep understanding of various security suites for endpoint management and security (Defender, Entra ID, Intune, SentinelOne, Avanon, Azure Security Center and similar).
• Knowledge of risk management frameworks such as NIST CSF, ISO 27001, and CIS Controls.
• Demonstrated success developing policy, governance, and compliance programs.
• Strong analytical and strategic thinking skills with the ability to translate complex security issues into business terms.
• Excellent communication, leadership, and interpersonal skills; able to influence across technical and executive levels.
• Relevant certifications such as CISSP, CISM, CISA, or CRISC.
• Experience with industrial or operational technology (OT) environments is a plus.
• Experience with Zero Trust architecture and cloud-native security solutions.
• Experience leading incident response teams or managing security operations centers (SOC).
• Knowledge of data loss prevention (DLP), MFA, SIEM/SOAR, and endpoint detection and response (EDR) platforms.
• Proven ability to develop, budget for, and manage informationsecurity projects ensuring strategic investment in technologies, tools, and personnel are implemented timely and with minimal service impact.
About SRM
Smyrna Ready Mix (SRM) is a growing leader in the ready-mix concrete industry, recognized for excellence, integrity, and innovation. Our IT department supports a fast-paced, technology-driven environment, ensuring reliable systems and connectivity across all SRM locations nationwide. Joining SRM IT means becoming part of a collaborative, forward-thinking team that values accountability, growth, and teamwork. We leverage modern infrastructure solutions to support SRM's mission-building better communities with reliable service and sustainable growth.
$102k-144k yearly est. 10d ago
Sr. Information Security Engineer
North Star Staffing Solutions
Information security analyst job in Goodlettsville, TN
Job Requirements & Qualifications: •Designs, put into practice, administers, and supports multiple informationsecurity platforms, systems, and applications. Supports a variety of technologies in a hands-on manner. •Performs internal security risk assessments, security risk assessments of third party business partners, and detailed security risk assessments of various technologies. (Examples include directory services, database platforms, client and server operating systems, programming languages, web services, firewalls, remote access technologies, messaging platforms, encryption solutions, wireless technologies, internally-hosted applications, externally-hosted applications, and cloud services).
•Supports defined Company operating principles via effective, pragmatic informationsecurity controls. Analyzes, defines, implements, and administers efficient business processes related to informationsecurity programs. Represents the informationsecurity function through pragmatic consultation and participation in a defined SDLC.
•Maintains knowledge of current and up-and-coming security, compliance, and technical developments. Identifies present and prospective future vulnerabilities and collaborates with suitable leaders to identify, recommend, and develop risk remediation plans, ad to track remediation outcomes and timelines.
•Works with the informationsecurity management team to administer, maintain, and continuously improve HIPAA, PCI DSS, SOX, and internal controls compliance programs, investigate known or suspected security incidents, support internal and external audits, and assist in the development of appropriate audit response Management Action Plans.
•Promotes security best practices via awareness, example, and compliance with policies and regulatory requirements.
•Uses project management best practices to initiate, manage, and close projects, often simultaneously across a variety of projects. Creates and maintains a variety of documents related to projects and informationsecurity.
•Guide and cross-train junior department team members lead meetings construct and uphold strong partnerships with multiple departments coordinate vendor support engagements etc.
Knowledge, Skills, and Abilities
•Knowledgeable with and ability to apply time-proven, generally-accepted security management concepts, techniques, and methodologies.
•Strong understanding of pragmatic implementation of informationsecurity controls, holistic defense-in-depth strategies, protocols used to interconnect networks, and publish application resources.
•Strong, efficient written and verbal communication skills that enables effective communications to multiple audiences.
•Ability to occasionally work unscheduled shifts and in an on-call capacity and be available for occasional travel (up to 25%).
•Strong internal (security recommendations) and external (vendor support) negotiation skills.
•Ability to influence and encourage others.
•Strong understanding of PCI, HIPAA, and SOC regulatory requirements.
•Development/analysis proficiency in one or more scripting languages.
•Development/analysis proficiency in TSQL.
•Capability to learn and preserve new skills required to adapt to growing business and technical environments.
•Strong perceptive of present and emergent informationsecurity technologies and trends.
Qualifications
Work Experience and/or Education
•Bachelor's and/or Master's degree in informationsecurity or computer information systems.
