Post job

Information security analyst jobs in High Point, NC

- 30 jobs
All
Information Security Analyst
Information Technology Analyst
Information Systems Security Officer
Cyber Security Analyst
Security Engineer
Information Technology Security Manager
Senior Cyber Security Analyst
Securities Analyst
Information Security Engineer
Certified Information Systems Security Professional
Information Assurance Analyst
Information Security Director
Senior Security Engineer
  • Global Assurance Analyst

    VF Corporation 4.9company rating

    Information security analyst job in Greensboro, NC

    Now that you have found the job description, what is next? At VF, we strive to foster a culture of belonging based on respect, connection, openness, and authenticity. As a purpose-led, performance-driven company, we are committed to inclusion, diversity, equity, and action. So, before we get to the job details, take a minute to learn a little more about us - our values and our culture - visit VF Careers or ************ What will you do? A day in the life of an Analyst, Global Assurance at VF looks a little like this. As an Analyst you will support the Senior Manager, Internal Audit, in managing projects within the region. You will participate in the delivery of the audit service plan for the AMER region. Let us break down that day-in-the-life a bit more. Participating in person in delivering Global Assurance audits and advisory projects both with reference to internal and external resources. Conducting the audit/review and following through to report issuance for financial and operational audits. Completing working papers ensuring that the audit objectives are met, and evidence supports the findings. Preparing reports on findings and recommendations for Management. This role will support divisions and subsidiaries in evaluating and suggesting improvements to business practices, processes, and control procedures. Conducting bi-annual inventory observations and periodic SOX control reviews acting on behalf of our external auditors. Evaluating the adequacy of internal controls over financial reporting per SOX compliance, conducting process walkthroughs, identifying deficiencies, assisting in remediation planning, and ensure timely and effective implementation of corrective actions. Summarizing quarterly testing results, collaborate across departments to enhance system efficiency and SOX compliance, and maintain up-to-date knowledge of Section 302/404 requirements through ongoing education. What do you need to succeed? We all have unique skills that we bring to work and celebrate every day. For this role, there are foundation skills you will need to succeed and excel. Additionally, while formal education in a related field is great to have, we are most interested in your 1-3 years of experience and professional achievements. The foundation skills you will need in this position are: Minimum of a Bachelor's in one of the following fields of concentration - Data Analytics, Supply Chain, Accounting, or Business Willingness to work towards a professional certification which may include CPA, CIA, and/or CFE Prior experience in Public Accounting, Corporate Accounting/Finance, or Supply Chain highly preferred Technological proficiency (i.e., Excel required and/or Power BI preferred) Sense of urgency and strong organizational skills Willingness to manage small project teams Now WE have a question for YOU. Are you in? Hiring Range: $56,000.00 USD - $70,000.00 USD annually Incentive Potential: This position is eligible for additional compensation awards that may include an annual incentive plan, sales incentive, or commission potential. Specific details of the additional compensation eligibility for this position will be provided during the recruiting and interview process. Benefits at VF Corporation: You can review a general overview of each benefit program offered, including this year's medical plan rates on ******************** and by clicking Looking to Join VF? Detailed information on your benefits will be provided during the hiring process. P lease note, our hiring ranges are determined and built from market pay data. In determining the specific compensation for this position, we comply with all local, state, and federal laws. At VF, we value a diverse, inclusive workforce and we provide equal employment opportunity for all applicants and employees. All qualified applicants for employment will be considered without regard to an individual's race, color, sex, gender identity, gender expression, religion, age, national origin or ancestry, citizenship, physical or mental disability, medical condition, family care status, marital status, domestic partner status, sexual orientation, genetic information, military or veteran status, or any other basis protected by federal, state or local laws. If you are unable to submit your application because of incompatible assistive technology or a disability, please contact us at **********************. VF will reasonably accommodate qualified individuals with disabilities to the extent required by applicable law. Pursuant to all applicable local Fair Chance Ordinance requirements, including but not limited to the San Francisco Fair Chance Ordinance, VF will consider for employment qualified applicants with arrest and conviction records.
    $56k-70k yearly Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Manpowergroup 4.7company rating

    Information security analyst job in Greensboro, NC

    Our client, a leading organization in the cybersecurity industry, is seeking a dedicated Cyber Security Analyst to join their team. As a Cyber Security Analyst, you will be an integral part of the Security Operations Center (SOC) supporting the organization's cybersecurity initiatives. The ideal candidate will demonstrate analytical thinking, proactive problem-solving skills, and excellent communication abilities, which will align successfully within the organization. **Job Title:** Cyber Security Analyst **Location:** Greensboro, NC **Pay Range:** **What's the Job?** + Monitor Security Operations Center (SOC) alert queues continuously and investigate detections to identify suspicious activities. + Rapidly analyze and respond to security breaches that could compromise sensitive organizational information. + Assess the nature and severity of security threats, determining appropriate actions to contain and mitigate risks. + Formulate temporary fixes to neutralize active threats, restore security posture, and ensure data integrity. + Handle true positive alerts and escalate incidents accordingly, ensuring swift resolution. **What's Needed?** + Typically 2 to 5 years of relevant cybersecurity experience. + Strong knowledge of SOC operations, threat detection, and incident response. + Experience in analyzing and mitigating security threats and breaches. + Familiarity with security tools, frameworks, and best practices. + Ability to work independently with minimal supervision, managing complex scenarios with confidence. **What's in it for me?** + Opportunity to work in a dynamic and innovative cybersecurity environment. + Engagement with cutting-edge security tools and technologies. + Chance to develop and enhance your cybersecurity skills and expertise. + Supportive team environment fostering professional growth. + Participation in ongoing security initiatives to strengthen organizational defenses. **Upon completion of waiting period consultants are eligible for:** + Medical and Prescription Drug Plans + Dental Plan + Vision Plan + Health Savings Account + Health Flexible Spending Account + Dependent Care Flexible Spending Account + Supplemental Life Insurance + Short Term and Long Term Disability Insurance + Business Travel Insurance + 401(k), Plus Match + Weekly Pay If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you! **About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.** _ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _-_ creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent. ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
    $72k-101k yearly est. 42d ago
  • Information Security Analyst

    XDIN

    Information security analyst job in Greensboro, NC

    XDIN subsidiary of ALTEN Group, includes 500 employees dedicated to the automotive engineering development. ALTEN is a Leader in Engineering & Information Technology system, and operates in over 21 countries (Europe, North America, Asia, Africa and Middle East) with more than 28,000 employees of which 88% are engineers. At XDIN, we are always looking for world-class talent to lead our global teams through commitment and dedication to our OEM and Tier I clients. We believe in quality support from concept through production, and delivering the best customer experience while at the same time attaining a great place to work! XDIN Offers Competitive wages, BOE. Major health, dental insurance benefits and vision savings plan. 401k, and basic life. Supplemental benefits such as short-term disability, accident, cancer and life insurance. Paid company holidays and earned time off. We place a high value on thought leadership. We want every employee to develop all the skills required to become an engineering and technology thought leader; contributing to the knowledge assets of our team and our clients. From day one, every consultant is trained and mentored to elevate their careers. Responsibilities: Performs network and application technical vulnerability assessments using vulnerability assessment tools. Performs penetration testing activities to detect vulnerabilities and attack chains. Utilizes penetration testing skills to conduct analyses to gather deeper situational awareness and provide greater security insight of the environment. Lead the Security Awareness efforts, including facilitating presentations on topics of relevance, evaluating and implementing awareness training Assist in network security efforts including Data Loss Prevention, Intrusion Prevention and SIEM analysis Test security measures including OS patches, system hardening, and application configuration Monitor, review and troubleshoot alerts Review, interpret and adapt customer, regulatory and corporate security and compliance requirements into technical design options Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements. Produce security policies, standards, and guidelines Perform security research Produce security risk advisories based on newly identified threats and risk assessment Assist in performing IT audit, third party evaluations, and risk assessment activities Requirements: Bachelor's degree in Information Technology, Computer Science or a related discipline Approximately 3 years' work experience in Information Security in an enterprise network (Internships and Co-Ops can be included) A recognized information security certification or accreditation such as Security+, CISSP, or CEH is a plus. Fundamental understanding of penetration testing techniques and technologies Fundamental understanding of application development security concepts such as OWASP Top 10 Vulnerabilities Fundamental understanding of Active Directory administration and Windows authentication Fundamental understanding of security technologies such as SIEM, IDS/IPS, Web filters, two-factor authentication, web application firewalls Fundamental understanding of Malware detection, analysis, exploitation, containment, and eradication techniques experience Experience with systems analysis including, but not limited to: Gathering requirements from stakeholders, Constructing RFP/RFQs, devising and planning proof-of-concepts, defining use and test cases, driving critical security infrastructure projects, creating cogent status reports for senior management, strong technical understanding of vulnerabilities, and how attackers can exploit vulnerabilities to compromise systems. Excellent verbal, written, and presentation skills; in particular, demonstrated ability to effectively communicate technical and business issues and solutions to multiple organizational levels internally and externally as needed Knowledge of security frameworks and governance such as NIST, ISO27000 series, HIPAA, GDPR, PCIDSS Solid analytical and problem solving skills; ability to think strategically and turn ideas into actions Familiarity with Project Management concepts. Familiarity with scripting languages such as Python Ability to work with little supervision and consistently deliver results The Location: This opportunity is based in Greensboro, NC.
    $78k-110k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst

    GDIT

    Information security analyst job in Liberty, NC

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret/SCI Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cybersecurity, Information Security, System Security Certifications: None Experience: 3 + years of related experience US Citizenship Required: Yes : Job Description Transform technology into opportunity as an Information Security Analyst with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate. At GDIT, people are our differentiator. As an Information Security Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on TS/SCI cleared Information Security Analysts joining our team to support our intelligence customer at Fort Liberty, NC. HOW AN INFORMATION SECURITY ANALYST WILL MAKE AN IMPACT The Information Assurance Analyst is primarily responsible for incident handling, incident response, intrusion analysis, threat hunting, digital forensic analysis, vulnerability scanning, Data Loss Prevention (DLP). Tracks and handles cyber security incidents/events from initial detection to final resolution; coordinates with appropriate parties to investigate and maintain communications. Collaborates with specialty teams to investigate and resolve complex problems. Troubleshoots security tools on the network to ensure successful operation, compatibility with other applications, and minimal impact to the users. Ensures ACAS vulnerability scanning mechanisms are operational and providing relevant results to the vulnerability management and admin teams. Performs Information Systems Security Officer (ISSO) duties, and acts as the POC between parent organization and cyber security teams. Conducts change requests, software authorizations, static code analysis, account reviews, and other Assessment & Authorization (A&A) tasks as required. Acts as a central point of contact for all inquiries potentially regarding cyber security, and if necessary, redirects to the appropriate entities. WHAT YOU'LL NEED TO SUCCEED EDUCATION Associate Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 8570 Certification REQUIRED EXPERIENCE: 3+ years of related experience in data security administration. REQUIRED TECHNICAL SKILLS: Minimum IAT II: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP Within 6 months of hire - CSSP Incident Responder (IR): CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+, GCFA, GCIH, SCYBER Preferred certifications: GCIH, GCFA, GCIA, GNFA, Linux+, CCNA R&S, Splunk Power User SECURITY CLEARANCE: TS/SCI (Required) REQUIRED SKILLS AND ABILITIES: Proficient at navigating Windows 10/Server 2012/Server 2016 operating systems to perform intrusion analysis and systems maintenance Proficient at navigating Linux: Ubuntu/RHEL 6/7/8 to facilitate cyber security engineering and systems maintenance Basic scripting skills using Windows command-line, PowerShell, or BASH Understanding of network ports, protocols, and services Intrusion analysis via HBSS, Splunk or other SIEM tools, Windows Event Logging, Open Source Intelligence (OSINT) sources Incident investigations via McAfee HBSS suite, SolarWinds, Cisco ISE, Cylance, Splunk, Phantom, StealthWatch, WireShark, ForeScout, ACAS, PowerShell, command-line tools Build and maintain ACAS infrastructure; analyze vulnerability scan results and provide recommendations for remediation PREFERRED SKILLS: Strong desire to learn new skills, techniques, tactics, and procedures to improve knowledge and existing processes Must be able to multi-task and adapt to changing priorities in highly stressful situations Highly resilient and motivated to investigate unfamiliar and anomalous problems in a robust OPTEMPO environment, including follow-through to complete resolution Critical thinking skills required to apply and correlate data from multiple sources to solve complex problems Strong ability to quickly and clearly articulate operational impacts of cyber security incidents/events to leadership Ability to communicate efficiently and precisely to target audience, as well as build strong rapport with other teams Location: On Company Site Citizenship Required US citizenship GDIT IS YOUR PLACE: ● 401K with company match ● Comprehensive health and wellness packages ● Internal mobility team dedicated to helping you own your career ● Professional growth opportunities including paid education and certifications ● Cutting-edge technology you can learn from ● Rest and recharge with paid vacation and holidays The likely salary range for this position is $76,500 - $103,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 25-50% Telecommuting Options: Onsite Work Location: USA NC Fort Liberty Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $76.5k-103.5k yearly Auto-Apply 9d ago
  • Cyber Security Analyst Co-op - Fall 2026

    Delhaize America 4.6company rating

    Information security analyst job in Salisbury, NC

    Ahold Delhaize USA, a division of global food retailer Ahold Delhaize, is part of the U.S. family of brands, which includes five leading omnichannel grocery brands - Food Lion, Giant Food, The GIANT Company, Hannaford and Stop & Shop. Our associates support the brands with a wide range of services, including Finance, Legal, Sustainability, Commercial, Digital and E-commerce, Technology and more. Co-op Program Overview: Get an insider view of the fast-changing grocery retail industry while developing relevant business, technical and leadership skills geared towards enhancing your career. This paid Co-op experience is an opportunity to help drive business results in an environment designed to promote and reward diversity, innovation and leadership. Our mission is to create impactful early talent programs that provide cohorts with meaningful project work, learning and development sessions, and mentorship opportunities. Applicants must be currently enrolled in a bachelor's or master's degree program. Applicants must be currently authorized to work in the United States on a full-time basis and be available from July 13, 2026 through December 4, 2026. We have a hybrid work environment that requires a minimum of three days a week in the office. Please submit your resume including your cumulative GPA. Transcripts may be requested at a future date. * Approximate 6-month Co-op session with competitive pay * Impactful project work to develop your skills/knowledge * Career assistance & mentoring in obtaining full time positions within ADUSA * Leadership speaker sessions and development activities * One-on-one mentoring in your area of interest * Involvement in group community service events * Networking and professional engagement opportunities * Access to online career development tools and resources * Opportunity to present project work to company leaders and gain executive visibility Department/Position Description: The Cybersecurity team is responsible for protecting our organization's systems, and data from internal and external threats. The team monitors network activity, manages security tools, responds to incidents, and ensures compliance with regulatory standards. We also implement proactive measures such as vulnerability assessments, threat intelligence, and employee training to reduce risk and maintain a strong security posture across the enterprise. The Co-op will support the Infrastructure Services team by assisting with day-to-day operations, documentation, and project-related tasks. During their session, they will gain hands-on experience with enterprise systems, collaborate across departments, and develop a deeper understanding of IT service delivery in a large-scale environment. Qualifications: * Currently pursuing a degree in Cybersecurity, Information Technology, Computer Science, or a related field. * Familiarity with basic cybersecurity concepts such as threat detection, network security, and vulnerability management through coursework or labs. * Exposure to tools or platforms like Wireshark, Splunk, or basic scripting for security automation is a plus. * Strong attention to detail and analytical thinking, especially when reviewing logs or identifying anomalies. * Excellent communication skills and a collaborative mindset, with a willingness to learn in a fast-paced, security-focused environment. Individual cohort pay rates vary based on location, academic year, and position. ME/NC/PA/SC Salary Range: $20.90 - $35.70 IL/MA/MD Salary Range: $22.80 - $37.30 #LI-DNI At Ahold Delhaize USA, we provide services to one of the largest portfolios of grocery companies in the nation, and we're actively seeking top talent. Our team shares a common motivation to drive change, take ownership and enable our brands to better care for their customers. We thrive on supporting great local grocery brands and their strategies. Our associates are the heartbeat of our organization. We are committed to offering a welcoming work environment where all associates can succeed and thrive. Guided by our values of courage, care, teamwork, integrity (and even a little humor), we are dedicated to being a great place to work. We believe in collaboration, curiosity, and continuous learning in all that we think, create and do. While building a culture where personal and professional growth are just as important as business growth, we invest in our people, empowering them to learn, grow and deliver at all levels of the business.
    $20.9-35.7 hourly 60d+ ago
  • Cyber Defense Incident Responder, Senior (L3)

