Senior Information System Security Officer
Information security analyst job in Huntsville, AL
MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Officer (ISSO) to join our team in Huntsville, Alabama.
Responsibilities include, but are not limited to:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Provide liaison support between the system owner and other IS security personnel
Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters
Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR; Working knowledge of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and ATO processes
Minimum Qualifications:
Must meet one of the following levels of experience: A high school diploma/GED and 7 years' experience, a bachelor's degree in computer science cybersecurity or a related discipline and five years' experience, or a master's degree in computer science cybersecurity or a related discipline and 3 years' experience.
Hold at least one of the following Information Assurance Management (IAM) Level III certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or equivalent certifications
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications
Preferred Qualifications:
A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline
Clearance Requirements:
Must have a current/active Top Secret security clearance with eligibility to obtain SCI prior to starting this position.
Selected candidate must be willing to undergo a Polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
Often positions self to maintain computers in the lab, including under the desks and in the server closet
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Cloud Security Analyst
Information security analyst job in Miami, FL
About the Company
Your new role as a Senior Cloud Security Analyst based in Miami, you will lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP). Acting as a consultant to internal teams, you'll evaluate digital security gaps, implement solutions, and ensure compliance with governance standards. You'll manage IAM processes, review access controls, monitor security events, and provide strategic security directives to stakeholders.
About the Role
Responsibilities
Lead initiatives to strengthen the security posture across cloud environments (Azure, AWS, GCP).
Act as a consultant to internal teams.
Evaluate digital security gaps and implement solutions.
Ensure compliance with governance standards.
Manage IAM processes and review access controls.
Monitor security events and provide strategic security directives to stakeholders.
Qualifications
Bachelor's degree in Computer Science or related field (or equivalent experience).
5+ years in cloud security and identity access management.
Required Skills
Expertise in Azure and AWS security administration.
Strong IAM knowledge (SailPoint, Active Directory, O365).
Familiarity with GDPR, PCI, NIST frameworks.
Scripting experience (PowerShell; Python a plus).
Experience with vulnerability tools (Qualys, Orca preferred).
Preferred Skills
Microsoft 365 Messaging or Security Administrator, CompTIA Cloud+.
Pay range and compensation package
110-120K plus bonus
Equal Opportunity Statement
We are committed to diversity and inclusivity.
Bank Information Security Governance Senior
Information security analyst job in Tampa, FL
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplyCyber Security Analyst
Information security analyst job in Huntsville, AL
Bellatrix-Latin for "Female Warrior" Owned and operated in a HUBZone, with over 25 years in the HR, Talent Acquisition and Government Contracting. Like the Bellatrix Star in the Orion Constellation, our Team Members are the Brilliance of the company, and are all shareholders, leading the company to success. Bellatrix prides itself on being a Small Woman Owned HUBZone company. We believe big does not equal best. By staying small, we can focus on agility, efficiency, and our people. At Bellatrix we believe in advancement from within through training, mentorship, innovation and truly being a family. Bellatrix believes in excellence in customer service, and catering to the customer's needs. We realize not everyone fits into a box, and we think outside of the box to ensure, affordable and outstanding services. Human Resources, Retention and Recruiting, and Medical Coding/Billing are the HRM of Bellatrix. Come and join our team, where you are a team member and shareholder, working together for growth.
Bellatrix has the current position open as a direct W2, Fulltime position for one of our top clients in the Huntsville, AL Market. This position requires a Secret Clearance and is on location with the Missile Defense Agency
Title: Cyber Security Analyst
Location: Onsite-Huntsville, AL
Program: MDA, C3BM and C2BMC
Number of Openings: 2
Immediate Direct Hire
Clearance: Secret
Travel: 25%
Salary Range: $150,000-165,000, DOE
General Overview:
Command, Control, Communications, and Battle Management (C3BM) cyber engineering efforts include engaging in Command, Control, Battle Management, and Communications (C2BMC) technical engineering and integration, future concepts, new functionality, and multi-national exchange designs. Cyber engineering tasking includes participation in reviews and assessments of C2BMC cyber security and documentation. Collaboration with MDS stakeholders is required to prepare C2BMC cyber products as part of the engineering objectives documentation and analysis processes as related to Defense Of Guam (DoG).Other activities include participation in engineering meetings, presenting engineering product development updates, providing analysis and failure review summaries.
