Post job

Information security analyst jobs in Jonesboro, AR

- 417 jobs
All
Information Security Analyst
Cyber Security Analyst
Securities Analyst
Cyber Security Engineer
Senior Information Security Analyst
Information Systems Security Officer
Senior Security Analyst
Security System Engineer
Data Security Analyst
Network Security Analyst
Information Technology Analyst
  • Lead Cyber Security Engineer

    Expeed Software

    Information security analyst job in Jonesboro, AR

    Cyber & Infrastructure Security Lead (This is a direct hire with our customer, no 3rd party or applicants requiring a visa or on an H1B or student visa) Must be able to reside in Jonesboro, Arkansas Location: Jonesboro, Arkansas (Full-Time / Onsite) We're seeking a skilled and experienced Cyber & Infrastructure Security Lead to oversee cybersecurity, infrastructure security, and IT service operations across the organization. This role blends strategic leadership with hands-on execution - perfect for someone who can strengthen enterprise security posture, enhance ITSM processes, and lead incident response with confidence. Role Overview The Cyber & Infrastructure Security Lead will manage the full lifecycle of infrastructure and cybersecurity initiatives, including network and cloud security, endpoint protection, risk management, IT Service Management (ITSM) alignment, and Service Desk operations. You'll be the key point of accountability for ensuring operational resilience, compliance, and continuous improvement across all security domains. Key Responsibilities Cybersecurity Leadership Develop and execute security strategies, policies, and standards. Oversee secure network architectures, firewalls, VPNs, IDS/IPS, and endpoint protection. Lead incident response, threat detection, and vulnerability management. Conduct regular risk assessments and ensure compliance with NIST, ISO 27001, and related frameworks. Manage vendor and third-party security evaluations. Drive continuous improvement by identifying emerging threats and adopting modern security tools. IT Service Management (ITSM) Lead ITSM process integration across Incident, Problem, Change, and Configuration Management. Ensure IT services are resilient, continuously monitored, and compliant with security standards. Collaborate with IT teams to align change management and security operations. Develop SLAs and performance metrics for infrastructure and security incident response. Service Desk Leadership Oversee day-to-day Service Desk operations with a focus on secure and efficient incident handling. Ensure proper escalation, categorization, and prioritization of security-related tickets. Provide training and awareness programs for service desk teams on security practices. Maintain documentation and knowledge bases for consistent response and resolution. Qualifications Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience). 7-10 years of experience in cybersecurity and infrastructure security, including at least 3-5 years in a leadership role. Proven experience managing hybrid or cloud environments (AWS, Azure, GCP). Hands-on familiarity with ITSM frameworks such as ITIL. Strong communication and leadership skills, with the ability to drive cross-functional initiatives. Preferred Certifications CISSP, CEH, CCSP, or similar credentials. ITIL Foundation or higher certification. Experience supporting ERP systems such as Epicor Kinetic is a plus. Ideal Candidate You're strategic yet hands-on - capable of leading security initiatives, managing cross-functional teams, and making smart, risk-based decisions. You thrive under pressure, communicate clearly, and have a passion for protecting systems and data through strong operational discipline. Cyber & Infrastructure Security Lead (This is a direct hire with our customer, no 3rd party or applicants requiring a visa or on an H1B or student visa) Must be able to reside in Jonesboro, Arkansas
    $75k-102k yearly est. 3d ago
  • Cyber Security Engineer

    Provisions Group 4.4company rating

    Information security analyst job in Knoxville, TN

    The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations. Technical Implementation: Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools. Implement and support security controls for network infrastructure such as routers, switches, and wireless access points. Configure, administer, and secure Active Directory and Azure AD environments. Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions. Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection. Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture. Security Operations: Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation. Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts. Lead technical response efforts during security incidents or breaches in coordination with the incident response team. Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access. Conduct routine vulnerability assessments and threat analysis to support continual improvement. Perform digital forensics and incident response activities as needed. Compliance: Ensure adherence to HIPAA and all applicable regulatory and security standards. Design and implement technical safeguards that protect sensitive information and support organizational objectives. Collaboration: Partner with IT and business teams to embed security controls into systems, applications, and workflows. Educate and support staff on cybersecurity awareness, best practices, and evolving threats. Documentation: Create and maintain accurate documentation for security configurations, procedures, and incident activity. Remain informed on current cybersecurity trends and recommend enhancements to existing controls. Security Audits: Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards. Security Standards and Policies: Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements. Security Infrastructure Maintenance and Monitoring: Configure, troubleshoot, and maintain security-related hardware and software. Implement and manage monitoring tools to detect intrusions and potential security breaches. Security Strategy Development: Support the planning, execution, and ongoing refinement of the organization's information security strategy. Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives. Perform additional duties as assigned. Minimum Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required. Minimum Experience: Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment. Certifications: Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
    $65k-87k yearly est. 2d ago
  • Information Security Specialist

