Information security analyst jobs in Jackson, TN - 676 jobs
All
Information Security Analyst
Cyber Security Analyst
Information Security Manager
Cyber Security Engineer
Data Security Analyst
Senior Security Engineer
Information Technology Analyst
Intrusion Detection Analyst
Information Assurance Analyst
Information Security Specialist
Federal Reserve Bank of Kansas City 4.7
Information security analyst job in Kansas City, MO
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
Important Information
Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen.
No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered.
This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility.
This position is not eligible to be remote and relocation assistance is not available.
We are seeking cybersecurity professionals to join our InformationSecurity team as a security specialist focused on operating our DevSecOps program according to standards and policies.
This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization.
Candidates with strong understanding and experience in cloud environment deployments, informationsecurity, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal.
Key Activities
Interpret and evaluate policies in order to mature and implement the DevSecOps program.
Assess maturity of development teams' DevSecOps practices against an existing framework.
Proactively advocate for and drive enhancements into the program.
Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC).
Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process.
Monitors informationsecurity policy compliance using security tooling.
Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives.
Provide technical expertise and support to internal teams on security-related matters.
Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure.
Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture.
Support leadership decision making through timely analysis and written communications.
Qualifications
Typically requires 3-6 years of relevant experience.
Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience.
Strong competence in cloud technologies such as AWS, Azure, and other platforms.
Expert understanding of DevSecOps practices, frameworks, and tools.
Expertise with tool integration for the DevOps pipeline such as Git.
Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules.
Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work.
Conveys complex and technical issues to diverse audiences.
Demonstrated competencies with artificial intelligence are beneficial.
Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others.
Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java
Technical expertise in security tools and knowledge of security practices and procedures.
A learning mindset, proactiveness, collaboration, and strong attention to detail.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Locations: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Relocation Assistance: No
Salary:
$79,100 - $111,500 / Experienced Level
$98,600 - $139,000 / Senior Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position.This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (FRS) or through verified Federal Reserve Bank social media channels.
Privacy Notice
$98.6k-139k yearly 5d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Engineer
Provisions Group 4.4
Information security analyst job in Knoxville, TN
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and SecurityInformation and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's informationsecurity strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
$65k-87k yearly est. 4d ago
IT Operations Center Analyst
Medasource 4.2
Information security analyst job in Nashville, TN
ITOC Analyst - Operations Center
Our client is seeking a ITOC Analyst to join their Data Center Operations team on a contract basis. This role serves as the front line of support for monitoring, maintaining, and troubleshooting mission-critical data center infrastructure. The ideal candidate is hands-on, detail-oriented, and comfortable working in a 24/7 operations environment supporting both facility and IT infrastructure systems.
Key Responsibilities
Monitor and support data center physical facilities, including power, cooling, and environmental systems
Perform hardware and server deployment, replacement, and troubleshooting
Conduct preventative maintenance, routine inspections, and health checks on data center infrastructure
Troubleshoot and resolve issues related to electrical and mechanical equipment
Support and maintain network infrastructure, including cabling, racks, and patching
Respond to incidents, alerts, and tickets as part of an operations center / NOC-style workflow
Document work performed and escalate issues appropriately to engineering or facilities teams
Adhere to operational procedures, safety standards, and change management processes
Required Qualifications
Experience working in a data center, NOC, or critical facilities environment
Hands-on experience with server hardware, rack/stack, cabling, and break/fix
Working knowledge of electrical and mechanical systems in a data center setting
Ability to follow runbooks, procedures, and safety protocols
Comfortable working shifts, on-call rotations, or non-standard hours if required
Preferred Qualifications
Experience with mission-critical environments (healthcare, financial services, enterprise IT, etc.)
Familiarity with monitoring tools, ticketing systems, or CMDBs
Basic understanding of networking concepts (switches, patch panels, fiber/copper)
Certifications such as CompTIA A+, Network+, or data center-related training (nice to have, not required)
$68k-89k yearly est. 1d ago
Manager of Information Security
Shook, Hardy & Bacon 4.9
Information security analyst job in Kansas City, MO
Oversees and coordinates all informationsecurity staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of informationsecurity programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives.
Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption.
Assists in audits of the InformationSecurity program as needed at the request of management.
Uses leadership skills to train, motivate and direct assigned staff.
Provides technical expertise in the selection, testing, implementation and deployment of informationsecurity systems.
Provides technical guidance and direction in informationsecurity monitoring, assessment, auditing and testing.
Defines, develops and implements the firm's Information Protection Program security policy.
Works with the Director of InformationSecurity and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency.
Assists in determining department work procedures, plans, assigns and directs work as necessary.
Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner.
Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice.
Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame.
Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all informationsecurity systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's informationsecurity infrastructure and security standards.
Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate.
Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected.
Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches.
Is on call to respond to security incidents or disaster recovery and business continuity operations.
Maintains advanced knowledge of the firm's InformationSecurity posture, goals and objectives. Supervises the InformationSecurity Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems.
$118k-154k yearly est. 2d ago
Information Security and Fraud Analyst
First Farmers & Merchants Bank 4.2
Information security analyst job in Columbia, TN
Education Level: (1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree).
Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Job Type: Full Time
VEVRAA Federal Contractor
Request Priority Referral of Protected Veterans
EOE Protected Veterans/Disabled
Robert C. Matthews, email: *******************************
Role:
The InformationSecurity and Fraud Analyst is responsible for developing and managing appropriate security measures for the bank's information systems, managing third-party vendor security risk, and investigating incidents of fraud and attempted fraud.
Essential Functions & Responsibilities:
E 35% Risk Management. Coordinates organizational risk assessments. Performs third party vendor risk assessments. Conducts informationsecurity Vendor Risk Assessments (VRA) on all in-scope third-party requests. Communicates at all levels and with all business units in providing support in the onboarding of third-party vendors with respect to the assessment of InformationSecurity posture of the vendor. Creates and manages relationships with business units and stakeholders of the Third-Party Vendor Risk Management process. Performs assessment of third-party security and related due diligence documentation (such as SOC).
E 30% InformationSecurity. Monitors computer networks for security issues. Documents and investigates security breaches and other cybersecurity incidents. Stays current on IT security trends and news. Develops company-wide best practices for IT security. Research security enhancements and makes recommendations to management. Implements both internal and external security audits. Analyzes security issues thoroughly to identify the root cause.
E 30% Fraud Investigations. Assists in the investigation of fraud incidents and recovery of funds; Maintains records of incidents, losses, recoveries, and prevention. Provides customer education to increase awareness of the fraud risk and effective techniques customers can use to mitigate the risk. Coaches staff on determination of fraud incidents and communication with customers. Interacts with external partners such as law enforcement agencies, vendors, and banks to validate information to check fraudulent activities.
N 5% Performs other related duties as assigned or requested.
Performance Measurements:
1.
To comply with the letter and with the spirit of the bank's Code of Business Conduct and Ethics
2.
To ensure that the bank suffers no losses due to failure to comply with operational procedures.
3.
To provide friendly, professional, and accurate service and support to all customers both internal and external.
4.
To maintain and build knowledge of auditing procedures through continued learning and research.
5.
To acquire and maintain a working knowledge of regulations and bank procedures; to comply with the provisions of the Bank Secrecy Act and other laws and regulations.
6. To maintain the confidentiality of customer and any other sensitive information.
7.
To complete required training and undertake additional training as needed to increase job knowledge and maximize productivity.
Knowledge and Skills:
Experience
Three yeas to five years of similar or related experience.
Education
(1) A bachelor's degree, or (2) achievement of formal certifications recognized in the industry as equivalent to a bachelor's degree (e.g. information technology certifications in lieu of a degree). Preferred Certifications include Security+ (CompTIA), CySA+ (CompTIA), or SSCP (ISC
2
).
Interpersonal Skills
Work involves much personal contact with others inside and/or outside the organization for the purpose of first-level conflict resolution, building relationships, and soliciting cooperation. Discussions involve a higher degree of confidentiality and discretion, requiring diplomacy and tact in communication.
Other Skills
1. Knowledge in all areas of accounting and audit procedures and the ability to work independently.
2. Working knowledge of spreadsheets and word processing software; must be able to use PC and other types of general office equipment.
Physical Requirements
The person in this position needs to frequently move about inside the office to interact with associates or clients and access office machinery and file cabinets. The person in the position constantly operates a computer and other office productivity machinery, such as a calculator, photocopier, and printer.
Work Environment
This job operates in a professional office environment and may require travel to branches and other locations. This role routinely uses standard office equipment such as calculators, computers, phones, photocopier, filing cabinets and fax machines.
$69k-96k yearly est. Auto-Apply 9d ago
Analyst, Information Security
Standard Aero 4.1
Information security analyst job in Maryville, TN
Build an Aviation Career You're Proud Of
At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT SecurityAnalyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization.
What you'll do:
Conduct risk and security assessments through vulnerability analysis and reporting
Perform mitigation support for both internal and external security audits
Investigate, analyze and document security incidents to identify and document the root cause
Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
Partner with IT Operation teams to remediate system vulnerabilities
Participates in the production of documentation and management reporting
Research security enhancements and make recommendations for improved policy and process
Analyze IT requirements and provide objective advice on the use of new IT security offerings
Stay up-to-date on information technology and cybersecurity trends and standards
Other IT Security-related duties as required
Capable of identifying, evaluating and mitigating significant risks within an enterprise.
Strong working experience with Microsoft Office Suite.
Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
Possess strong analytical skills attention to detail.
Ability to prioritize assignments while working on multiple projects
Ability to work independently and proactively to meet assigned objectives
Flexible with the ability to multi-task, effectively prioritize and work under pressure
Basic project management
Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
Analyze, report and respond to security alerts within the various IT technologies and global locations
Proactively remediate information technology security threats as a member of the security team
Assist in the designing, documenting, architecting and implementing IT security measures and controls
Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
Bachelor's degree in InformationSecurity, Computer Science, or a related field; equivalent experience may be considered.
5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
SDLC, and understand application security.