Responsibilities:
Understand cybersecurity aspects of systems engineering development, as well as DoD cybersecurity requirements, and be capable of recommending changes to the Government about the contractor's system engineering development process.
Perform cybersecurity risk assessment reviews to include changes, modifications, and/or updates of software and/or hardware to individual information systems and/or enterprise environment.
Familiarity with Configuration Management to include oversight and engineering assessments of Cybersecurity fixes, patch development, and pre-release testing in support of DoG.
Performing cybersecurity risk assessment describing the posture of an individual information systems through an enterprise architecture in support of DoG.
Will directly support the Software Assurance program for C2BMC. Includes ability for assessments of code reviews and approvals/disapprovals of software products for use on Mission, Training and Test/Development C2BMC systems is support of DoG
Requirements:
Bachelor's degree in STEM program: Computer Science, Information Technology, Network Engineering or other similar program
5+ years of Related Experience
Secret Clearance
Familiarity with MDS cyber capabilities and policy
Familiarity with Missile Defense Agency, Ballistic Missile Defense System, and/or C3BM Program Office work efforts
Security +, CE with a preferred certification level of CISSP
Ability to work independently within a dynamic environment
Apply cyber engineering and solutions to support real-world test, integration, and operations
Work within a collaborative environment composed of Government, prime contractor, sub-contractor and supporting contractor personnel in a badge-less contractor environment
Bellatrix is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Cyber Security Analyst
Information security analyst job in Miami, FL
Job Title: SCITES - Cyber Security Analyst
Required Clearance: Minimum Secret clearance upon start and be eligible for TS/SCI clearance
Required Certification(s): DoDM 8570 CSSP Category Certification (e.g. CompTIA CySA+ or CEH)
Required Education: Bachelor's in IT or a related technical discipline preferred or commensurate level of experience based on position level
Required Experience: Advisor 8+ Years, Senior 5+ Years, Analyst 0 - 2 Years
Position Description:
Exeter is seeking personnel to provide Cyber Security, Computer Network Defense in support of the SOUTHCOM Cyber Information Technology Enterprise Services (SCITES) Contract in Doral FL.
Primary Responsibilities:
Incident Reporting, manages, track and report incidents to include submitting incident reports using the SharePoint Incident Reporting Portal
Uses SIEM Q-RADAR/ArcSight for event tracking and correlation
Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools
Evaluate firewall change requests and assess organizational risk
Safeguards network against unauthorized infiltration, modification, destruction or disclosure
Researches, evaluates, tests, recommends, communicates and implements new security software or dev forensics; manages, performs and reports forensics analysis to government leadership
Monitor and analyze Network IDS to identify security issues for remediation
Manages, performs and monitors the following CND tools: PowerShell, IBM Q-RADAR, CISCO SOURCEFIRE (IDS), WIDS, ACAS,JRSS Stack: Agency FIREWALL PALO ALTO, BASE FIREWALL CISCO ASA, Tipping Point (IPS), PCAP collector, InQuest, ArcSight ESM and loggers, Lancope, Blue coat Web Proxy
Required Qualifications:
Must be a U.S. Citizen
Minimum Secret clearance upon start and be eligible for TS/SCI clearance
DoDM 8570 Cyber Security Service Provider (CSSP) Category Certification (e.g. CompTIA CySA+ or CEH)
Shift work required to support real-world or contingency operations
Candidates must be local or willing to relocate
Desired Qualifications/Experience:
Bachelor's Degree in specialty field
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
Auto-ApplyCyber Information Assurance Analyst III / Information Security
Information security analyst job in Pensacola, FL
Global Business Solutions, Inc., established in 1995, offers customers a distinctive blend of information technology capabilities, education and training services, and information assurance solutions. Managed by a team of executive leaders experienced in the field of information technology and training services within the industry and government, GBSI prides itself on exceeding expectations. Our award-winning solutions give clients the support tools needed to successfully deliver in evolving environments with confidence.
Job Description
Role and Responsibilities
This position does not represent a current opening and is posted for the purpose of collecting multiple resumes across various skill levels for a pending contract. GBSI may consider candidates who express an interest in this position for future job openings.
This Position is located in Pensacola, FL - Currently, there is no relocation assistance
.