    Federal Reserve Bank of San Francisco 4.7company rating

    Information security analyst job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture. Important Information Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency. No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc. This position requires working on-site with 5 days per month remote work flexibility. Key Activities Risk Assessment & Analysis Modernize the current approach to cybersecurity risk management and assessments. Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization. Identify and implement risk quantification and scoring approaches within the organization. Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority. Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations. Conduct business impact analyses to understand how security incidents affect critical business functions. Evaluate and quantify risks associated with third-party vendors and supply chain. Assess specific risks related to cloud environments and services. Program Development Develop reports and dashboards to illustrate the organization's risk posture. Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk. Research and identify options to establish a risk register. Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options. Map cybersecurity risks to relevant regulatory requirements and compliance frameworks. Continuously improve risk management processes based on industry trends and organizational needs. Communication & Collaboration Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand. Partner with incident response teams to incorporate lessons learned into risk models. Translate complex technical risk scenarios into actionable insights for all levels of the organization. Qualifications Experience Typically requires at least 6 years of relevant cybersecurity risk management experience. Experience with risk scoring methods and risk quantification. Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume. Experience establishing or running an Enterprise cybersecurity risk management program. Experience with NIST SP 800-53 security standards. Experience presenting risk information to executive leadership. Education & Certifications Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience. Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred. Technical Knowledge Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF). Strong skills and experience with data analysis. Experience with GRC (Governance, Risk, and Compliance) tools. Knowledge of business impact analysis methodologies. Familiarity with cloud security frameworks (CCSK, CCSP). Skills & Abilities Ability to understand technical details of cybersecurity risk. Ability to communicate complicated technical risk scenarios to all levels of the organization. Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Location: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Salary: $98,600 - $139,000 / Senior Level $117,300 - $165,400 / Advanced Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $117.3k-165.4k yearly Auto-Apply 17d ago
  • CI Cyber Threat Analyst

    GD Information Technology

    Information security analyst job in Springfield, MO

    Type of Requisition: Pipeline Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret/SCI Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cybersecurity Operations, Cyber Threat Analysis, Security Operations, Threat Analysis Certifications: None Experience: 10 + years of related experience US Citizenship Required: Yes Job Description: Seize your opportunity to make a personal impact as a CI Cyber Threat Analyst supporting our intelligence customer. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiator. As CI Cyber Threat Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on a TS/SCI level cleared CI Cyber Threat Analyst joining our team to support our customer. Duties & Responsibilities: Produce weekly actionable Technical CI (Cyber/TSCM/TEMPEST) threat reports in collaboration with teammates, the customers partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly threat reports, each report due NLT 0800 each Monday morning. Threats reports will include (as applicable): Threat data collected and reported by the customers Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTS). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat (s) to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused all source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat (s) to the customer to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, customer partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by the Intelligence Community. Fused all source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to the customer. Produce CI Information Reports and IIRs from data collected and reported by either the Technical CI team or the cyber security personnel. Provide a minimum of 6 Reports of Inquiry and/or Requests for Information within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross). Provide Technical CI advice and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Provide high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Provide current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats.) Self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Have proficiency in use of bottom-line-up-front (BLUF) writing. Collaborate well internally and externally with IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other customer Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience: Required: 11+ years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Meet minimum training requirements, within one calendar year of assignment, for access to DoD networks in accordance with DoDM 8140.03, by attaining and maintaining at least baseline certification for DoDM 8140.03 Information Assurance Technician Level II compliance. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Bachelor's degree in Science, Technology, Engineering or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives Monitor and track progress towards achievable measures. Location: Customer Site Clearance: Active TS/SCI with ability to obtain CI Poly US Citizenship Required The likely salary range for this position is $137,700 - $186,300. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: None Telecommuting Options: Onsite Work Location: USA VA Springfield Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $137.7k-186.3k yearly Auto-Apply 60d+ ago
  • Analyst, Information Security

    Standard Aero 4.1company rating

    Information security analyst job in Maryville, TN

    Build an Aviation Career You're Proud Of At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term. Summary: As an IT Security Analyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization. What you'll do: Conduct risk and security assessments through vulnerability analysis and reporting Perform mitigation support for both internal and external security audits Investigate, analyze and document security incidents to identify and document the root cause Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary Partner with IT Operation teams to remediate system vulnerabilities Participates in the production of documentation and management reporting Research security enhancements and make recommendations for improved policy and process Analyze IT requirements and provide objective advice on the use of new IT security offerings Stay up-to-date on information technology and cybersecurity trends and standards Other IT Security-related duties as required Capable of identifying, evaluating and mitigating significant risks within an enterprise. Strong working experience with Microsoft Office Suite. Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience. Possess strong analytical skills attention to detail. Ability to prioritize assignments while working on multiple projects Ability to work independently and proactively to meet assigned objectives Flexible with the ability to multi-task, effectively prioritize and work under pressure Basic project management Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.) Analyze, report and respond to security alerts within the various IT technologies and global locations Proactively remediate information technology security threats as a member of the security team Assist in the designing, documenting, architecting and implementing IT security measures and controls Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources Threat mitigation; malicious code detection, response and prevention; operating system security oversight Minimum Qualifications: Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered. 5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering. 5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation. 5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks. 5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC). Preferred Qualifications: IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL SDLC, and understand application security. Containerization and Development Security Operations Benefits that make life better: Comprehensive Healthcare 401(k) with 100% company match; up to 5% vested Paid Time Off starting on day one Bonus opportunities Health- & Dependent Care Flexible Spending Accounts Short- & Long-Term Disability Life & AD&D Insurance Learning & Training opportunities Raising the Standard of Excellence since 1911 With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us. Inclusivity Is Our Standard It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
    $73k-103k yearly est. Auto-Apply 35d ago
  • Information Security Analyst