Containerization and Development Security Operations
Benefits that make life better:
Comprehensive Healthcare
401(k) with 100% company match; up to 5% vested
Paid Time Off starting on day one
Bonus opportunities
Health- & Dependent Care Flexible Spending Accounts
Short- & Long-Term Disability
Life & AD&D Insurance
Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
$73k-103k yearly est. Auto-Apply 60d+ ago
Information Security Specialist
Collabera 4.5
Information security analyst job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to informationsecurity “customers,” or business partners.Provides consultative advice to informationsecurity customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in informationsecurity, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside InformationSecurity in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
$71k-97k yearly est. Easy Apply 60d+ ago
Cyber Security Vulnerability Analyst
ITR 4.2
Information security analyst job in Oak Ridge, TN
Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities.
This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week.
Job Responsibilities:
• Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role.
• Mentor the DCO's junior staff, developing their technical and incident resolution skills.
• Participate in incident response activities involving multiple teams and functions.
• Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls.
• Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status.
• Automate key DCO functions using Tines technology
• Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities.
• Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities.
• Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats.
• Assist users with the creation, monitoring, and evaluation of policy and device exceptions.
• Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements.
• Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues
Candidates must be able to obtain a federal security clearance so US citizenship is required.
$69k-95k yearly est. 28d ago
IAM Information Security Specialist V6W6W656
AP Recruiters & Associates
Information security analyst job in Kansas City, MO
IAM InformationSecurity Specialist Duration: 12 Months
Overview of the Role: Our Client is currently seeking an Identity Access Management (IAM) InformationSecurity Specialist that will have a strong emphasis on Cloud based IAM services. As a member of the team, your work will focus on IDaaS (Identity as a service) work using SaaS (Software as a Service) tools. As an IAM InformationSecurity Specialist you will work with critical and sensitive information daily, and you will be relied upon to maintain critical security safeguards.
Key Responsibilities:
Develop and maintain comprehensive informationsecurity posture including rules, controls, and security safeguards.
General activities such as Develop and maintain the informationsecurity posture (rules, controls, security safeguards, etc.) to protect information assets, and conducts reviews.
Engineering activities such as facilitating and configuring application integrations, creation of IAM objects (users, groups, servicer accounts, API tokens, etc.), working incidents, following change management processes, and
creating documentation.
Required Skills & Qualifications:
At least three years of related access control experience with a general understanding of provisioning within IDaaS and IAM systems preferred.
Associate or Bachelors degree from an accredited college or university with specialization in an information technology field or equivalent combination of experience, education, and/or certification preferred.
Intermediate understanding of computer applications such as Microsoft Office, internet navigation and email programs.
Strong interpersonal, analytical and customer service skills and communication skills.
Good business and organizational skills including the ability to prioritize, work within a team setting and manage work.
Perks of Working with AP Recruiters & Associates:
Competitive compensation (depending on experience)
Comprehensive career development and professional growth opportunities
Dedicated recruiter support throughout your contract journey
Access to exclusive opportunities with Fortune 500 clients
Flexible work arrangements and professional development resources
About the Client:
Our client is a leading energy company recognized as one of the largest electric utilities in the United States. They are committed to delivering clean, affordable, and reliable energy while driving innovation in sustainable power generation. The organization operates across multiple states, serving millions of customers and maintaining a strong focus on environmental stewardship, technological advancement, and community development. Their commitment to digital transformation and cybersecurity excellence makes this an exciting opportunity for security professionals.
$68k-96k yearly est. 60d+ ago
Cyber Threat Emulation Analyst
Launchtech
Information security analyst job in Huntsville, AL
Job Description
or
Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
What You'll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
Measure defense-in-depth effectiveness against known vulnerabilities
Generate vulnerability assessment reports and escalate findings for review
Support enterprise Incident Response in accordance with DoD regulations and instructions
Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
What You Bring
Basic Requirements:
Must have 6, or more, years of general (full-time) work experience
Must have 4 years of combined experience with:
Performing manual or automated penetration tests in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
Must have 1 year of experience in management or leadership in a team environment
Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
Must have, or obtain within 6 months of start date, a PenTest+ certification
Must have an active DoD Secret Security Clearance
Desired Requirements:
Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field
Have experience with Cyber Threat Emulation tools, policies, and procedures
Have experience operating custom software on a Linux platform
Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
Be able to mentor and train personnel in a high-paced environment
Be familiar with DoD Security Operations Centers (SOC/CSSP)
Be familiar with DCO/CSSP-guiding security policies and procedures
Have an active DoD Top Secret clearance
Why LaunchTech?
At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence.
We offer competitive benefits, including:
Medical, Dental, and Vision coverage
401(k) with company match
Paid Time Off (PTO)
Opportunities to make a meaningful impact while advancing your career
And more
Ready to Join the LaunchTech Crew?
If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you.
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Powered by JazzHR
CkYm1Mbb4K
$64k-87k yearly est. 2d ago
Mid-Level Cyber/Watch Floor Analyst
Noetic Strategies Inc.
Information security analyst job in Huntsville, AL
Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk.