•6+ years of informationsecurity generalist experience (broad and deep in data, application, system, and network security domains) with complex technical initiatives.
•Active CISA, CISSP, or CISM certification.
•Experience identifying and addressing security risks associated with host and network operating systems (e.g. Windows, Linux, AS400, PAN OS, AIX, Cisco IOS, etc.) enterprise services (e.g. directory services, email, web publishing, database, virtualization, etc.) content management, client-server, and collaboration, thin-client, and web-based applications enterprise applications (e.g. Lawson) cloud services (e.g. SaaS, IaaS, etc.) data storage, etc.
•Hands-on SME/lead experience with the design, implementation, and administration of at least 5 of the following technologies: Palo Alto Networks, IBM Tivoli Endpoint Manager (BigFix), IBM QRadar (SIEM), Qualys Vulnerability Scanning Solutions, Tenable Nessus, Juniper SSL VPN GlobalScape EFT Server Symantec Data Loss Prevention (Vontu), RSA SecurID, and CyberArk Password Management.
Additional Information
$88k-117k yearly est. 2d ago
Night Shift Security Analyst
Arctiq
Information security analyst job in Brentwood, TN
Arctiq is a leader in professional IT services and managed services across three core Centers of Excellence: Enterprise Security, Modern Infrastructure and Platform Engineering. Renowned for our ability to architect intelligence, we connect, protect, and transform organizations, empowering them to thrive in today's digital landscape. Arctiq builds on decades of industry expertise and a customer-centric ethos to deliver exceptional value to clients across diverse industries.
Job Summary:
Do you have an analytical and flexible mindset, a demonstrated strong work ethic and are motivated to seek out and solve complex security problems? If so, Arctiq invites you to join their Security Operations Center team. As a Night Shift Security Operations Centre (SOC) Analyst, you will be responsible for handling cybersecurity events. Analyze and respond to alerts, compromise, breaches and proactively develop defensive measures and capabilities. Handle informationsecurity incidents and other adverse security events.
Responsibilities:
Monitor and triage security events, incidents, and alerts in a 24/7/365 environment.
Conduct initial triage and analysis of security events and incidents.
Escalate complex incidents to Tier 2/3 analysts as needed.
Respond to security incidents in accordance with established incident response procedures.
Participate in incident response activities and provide status updates to stakeholders.
Document and maintain an accurate record of all security incidents, events, and alerts.
Maintain a high level of awareness of current and emerging security threats and trends.
Collaborate with other teams and departments within the organization to resolve security incidents.
Continuously improve processes and procedures for incident response and security event management.
Provide excellent quality of Customer Service.
Meet or exceed customer expectation.
Understand the overall processes and procedures of the Arctiq SOC and the relevance of the procedures to the managed client.
Work non-traditional hours in a 24 x 7 service environment.
Experience
2+ years in an IT security role or IT support role with significant security responsibilities.
Demonstrated expertise in one or more of the following domains Data Security, Digital Forensics, Incident Response and Analysis, IT Systems and Operations, Network Security, Systems and Applications Security or Vulnerability Management.
Excellent oral and written communication skills.
Individuals will be required to submit to a background examination.
Demonstrated ability in effective communication and collaborating in a high-performance team environment.
Demonstrated commitment to customer service.
Experience functioning in diverse workgroups
Experience working with a SIEM
Arctiq is an equal opportunity employer. If you need any accommodations or adjustments throughout the interview process and beyond, please let us know. We celebrate our inclusive work environment and welcome members of all backgrounds and perspectives to apply.
We thank you for your interest in joining the Arctiq team! While we welcome all applicants, only those who are selected for an interview will be contacted.
$61k-84k yearly est. 32d ago
Information Systems and Analytics (Cybersecurity), Professional Practice-Track Faculty
MTSU Jobs
Information security analyst job in Murfreesboro, TN
Job Title
Information Systems and Analytics (Cybersecurity), Professional Practice-Track Faculty Department
Information Systems and Analytics
University Expectation
MTSU seeks candidates committed to innovative teaching and meaningful service. We also seek to attract culturally and academically diverse faculty who value working with diverse students.
Salary
The salary is commensurate with education and experience.
Job Summary/Basic Function
The Department of Information Systems and Analytics at Middle Tennessee State University invites applicants for a full-time professional practice-track faculty position in cybersecurity at the rank of assistant or associate professor. The start date for the position is August 1, 2026.