    Veterans United Home Loans 4.7company rating

    Information security analyst job in Columbia, MO

    Whether your background is in cybersecurity, system administration, or IT operations, you can be successful in this role. We don't require a specific degree, but we're looking for translatable skills and relevant expertise. About the Role: As an Information Security SOC Analyst, you'll play a key part in protecting our company's systems and data. You'll help monitor and respond to security alerts, investigate potential incidents, and support security projects that keep our environment safe and strong. Your day-to-day will include staying sharp on emerging threats, helping teammates during investigations, and ensuring our systems are running securely across the organization. This is a hands-on, collaborative role-perfect for someone who thrives on problem-solving, curiosity, and continuous learning. Here's a snapshot of what you'd be doing: Investigate email related Information Security incidents utilizing established tools, procedures, and processes to identify malicious intent. Act as a primary point of contact for information security inquiries. Respond to internal and external inquiries to provide guidance and advice on best practices. Identify and block access to malicious websites. Perform email security systems administration and maintenance. Remain knowledgeable in technical security guidelines and processes. Monitor and update resources, while providing consultation, support, and training to peers. Help implement, test, and support Security projects as needed. Assist in investigating potential Information Security incidents in support of more experienced SOC teammates. Create and maintain information security incident response procedures (playbooks). Identify and propose process and tool improvements. Maintain a working knowledge of the organization's IT Policies and Procedures. Actively contributes to making the team and culture stronger by assisting with other duties as needed, excluding licensed activity About You: You're a dedicated, detail-oriented problem solver who thrives on analyzing data and uncovering root causes. Strong communication skills come naturally to you-you can explain technical concepts clearly and confidently. You love learning and adapting to new technology, especially in fast-paced, security-driven environments. Collaboration is your default mode-you work well on a team and value shared success. You take initiative and show up consistently, ready to protect and enhance the company's security posture. You're familiar with the basics of operating systems, scripting, and security concepts (Linux, PowerShell, regex, or log analysis a plus). Preferred Qualifications: Computer Science or Cybersecurity related degree, or equivalent experience. 2-3 years of Information Security, Systems Administration or Information Technology experience. Strong foundational understanding of Information Security concepts and principles. About Us: We're all about helping Veterans and military families become homeowners. In two short decades, we closed over 500,000 VA Loans and became the #1 VA lender for homebuyers in the nation. But to us, success isn't measured in numbers. Our success is measured in living our values every day: Be Passionate and Have Fun, Deliver Results with Integrity, and Enhance Lives Every Day. We strive to provide friendly service to military homebuyers and their families-and we seek to lift up people and communities across the country. We're so glad you're here checking out this opportunity! If this role gets you excited but you're worried you don't check every box-don't sweat it. We're more interested in what you can bring to the team than a perfect checklist. If you're passionate, driven, and ready to make a difference, we'd love to hear from you. Come as you are, and together we'll create something amazing. Interested? Apply Today! Veterans United Home Loans and its affiliates are Equal Opportunity Employers that consider all qualified applicants regardless of race, color, religion, sex (including pregnancy, transgender status, and sexual orientation), national origin, age (40 or older), disability or genetic information.
    $86k-106k yearly est. Auto-Apply 4d ago
  • Information Security Specialist

    Collabera 4.5company rating

    Information security analyst job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 60d+ ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Information security analyst job in Saint Louis, MO

    Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 60d+ ago
  • Cyber Security Vulnerability Analyst

    ITR 4.2company rating

    Information security analyst job in Oak Ridge, TN

    Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities. This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week. Job Responsibilities: • Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role. • Mentor the DCO's junior staff, developing their technical and incident resolution skills. • Participate in incident response activities involving multiple teams and functions. • Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls. • Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status. • Automate key DCO functions using Tines technology • Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities. • Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities. • Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats. • Assist users with the creation, monitoring, and evaluation of policy and device exceptions. • Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements. • Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues Candidates must be able to obtain a federal security clearance so US citizenship is required.
    $69k-95k yearly est. 13d ago
  • Cyber Security Analyst Tier 3

    Freedom Technology Solutions Group

    Information security analyst job in Saint Louis, MO

    Freedom Technology Solutions Groups is looking to add a Tier 3 Cyber Security Analyst to the team. The candidate will provide CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in support of CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certification that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder. Job Duties: Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government. Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents; Collaborates with appropriate authorities in the production of security incident reports; Categorizes incidents and events; Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated; Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events; Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event; Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions. Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed. Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed; Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis; Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services; Provides adversary attribution; Performs malware analysis and signature development; Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. Job Requirements: Bachelors Degree and or 6 years' experience in Cyber Security (CSOS) Active security clearance. DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report; Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander; Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems; Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis. When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down; Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification Preferred Qualifications: Masters degree IAT III Qualifications that are nice to have: Juniper certification What's in It for You? Flexible work environment A team mentality - work with friendly, like-minded professionals Work with innovative, cutting edge technologies Enjoy extremely competitive compensation and benefits A work-life balance you can count on Opportunities to grow and advance your career on our dime The Benefits You Get with Freedom Amazing benefits including matching 401k, fully paid medical, and more Generous paid time off - including paid site closure days Competitive salary offerings Paid training and tuition reimbursement Referral bonuses Fully paid life and disability Annual logo wear allowance Company sponsored events (game nights, holiday party, summer party, happy hours) Interested in learning more about Freedom and our culture? Contact us today! We're constantly hosting hiring events in our office and elsewhere, to help you get a sense of what life is like at Freedom before joining the team. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, sex, age, marital status, disability or veteran status Applicant Federal & E-Verify Postings VEVRAA Federal Contractor Accessibility: If you need an accommodation as part of the employment process, please contact Human Resources at Phone: ************ Email: ********************* Equal Opportunity Employer, including disabled and veterans. If you want to view the EEO Law poster, please choose your language: English - Spanish - Arabic - Chinese If you want to view the EEO Law Supplement poster, please choose your language: English - Spanish - Chinese If you want to view the Pay Transparency Policy Statement, please click the link: English
    $66k-89k yearly est. Auto-Apply 60d+ ago
  • Senior IT Security Analyst