BASIC QUALIFICATIONS:
Minimum of 5 year of Splunk/SOC experience.
Bachelor's in a computer science related field
Active Top Secret Clearance
Ability and willingness to do shift work
MAIN RESPONSIBILITIES:
Responsible for monitoring computer networks for security issues.
Investigating security breaches and other cybersecurity incidents.
Document security breaches and assess the damage they cause.
Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.
Fix detected vulnerabilities to maintain a high-security standard.
Recommend best practices for IT security.
Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
Decrypts data and provides technical summaries and input.
Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
PREFERRED QUALIFICATIONS
Microsoft Sentinel
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.
Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
Powered by JazzHR
6IxgcPuXI3
Information security analyst job in Huntsville, AL
Ready to launch your career? RGNext operates, maintains, and sustains mission-critical systems to provide safe and effective launch, testing, and tracking of Department of Defense, civil, commercial and international space lift vehicles. We support ballistic missile, guided weapon and aeronautical tests and evaluations as well as support space situational awareness operations and experiments to defend the United States to ensure our nation's safety. Our employees serve on the forefront of global defense and space operations. We offer our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities.
This position is located on Kwajalein Atoll in the Marshall Islands. It is an unaccompanied position (no family accommodations or pets). Benefits of this unique location include free housing, three meals a day and potential for U.S. overseas tax incentives.
Essential Functions
Perform comprehensive DISA STIG compliance evaluations and technical security control validations to ensure rigorous system hardening.
Execute daily monitoring and provide critical security posture briefings to the Cyber Operations Team Lead and RETS Cybersecurity Manager.
Draft and update Cyber Operations Standard Operating Procedures (SOPs), creating standardized, repeatable processes that significantly enhance team productivity and mission readiness.
Partner with cross-functional technical teams to provide expert guidance on remediation strategies and cybersecurity best practices.
Support investigations into potential security violations and policy breaches, executing the Incident Response Plan to ensure rapid mitigation and containment.
Collaborate with the Cyber Operations team to ensure technical compliance with security mandates from SMDC, NETCOM, C5ISR, and RETS leadership.
Maintain technical proficiency in emerging Cyber Operations tools and methodologies to adapt to evolving mission requirements and threat landscapes.
Execute additional technical functions and mission-critical tasks as assigned to support organizational security objectives.
Other duties as assigned.
Required Skills
Proven ability to communicate complex technical concepts clearly to diverse stakeholders and collaborate effectively with cross-functional teams to streamline workflows.
Proficient in producing high-quality Standard Operating Procedures (SOPs) and comprehensive technical reports.
Expert at conducting DISA Security Technical Implementation Guide (STIG) evaluations using STIG Viewer, Xylok Security Suite, and SCAP Compliance Checker (SCC), supplemented by meticulous manual checklist reviews.
Skilled at identifying, documenting, and tracking non-compliant items while providing actionable technical recommendations for remediation or risk mitigation.
Hands-on experience utilizing Tenable Security Center (ACAS) to perform vulnerability scans and cross-reference findings against current STIG requirements.
Proficient in analyzing Windows and Linux system event logs via Splunk (or similar SIEM tools) to validate security controls, detect unauthorized configuration changes, and identify indicators of compromise (IOCs).
Evaluates high-impact Change Requests as a key member of the Technical Review Board (TRB).
Required Experience
Bachelor's degree in computer science, cybersecurity, or related field; or equivalent combination of education and experience.
Two (2) or more years of experience in Information Assurance, Cybersecurity, or related field with a focus on similar responsibilities to those listed in the Essential Functions and Required Skills sections above.
Experience communicating security concerns and issues to non-technical audiences.
DoD 8140 Security+ certification required.
Additional Eligibility Qualifications
Must be able to obtain and maintain a DoD Secret Security Clearance which requires U.S. Citizenship.
Must be able to obtain/maintain a valid U.S. passport.
Must be able to relocate to the United States Army Kwajalein Atoll, Marshall Islands.
The flexibility to work occasional non-duty hours or on weekends to support specific mission or project requirements.
Benefits of Working at RGNext
RGNext offers our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities and growth. Employees enjoy a robust benefit package on day one, which includes medical, dental, vision, disability and life insurances, generous Paid Time Off and holiday pay, a retirement savings plan with a company match and vesting on day one! We are committed to providing employees a quality work/life balance in a productive, evolving environment.
Note: This job description describes the general nature of the duties and requirements of the job. It is not intended to be an exhaustive list or to limit the supervisor's ability to modify work assignments as appropriate.
RGNext is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, or any other applicable state or federal protected class.
$55k-82k yearly est. Auto-Apply 4d ago
Cyber Security Analyst
Pmu Recruitment
Information security analyst job in Alabama
Cyber SecurityAnalyst - (2400000X) Description AL-KHOBAR, KINGDOM OF SAUDI ARABIA Cyber SecurityAnalyst Department Information Technology Institution Prince Mohammad bin Fahd University Reports to Manager - Cyber Security introduction The Cyber SecurityAnalyst at Prince Mohammad bin Fahd University protects the university's digital assets, network, and data by identifying vulnerabilities, monitoring threats, and enforcing security measures. This role ensures compliance with security policies, supporting a safe environment for research and academic activities.