Required Education
A master's degree in information systems, cybersecurity, computer science or a closely related field is required by the appointment date.
Required Related Experience
Ten (10) years of professional experience in information technology, that includes experience in cybersecurity disciplines such as network security, ethical hacking/penetration testing, cyber analytics, incident response, or cyber defense.
Other Desirables
Applicants with demonstrated expertise in data analytics and curriculum development will receive special consideration.
Documents Needed to Apply
To successfully apply, applicants must include a cover letter, curriculum vitae, and statement of teaching philosophy as separate attachments at the time of online application.
Special Instruction to Applicants
For more information about serving as a faculty member at Middle Tennessee State University, please visit our faculty recruitment webpage.
If you need help applying, please contact Mitzi Dunkley, Faculty Recruitment Specialist, at **************. If you have position-specific questions, please contact Melinda Korzaan at ************************.
MTSU offers a comprehensive benefits package, including but not limited to the following:
Sick Leave
Vacation Leave for Administrative/Classified Staff/12-month Faculty
13 paid University holidays
Medical, dental, vision, and life insurance
Retirement plans
Optional 401K and 403B Deferred Compensation Plans
Educational benefits for the employee and their spouse and dependents
Click here for additional information.
MTSU is an equal opportunity employer. All qualified individuals are encouraged to apply.
Proof of U.S. citizenship or eligibility for U.S. employment is required before employment (Immigration Control Act of 1986). Clery Act crime statistics for MTSU are available at *********************************************** or by contacting MTSU Public Safety at **************.
MTSU is a Tobacco & Drug-Free campus.
This position requires a criminal background check. Therefore, you will be required to provide information about your criminal history to be considered.
For individuals requiring reasonable accommodation to apply: In compliance with the Americans with Disabilities Act Amendments Act (ADAAA), if you have a disability and would like to request an accommodation to apply for a position with MTSU, please call ************ or email ************.
Application Review Date: 11/03/2025
$76k-102k yearly est. Easy Apply 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Frankfort, KY
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including InformationSecurity, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Temporary- Cyber Security Analyst
Tennessee Board of Regents 4.0
Information security analyst job in Nashville, TN
Title: Temporary - Cyber SecurityAnalyst
Under the directive of the InformationSecurity Officer, the cyber securityanalyst will implement security strategies and best practices in accordance with regulatory standards.
ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in informationsecurity and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in informationsecurity, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of InformationSecurity Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 60d+ ago
Security Analyst
Firstbank 4.6
Information security analyst job in Nashville, TN
Description This position administers the enforcement of corporate, regulatory, and risk management policies and assists in developing, implementing, and achieving the strategic goals of the InformationSecurity Program. The InformationSecurity program includes policies, standards, procedures, and controls (technical, administrative, and physical) to protect customer, consumer, and proprietary information against reasonably foreseeable risks. This role is responsible for management of or auditing and reporting on intrusion prevention systems, content filtering systems, SIEM and event management systems, Antivirus, and vulnerability assessment programs.ESSENTIAL FUNCTIONS:
Leading efforts to reduce overall risk by monitoring and tuning security alerts and investigating incidents.
Defining, planning, implementing, maintaining, and upgrading security measures, policies and controls.
Implement products and services as required to maintain compliance with existing, new, or changing regulations and auditing recommendations.
Administer security policies to control access to resources observing least privilege.
Manage and maintain patch installation for operating systems, software applications and Hardware as part of the overall vulnerability management system.
Create and maintain security documentation to include policies, standards, procedures, and reports as required to support the InformationSecurity program.
Protect systems by defining access privileges, control structures, and resources.
Work closely with technology and compliance teams for troubleshooting security related problems as well as identifying and implementing security strategy.
Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity, and make recommendations based on those findings,
Research attempts to compromise security posture and recommend solutions.
Manage the user awareness training program and provide additional end-user training as needed.
Design, implement, and report on security system activity, and perform end-user activity audits.
Work with vendors to arrange for upgrades, updates, patches and replacements on software and hardware.
Assist with 3rd party due diligence as pertains to cybersecurity best practices.
Perform other duties as assigned
KNOWLEDGE, SKILLS & ABILITIES: Education: A Bachelor's degree or 5 years of related experience.
Experience: 3+ years relevant InformationSecurity or IT Audit experience.