    First Busey Corporation 4.5company rating

    Information security analyst job in Kansas City, MO

    The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business. Duties & Responsibilities * Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes * Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary. * Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments. * Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours. * Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies. * Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data. * Document and perform verification of IT related changes in accordance with Company security policies and procedures. * Research and recommend hardware and software solutions to augment or enhance existing security measures. * Stay current in events and trends in IT security. * Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered. * Conduct scheduled reviews of key application security settings. * Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. * Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs * Supports audit and incident processes, as required * Monitor and support internal SEIM systems, reports, and searches * Monitor and support internal phishing email report systems and reports * Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business * Develops strong liaison relationships with key internal business and technology teams * Coach level I & IIs on security domains and program processes * Depending on need, VP Security may determine a Team Lead designation for Level III role * Participate in security work streams for a variety of enterprise projects and initiatives * Determine and communicate security risk postures to partners and leaders as appropriate Education & Experience Knowledge of: * Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments. * Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents. * Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices. * Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS. * Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Familiarity with cloud architectures, security standards, and best practices * Strong oral and written communication skills * Strong organizational skills and attention to detail * Excellent interpersonal skills Ability to: * Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits. * Take independent action within established options and develops new procedures and approaches to problems when necessary * Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required * Self-starter requiring minimal supervision * Highly organized and efficient. * Demonstrated strategic and tactical thinking. * Stays current with the evolving threat landscape. * Perform duties and make decisions under frequent time pressures Education and Training: * (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience. * On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent * Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire. * At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration * Requires knowledge of Microsoft Office and other productivity tools Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails. Application Deadline 11/15/25
    $86k-123k yearly Auto-Apply 47d ago
  • Data Security Analyst

    The Timberline Group

    Information security analyst job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Senior Security Analyst - Camden, AR

    RTX

    Information security analyst job in East Camden, AR

    Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Security Clearance: Secret - Current At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Our Security team is seeking a Senior Security Analyst to support our team 100% onsite at our facilities in Camden, Arkansas. This person will serve as Alternate Facility Security Officer (AFSO), Designated Government Representative (DGR) and COMSEC hand receipt holder. What You Will Do Ensure adherence to the provisions of the National Industrial Security Program Operating Manual (NISPOM) and National Security Administration 3-16 (NSA/CSS 3-16). Serve as the DGR for foreign sales maintaining US State Department Licenses, communicating with Defense Counterintelligence Security Agency (DCSA) and Foreign DGR's to coordinate classified exports and imports. Report to the FSO for ensuring the open storage areas are properly maintained assist in reviewing articles and documents for appropriate classification markings. Assist the FSO in working with the lead guard to ensure cleared guard scheduling is achieved. Serve as the COMSEC hand receipt holder under supervision of the Facility Security Officer to conduct inventories, receive, transfer, destroy and inventory COMSEC material. Maintain the visitor control program. Follow specialized procedures for the transmission of classified and/or proprietary material/information. Participate in security audits, semi-annual alarms tests, and UL certification. Complete the DCSA SPeD training courses for Facility Security Officer - Possessing Facilities within one year of start date. Qualifications You Must Have Typically requires a University Degree or equivalent experience and minimum 2 years of prior relevant experience, or an Advanced Degree in a related field. Experience scheduling Guard Rotations. Experience with administrative requirements for classified areas. Perform physical tasks such as climbing ladders, conducting alarm tests and performing escort duties for uncleared visitors. Qualifications We Prefer Completion of FSO for Possessing Facilities from DCSA SPeD. Certified First Aid, AED and CPR to serve as a First Responder. Certified Industrial Security Professional or similar related certification or Certified DoD Security Manager. Excellent written, verbal, and presentation skills. Must be able to complete required NSA training for DIAS Ability to understand and safeguard Personal Identifiable Information (PII). Self-starter with minimal supervision and the ability to solve routine problems of moderate complexity. What We Offer Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation. Relocation Non-Eligible - Relocation assistance not available Please consider the following role type definition as you apply for this role: Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products. We are RTX #LI-Onsite The salary range for this role is 66,000 USD - 130,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $76k-103k yearly est. Auto-Apply 60d+ ago
  • Senior Security Analyst-Application

    Sfbcic

    Information security analyst job in Ridgeland, MS

    Are you looking for a great team environment? Southern Farm Bureau Casualty Insurance Company is currently seeking a Senior Security Analyst-Application. Southern Farm Bureau is a great company and an excellent place to work. The Company offers a family-oriented work environment and a rich benefit package including paid time off, company matched 401(k), pension/retirement, medical, dental, vision, group life, accidental death and dismemberment, employee assistance program, a continued education program, and a hybrid home/office work schedule. This position is located in Ridgeland, MS. Under limited supervision, responsible for comprehensive range of tasks, including everyday management of information security tools and devices, along with responsibilities for information security administration of a wide diversity of Farm Bureau IT systems. This position will have a primary focus on Application Security. This position is charged with ensuring the integrity and security of applications deployed or being developed at our organization. This position will serve as the bridge between the development team(s) and the security team. Essential Functions • Perform and/or assist with internal application security assessments as needed. • Scan web applications for vulnerabilities and exploits & work with other staff members to remediate issues. • Work closely with developers to ensure that security is an integral part of the software development lifecycle • Coordinate and work closely with 3rd party testing teams performing application assessments. • Develop application security training documentation. • Develop the security components of application project plans in coordination with developers and other business units/departments • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. • May assist in training and development of other personnel when and where required. • Enterprise Risk Management (ERM) risk ownership responsibilities to be conducted as assigned. Additional Responsibilities • Additional hours and on call may be required. • Other duties and responsibilities as assigned. • Regular and predictable attendance is required. Education Level Education Details Req Pref Bachelor's Degree Majoring in Computer Science, Management Information Systems, or related field X And Other Certifications: CISSP, SSCP, Security+, CEH, CISA or CISM in good standing X
    $78k-105k yearly est. 60d+ ago
  • Network/Security Operations Center Analyst (17591)