    Stefanini Group 4.6company rating

    Information security analyst job in Greensboro, NC

    Details: Stefanini Group is hiring! Stefanini is looking for a Cyber Defense Incident Responder, Senior (Level 3) in Greensboro, NC (Onsite) For quick apply, please reach out to Krisha Lago Call: ************** / Email: ************************* Work Location 7900 National Service Road Greensboro, NC 27409 Job Title: Cyber Defense Incident Responder, Senior (L3) Days are M-F, 2pm to 10pm Eastern time Training (During first month of the job): M-F, 10am to 6pm Eastern time As a Senior Cyber Defense Incident Responder within the Global Cybersecurity Operations Center (CSOC) you will play a crucial role as a key technical expert responsible for managing and responding to advanced cyber threats, conducting in-depth investigations, and supporting the overall security posture of The Company. This role combines hands-on technical expertise with mentoring responsibilities, ensuring effective threat detection, incident response, and continuous improvement of SOC capabilities. What you will do: Analyze and respond to complex security incidents and alerts generated by SOC tools (e.g., SIEM, EDR, IDS/IPS) Investigate and resolve escalated incidents from Level 1 and Level 2 analysts, ensuring swift containment and remediation Lead investigations into cybersecurity incidents, including malware infections, data breaches, and insider threats Perform digital forensics to collect, analyze, and preserve evidence for legal or compliance requirements Provide incident reports with detailed root cause analyses and actionable recommendations Use threat intelligence to identify patterns and indicators of compromise (IOCs) relevant to the organization Work closely with junior analysts to provide guidance, training, and mentorship, fostering a culture of growth and knowledge-sharing Collaborate with IT, cybersecurity, and business stakeholder teams to implement and improve security controls Support the continuous improvement of SOC processes, tools, and technologies to enhance efficiency and effectiveness. Identify gaps in detection and response capabilities and recommend improvements to SOC leadership. Details: In this role, you will bring: Bachelor's degree in Computer Science or a related 4-year technical degree Minimum 7 years of experience in supporting cyber defense operations in highly complex enterprise networks. Experience in SOC, SIRT, or CSIRT capacities One or more of the following certifications: GIAC Certified Intrusion Analyst, GCIH Certified Incident Handler, GCIA Certified Intrusion Analyst, CISSP Experience in enterprise cybersecurity environment investigating targeted intrusions through complex network segments Expert understanding of Advanced Persistent Threat (APT), Cybercrime, and Hacktivist tactics, techniques, and procedures (TTPs) Subject Matter Expert in cybersecurity principles, threat lifecycle management, incident management Comprehensive knowledge of various operating systems (Windows, OS X, Linux), network protocols, and application layer protocols Demonstratable experience in scripting languages (may include Powershell, Python, PERL, etc.) Understanding of the Cyber Kill Chain methodology, the NIST framework, the MITRE ATT&CK framework, and SANS Critical Security controls Working knowledge in modern cryptographic algorithms and systems Experience working with and tuning signatures, rules, signatures, and security technologies (IDS/IPS, SIEM, Sandboxing tools, EDR, email security platforms, user behavior analytics Network design knowledge including security architecture Strong analytical and technical skills in network defense operations including experience with incident handling (detection, analysis, triage) Conceptual understanding of cyber threat hunting Prior experience and ability analyzing cybersecurity events to determine true positives and false positives. Including cybersecurity alert triage, incident investigation, implementing countermeasures, and managing incident response Previous experience with SIEM platforms and log aggregation systems that perform collection, analysis, correlation, and alerting Ability to develop rules, filters, views, signatures, countermeasures, and other cyber defense platforms as well as the ability to support analysis and detection continual improvement Knowledge of new and emerging cybersecurity technologies Ability to create technical documents as well as stakeholder sitreps and briefing documents Preferred Qualifications: Deep Cybersecurity Operations Center experience in the following: intelligence driven detection, security principles, threat lifecycle management, incident management, digital forensics and investigations, network monitoring, endpoint monitoring, OT security principles CSOC Process Management experience, to include: process and procedure management, CSOC initiative management, continual operational improvement Preferred certifications: CISSP, GCIH, GCIA, Linux+, CCNA, CCNP Ability to demonstrate analytical skills, technical knowledge, and practical application of cyber and information security principles to both business leaders/key stakeholders as well as technical teams and SMEs Demonstrated knowledge in cyber defense policies, procedures, and regulations Knowledge of cyber vulnerability management processes Knowledge of common user and system authentication and authorization mechanisms Listed salary ranges may vary based on experience, qualifications, and local market. Stefanini takes pride in hiring top talent and developing relationships with our future employees. Our talent acquisition teams will never make an offer of employment without having a phone conversation with you. Those face-to-face conversations will involve a description of the job for which you have applied. We also speak with you about the process including interviews and job offers. About Stefanini Group The Stefanini Group is a global provider of offshore, onshore, and nearshore outsourcing, IT digital consulting, systems integration, application, and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like the Americas, Europe, Africa, and Asia, and more than four hundred clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting company with a global presence. We are a CMM Level 5 company. #LI-KL1 #LI-ONSITE
    $90k-119k yearly est. Easy Apply 60d+ ago
  • Information System Security Officer (ISSO) - Level II

    Onezero Solutions 4.2company rating

    Information security analyst job in Sedalia, NC

    Job Description OneZero Solutions is an employee‑centric cybersecurity and engineering firm supporting federal and defense missions. We value our people and provide competitive benefits, including health coverage, 401(k) match, PTO, paid holidays, referral bonuses, and educational assistance. Position Title: Information System Security Officer (ISSO) - Level II Location: Elizabeth City NC (Hybrid - 2-3 days onsite per week) Clearance: Secret Clearance Position Overview The ISSO Level II provides mid‑level cybersecurity support for USCG avionics systems, aviation software, and maintenance test platforms. This role helps achieve and sustain ATO compliance through DoD and NIST cybersecurity frameworks and aviation‑specific standards. Key Responsibilities - Execute the NIST RMF A&A lifecycle for aviation-related systems - Conduct vulnerability assessments and direct remediation - Implement and validate STIGs and SCAP compliance results - Support continuous monitoring, configuration management, and audits - Assist in evaluating avionics updates, patches, and maintenance tools - Collaborate with engineering, maintenance personnel, OEMs, and leadership stakeholders Required Qualifications 3+ years of ISSO or cybersecurity experience in DoD/Federal environments Working knowledge of the NIST RMF and related standards, DoD security policies and standards (DoD 8510.01, DoD 8500, STIG etc.), and the DoD Security Assessment and Authorization process. Demonstrated proficiency in the use of security tools such as eMASS, Tenable Nessus, ACAS, etc. Experience with ACAS/Tenable, HBSS/ESS, and STIG/SCAP tools Ability to develop and update cybersecurity documentation and artifacts Experience with aircraft support systems, OT, or maintenance tools preferred Required Certifications (one or more): - Security+ - CGRC (CAP) - CASP+ / SecurityX - CCISO - CCSP - Cloud+ - SSCP - CSSLP Education Bachelor's degree in Cybersecurity, Computer Science, or related field preferred OneZero Solutions, LLC is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws. To request an accommodation, please contact us at ************************* or call **************. Job Posted by ApplicantPro
    $63k-84k yearly est. 9d ago
  • IT Financial Analyst

    ITG Brands 4.6company rating

    Information security analyst job in Greensboro, NC

    **City** Greensboro **Role Type** Permanent **WHO WE ARE** ITG Brands is the third-largest tobacco company in the USA with offerings of some of the most well-known cigarette, cigar, and e-vapor brands. As a member of the globally recognized Imperial Brands PLC family, we are a forward-thinking partner with operational integrity. ITG Brands is committed to putting consumers at the center of what we do, while creating an innovative workplace where inclusion, creativity, and bold thinking drive progress. This empowers us to bring our true selves to work, to collaborate more effectively through showing our passion and being confident to bring new ideas to the table. We are not afraid to seize opportunities and make things happen - both individually and collaboratively. We strive to exceed expectations by seeing things differently and doing things differently. This truly is a place where we all share a challenger mindset which drives our success. **What You Will Do** The **IT Financial Analyst** reports to the IT Finance Business Partner and is responsible for ensuring accurate financial tracking, reporting, and compliance for IT projects within the Global IT organization. This role focuses on managing IT spend, maintaining strong financial controls, and providing clear, timely communication to stakeholders. **What You Will Do** + **Financial Reporting & Forecasting:** Deliver timely, accurate reporting of IT project costs; analyze variances between actuals, forecasts, and budgets; provide insights on key drivers. + **Cost Management:** Ensure complete and accurate cost capture in SAP, including allocations, recharges, accruals, and PO support. + **Compliance & Controls:** Confirm CapEx/OpEx classification aligns with Group Accounting Policy; maintain internal controls and support audits. + **Stakeholder Collaboration:** Work closely with IT project managers, procurement, and finance teams to validate forecasts, ensure POs are in place, and apply correct accounting treatment for IT contracts, licenses, and vendor payments. + **Asset Management:** Support IT asset capitalization and depreciation forecasting; maintain and reconcile the IT Fixed Asset Register. + **Process Improvement:** Identify and implement opportunities to simplify and automate reporting and financial governance processes. + **Tools & Analysis:** Utilize SAP and other ERP systems; develop financial models and automated reporting solutions using Excel or similar tools. **What We're Looking For** + Strong accounting and financial analysis experience, ideally within IT or technology environments. + Hands-on experience with SAP and ERP systems. + Skilled in data analysis, financial modeling, and building automated reporting solutions. + Ability to work across multiple geographies and time zones, with strong communication and stakeholder management skills. + Detail-oriented, proactive, and comfortable driving process improvements. **Qualifications** - REQUIRED MINIMUM QUALIFICATIONS: The IT Finance Investment Analyst must have the following level of experience. + Qualification in Accounting, Finance, or a related field; CIMA, CPA or equivalent qualification. QBE will be considered + 2-5 years of relevant experience in accounting, financial analysis, or project finance, preferably with exposure to IT or capital investment environments. + Strong understanding of IFRS, especially related to asset capitalisation and treatment of software costs. + Experience working with SAP. + Proficient in Excel (e.g. Pivot tables, XLOOKUP etc) & knowledge of Power BI is an advantage. + Strong analytical mindset and attention to detail. + Excellent communication and collaboration skills. + Ability to work independently in a fast-paced, deadline-driven environment with multiple stakeholders across different geographic locations. - PREFERRED QUALIFICATIONS: It is preferable that the IT Finance Investment Analyst has the following: + Familiarity with IT project lifecycle and technology investment planning. + Experience working in a large corporate environment. **Work Environment and Physical Demand** **What We Offer** - Competitive benefits package that includes medical/dental/vision/life insurance/disability plans - Dollar for dollar 401k match up to 6% and 5% annual company contribution - 15 Company-paid holidays - Generous paid time off - Employee recognition and discount programs - Education assistance - Employee referral bonus program - Hybrid workplace - remote / in office - Summer hours - Casual dress policy Monday through Friday **Applicant Information** This describes the essential functions of the job at the time the was created, but it is not an exhaustive list of tasks, duties and responsibilities. In addition, the position may evolve or change over time and such changes may not be reflected in the job description until it is next updated. **ITG Brands and ITG Cigars provides equal employment opportunities.** All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you have a concern about discrimination in the application or hiring process or you need an accommodation based on religion, disability or pregnancy in the application or hiring process, please contact us at ******************************* . **SHARE THIS JOB** The posting for the position for which you are applying highlights key aspects of the position only. It is not a complete description of the position. All candidates must consent to an independent investigation of their background, references, past employment, education, criminal record, and drug screening. Results of such background checks will be reviewed on a case-by-case basis, giving consideration to the nature of the information reported and its relevance to the specific job being sought before a decision is made using this information. ITG Brands and ITG Cigars provides equal employment opportunities. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you have a concern about discrimination in the application or hiring process or you need an accommodation based on religion, disability or pregnancy in the application or hiring process, please contact us at ******************************* (Talen%74Acquisition%40%69t%67b%72ands.%63om) . We collect personal information from you in connection with your application for employment with ITG Brands or ITG Cigars. For more information, please see our Privacy Policy (****************************************** . If you are a job applicant from California, additional information can be found on our California Applicant Privacy Notice (******************************************************* . If you have questions, contact us atprivacy@itgbrands.com (priv%61%63y@i%74gb%72ands.co%6D) .
    $85k-116k yearly est. 23d ago
  • IT Security Manager