Certifications & Licenses: Relevant security or IT Audit certification.
FirstBank does not accept unsolicited resumes from agencies and staffing firms. Recruitment agencies and consultants may not submit resumes directly to managers. FirstBank will not pay fees to any third-party agency or company that does not have a signed agreement as an approved vendor. FirstBank in an Equal Opportunity Employer, including disability.
$60k-81k yearly est. Auto-Apply 60d+ ago
Temporary- Cyber Security Analyst
The College System of Tennessee 3.9
Information security analyst job in Nashville, TN
Title: Temporary - Cyber SecurityAnalyst Under the directive of the InformationSecurity Officer, the cyber securityanalyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in informationsecurity and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in informationsecurity, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of InformationSecurity Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 24d ago
Physical Security Systems Engineer
xAI
Information security analyst job in Memphis, TN
xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates.
About the Role
As a Physical Security Systems Engineer at xAI, you'll design, implement, and maintain advanced security systems to safeguard our facilities, assets, and personnel. Working onsite in Memphis, Tennessee, you'll tackle complex challenges, leveraging your deep expertise in security technologies to strengthen our infrastructure at a fast-scaling company. Expect to dive into system optimization, ensure robust protection, and travel regularly to xAI sites to support our mission of accelerating human scientific discovery through AI.
This is an in-person role based in Memphis, Tennessee, with regular travel required to all xAI sites.
Responsibilities
Develop detailed design plans for the installation of physical security systems including access control, surveillance cameras, intrusion detection, and alarm systems.
Collaborate with InfoSec, IT and facility management teams to integrate security hardware with existing systems across locations.
Manage health and configuration of security network infrastructure
Regularly assess the performance of installed security systems and make necessary adjustments or upgrades.
Conduct preventive maintenance to ensure all security equipment is in optimal working condition.
Diagnose and resolve hardware issues promptly to minimize downtime and security risks.
Keep detailed records of all service and maintenance activities.
Participate in or lead security audits to identify vulnerabilities in physical security measures.
Recommend and implement solutions to address identified security gaps.
Liaise with vendors for procurement of security hardware, ensuring compliance with organizational standards and budget constraints.
Manage relationships with external contractors for installation and maintenance services.
Train security and facility staff on the use of new security systems.
Ensure all security hardware installations meet local, state, and federal regulations.
Maintain up-to-date documentation on system configurations, maintenance schedules, and security incident responses.
Required Qualifications
Minimum of 5 years in a role focused on physical security systems design.
Proven experience with CCTV, access control, and intrusion detection systems.
Experience using CAD software and reading architectural drawings
Experience using Bluebeam software
Preferred Qualifications
Bachelor's degree in Electrical Engineering, Computer Science, or related field; or equivalent experience in security systems.
Ability to interpret security objectives, develop project schedules and manage adherence to established timetables.
Familiarity with Genetec software is a plus.
Proficiency in hardware troubleshooting and system diagnostics.
Experience configuring security and network architecture in integrated security systems.
Familiarity with current security technology trends and innovations.
Certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional) are highly desirable.
Excellent problem-solving abilities and attention to detail.
Strong communication skills for effective collaboration with team members and stakeholders.
Ability to work under pressure in a dynamic environment on highly condensed timelines.
Regular sitting at a desk or computer for extended periods, typing and writing. Occasionally walking, around the facility and standing.
xAI is an equal opportunity employer. For details on data processing, view our
Recruitment Privacy Notice.
$65k-90k yearly est. 25d ago
Analyst IT Report -Technology Development
Shelby County Schools 4.6
Information security analyst job in Memphis, TN
Destination 2025, our 10-year strategic plan, is designed not only to improve the quality of public education, but also to create a more knowledgeable, productive workforce and ultimately benefit our entire community. What will success look like in 2025?
By 2025, 80 percent of seniors will be on track to learn in a postsecondary classroom or enter the workforce straight out of high school; 90 percent of students will earn their high school diploma on time; and every student will enroll in a postsecondary opportunity college or career-ready.
We believe:
Proficiency in literacy is the foundation of all learning, and we are committed to making that a top priority for students.
As we raise expectations of our students, innovative and varied practices are needed in the classroom to provide students with learning experiences that will prepare them for life after graduation.
Successful teachers and leaders are the drivers for student success. That means continuing to provide educators with the support and tools needed to make classroom teaching impactful.