    Pantex Plant

    Information security analyst job in Oak Ridge, TN

    Job Title: Network/Security Operations Center Analyst Career Level From: Associate Career Level To: Senior Associate Job Specialty: Network Administration What You'll Do NOC/SOC serves as the first line of defense against network disruptions and cybersecurity threats. We serve a critical function in the organization to identify, investigate and resolve issues while minimizing the business impact. We are looking for a positive attitude, esprit de corps, and skills to join our team. Due to the sensitive nature of this position, NOC/SOC Analysts must work in an office environment 100% of the time. Job Specific Responsibilities: Network Operations Center / Security Operations Center (NOC / SOC) Analysts are hard charging, analytical thinkers who enjoy solving problems. We thrive in a high-pressure environment with shifting priorities. NOC / SOC Analysts are able to assess a situation, determine tactical steps forward, and can implement a strategic plan. We support multiple technical teams in a 24 x 7 x 365 operational environment with high uptime requirements. In addition to these general skills and personality traits, CNS is seeking candidates with the following skills. Core Skills & Job Requirements: * Interact positively with peers, other departments, internal / external customers, and vendors to identify operational issues * Prolonged or irregular hours required - 12 hour rotating shifts (compensated by shift differential pay) * On-site requirement to support the network and cyber infrastructure * Collecting and reviewing performance reports for various systems, and reporting trends in performance to senior technical personnel to help them predict future issues or outages * Strong ability to diagnose server or network alerts, events or issues * General understanding of TCP/IP Networking and Server infrastructure * Understanding of common information architecture frameworks * General understanding and/or experience with Information Security and Incident Response * Understanding of Disaster Recovery plans and related technologies * General understanding of common firewalls * Excellent time management and organizational skills, and ability to handle multiple concurrent tasks and projects with minimal supervision * Good oral and written communication skills, and ability to address conflict with others constructively * Cross-team coordination and collaboration What You Can Expect * Meaningful work and unique opportunities to support missions vital to national and global security * Top-notch, dedicated colleagues * Generous pay and benefits with a stable organization * Career advancement and professional development programs * Work-life balance fostered through flexible work options and wellness initiatives Minimum Job Requirements * Bachelor's degree in engineering/science/information technology discipline * OR Eight or more years of relevant education, training, and/or progressive experience may be considered to satisfy educational and years-of-experience requirements for this posting Preferred Job Requirements * Prior helpdesk and/or field support experience * Prior NOC / SOC experience * Security Incident and Event Management (SIEM) * Common Intrusion Detection/Prevention Systems (IDS/IPS) (Snort, Cisco, FortiGate, Firepower) * Experience with Disaster Recovery plans and related technologies * Server hardware experience (e.g., Cisco UCS, and HP blade systems) * Server Administration experience with Linux and/or Windows * Prior Server / Network Administration experience * Experience working in a large, geographically distributed environments * Experience with SolarWinds, System Center Operations Manager, or other monitoring tools * Operational analysis and development skills, such as scripting, to deploy DevOps solutions * Knowledge of packet analysis and packet capture tools * Working knowledge of large network and server infrastructures * Experience with Penetration Testing or similar training environments * Preferred certifications: Network+ and/or Security+, SPLUNK Why Y-12? You get #morethanajob. We encourage employees to achieve a healthy personal balance among home, work and the community. One of the ways we embrace work-life balance is by offering flexible work arrangements that provide alternatives to the traditional workweek, while still meeting business needs. Top talent and personal commitment mean more to our success than any other factors, so we reward our people with the kinds of benefits that make a positive difference in the quality of their lives. Benefits such as: medical plan, prescription drug plan, vision plan, dental plan, employer matched 401(k) savings plan, disability coverage, education reimbursement and many more. Want to stay healthy and fit but hate the cost of a gym membership? Take advantage of one of our onsite workout facilities and eat healthy in our onsite cafeterias. Much more than a workplace, at Y-12, you can build a career that lasts a lifetime. Notes The minimum education and experience for the lowest career level in the job posting range are listed under Minimum Job Requirements. Successful candidates hired into a higher career level than the minimum in the range must meet the requirements listed in the job leveling charts for the career level into which they are being hired. If a range of Career Levels is posted, i.e., Senior Associate to Senior Specialist, internal applicants already in one of the Career Levels would come across at their current Career Level. Internal applicants currently in a lower level Career Level would move to the lowest posted Career Level. Requires a Q clearance; however all qualified candidates will be considered regardless of their current clearance status. The ability to obtain and maintain a Department of Energy Q clearance is required. This position may require entry into the Material Access Areas (MAA) and participation in the Human Reliability Program (10 C.F.R. Part 712), which requires successful competition of a DOE counterintelligence evaluation and may include a counterintelligence-scope polygraph examination. This position may be categorized as a "designated position" identified by 10 C.F.R. Part 709, requiring successful completion of a DOE counterintelligence evaluation that may include a counterintelligence-scope polygraph examination. CNS is a drug-free workplace. Candidates accepting a job offer will be required to pass a pre-placement physical, drug screening and background investigation. As an employee, you may be required to receive and maintain a security clearance from the United States Department of Energy in order to meet eligibility requirements for access to sensitive information or matter. U.S. citizenship is a requirement for security clearance applicants. All employees are subject to being randomly selected for drug testing without advance notification. CNS is an equal opportunity employer. All qualified applicants will receive consideration for employment based on merit and without regard to race, color, religion, sex, sexual orientation, national origin, protected veteran status or disability.
    $59k-78k yearly est. 30d ago
  • Security Monitoring and Response Analyst II