    Direct Staffing

    Information security analyst job in Greensboro, NC

    The IT Security Manager is an experienced leadership role on the IT team responsible for developing, implementing, maintaining, communicating and auditing the security program to protect network availability and information on the global networks. The strategic security plan should foster confidence in the integrity of the organization and its information assets, assuring management, staff, customers, and trading partners that our information systems are safe and dependable. The role plays as a liaison to the Security Team to ensure that security policies are adopted and adhered to II. Key Responsibilities • Manage enterprise-wide security, policies and systems • Develop, document, implement, monitor and audit information systems security strategies, policies, and procedures • Ensure all mandated security and compliance standards are met • Coordinate with vendors, contractors and consultants to maintain and enhance data security • Provide leadership, guidance, and training to information systems personnel on security practices • Manage security audits, vulnerability and threat assessments by directing remediation activities to network or system security breaches • Ensure fulfillment of legal and contractual information, security and privacy mandates including providing executive management with compliance reports and audit findings • Drive project planning, coordination and delivery of quality IT security solutions on time and within budget • Work with technology administrators to ensure the proper level of security for all computing systems and network connections is implemented • Ensure associates are aware of security policies • Provide recommend changes to improve security using new technologies III. Relationships • Position reports directly to the Director, Global IT Infrastructure • Receives work direction from the Security Lead • Works on cross functional teams across IT • Works with Business Managers on security needs as identified IV. Measures of Performance • Maintain a high security index score (measures effectiveness of our security program) • Quality and thoroughness of security program • Number of security breaches and potential security risks to the business • Define and execute projects on time • Deliver solutions that meet requirements, quality, schedule, budget and cost goals • Provide guidance and support to our companies ensuring 100% compliance to all security policies • Strong oral and written communications skills V. Background and Skill • Bachelor's Degree in Computer Science, Information System Management or equivalent (required) • 8-10 years' experience in IT with a broad range of exposure to infrastructure, systems analysis, and application development • 4-7 years of IT Security experience • Certified Information System Security Professional (CISSP) or equivalent certifications desirable • Strong working knowledge of networking technologies; TCP/IP addressing, Routing, DHCP, DNS, VPN, Next Generation Firewalls, Firewalls, IPS, and DMZ • IT auditor experience including SOX, SSAE16, COBIT, etc. (preferred) • Effective utilization of productivity tools including MS Word, Excel, Outlook, Visio, and PowerPoint • Excellent interpersonal, organizational, and time management skills • Versatile, flexible and proactive when resolving technical issues • Strong project management skills with the ability to multitask and manage multiple projects at one time Additional Information All your information will be kept confidential according to EEO guidelines. Direct Staffing Inc
    $89k-129k yearly est. 4h ago
  • Information Security Professional

    UNC Greensboro 4.2company rating

    Information security analyst job in Greensboro, NC

    We are seeking a highly skilled Security Architect with 5 to 7+ years of experience and expertise in cloud security, vulnerability management, BC/DR and AI governance. The ideal candidate will drive innovation while ensuring operational resilience, compliance, and effective risk mitigation across on-prem and hybrid cloud environments. This Information Security Professional position contributes to the division's role of ensuring university compliance with federal and state laws and regulation, serving as the advisory and support resource for HIPAA Security Rule, FERPA and DMCA compliance, records management, and compliance with restricted data laws and policies - such as PII , ePHI, and educational information. Minimum Qualifications A Bachelor's or Master's degree in a technical field with at least 5 to 7 years of relevant experience, or equivalent combination of education/experience Certifications such as CISSP , CRISC , CCSP , Microsoft Certified: Security, Compliance, and Identity Fundamentals, or equivalent. Azure/ AWS /AI Certifications Proven experience in security architecture and AI governance. Expertise in Microsoft security tools (Azure Security, Defender Suite, Purview, Sentinel). Proficient in scripting languages for automation (PowerShell, Python, Bash). Familiarity with compliance frameworks like NIST , ISO 27001/2, HIPAA , and AI governance standards. Strong analytical, communication, and collaboration skills. Work Environment Inside - c
    $65k-84k yearly est. 52d ago
  • Information Systems Security Officer

    Caci International 4.4company rating

    Information security analyst job in High Point, NC

    Information Systems Security OfficerJob Category: Information TechnologyTime Type: Full time Minimum Clearance Required to Start: SecretEmployee Type: RegularPercentage of Travel Required: Up to 10%Type of Travel: Continental US* * * Responsibilities: Manage Risk Management Framework (RMF) process Work with system development team to identify needed RMF artifacts and load them into the government's EMASS system. Develop security plans, policies, and designs. Configure and implement security solutions based upon the customer's performance criteria and specifications Conduct systems pre-test and acceptance tests to validate the designed performance criteria Structure mock designs based upon RFP specifications in support of the Bids & Proposal teams Collaborate with government and /or subcontractors at customer site for security solution integration into existing infrastructure Develop and perform technical presentations for customers Mentor junior engineers and technicians Serve as technical lead on projects. Travel to other CACI Locations or Customer Sites as necessary Proactively ensure a safe work environment and adhere to CACI EH&S policies and procedures Perform other duties as required Qualifications: Required: A Bachelors degree is required. Knowledge of risk assessment tools, technologies, and methods including EMASS system Experience designing secure networks, systems, and application architectures Experience planning, researching, and developing security policies, standards, and procedures Ability to communicate network security issues to peers and customers Working knowledge of current Cyber technologies and experience with NIST 800 Series and DoD 8570 regulations and governing DISA STIGs and/or SRGs Understanding of Information Assurance Vulnerability Management (IAVM) and Information Assurance Vulnerability Assessments (IAVAs Prior experience with RMF controls, risk assessments, and POA&M generation Strong working knowledge of Confidentiality, Integrity, and Availability (CIA) concepts, to include 2-factor authentication, Public Key encryption techniques, patch management, end-point security systems, intrusion detection, security event management and defense-in-depth. Well versed in DoD cyber security Assessment and Authorizations (A&A) DoD Implementation, Directives, NIST Special Publications and other government cyber security standards, policies, and directives Experience with Nessus, ACAS, SCAP Experience completing and review DISA Security Technical Implementation Guides (STIGs) Experience conducting risk analysis on products and system components through review of CVEs, plugins, IAVAs Experience onboarding assets to centrally managed Enterprise solutions. Application Security Architecture and Design experience Security Compliance Operations and Application Security Assessment experience DoD 8570.01 IAT level 2 or greater cyber security certification per DoD 8570.01 (such as Security+) Experience designing and implementing Commercial Solutions for Classified (CSfC) Multi-Site Connectivity Capability Package desired Systems integration experience Excellent interpersonal and presentation skills At least five years of continuous recent experience in the field of DoD information systems security and/or cybersecurity. Possess an active Information Assurance Management (IAM) Level III certification. Additional cyber and/or IT certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA's Advanced Security Practitioner (CASP) Possess an active DoD Secret clearance. Desired: At least five years of continuous recent experience as an Information System Security Manager (ISSM), Information Systems Security Engineer (ISSE), and/or Information Systems Security Officer (ISSO). At least five years of continuous recent experience performing information systems security and/or cybersecurity roles in IT projects and obtaining ATO/ATC. At least five years of continuous recent experience in DoD enterprise Mission Assurance Support Service (eMASS). At least five years of continuous recent experience in networking and/or system engineering. - ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here. Since this position can be worked in more than one location, the range shown is the national average for the position. The proposed salary range for this position is: $105,100-$231,100 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
    $50k-69k yearly est. Auto-Apply 2d ago
  • information Security Engineer