Job Purpose
The Cyber SecurityAnalyst role is to safeguard the university's IT infrastructure by proactively monitoring, identifying, and addressing security threats. This position involves implementing security measures, responding to incidents, and ensuring compliance with security policies to protect data and maintain the integrity of university systems. The analyst plays a key role in supporting a secure environment for all digital and academic activities.
Duties and Responsibilities
Major Duties/ Responsibilities:
· Monitor all networks and computer systems to prevent, detect, and investigate security breaches.
· Perform penetration testing to ensure the company's networks are free of bugs that malware authors can take advantage of.
· Design and implement multilevel security strategies to protect networks and data resources.
· Plan computer and network security upgrades and test hardware and software related to the upgrade.
· Stay up to date on new information technologies and apply those innovations in the company's security standards and best practices.
· Lead analysis of current architecture, risk exposure and defining mitigation measures in order to develop suitable recommendations.
· Highlight Cyber Security threats and prepare the official reports.
· Lead assessments of company's security posture including benchmarking/maturity assessments.
· Lead design of cyber security solutions and development of detailed technical specifications for the approved designs.
· Lead implementation, integration and testing of approved security solutions.
· Provide specialist technical support and address technical problems related to applications and production equipment to ensure any complex/escalated issues are handled with no or minimal downtime.
· Oversee/perform preventive maintenance as per schedule to ensure relevant security systems/processes remain fit for purpose.
· Provide subject matter expertise for cyber security related projects throughout its lifecycle to ensure delivery is as per plan/budget and client/TCC expectations.
· Prepare and deliver technical presentations for successful project delivery
· Lead cybersecurity evaluation and configuration review services
· Anticipate future problem areas by monitoring workflows and network traffic patterns.
· Prepare and perform cyber security awareness activities.
· Prepare work papers documenting procedures performed and that fully support audit findings.
· Assist IT operational audits in accordance with the annual audit plan.
· Follows up the action plan progress (such as penetration tests, vulnerability scans) and ensures that recommendations are implemented in a timely manner
· Assist staff members when they need help with security products and processes.
Job-Specific Skills:
· Working experience in a SOC or NOSC environment
· Must have strong working knowledge of information technology, including applications, networks and systems.
· Knowledge in performing IT Audit reports
· Experience in performing Risk Assessments reports.
· Experience in developing Business Continuity Plans and Disaster Recovery Plans
· Knowledge in the usage of vulnerability assessment and penetration testing tools
· Knowledge of security attacks techniques, familiar with MITRE ATT@CK framework
· Experience in using MS Office, MS Visio, Project Management tool.
· Experience in project management, problem-solving, training/coaching, presentation skills, and conflict resolution skills.
· General knowledge of ISO 27001, ITIL or other control frameworks
· Experience in writing SOP's - operation manuals
· Independent, motivated, and ambitious personality
Qualifications & Experience (Required)
Bachelor's degree in computer science, technology or computer engineering
5 to 8 years of experience in progressively more complex and responsible operational roles within a dynamic Enterprise function
Certified CompTIA Security+, CEH, CCNA, CCNP, CISSP (preferred)
Experience in Cisco ASA, WatchGuard, Juniper, CheckPoint Firewall
Knowledge of network and web protocols, and an in-depth knowledge of Linux/Unix tools and architecture
Experience in Patch Management and vulnerably assessment.
Knowledge and understanding of relevant legal and regulatory requirements.
Knowledge of common informationsecurity management frameworks.
Experience in InformationSecurity and NCA controls implementation.
Having experience in IT, Operational IT, Cybersecurity, incident detection, incident response, and forensics.
Maintain quality service delivery by adhering to company standards and best practices.
Strong attention to detail with an analytical mind and outstanding problem-solving skills.
Familiarity with information technology concepts such as infrastructure, cyber security, and application controls.
Great awareness of cybersecurity trends and hacking techniques.
On-call network troubleshooting
Knowledge, Skills and Abilities (Required)
· Strong written and verbal communication skills
· Strong focus on first time quality
· Desire to grow technical skills and ability to learn new technologies swiftly
· High attention to detail, self-starter, result driven
· Ability to work in a cross-functional team
· Professional, polite, and attentive while also being accurate
· Always prepared and responsive, willing to meet each challenge directly
· Teamwork
· Problem solving, Leadership
· Perseverance and motivation
· Ability to work under pressure, Confidence
· Managing ambiguity, Resilience
· Analytical skills, IT skills
Disclaimer
PMU reserves the right to alter, amend and add responsibilities to this position in line with the institutional needs. Changes and amendments to this job description shall be within the academic framework and the general employment conditions. Primary Location: Al-KHOBARJob: AnalystOrganization: Information Technology DepartmentSchedule: Regular StandardJob Type: Full-time Job Posting: Feb 25, 2025, 9:10:34 AM
$64k-87k yearly est. Auto-Apply 60d+ ago
Cyber Security Analyst 2
Us Tech Solutions 4.4
Information security analyst job in Birmingham, AL
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cyber security modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
$67k-89k yearly est. 60d+ ago
Data Security Analyst
Exeter Government Servi 4.1
Information security analyst job in Fort Knox, KY
Provide support to the lead securityAnalyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies.