Although 2025 is in the future, the work is happening to produce engaged and prepared students.
By devoting time and other resources to schools, community members can have a direct impact on student achievement.
How will we get there?
Teachers, parents and community leaders have worked with us to develop the high-leverage priorities to focus all of our efforts and resources over the next 10 years - early literacy, post-secondary readiness, teacher and staff development, high quality schools and community engagement.
Job Description
Purpose and Scope 1. Work with the Leadership and Department to gather requirements to design, develop, test and deploy reports and strategic and operational dashboards.
2. Responsible for day-to-day designs, developments, monitoring and support of assigned reports and dashboards.
3. Develops Excel, SQL, or application specific reports.
4. Pulls data from various data sources and combine into a single report, either via Data Warehouse or through direct integration.
5. Builds reports to help identify data patterns to scrub/clean data and maintain good data hygiene.
6. Provide database development expertise (stored procedures, views etc.) for application development, design, implementation, verification, debugging, optimizing and maintenance of SQL Server database objects and process for the application, reporting and interface modules
7. Perform report development with strong stored procedure skills utilizing SQL Server 2008 R2, 2005, 2000
8. Design code and test SQL Server reporting services components (user interface, Stored Procedures, Tables etc.)
9. Experience in complete development lifecycle from requirements through deployment and maintenance
10. Provides end-user training on report writing software and support users in ad-hoc report creation.
11. Develops and applies solutions to complex problems which require the regular use of ingenuity and creativity and competency in SQL and EXCEL.
12. Converses with management to determine type, scope, and purpose of analyses. May lead a team in the effort. Works with other analysts and management to complete assigned project work.
13. Deals with complex problems and provides solutions that are innovative and ingenious, achieving quality and work process improvements.
14. May ensure that the workgroup's goals and activities are in sync with and support the broader goals and objectives of the organization; and that the execution of responsibilities are in accordance to lawful and ethical standards.
15. Directs and assists in the preparation and maintenance of a variety of narrative and statistical repmis, records, correspondence, and files related to assigned service, activities, and operations; provides for appropriate research and compiles reports, as needed.
16. Performs other related duties as assigned or directed.
Qualifications
Essential Job Functions Delivers at a high level of competency Information Technology software development. Assesses and performs analysis on data, and prepares data to facilitate Technical Services functions of organization. Responsibilities require understanding of both theory and practice. Minimum Qualifications Graduation from an accredited college or university with a Bachelor's Degree in Computer Science plus an additional four (4) years related experience, or equivalent, for a total education/experience of 8 years. Prefer experience with MS SQL Server 2008 R2, 2005 Reporting Services, Integration Services. Prefer 2+ years' experience in use and application of stored procedures, DTS package, SSIS package, and Crystal reports. Experience with multi-dimensional Data Sources, reporting tool such as MS Reporting services, Tableau preferred.
Degree Equivalency Formula:
Bachelor's Degree= 4 years plus required years of experience.
Master's Degree= 2 years plus required years of experience. Where Master's degrees are required, years for Bachelor's Degrees must be included. Knowledge, Skills, and Abilities Basic understanding and familiarity with database structure (particularly SQL).
Strong analytic and problem-solving skills, with the ability to swiftly and accurately understand complex data and perform analysis
Skill in developing data-supported solutions and using fact-based logic; ability to translate complex analysis in easy-to-understand manner and present to a broad audience
Strong written and verbal communication skills
Outstanding leadership skills and ability to build high-performing teams through both recruitment and selection and professional development
Ability to tackle the operational challenges of the merged school district in a complex, changing political and educational environment
Ability to manage daily administrative tasks without losing sight of long-term goals and planning
Additional Information
Why Memphis?
Shelby County
Schools-one of the 25 largest school districts in the nation-is located in
Memphis, TN, a
city
known for its great food, original music, professional sports, high-quality
arts in the most affordable urban setting in the nation
. Not only that, but Memphis is a hotbed and national leader
for groundbreaking work in education.
Benefits
:
SCS
benefits include the following:
State
retirement plan
Paid
holidays
Paid
vacation
Paid
sick days
Heath
Care Insurance (e.g. Medical, Dental)
$64k-88k yearly est. 2d ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Hendersonville, TN?
The average information security analyst in Hendersonville, TN earns between $58,000 and $110,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Hendersonville, TN