    Locus Recruiting

    Information security analyst job in Greensboro, NC

    Locus is a nimble, experienced consulting team specializing in information security, cloud computing, networking, and infrastructure. We have extensive experience delivering technology solutions in the Network, Cloud, and Security arenas to some of the largest companies in the world. Candidates are treated like unique individuals, not a commodity, and our career experts are committed to understanding all aspects of a candidate's wants and needs in order to find the best possible fit. We are laser-focused on winning together and supporting both our internal team and clients alike for long-term shared success. We take a full-service approach with our process, understanding our clients and candidates needs to find the right fit from a skillset and a cultural perspective. People are at the cornerstone of what we do, and we'd love to hear from you. Locus is currently searching for an Information Security Engineer for our client. This is a full time perm exempt role. SUMMARY: Responsible for protecting the organization's computers, networks, and data against threats, such as security breaches, computer viruses, or attacks by cyber criminals. This position oversees the planning, development, coordination, implementation, and management of all Information Security functions and measures to regulate access and usage of Customer Information Systems in accordance with established company policies, standards and procedures. The Information Security Manager regularly interfaces with other department heads in matters pertaining to information security awareness and keeps abreast of changes in regulatory and compliance issues, which affect all phases of information security and Customer. This position is also responsible for administration of corporate Business Continuity Program. ESSENTIAL JOB FUNCTIONS: Develops Information Security (IS) architecture/designs, plans, controls, processes, standards, policies, and procedures to ensure alignment with IS standards and overall IS security strategy Develop, implement, and manage security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information Determines user requirements, plans projects, establishes priorities, and monitors progress Manages the evaluation and testing of hardware, firmware, and software for possible impact on systems security Maintains and monitors user access control for bank systems Coordinates with other managers to integrate IS project components with other projects including application delivery, network, server, and hosted solutions Manages and coordinates the enterprise Vendor Risk Management Program Manages and coordinates Corporate Business Continuity Program Communicate best practices and risks to Customer Perform a risk assessment of Customer's vulnerabilities in the cybersecurity landscape and develop Customer's risk appetite for Information Security Develop key risk indicators and dashboard metrics reporting to both the management team and the Board of Directors JOB REQUIREMENTS: Bachelor's Degree from an accredited university in the field of Audit, MIS, Computer Science or related field of study Prior Information Security experience at a Financial Services company Familiarity with Financial Services regulations Familiarity with Federal Financial Institution Examination Council (FFIEC) guidance Prior management experience Certified Secure Software Lifecycle Professional (CSSLP) and/or Certified Information Security Manager (CISM) certification KNOWLEDGE/SKILLS REQUIRED: Knowledge of financial services industry and all applicable regulations and industry standards Advanced ability to engineer security solutions Intermediate relationship management skills Intermediate knowledge of cybersecurity strategy management Advanced cybersecurity monitoring and reporting skills Advanced knowledge of security incident handling Advanced knowledge of security risk assessment methodologies Excellent customer service skills Strong verbal and written communication skills High level of attention to detail, with strong problem solving & organizational skills Ability to perform effectively in fast-paced environment PHYSICAL AND MENTAL QUALIFICATIONS: Standing, walking, bending and stooping required Must be able to sit at a desk for long periods of time and use a computer Must be able to occasionally move or lift up to 10 pounds May be asked to work supplemental hours periodically Limited travel required during and after business hours The above statements are intended to describe the general nature and level of work being performed by the incumbent assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties, and/or skills required of all personnel so classified. NOT A CONTRACT
    $76k-103k yearly est. 60d+ ago
  • Security Engineer - Secure Software Development

    Sedgwick 4.4company rating

    Information security analyst job in Greensboro, NC

    By joining Sedgwick, you'll be part of something truly meaningful. It's what our 33,000 colleagues do every day for people around the world who are facing the unexpected. We invite you to grow your career with us, experience our caring culture, and enjoy work-life balance. Here, there's no limit to what you can achieve. Newsweek Recognizes Sedgwick as America's Greatest Workplaces National Top Companies Certified as a Great Place to Work Fortune Best Workplaces in Financial Services & Insurance Security Engineer - Secure Software Development Security Engineer - Secure Software Development **PRIMARY PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data, networks, and computer systems. To focus on executing security fundamentals for threat detection, investigation, and response efforts. **ARE YOU AN IDEAL CANDIDATE?** We are looking for enthusiastic candidates who thrive in a collaborative environment, who are driven to deliver great work, are customer-oriented and are naturally empathetic. **ESSENTIAL RESPONSIBLITIES MAY INCLUDE** + Engineers, implements and monitors security measures for the protection of computer systems, networks and information. + Identifies and defines system security requirements. + Designs computer security architecture and develops detailed cyber security designs. + Prepares and documents standard operating procedures and protocols. + Configures and troubleshoots security infrastructure devices. + Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks. + Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs. + Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management. + Analyzes client and customer needs as required and provides clear and concise reports to leadership. + Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained. **QUALIFICATIONS** Eight (8) years of encryption technologies/algorithms, digital forensics, network topologies, and access controls experience or equivalent combination of educated and experience required. **Skills & Knowledge** + Knowledge of TCP/IP services + Knowledge of audit and compliance + Knowledge of vulnerability management + Knowledge of penetration testing + Knowledge of various operating systems + Knowledge of desktop productivity software + Knowledge of Carbon Black Protection + Knowledge of Symantec Endpoint Protection and host data loss prevention + Knowledge of information technology security frameworks + Excellent oral and written communication skills, including presentation skills + PC literate, including Microsoft Office products + Analytical and interpretive skills + Strong organizational skills + Excellent interpersonal skills + Ability to create and complete comprehensive, accurate and constructive written reports + Ability to work in a team environment + Ability to meet or exceed Performance Competencies **Proficient in Snyk for Application Security:** Demonstrated expertise in integrating Snyk into CI/CD pipelines to proactively identify and remediate vulnerabilities in open-source dependencies, container images, and infrastructure as code. Skilled in leveraging Snyk's developer-first tools to maintain secure codebases, enforce security policies, and ensure compliance with industry standards. Experienced in configuring automated scans, interpreting results, and collaborating with development teams to implement effective remediation strategies, contributing to a robust DevSecOps culture. **TAKING CARE OF YOU** + Career development and promotional growth opportunities + A diverse and comprehensive benefits offering including medical, dental vision, 401K, PTO and more \#LI-TS1 Work environment requirements for entry-level opportunities include - Physical: Computer keyboarding Auditory/visual: Hearing, vision and talking Mental: Clear and conceptual thinking ability; excellent judgement and discretion; ability to meet deadlines Travels as required The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions, duties, or local variances. Management retains the discretion to add or to change the duties of the position at any time. Sedgwick is an Equal Opportunity Employer and a Drug-Free Workplace. **If you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, consider applying for it anyway! Sedgwick is building a diverse, equitable, and inclusive workplace and recognizes that each person possesses a unique combination of skills, knowledge, and experience. You may be just the right candidate for this or other roles.** **Sedgwick is the world's leading risk and claims administration partner, which helps clients thrive by navigating the unexpected. The company's expertise, combined with the most advanced AI-enabled technology available, sets the standard for solutions in claims administration, loss adjusting, benefits administration, and product recall. With over 33,000 colleagues and 10,000 clients across 80 countries, Sedgwick provides unmatched perspective, caring that counts, and solutions for the rapidly changing and complex risk landscape. For more, see** **sedgwick.com**
    $87k-113k yearly est. 60d+ ago
  • Security Analyst