    Mastercard 4.7company rating

    Information security analyst job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Security Monitoring and Response Analyst II Who is Mastercard? Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all. Overview Overview The Mastercard Global Fusion Center, based in the St. Louis Tech Hub, serves as the central point for global coordination, connecting teams and intelligence across cyber, fraud, and geopolitical domains to strengthen enterprise resilience. It integrates intelligence from these areas to proactively monitor, detect, and respond to threats that could impact Mastercard's technology, reputation, or personnel. By uniting global teams and streamlining response efforts, the Fusion Center ensures rapid, coordinated action during critical events and drives continuous improvement in enterprise resilience. The Mastercard Global Fusion Center is looking for a Security Monitoring and Response Analyst II to drive our customer experience strategy forward by consistently innovating and problem-solving. The ideal candidate is passionate about collaboration, communication and culture. They will have advanced presentation skills, be highly motivated, intellectually curious, analytical, and possess a futurist mindset. Role In this position, you will: * Drive end-to-end project management, including initiating and tracking Fusion Center projects and workstreams across cyber, geopolitical, fraud, and enterprise resilience domains. * Lead and coordinate enterprise incident response efforts during critical events, ensuring aligned situational awareness across global operations that impact technology, reputation, personnel, and business continuity. * Develop and deliver high-quality briefs, reports, and presentations for executives, preparedness exercises, and collaboration sessions. * Analyze threats and opportunities, synthesize findings into actionable insights, and communicate results effectively by leveraging partner capabilities and resources. * Assist in coordinating large-scale preparedness exercises, including Threatcasting and threat briefings, to advance enterprise resilience. * Increase the maturity of key Fusion Center capabilities across governance, people, processes, and technology to help Mastercard achieve integrated cyber defense, proactively monitor, detect, investigate, and respond to known and unknown attacks. * Host tours and serve as a security ambassador internally and externally, showcasing Fusion Center capabilities and fostering a culture of security awareness. * Support key internal and external relationships with industry, law enforcement agencies, and vendor partners to strengthen collaboration and threat response capabilities. * Protect Mastercard and its stakeholders All About You * Excellent communication, listening & facilitation skills * Excellent organizational and project management skills, with the ability to prioritize multiple initiatives, manage complex timelines, and deliver results in fast-paced, dynamic environments. * Sound judgment, problem-solving, and decision-making abilities * Possess a personal passion for fostering a culture of decency, collaboration, and team spirit * Experience managing senior-level relationships * Experience mentoring and coaching others * Excellent ability to take a pragmatic approach to dealing with situations where confidentiality is important or where our work is of a sensitive nature * Excellent ability to anticipate threats and risks, articulate threat risk to stakeholders and make thoughtful, balance recommendations to stakeholders * Experience using tools like Microsoft PowerPoint, Excel, Word, PowerBI, PowerAutomate, Teams and Threat Intelligence platforms like Recorded Future. * Some knowledge in least two of as the following cybersecurity disciplines: Fusion Center, Security Operations Center, Network Security, Incident Response, Forensics, Threat Intelligence, Vulnerability Management, Risk Management, or Business Operations The ideal candidate for this position should: * Have a clear mission that focuses on protecting Mastercard, our employees and the payments ecosystem * Have experience creating presentations using common applications, developing graphs and visuals from various data sources, and experience working with others to coordinate meetings and events * Continually look at the Fusion Center processes to see what can be done better or where automation is possible * Go out of your way to get close to the Fusion Center partners to find out what their needs are and how you can help * Identify areas where resources fall short of needs and provide thoughtful and sustainable solutions to benefit the team * Be skilled at explaining technical problems succinctly and clearly * Be a strong, confident, and exacting writer and speaker, able to communicate your vision and roadmap effectively to a wide variety of stakeholders * Always look for potential solutions to solve problems Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: * Abide by Mastercard's security policies and practices; * Ensure the confidentiality and integrity of the information being accessed; * Report any suspected information security violation or breach, and * Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. NOTE: Candidates go through a thorough screening and interview process. There is no need to include all preferred skills in the job description. Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: * Abide by Mastercard's security policies and practices; * Ensure the confidentiality and integrity of the information being accessed; * Report any suspected information security violation or breach, and * Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations. Pay Ranges O'Fallon, Missouri: $75,000 - $125,000 USD
    $75k-125k yearly Auto-Apply 22d ago
  • Temporary- Cyber Security Analyst

    Tennessee Board of Regents 4.0company rating

    Information security analyst job in Nashville, TN

    Title: Temporary - Cyber Security Analyst Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned. REQUIRED QUALIFICATIONS High School Diploma or GED One year of experience in information security and compliance regulations. Proficiency with Microsoft applications. PREFERRED QUALIFICATIONS Certificate in information security, i.e., Security+, Pen+, Ethical Hacker. Experience with SIEM (Microsoft Defender). Experience in phishing campaign/training. KNOWLEDGE, SKILLS AND ABILITIES Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels. Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures. Open Until Filled: Yes Rate of Pay: $20.00 per hour Work Hours: Up to 28 hours per week Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check. Nashville State offers flexible work arrangements for positions that qualify.
    $20 hourly 60d+ ago
  • Physical Security Systems Engineer