Required Qualifications:
Experience in administrative support & MS Office proficiency
Bachelor's degree or 5 years of experience
U.S. citizen and MUST possess a current active DoD Secret clearance
Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
$64k-88k yearly est. Auto-Apply 60d+ ago
Data Security Analyst
The Timberline Group
Information security analyst job in Saint Louis, MO
Join our dynamic and thriving company as a Data SecurityAnalyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning.
What You'll Be Doing
Monitor security service performance and availability: Provide recommendations on security equipment, software, and services
On-going investigation: Inspect informationsecurity alarms and events to determine vulnerability and impact
Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk
Participate in architecture reviews: Ensure adherence to informationsecurity architecture
Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to informationsecurity incidents
Design and deliver programs: Create education and training programs on informationsecurity and privacy matters
The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* *************************
"Delivering quality solutions through quality people"
Information security analyst job in Redstone Arsenal, AL
Support the Missile Defense Agency (MDA) with development and analysis of programmatic data for program management support, to include monitoring and reporting against the acquisition program baselines, and assistance with program oversight and execution briefings. Alternative responsibilities may encompass development and execution of acquisition strategies/plans, contract requirements packages (e.g., writing SOWs, CDRLs, special provisions, source selection evaluation plans) and supporting prime contract monitoring/management activities. CompTIA Certification Preferred.
Certified Authorization Professional (CAP) certification (or ability to attain within 90 days after employment)
Provide interpretation and execution of MDA Acquisition policy, directives, guidance, and instructions
Provide program management support in developing, maintaining, and reporting against program baselines, gathering and analyzing programmatic data for internal Agency oversight reviews of programs (e.g., MDAR, DPR, PER, PMRs, internal reviews)
Prepare briefings and correspondence in response to internal taskings and external RFIs (e.g., GAO/Congressional/DoDIG/DoD oversight organizations)
Analyze acquisition requirements and provide recommendations during pre-solicitation phase through contract execution
Support program and contract management processes through the preparation and/or review of acquisition and program management documentation, briefings, white papers, reports, metrics
Provide support through all phases of the acquisition cycle with an emphasis on cybersecurity throughout the process
Requirements
Prior MDA experience preferred.
Advanced level - Master's degree required and/or 15 years' experience
Intermediate level - Bachelor's degree required and/or 10 years' relevant experience
Knowledge and experience in acquisition, procurement, and contracting highly desirable
Solid background in MS Office tools suite (e.g., Word, Excel, PowerPoint, Access) essential
Must possess exceptionally strong communications and analytical skills, be a self-starter, detail oriented, work well with a team, interacts with multiple levels and functional areas and able to manage customer and contractor relationship
SECRET or above Security Clearance required.
$64k-87k yearly est. 60d+ ago
Manager, Information Security Policy and Controls Governance
Unum 4.4
Information security analyst job in Chattanooga, TN
Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures.
Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company - not just insurers.
We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo.
Unum is changing, and we're excited about what's next. Join us.
General Summary:The Manager - InformationSecurity Policy and Controls Governance is responsible for strategic enhancement and day-to-day operation of key governance, risk, and compliance capabilities, including policy and standards governance, enterprise and application-level risk assessments, and controls management and attestation programs. This role will oversee the full lifecycle of governing documents, manage policy exceptions, coordinate external and regulatory assessments, and ensure strong alignment between security controls and regulatory requirements. The manager will also drive consistent, timely issues management across all domains. This leader will partner closely with stakeholders across the organization to mature processes, strengthen compliance posture, and ensure effective, repeatable execution of GRC activities. They will manage a small to mid-size team of IT security and risk management professionals.
Job Specifications
Bachelors degree in computer science, or relevant technical experience
Has 5+ years experience in an IT Risk Management field, or equivalent relevant work experience
Has a security technology background with strong knowledge of relevant technical security disciplines
Exhibits courage by taking smart risks and encouraging others to do so; empowers innovative approaches by motivating others to be proactive and resourceful
Able to effectively coach, mentor, identify, and address skills needs and gaps
Proficient in methods and techniques for running effective meetings and for understanding and influencing the roles played by participants
Displays good interpersonal skills at all levels of contact and in a wide variety of situations, able to listen and influence, and to relate to customers in their own language
Demonstrates the ability to champion change and support teams through change.
Demonstrates the ability to think critically, challenge conventional thinking and generate and apply unique business insight to create competitive advantage for the organization
Has solid knowledge of regulations, including, GLPA, HIPAA, GDPR, CCPA, and other cyber security regulatory compliance requirements and related programs
Has in-depth knowledge of security and control frameworks such as the NIST Cyber Security Framework, NIST SP 800-53, ISO 17799/27001, CobIT, and ITIL
CRISC, CISSP, CISM, CISA, and other security related certifications are a plus
Principal Duties and Responsibilities
Oversees and evaluates the delivery and effectiveness of the organizations policy governance, risk assessments, control attestation, and issues management capabilities, taking action to address performance or quality gaps as needed.