    University of North Carolina School of The Arts 4.5company rating

    Information security analyst job in Winston-Salem, NC

    Posting Type Non-Student Position Title Security Analyst Position Number TECH10 Description of Responsibilities and Duties Additional responsibilities include, but are not limited to: * Monitor cybersecurity software used in the environment. * Investigate incoming alerts and escalate as necessary. * Investigate suspicious email reports. * Review incoming incident response hotline calls. * Threat hunting within the environment to prevent security incidents. * Perform vulnerability scans in the environment. Research solutions to vulnerabilities and work alongside system owners and techs to remediate vulnerabilities. * Create Threat Assessments to aid in evaluating risks posed by vulnerabilities or potential threats based on research of upcoming trends and intelligence feeds. * Work with other team members to create and execute Security Awareness Training and Testing for the university. * Assist with maintaining email filtering systems and, release emails when deemed safe. * Assist with reviewing and remediating items found during audits, both internal and external. * Develop and support cybersecurity environments for the university. * All other duties as assigned. School/Department Information The University of North Carolina School of the Arts (UNCSA) is a top-ranked creative and performing arts conservatory in Winston-Salem, North Carolina. It was founded in 1963 as America's first public arts conservatory. UNCSA provides gifted emerging artists with the experience, knowledge, and skills needed to excel in their disciplines and in their lives, and it serves and enriches the cultural and economic prosperity of the people of North Carolina and the nation. UNCSA is the state's unique professional school for the performing, visual, and moving image arts, training students at the high school, undergraduate, and master's levels for professional careers in the arts. UNCSA Information Technologies (IT) department's mission is to lead, serve, and support the school as it embraces and encourages integration of information technology in all aspects of campus life where it is appropriate and in alignment with UNCSA's mission. UNCSA's IT department is responsible for centralized IT management. Description of Work The Cybersecurity Analyst is responsible for ensuring effective integration of Information Technology systems and services with the Information Security Program and Information Security Policy. The Cybersecurity Analyst is primarily responsible for protecting Founders from cyberattacks. This involves researching upcoming IT trends, reviewing suspicious activities, reporting security breaches, and educating employees on cybersecurity. Work Schedule and Hours Monday-Friday 8am - 5pm and other hours as necessary Required Qualifications Master's degree or a Bachelor's degree and 0-2 years of experience, or an equivalent combination of training and experience. Preferred Qualifications * Bachelor's degree in computer science or a related field is preferred. * CompTIA Security + Certification preferred. Knowledge, Skills and Abilities The Cybersecurity Analyst must have the ability to analyze, research, and resolve questions, and possess the ability to learn quickly and adjust to technological changes. The ideal candidate must have the following skills & qualifications: * Excellent communication, documentation skills, and the ability to understand and explain technical details to technical and non-technical audiences are required to be successful. * Ability to effectively communicate on complex issues with a high level of effectiveness. * The ability to work in a team, present a trustworthy image, and deal effectively with others is required. * Must be a self-starter with the ability to manage multiple work assignments and priorities with urgent deadlines, maintain excellent service delivery, while working with a fast-paced team. * Strong data analysis, research, analytical, and testing skills. * Able to work independently without significant supervision. Physical Demands Classification Code Classification Title IT Security Professional I Posting Detail Information Posting Number Open Date 10/23/2025 Close Date Salary $28 an hour Recruitment Range Open Until Filled Yes Special Instructions to Applicants This is a TEMPORARY position. The University of North Carolina School of the Arts is an equal opportunity employer and all qualified applicants are welcome to apply without regard to age, color, disability, gender, genetic information, national origin, race, religion, sex, sexual orientation, or veteran status. The application must be completed in full detail (including work history) for your qualifications to be considered. Failure to complete the application process as required by state regulations will result in your application being rejected for the vacancy and you will not be considered for the position. The UNCSA participates in E-Verify. Federal law requires all employers to verify the identity and employment eligibility of all persons hired to work in the United States. Final candidates are subject to criminal background checks. EEO Contact Information Applicants needing assistance with the application process are asked to contact: ******************
    $28 hourly 56d ago
  • INFO SECURITY ENGINEER 5 (Penetration Testing)

    International Technologies Inc. 4.2company rating

    Information security analyst job in Winston-Salem, NC

    Type: Contract Duration: 3 months Job description: • Conduct dynamic application security testing using both manual and automated testing tools. • Review test results from tools • Ensure that automated tests are completed successfully • Configure tools as required to be successful in evaluating VERA (Vendor remote access) applications • Identify and remove any false positives from automated testing tool reports • Triage & Disposition results and enforce a Bug Bar • Verify/validate defect fixes • Provide application security consulting SME Support to developers • Assist developers with understanding of security defects and risk • Assist in defining acceptable solution to fix defects • Communicate Security risk to ISCs and ORCs to document security issues and controls for security planning purposes • Help maintain Security Coding Standards and Bug Bar as required • Assist in the Development of standards as required • Provide training • Stay up to speed on 3rd party (inside and outside Wells Fargo) known security vulnerabilities • Develop and review malicious use cases/threat models • Maintain a broad understanding of security technologies and products • Actively participate on improving the security culture and education throughout the organization Qualifications Required skills: • 5+ years of experience in security applications and systems • Minimum of 5 years of Information Security Engineer/Consultant experience with application penetration testing. • Minimum of 5 years of demonstrated experience with automated penetration tools • Minimum of 5 years of demonstrated experience with manual penetration testing tools • Demonstrated experience with creating and communication of reports regarding web application vulnerabilities to various level of personnel within a large organization Desired skills: • Advanced Information Security technical skills • Ability to manage complex issues and develop solutions • Excellent verbal and written communication skills • Knowledge and understanding of application or software security such as: web application penetration testing, secure code review, secure static code analysis • Knowledge and understanding of banking or financial services industry • Experience working in a large enterprise environment • Strong analytical skills with high attention to detail and accuracy • Knowledge and understanding of information security industry standards and government regulations • Ability to manage multiple and competing priorities • Ability to work with limited supervision • Ability to take on a high level of responsibility, initiative, and accountability • Good attention to detail and accuracy skills • Strong collaboration and partnering skills • Demonstrated experience developing and reviewing malicious use cases/threat models Job expectations • Ability to work weekends and holidays as needed or scheduled Candidate will be required to work onsite at certain facilities in these cities: MN-Minneapolis; AZ-Chandler; NC-Charlotte;NC-Winston Salem; CA - San Francisco Additional Information All your information will be kept confidential according to EEO guidelines. **Please let me know if you might someone to refer or if you are interested for the role. **Please reply with an updated copy of your resume and preferred time for a call. **You can call me back at ************ .
    $81k-102k yearly est. 4h ago
  • Director Cyber and Information Security

    Truliant Federal Credit Union 4.6company rating

    Information security analyst job in Winston-Salem, NC

    Truliant's mission is to improve lives by putting our members first, providing great service and straightforward financial solutions. Our core values of Member Focus, Service, Guidance, Relationships, and Community define how we interact with members to fulfill our mission of improving lives and providing a foundation on which we conduct ourselves. Our Promise to Our Teammates: Truliant strives to provide all teammates with an enjoyable place to work where they feel valued, empowered and rewarded for all that they do. Purpose of the Job The Director of Cyber and Information Security is responsible for developing, implementing, and overseeing comprehensive cybersecurity strategies, policies, and procedures to mitigate risks and protect against cyber threats. The leader plays a pivotal role in safeguarding our organization's digital assets and ensuring the integrity, confidentiality, and availability of sensitive information. The Director of Cyber and Information Security is a strong, obvious leader responsible for leading IT Security and IT Security Incident Response for the Credit Union. The Director is expected to possess a deep technical understanding of information security engineering and how to apply them to safeguard Credit Union assets effectively. This role will work with business stakeholders to help define solution strategies and implement effective security controls that minimize risk while minimizing impact on user productivity, empowering the organization to navigate the evolving landscape of cyber threats and fostering a culture of security awareness and resilience. A crucial element of the Director's role is working with senior leaders, line-of-business managers, and other key decision-makers to determine acceptable levels of residual IT risk for the Credit Union as a whole. This role is also responsible for clearly understanding the levers and choices to mitigate risks as appropriate. This role will lead a best-in-class IT risk management and information security team in delivering advisory and cybersecurity services for Credit Union Information Security programs. The Director is responsible for establishing security governance and executing an information security framework to safeguard information assets. This role will research, select, and negotiate contracts with best-in-class third-party providers for the potential implementation of additional information security products, services, and monitoring capabilities. The Director will lead by example, drive continuous improvement, ensure security, compliance, recoverability, and maintain a relentless focus on risk management. Essential Functions and Responsibilities Develops and oversees the implementation of a comprehensive security architecture that aligns with organizational goals and industry best practices. Ensures security measures are integrated into all technology deployments, including cloud services, on-premises infrastructure, and third-party applications. Conducts regular security assessments and audits to identify weaknesses in the architecture and recommend improvements. Stays abreast of emerging technologies (e.g., AI, IoT) and evaluates their security implications, ensuring the architecture supports secure adoption. Works closely with IT, application development, and network teams to ensure a unified approach to security across all platforms. Collaborates with executive leadership and key stakeholders to advocate for security initiatives and secure necessary resources. Defines and monitors key performance indicators (KPIs) to measure the effectiveness of security programs and initiatives. Fosters a culture of continuous improvement by regularly reviewing and updating security programs based on industry trends, emerging threats, and organizational changes. Implements and manages access control measures to safeguard data, ensuring that only authorized personnel can access sensitive information. Oversees compliance with data-related regulations (NCUA, FFIEC, GLBA, PCI, etc.), ensuring the organization adheres to legal and ethical standards. Oversees the deployment and management of security information and event management (SIEM) systems and other monitoring tools. Ensures real-time detection and alerting of potential security incidents, conducting regular reviews of logs and alerts. Establishes and maintains an incident response plan, including protocols for containment, eradication, recovery, and lessons learned. Leads the incident response team during security breaches, ensuring timely and effective incident response. Conducts post-incident reviews to analyze incidents, document findings, and implement improvements. Regularly assesses the organization's systems and networks for vulnerabilities and recommends remediation actions. Conducts risk assessments to evaluate the potential impact of identified threats on business operations. Maintains detailed documentation of security policies, procedures, and incidents for accountability and compliance. Develops and implements organization-wide security awareness training programs for all employees. Regularly assesses the organization's security posture and implements continuous improvement initiatives. Other Duties and Responsibilities Departmental financial management, budgeting, and reporting. Team development, management, and performance. Assists with other tasks and projects as assigned. Knowledge, Skills, and Abilities Must have advanced problem-solving and analytical skills, with the ability to assess complex security issues and develop innovative solutions. This position requires a blend of strategic thinking and operational excellence to deliver technical security services consistently across the Credit Union. Must have excellent leadership and communication skills with all levels of Credit Union staff, including executives, auditors, finance, legal, IT staff, and third parties, in matters related to IT risk, Information Security, compliance, and audit requirements and remediation. Managerial solid and facilitation skills required. Must have in-depth knowledge of cybersecurity principles, technologies, and methodologies, and a strong understanding of regulatory requirements such as GLBA, SOX, and PCI DSS. Must have a deep understanding of cybersecurity frameworks (NIST, ISO, etc.). Must know regulatory agencies' policies, procedures, and laws governing the security of data for financial institutions. Must have the ability to make decisions, work independently, and guide the Information Security team, other IT team members, and business unit partners. Must have strong strategic thinking and analytical skills. Must have excellent communication and leadership abilities. Must possess a deep technical understanding of information security engineering and infrastructure operations. Physical Requirements Occasional standing, walking, bending, and stooping required Must be able to sit at a desk for long periods of time and use a computer Must be able to moderately lift or move up to 5 pounds and occasionally lift or move up to 10 pounds Education and Background Requires a Bachelor's degree in computer science, cybersecurity, or a related field, or equivalent work-related experience. Master's Degree in a relevant discipline (preferred). Requires professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP). Minimum of 10 years of experience in information security or a related field required. Minimum of 5 years in a leadership role, managing security teams and initiative required. Proven experience in developing security strategies, risk management, and compliance required. Minimum of 10 years of demonstrated success in leadership roles in compliance, risk management, information security, IT, and OT security required. Minimum of 5 years of experience successfully supervising large-scale complex projects and programs that meet the objectives of excellence in a dynamic business environment required. Minimum of 5 years of experience in extensive contract negotiations and management of 3rd parties that provide an array of IT services. Must be able to evaluate and determine appropriate data security terms and conditions for all significant organizational contracts required. Requires demonstrated leadership with a minimum of 15 years of management experience in a technical capacity and the ability to interface effectively with a broad range of people and roles, including senior leadership, IT leaders, and external constituents. Experience in cross-functional collaboration and budget management required. If you have a passion for member service and would like to invest in a meaningful career with opportunity for growth, we encourage you to apply to Truliant! As a member of the Truliant family, you will enjoy the following full time benefits: No-cost employee Medical, dental, vision coverage Prescription benefits (including mail order) Paid holidays and Paid Time Off (PTO) 401(k) plan with contribution matching Paid community involvement volunteers hours Paid group life Insurance Teammate loan discounts Tuition reimbursement Short and long-term disability Health & Wellness program Teledoc (physician video conferencing) Onsite fitness facilities or health club reimbursement Employee Assistance Program (EAP) Medical flexible spending account Dependent care flexible spending account
    $98k-120k yearly est. Auto-Apply 1d ago
  • IT Security Analyst - Flow Automotive