    xAI

    Information security analyst job in Memphis, TN

    xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates. About the Role As a Physical Security Systems Engineer at xAI, you'll design, implement, and maintain advanced security systems to safeguard our facilities, assets, and personnel. Working onsite in Memphis, Tennessee, you'll tackle complex challenges, leveraging your deep expertise in security technologies to strengthen our infrastructure at a fast-scaling company. Expect to dive into system optimization, ensure robust protection, and travel regularly to xAI sites to support our mission of accelerating human scientific discovery through AI. This is an in-person role based in Memphis, Tennessee, with regular travel required to all xAI sites. Responsibilities Develop detailed design plans for the installation of physical security systems including access control, surveillance cameras, intrusion detection, and alarm systems. Collaborate with InfoSec, IT and facility management teams to integrate security hardware with existing systems across locations. Manage health and configuration of security network infrastructure Regularly assess the performance of installed security systems and make necessary adjustments or upgrades. Conduct preventive maintenance to ensure all security equipment is in optimal working condition. Diagnose and resolve hardware issues promptly to minimize downtime and security risks. Keep detailed records of all service and maintenance activities. Participate in or lead security audits to identify vulnerabilities in physical security measures. Recommend and implement solutions to address identified security gaps. Liaise with vendors for procurement of security hardware, ensuring compliance with organizational standards and budget constraints. Manage relationships with external contractors for installation and maintenance services. Train security and facility staff on the use of new security systems. Ensure all security hardware installations meet local, state, and federal regulations. Maintain up-to-date documentation on system configurations, maintenance schedules, and security incident responses. Required Qualifications Minimum of 5 years in a role focused on physical security systems design. Proven experience with CCTV, access control, and intrusion detection systems. Experience using CAD software and reading architectural drawings Experience using Bluebeam software Preferred Qualifications Bachelor's degree in Electrical Engineering, Computer Science, or related field; or equivalent experience in security systems. Ability to interpret security objectives, develop project schedules and manage adherence to established timetables. Familiarity with Genetec software is a plus. Proficiency in hardware troubleshooting and system diagnostics. Experience configuring security and network architecture in integrated security systems. Familiarity with current security technology trends and innovations. Certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional) are highly desirable. Excellent problem-solving abilities and attention to detail. Strong communication skills for effective collaboration with team members and stakeholders. Ability to work under pressure in a dynamic environment on highly condensed timelines. Regular sitting at a desk or computer for extended periods, typing and writing. Occasionally walking, around the facility and standing. xAI is an equal opportunity employer. California Consumer Privacy Act (CCPA) Notice
    $65k-90k yearly est. Auto-Apply 60d+ ago
  • Analyst IT Report -Technology Development

    Shelby County Schools 4.6company rating

    Information security analyst job in Memphis, TN

    Destination 2025, our 10-year strategic plan, is designed not only to improve the quality of public education, but also to create a more knowledgeable, productive workforce and ultimately benefit our entire community. What will success look like in 2025? By 2025, 80 percent of seniors will be on track to learn in a postsecondary classroom or enter the workforce straight out of high school; 90 percent of students will earn their high school diploma on time; and every student will enroll in a postsecondary opportunity college or career-ready. We believe: Proficiency in literacy is the foundation of all learning, and we are committed to making that a top priority for students. As we raise expectations of our students, innovative and varied practices are needed in the classroom to provide students with learning experiences that will prepare them for life after graduation. Successful teachers and leaders are the drivers for student success. That means continuing to provide educators with the support and tools needed to make classroom teaching impactful. Although 2025 is in the future, the work is happening to produce engaged and prepared students. By devoting time and other resources to schools, community members can have a direct impact on student achievement. How will we get there? Teachers, parents and community leaders have worked with us to develop the high-leverage priorities to focus all of our efforts and resources over the next 10 years - early literacy, post-secondary readiness, teacher and staff development, high quality schools and community engagement. Job Description Purpose and Scope 1. Work with the Leadership and Department to gather requirements to design, develop, test and deploy reports and strategic and operational dashboards. 2. Responsible for day-to-day designs, developments, monitoring and support of assigned reports and dashboards. 3. Develops Excel, SQL, or application specific reports. 4. Pulls data from various data sources and combine into a single report, either via Data Warehouse or through direct integration. 5. Builds reports to help identify data patterns to scrub/clean data and maintain good data hygiene. 6. Provide database development expertise (stored procedures, views etc.) for application development, design, implementation, verification, debugging, optimizing and maintenance of SQL Server database objects and process for the application, reporting and interface modules 7. Perform report development with strong stored procedure skills utilizing SQL Server 2008 R2, 2005, 2000 8. Design code and test SQL Server reporting services components (user interface, Stored Procedures, Tables etc.) 9. Experience in complete development lifecycle from requirements through deployment and maintenance 10. Provides end-user training on report writing software and support users in ad-hoc report creation. 11. Develops and applies solutions to complex problems which require the regular use of ingenuity and creativity and competency in SQL and EXCEL. 12. Converses with management to determine type, scope, and purpose of analyses. May lead a team in the effort. Works with other analysts and management to complete assigned project work. 13. Deals with complex problems and provides solutions that are innovative and ingenious, achieving quality and work process improvements. 14. May ensure that the workgroup's goals and activities are in sync with and support the broader goals and objectives of the organization; and that the execution of responsibilities are in accordance to lawful and ethical standards. 15. Directs and assists in the preparation and maintenance of a variety of narrative and statistical repmis, records, correspondence, and files related to assigned service, activities, and operations; provides for appropriate research and compiles reports, as needed. 16. Performs other related duties as assigned or directed. Qualifications Essential Job Functions Delivers at a high level of competency Information Technology software development. Assesses and performs analysis on data, and prepares data to facilitate Technical Services functions of organization. Responsibilities require understanding of both theory and practice. Minimum Qualifications Graduation from an accredited college or university with a Bachelor's Degree in Computer Science plus an additional four (4) years related experience, or equivalent, for a total education/experience of 8 years. Prefer experience with MS SQL Server 2008 R2, 2005 Reporting Services, Integration Services. Prefer 2+ years' experience in use and application of stored procedures, DTS package, SSIS package, and Crystal reports. Experience with multi-dimensional Data Sources, reporting tool such as MS Reporting services, Tableau preferred. Degree Equivalency Formula: Bachelor's Degree= 4 years plus required years of experience. Master's Degree= 2 years plus required years of experience. Where Master's degrees are required, years for Bachelor's Degrees must be included. Knowledge, Skills, and Abilities Basic understanding and familiarity with database structure (particularly SQL). Strong analytic and problem-solving skills, with the ability to swiftly and accurately understand complex data and perform analysis Skill in developing data-supported solutions and using fact-based logic; ability to translate complex analysis in easy-to-understand manner and present to a broad audience Strong written and verbal communication skills Outstanding leadership skills and ability to build high-performing teams through both recruitment and selection and professional development Ability to tackle the operational challenges of the merged school district in a complex, changing political and educational environment Ability to manage daily administrative tasks without losing sight of long-term goals and planning Additional Information Why Memphis? Shelby County Schools-one of the 25 largest school districts in the nation-is located in Memphis, TN, a city known for its great food, original music, professional sports, high-quality arts in the most affordable urban setting in the nation . Not only that, but Memphis is a hotbed and national leader for groundbreaking work in education. Benefits : SCS benefits include the following: State retirement plan Paid holidays Paid vacation Paid sick days Heath Care Insurance (e.g. Medical, Dental)
    $64k-88k yearly est. 12h ago
  • Senior Information Security Business Analyst