Ensures the team maintains a well‑defined, risk‑aligned backlog of work that advances program maturity and meets regulatory, audit, and business needs.
Guides team members in prioritizing assessments, policy lifecycle activities, and control-related work based on risk, business value, and regulatory timelines.
Proactively removes obstacles and operational roadblocks that hinder timely completion of assessments, attestations, and governance processes.
Partners with business and technology stakeholders to translate security, compliance, and risk management objectives into actionable work items.
Ensures best‑practice execution, including structured assessment methodologies, clear control documentation, consistent issue tracking, adherence to policy standards, and high‑quality evidence collection.
Encourages creativity and continuous improvement in maturing governance, assessment, and control processes; fosters a culture of innovation within the team.
Uses operational metrics, assessment cycle data, and workflow insights to understand team performance and drive process efficiency.
Partners with leadership to ensure strong talent is in place to support the organization's governance, risk and compliance obligations.
Mentors, coaches, and motivates team members to elevate their GRC expertise, business partnership skills, and overall performance.
Identifies skill gaps related to risk frameworks, regulatory requirements, control design, and assessment techniques, ensuring development plans address these needs.
Promotes cross‑training and shared ownership of GRC functions to reduce single‑points‑of‑failure and increase team resilience.
While accountable for the team's output, actively cultivates a self‑organizing, autonomous, and collaborative team that consistently demonstrates accountability and continuous improvement.
Conducts regular 1:1s and development discussions to monitor progress, reinforce strengths, and close skill gaps.
Collaborates with peers to evaluate the effectiveness of resourcing models, proposing enhancements to better support team operations.
Maintains a strong understanding of emerging regulatory trends, risk frameworks (e.g., NIST CSF, HIPAA, SOC, ISO), and control expectations to inform program improvements.
Reinforces disciplined prioritization by ensuring the team focuses on the highest‑value, highest‑risk activities and commitments.
Designs and operates GRC processes with partner teams' knowledge and needs in mind, ensuring risk governance activities are clear, intuitive, and easy to complete.
#LI-TO1
#LI-MULTI
IN4
Our company is built on helping individuals and families, and this starts with our employees. We want employees to maintain a positive balance, which is why we provide access to the benefits and resources they need to invest in themselves. From our onsite fitness facilities and generous paid time off to employee professional development programs, we are committed to helping employees live and work their best - both inside and outside the office.
Unum is an equal opportunity employer, considering all qualified applicants and employees for hiring, placement, and advancement, without regard to a person's race, color, religion, national origin, age, genetic information, military status, gender, sexual orientation, gender identity or expression, disability, or protected veteran status.
The base salary range for applicants for this position is listed below. Unless actual salary is indicated above in the job description, actual pay will be based on skill, geographical location and experience.
$89,400.00-$183,500.00
Additionally, Unum offers a portfolio of benefits and rewards that are competitive and comprehensive including healthcare benefits (health, vision, dental), insurance benefits (short & long-term disability), performance-based incentive plans, paid time off, and a 401(k) retirement plan with an employer match up to 5% and an additional 4.5% contribution whether you contribute to the plan or not. All benefits are subject to the terms and conditions of individual Plans.
Company:
Unum
$89.4k-183.5k yearly Auto-Apply 14d ago
Cybersecurity Intrusion Detection Analyst
UIC Government Services and The Bowhead Family of Companies
Information security analyst job in Vicksburg, MS
Bowhead is seeking a Lead Cybersecurity Intrusion Detection Analyst to join our team in Vicksburg, MS. The Cybersecurity Intrusion Detection Analyst use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers. The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cyber security state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. These positions are in a 24x7x365 Cybersecurity environment and qualified candidates must be able to work 12 hour shifts - day or night on a Panama schedule.
**Responsibilities**
+ Provides leadership and supervision to the incident response staff and performs highly technical customer support to organization users.
+ Manages the incident response and threat detection function.
+ Proactively analyzes network and systems traffic, event logs, and threat intelligence data, to properly identify and triage susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security controls
+ Participates in the development and monitoring of policies and procedures for department or department operations.
+ Assesses, analyzes, and consults on the security of information assets - networks, endpoints, databases, applications, services, platforms, environments, etc. Contributes to asset inventory and categorization processes.
+ Receive and distribute AS&W information
+ Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions,
+ Maintain internal and external source location information)
+ Coordinate AS&W information from other sources to aid in analysis of alerts.
+ Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity.
+ Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops.
+ Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN.
+ Monitor a platform capable of performing informationsecurity continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats.
+ Collect intrusion artifacts (e.g., source code, malware, and trojans)
+ Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
+ Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
+ Provide a 24/7x365 event/incident handling and analysis capability;
+ Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents;
+ Analyze detected cyber events to identify incidents;
+ Categorize and characterize cyber incidents;
+ Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process;
+ Analyze cyber incidents to develop specific responses;
+ Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers;
+ Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;
+ Mitigate operational and/or technical impact due to cyber incidents;
+ Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures.