    Flow Companies Group 3.9company rating

    Information security analyst job in Winston-Salem, NC

    Job Details Flow Companies - Winston Salem, NC NoneDescription Security Analyst (Onsite) - Threat Management About the Role - Flow Automotive is seeking a skilled Security Analyst (Onsite) to strengthen our cybersecurity defenses and proactively manage threats across our infrastructure. You will be at the forefront of monitoring, detecting, and responding to security incidents while continuously improving our security posture through strategic tool management, vulnerability assessments, and infrastructure hardening. This role combines threat management with hands-on security engineering to protect our data, networks, and systems. Flow Automotive Companies is committed to being on the cutting edge of the transportation industry and needs like-minded individuals to join our team. Our growth has been driven by a strategy to attract and develop high achieving people of outstanding character who are committed to operational excellence and to providing extraordinary personal service. Flow operates 54 automotive franchises representing 26 manufacturers in 10 cities and employs over 2,200 people in North Carolina and Virginia. Key Responsibilities Threat Detection & Response Monitor and analyze security events using SIEM platforms and advanced threat detection tools to identify potential security incidents Investigate security alerts, determine severity, and coordinate incident response efforts Perform threat hunting activities to proactively identify indicators of compromise and emerging threats Develop and refine detection rules and playbooks to improve response times and accuracy Vulnerability Management & Penetration Testing Work with vendors to conduct regular vulnerability assessments and coordinate remediation efforts across infrastructure Coordinate with external partners to perform penetration testing against internal and external systems to identify security weaknesses Execute social engineering assessments and physical security testing as needed Prioritize vulnerabilities based on risk, exploitability, and business impact Work with engineering and operations teams to develop remediation strategies and validate fixes Maintain vulnerability tracking and reporting dashboards for stakeholders Security Posture Management Continuously assess and enhance the organization's overall cybersecurity posture through gap analysis and risk assessments Manage and optimize security tools including EDR/XDR platforms (CrowdStrike or similar), network detection solutions (Darktrace or similar), and cloud security services (Cloudflare or similar) Collaborate with IT teams to implement security controls, patches, and configuration improvements Track security metrics and KPIs to measure and communicate security effectiveness Network & Infrastructure Hardening Design and implement network segmentation strategies and perimeter security controls Configure and maintain border security solutions including firewalls, IPS/IDS, and secure gateways Implement LAN hardening techniques including VLAN isolation, 802.1X authentication, and network access control Deploy and manage endpoint hardening standards and baseline configurations Conduct security architecture reviews for new systems and network changes Data Protection & Encryption Implement and manage data encryption solutions for data at rest and in transit Design and deploy secure data transfer mechanisms including SFTP, secure APIs, and encrypted file sharing Maintain encryption key management practices and certificate lifecycle management Ensure compliance with data protection requirements across all systems handling sensitive information Monitor and audit data access patterns and implement data loss prevention (DLP) controls Identity & Access Management Administer and monitor single sign-on (SSO) platforms such as Okta, including user provisioning, MFA enforcement, and access reviews Investigate suspicious authentication activities and implement adaptive security policies Conduct regular access audits to ensure least privilege principles are maintained Business Continuity & Disaster Recovery Contribute to the development and maintenance of business continuity and disaster recovery plans Participate in BC/DR testing exercises and tabletop simulations Document security-specific recovery procedures and runbooks Assess recovery time objectives (RTO) and recovery point objectives (RPO) for critical security systems Ensure security controls remain effective during failover and recovery scenarios Threat Intelligence & Analysis Stay current with emerging threats, attack techniques, and vulnerability disclosures Analyze threat intelligence feeds and correlate findings with organizational risk Document security incidents and contribute to lessons learned and improvement initiatives Participate in security awareness training and help educate teams on security best practices Required Qualifications 3-5 years of experience in cybersecurity, with focus on security operations, threat management, or infrastructure security Hands-on experience with EDR/XDR solutions (CrowdStrike Falcon, SentinelOne, Microsoft Defender, or similar) Proficiency with network security monitoring tools (Darktrace, Vectra, ExtraHop, or similar) Experience managing cloud security platforms (Cloudflare, Akamai, Zscaler, or similar) Strong understanding of identity and access management principles and SSO platforms (Okta, Azure AD, Duo, or similar) Demonstrated experience with vulnerability scanning tools (Nessus, Qualys, Rapid7, or similar) Practical knowledge of penetration testing methodologies Experience implementing network security controls, firewall rules, and network segmentation Strong understanding of encryption protocols (TLS/SSL, AES, PKI) and secure data transfer methods Knowledge of network hardening techniques including access control lists, port security, and secure protocols Familiarity with business continuity and disaster recovery planning processes Knowledge of security frameworks and standards (NIST, MITRE ATT&CK, CIS Controls) Understanding of common attack vectors, malware analysis, and incident response procedures Preferred Qualifications Security certifications such as Security+, CEH, CISM, or similar Experience with SIEM platforms (Splunk, Elastic, Chronicle, or similar) Scripting or automation skills (Python, PowerShell, Bash, or similar) Cloud platform security experience (AWS, Azure, GCP) Experience with data loss prevention (DLP) and encryption key management solutions Knowledge of secure network protocols (SSH, HTTPS, SFTP, IPSec, VPN technologies) Experience with network access control (NAC) solutions and 802.1X implementations Familiarity with compliance requirements (SOC 2, ISO 27001, PCI-DSS, HIPAA, GDPR, etc.) Experience with container and Kubernetes security Understanding of zero trust architecture principles Technical Skills Network protocols and architecture (TCP/IP, DNS, routing, switching) Firewall platforms (Palo Alto, Fortinet, Cisco ASA, pf Sense, or similar) Encryption technologies and PKI infrastructure Vulnerability assessment and penetration testing tools Security information and event management (SIEM) Endpoint detection and response (EDR/XDR) Network intrusion detection/prevention systems (IDS/IPS) Secure file transfer protocols and solutions Backup and disaster recovery technologies Flow provides competitive earning opportunities and a comprehensive benefits plan including: Medical, Dental, Vision, and Life Insurance (including dependent coverage) Paid Vacation, Holidays and Time Off Paid volunteer time 401(k) Retirement Plan and Financial Wellness Program Thrive@Flow Wellness Program Employee pricing for automotive service and vehicle purchases Scholarship program for children of employees Applicants must pass a pre-employment drug screening. Flow Automotive Companies is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.
    $76k-105k yearly est. 60d+ ago
  • IT Database Analyst & Systems Support Special