    Aurecon

    Information security analyst job in Manila, AR

    Just imagine your future with us… At Aurecon we see the future through a very different lens. Do you? Innovation, eminence and digital are at the heart of everything we do. Are you excited about the future? Are you driven by the opportunity to work on some of the most challenging and complex projects around the world and to learn from the best? We are. Diversity is at the core of everything we do. We work together to create a culture based on respect, trust and inclusiveness. Our differences are what fuel our creativity. The purpose of the Senior Business Analyst (Security) role is to lead the analysis and documentation of Aurecon's project delivery needs so that our programs deliver the highest quality change into Aurecon. The Senior Business Analyst has the experience and insight to work quickly and autonomously and will be expected to produce high-quality deliverables that meet the needs of their program and stakeholders. The Senior Business Analyst will bring their confidence, work ethic and leadership skills to ensure the successful implementation of IT initiatives at Aurecon. What will you do? We know the work we do is vital in assisting Aurecon's business globally. Here are the key things you will do to 'bring ideas to life'. * Responsible for gathering, documenting, and obtaining sign-off of business, functional and non-functional requirements aligned with Aurecon PMO and security standards (E8 / NIST Level 2) * Agile/Scrum experience - Mandatory * Work with business, IT teams and vendors to analyse and explain the feasibility of security options and recommend the most appropriate response for business partners * Proactively build and maintain exceptional business and technology stakeholder relationships at all levels to ensure alignment between business strategy, technology, security, and solution delivery * Responsible for collecting process information and documenting in defined templates * Responsible for raising issues and risks and proactively proposing work arounds and resolutions for problem resolution. * Contribute to and review requirements and process related documentation Data Analysis activities: * Ability to analyse large data sets into meaningful output for consumption by stakeholders * Leveraging advanced Excel skills be able to analyse, monitor, manage and predict impacts of business scenarios * Able to initiate and perform ad hoc queries to identify potential security issues within data sets * Able to initiate uplift to data capture and analysis processes to improve analytical outcomes Testing activities (nice to have): * Create Test Approach/Plan across both functional and non-functional requirements covering the applicable Testing stages and gain endorsement * Collaborate with Project Manager to estimate, schedule and resource the testing, identifying assumptions, dependencies, risks, and issues Firstly, strong sense of responsibility, flexibility, and adaptability to varying request. Demonstrate excellent time management and organizational skills. And as part of a new team, you will have the opportunity to shape this role and have input into how we evolve it over time to WOW our employees and make an even bigger impact on the world. You will also need the following capabilities: Qualifications (Required) * 7+ years of experience on Business Analysis, Requirements gathering, creating BRDs, etc. * With exposure on Cyber Security / Security projects * Strong communications skills and stakeholder management * Agile Scrum methodology experience is preferred At Aurecon, we know every career adventure is unique. That's why our benefits are designed to support you and your family - at every stage. * Flexibility - 1x every fortnight reporting in the office * Wellbeing - we priorities your health * Recognition - your impact matters * Family - support for modern families and carers * Community - give back through volunteering days * Career development - learn, lead and shape your career Our Aurecon Attributes describe the types of people we bring together for clients. We don't expect you to have all eight of the attributes, but one that is unique to you. Finally, we value that each of our team members brings something different to Aurecon. We look for people who have had a broad range of experiences throughout their career and can demonstrate how they have worked as part of a team to bring ideas to life. Does that sound like you? About us We've re-imagined engineering. Aurecon is an engineering and infrastructure advisory company, but not as you know it! For a start, our clients' ideas drive what we do. Drawing on our deep pool of expertise, we co-create innovative solutions with our clients to some of the world's most complex challenges. And through a range of unique creative processes and skills, we work to re-imagine, shape and design a better future. We listen deeply and intently, which helps us see opportunities, possibilities and potential that others can't. Think engineering. Think again. Want to know more? You can learn more about what it's like to work at Aurecon by visiting the careers section of our website. If you are intrigued or excited by what you have read, then we want to hear from you. Apply now!
    $70k-95k yearly est. Auto-Apply 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Jonesboro, AR?

The average information security analyst in Jonesboro, AR earns between $53,000 and $103,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Jonesboro, AR

$74,000
Job type you want
Full Time
Part Time
Internship
Temporary