**Qualifications**
+ Must possess Bachelor's degree or equivalent experience.
+ Must have at least 5 years intrusion detection experience.
+ Must have at least 2 years relevant IT and/or System administrator experience and 3 years relevant InformationSecurity experience
+ Must have the certifications for DOD 8570 IAT Level II minimally.
+ Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder.
+ Must have the ability to earn DoD 8570 computing environment certification within 6 months.
+ Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
+ Ability to demonstrate strong knowledge of computer security concepts
+ Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
+ Advanced knowledge of network technologies and protocols
+ Advanced understanding of current threats and trends present in the InformationSecurity and Technology field
+ Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified.
SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance with the ability to obtain a Top Secret/SCI. US Citizenship is a requirement for Secret clearance at this location.
Physical Demands:
- Must be able to lift up to 25 pounds
- Must be able to stand and walk for prolonged amounts of time
- Must be able to twist, bend and squat periodically
\#LI-MN1
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. Please view Equal Employment Opportunity Posters provided by OFCCPhere (******************************************* .
All candidates must apply online at ***************** , and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance *****************/careers/recruitment/ .
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs.
**Join our Talent Community!**
Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events.
**ID** _2026-24447_
**Category** _Cybersecurity/InformationSecurity_
**Location : Location** _US-MS-Vicksburg_
**Clearance Level Must Be Able to Obtain** _Top Secret/SCI_
**Minimum Clearance Required** _Secret_
**Travel Requirement** _Less than 10%_
$66k-94k yearly est. 10d ago
Senior Security Engineer
Exclusive Networks
Information security analyst job in Milan, TN
Exclusive Networks is the global cybersecurity go-to-market specialist that provides partners and end-customers with a wide range of services and product portfolios. With offices in over 45 countries and the ability to serve customers in over 170 countries, we combine deep local expertise with the scale and delivery of a single global organization.
Our best-in-class vendor portfolio is carefully curated with all leading industry players. Our services range from managed security to specialist technical accreditation and training and capitalize on rapidly evolving technologies and changing business models. For more information visit ***************************
At Exclusive Networks, we are passionate about making a difference. That means delivering the best to our ecosystem, shaping a prosperous and trusted digital world, and helping our people to realize their full potential.
DUTIES AND RESPONSIBILITIES | About the role
At Exclusive Networks Italia, we are looking for a Senior Security Engineer, to be included in the Italian Technical Team, who is capable of providing pre/post-sales consultancy (delivery) thanks to in-depth knowledge of the company's Cybersecurity solutions portfolio.
As the Senior Security Engineer, you will:
* collaborate with the commercial area by supporting accounts in all pre-sales activities.
* develop business opportunities thanks to its technical leadership and understanding of needs, which it relates to the most effective solutions
* manage Proof-of-Concept (POC) to support sales on both resellers and end customers
* support our customers in the configuration, installation and maintenance of products linked to the brands distributed
* teach the technologies distributed by Exclusive Netwoks Italia through teaching activities and/or 'on-the-job training'.
QUALIFICATIONS AND EXPERIENCE | About you
Core skills:
* Previous experience in cybersecurity
* Ability to work in a team, at multiple levels: interaction with vendors, customers and other company functions often in English.
* Knowledge of the English language (level B1-B2)
* Availability to travel, mainly within the national territory.
In-depth expertise on some of the following areas:
* Networking, LAN, WAN, SDWAN
* Network Security
* End-point security
* Vulnerability adjustmentT
* Security in a virtual environment and private/hybrid cloud
* IoT, OT Security
* Managed Security Services
* Main hardware technologies, software
Preferential elements shall be:
* Experience as a Cybersecurity teacher;
* Previous experience on some of the following brands: Fortinet, PaloAlto, Proofpoint, SentinelOne, Vectra (brands distributed by Exclusive Networks Italia);
* Possession of certifications, independent or linked to vendors.
WHO IS EXCLUSIVE NETWORKS? | Why work for us
We are people focused and strongly believe that talent empowers us to continue our dynasty of disruption and growth in the future. Our Mission is to drive the transition to a totally trusted digital world for all people and organizations. Visit our website ***************************
We are proud to be an Equal Opportunity Employer. We are committed to the recruitment and hiring of individuals from diverse backgrounds and experiences, as we believe this strengthens our ability to develop superior solutions, make informed decisions, and better serve our valued customers. We do not discriminate against individuals on the basis of race, religion, color, national origin, gender, sexual orientation, disability status, or any similar characteristic. Employment decisions are made solely on the basis of qualifications, merit, and business need. Please click here to review our Diversity and Inclusion Policy for further information.
We care about your data: please click here to read our Recruitment Data Protection Policy prior to applying, and therefore sharing your data with us.
If you think the open position you see is right for you, we encourage you to apply!
Our people make all the difference in our success.
$83k-112k yearly est. Auto-Apply 60d+ ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Jackson, TN?
The average information security analyst in Jackson, TN earns between $57,000 and $109,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Jackson, TN