    Livingstone College 3.6company rating

    Information security analyst job in Salisbury, NC

    IT Database Analyst & Systems Support Specialist Division: Business Office Department: Information Technology Reports to: Director of Information Technology Position Summary Livingstone College is seeking a versatile IT professional with strong Transact-SQL (T-SQL) skills and experience in InfoMaker, Jenzabar, JICS, and Blackboard. This role blends database development, ERP support, and desktop troubleshooting in a higher education setting. Essential Duties & Responsibilities The results you will deliver each day that matter the most! Write and optimize T-SQL queries and reports Support InfoMaker and ERP systems (Jenzabar, JICS, Blackboard) Assist with system implementation and integration Provide desktop support and internal helpdesk services Troubleshoot issues and manage system performance Other duties as assigned Education/Experience What you will need to be successful! Experience with T-SQL and relational databases Familiarity with InfoMaker and ERP platforms Strong troubleshooting and communication skills 10+ years of IT experience required. Website Development Life at Livingstone College Why we believe you will love working at Livingstone College!! Livingstone College is a private historically black college that is secured by a strong commitment to quality instruction, academic excellence, and student success. Through a Christian-based environment suitable for holistic learning, Livingstone provides excellent business, liberal arts, STEAM, teacher education, and workforce development programs for students from all ethnic backgrounds designed to promote lifelong learning and to develop student potential for leadership and service to a global community. About Livingstone College: *********************** Livingstone College is an equal opportunity employer that employs qualified individuals based upon job related qualifications regardless of race, religion, ancestry, gender, sexual orientation, national origin, age, disability, marital status, domestic partner status, medical condition, political affiliation or any other classification proscribed under applicable federal, state or local law. Livingstone College complies with all laws regarding reasonable accommodation for disabled candidates and employees. Applicants requiring reasonable accommodation in order to participate in the interview process are requested to contact Human Resources in order to arrange such accommodation. We offer competitive compensation and an attractive benefits package. No recruiters or agencies without a previously signed contract.
    $56k-66k yearly est. Auto-Apply 60d+ ago
  • IT Security Manager

    Direct Staffing

    Information security analyst job in Greensboro, NC

    Greensboro North Carolina Exp 5-7 yrs Deg Bachelors Occasional Travel Job Description The IT Security Manager is an experienced leadership role on the IT team responsible for developing, implementing, maintaining, communicating and auditing the security program to protect network availability and information on the global networks. The strategic security plan should foster confidence in the integrity of the organization and its information assets, assuring management, staff, customers, and trading partners that our information systems are safe and dependable. The role plays as a liaison to the Security Team to ensure that security policies are adopted and adhered to II. Key Responsibilities • Manage enterprise-wide security, policies and systems • Develop, document, implement, monitor and audit information systems security strategies, policies, and procedures • Ensure all mandated security and compliance standards are met • Coordinate with vendors, contractors and consultants to maintain and enhance data security • Provide leadership, guidance, and training to information systems personnel on security practices • Manage security audits, vulnerability and threat assessments by directing remediation activities to network or system security breaches • Ensure fulfillment of legal and contractual information, security and privacy mandates including providing executive management with compliance reports and audit findings • Drive project planning, coordination and delivery of quality IT security solutions on time and within budget • Work with technology administrators to ensure the proper level of security for all computing systems and network connections is implemented • Ensure associates are aware of security policies • Provide recommend changes to improve security using new technologies III. Relationships • Position reports directly to the Director, Global IT Infrastructure • Receives work direction from the Security Lead • Works on cross functional teams across IT • Works with Business Managers on security needs as identified IV. Measures of Performance • Maintain a high security index score (measures effectiveness of our security program) • Quality and thoroughness of security program • Number of security breaches and potential security risks to the business • Define and execute projects on time • Deliver solutions that meet requirements, quality, schedule, budget and cost goals • Provide guidance and support to our companies ensuring 100% compliance to all security policies • Strong oral and written communications skills V. Background and Skill • Bachelor's Degree in Computer Science, Information System Management or equivalent (required) • 8-10 years' experience in IT with a broad range of exposure to infrastructure, systems analysis, and application development • 4-7 years of IT Security experience • Certified Information System Security Professional (CISSP) or equivalent certifications desirable • Strong working knowledge of networking technologies; TCP/IP addressing, Routing, DHCP, DNS, VPN, Next Generation Firewalls, Firewalls, IPS, and DMZ • IT auditor experience including SOX, SSAE16, COBIT, etc. (preferred) • Effective utilization of productivity tools including MS Word, Excel, Outlook, Visio, and PowerPoint • Excellent interpersonal, organizational, and time management skills • Versatile, flexible and proactive when resolving technical issues • Strong project management skills with the ability to multitask and manage multiple projects at one time Additional Information All your information will be kept confidential according to EEO guidelines. Direct Staffing Inc
    $89k-129k yearly est. 60d+ ago
  • IT Analyst Co-op - Fall 2026

    Delhaize America 4.6company rating

    Information security analyst job in Salisbury, NC

    Ahold Delhaize USA, a division of global food retailer Ahold Delhaize, is part of the U.S. family of brands, which includes five leading omnichannel grocery brands - Food Lion, Giant Food, The GIANT Company, Hannaford and Stop & Shop. Our associates support the brands with a wide range of services, including Finance, Legal, Sustainability, Commercial, Digital and E-commerce, Technology and more. Co-op Program Overview: Get an insider view of the fast-changing grocery retail industry while developing relevant business, technical and leadership skills geared towards enhancing your career. This paid Co-op experience is an opportunity to help drive business results in an environment designed to promote and reward diversity, innovation and leadership. Our mission is to create impactful early talent programs that provide cohorts with meaningful project work, learning and development sessions, and mentorship opportunities. Applicants must be currently enrolled in a bachelor's or master's degree program. Applicants must be currently authorized to work in the United States on a full-time basis and be available from July 13, 2026 through December 4, 2026. We have a hybrid work environment that requires a minimum of three days a week in the office. Please submit your resume including your cumulative GPA. Transcripts may be requested at a future date. * Approximate 6-month Co-op session with competitive pay * Impactful project work to develop your skills/knowledge * Career assistance & mentoring in obtaining full time positions within ADUSA * Leadership speaker sessions and development activities * One-on-one mentoring in your area of interest * Involvement in group community service events * Networking and professional engagement opportunities * Access to online career development tools and resources * Opportunity to present project work to company leaders and gain executive visibility Department/Position Description: The Performance Analytics team transforms raw data from our IT systems and operational functions into actionable insights. Using ServiceNow as our primary platform, we analyze a wide range of data-including IT monitoring metrics, incident reports, change records, and more. These analytics help surface trends and patterns that empower both IT and business leaders to make informed, timely decisions. By continuously monitoring performance, we enable the organization to improve IT service delivery and align technology operations with business goals. During the session, the co-op will gain hands-on experience understanding how data is entered into ServiceNow; capturing inconsistencies with entered data, data that doesn't follow protocol, and understand which data points could be automated to reduce the overall volume of tickets entered. This co-op position may also include creating reports and/or dashboards to show the volumes in each area and any new data points that stand out. Qualifications: * Currently pursuing a degree in Information Technology, Management Information Systems, Data Analytics, or a related field. * Proficiency or experience in SQL or JavaScript * Ability to analyze, segment, and interpret complex data sets to extract actionable insights * Familiarity with database management and table relationships * Data Analysis prep (write cogent highlights and callouts on the data) * Ability to communicate effectively Individual cohort pay rates vary based on location, academic year, and position. Individual cohort pay rates vary based on location, academic year, and position. ME/NC/PA/SC Salary Range: $20.90 - $35.70 IL/MA/MD Salary Range: $22.80 - $37.30 #LI-DNI At Ahold Delhaize USA, we provide services to one of the largest portfolios of grocery companies in the nation, and we're actively seeking top talent. Our team shares a common motivation to drive change, take ownership and enable our brands to better care for their customers. We thrive on supporting great local grocery brands and their strategies. Our associates are the heartbeat of our organization. We are committed to offering a welcoming work environment where all associates can succeed and thrive. Guided by our values of courage, care, teamwork, integrity (and even a little humor), we are dedicated to being a great place to work. We believe in collaboration, curiosity, and continuous learning in all that we think, create and do. While building a culture where personal and professional growth are just as important as business growth, we invest in our people, empowering them to learn, grow and deliver at all levels of the business.
    $20.9-35.7 hourly 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in High Point, NC?

The average information security analyst in High Point, NC earns between $67,000 and $127,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in High Point, NC

$92,000
Job type you want
Full Time
Part Time
Internship
Temporary