The Cyber Information Assurance Analyst III designs and conducts regular audits on computer systems to determine that they are operating securely and that data is protected from both internal and external threats. Makes assessments of assigned systems to determine the system security status and ensure compliance to security policies, procedures and standards.
Primary Objectives of the Cyber Information Assurance Analyst III - InfoSec
Designs and recommends security policies and procedures;
Prepares training materials and instructs computer security education and awareness training programs;
Monitors, evaluates, and maintains complex security systems according to industry best practices and safeguards internal information systems and databases;
Reviews system configurations to ensure compliance with security requirements and complies with established standards;
Investigates security violations and breaches and recommends solutions;
Compiles reports on intrusions as necessary and provides analysis summaries to management;
Reviews organization wide firewall logs;
Provides reports to internal and external customers in response to queries and requests for computer security information;
Consults on tasks, provides leadership and guidance for junior personnel
Gives recommendations for product upgrades, patches and general security measures to secure and/or mitigate threats for various clients.
Qualifications
Qualifications and Education Requirements
Ability to pass a Government background check;
Bachelor's degree in Computer Science, Management Information Systems, or data security experience;
Four (4) or more years of experience in computer science, information systems management or data security may be substituted in lieu of a degree;
Experience working with system/network security tools;
Must possess an active CompTIA Security+ or CISSP certification or be able to obtain either certification within thirty (30) days of employment.
Preferred Qualifications
CompTIA Security+ Certification;
CISSP Certification.
Additional Information
GBSI is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action-Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA statement, please visit ********************************************************** You may also view the "EEO is the Law" poster directly at *****************************************************************
No part of this Position Description or of any other shall be construed as an employment contract. Employment with GBSI is at will and constrained by both the laws of the State of Florida and those of the state wherein the employee performs services for the company.
Cyber Security Analyst
Information security analyst job in Boca Raton, FL
Reports to CISO and works with a team of Cyber Security specialists. The Cyber Security Analyst is responsible for identifying risks to the confidentiality, integrity, and availability of our clients products and services, while maintaining compliance with applicable regulatory standards.
In this role, you will be expected to contribute to the integrity and sustainability of the service delivery network, which consists of advanced server-based applications used to support our client's customers. The successful candidate will work directly with senior team members on issues that may require some after-hours and weekend availability.
Specific Job Duties:
• Articulate technical and security requirements to departments/business groups
• Identify gaps in security operations and develop mitigation strategies
• Assist with the maintenance of application and operating system software in the Service Delivery Network
• Participate in disaster recovery and business continuity planning
• Perform software development lifecycle auditing
• Prioritize compliance actions according to business risk
Desired Preferred Skills:
• Industry certifications - PMP, CISA, CISSP, Security +
• Department of Defense IT experience
• Pharmacy or healthcare experience
Qualifications
• Masters's degree in computer science or relative discipline
• 5-10 years combined experience in information security
• Proficient with Unix / Linux
• Strong analytical problem solving
• Knowledge of the software development lifecycle
• Proven ability to plan and work to a deadline
• Must be able to obtain Department of Defense clearance
Additional Information
Work with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
Information Security Analyst
Information security analyst job in Tampa, FL
As an Information Security Analyst, you will have shared responsibility for implementing and maintaining company's security strategies and services while providing security guidance based on industry standards and best practices. The ideal candidate will ho have an educational background and/or experience to maintain and support assigned information security technologies with general leadership oversight.
*This position is located out of our Tampa, FL corporate office.
2 days a week in office are required*
Some of the regular responsibilities may include:
Provision, manage, monitor, test, and decommission security tools and applications.
Attend and lead small project meetings and enforce best practices.
Apply specialized security technical knowledge.
Evaluate, plan and implement security projects.
Remain current on assigned security tools and applications and apply skilled understanding of troubleshooting.
Document and resolve moderately complex problems.
Report progress to leaders.
Monitor and analyze Identity security incidents, and provide recommendations for remediation
Other duties as assigned or required.
Experience to be successful:
IT security risks and mitigation strategies.
Security Incident Response
Security frameworks, including ISO and NIST.
Company IT and HR policies.
Various IT security-related regulatory requirements.
IT security logging and monitoring strategies.
Deployment and use of sophisticated IT security monitoring tools.
Educational background: Bachelor's degree in computer science, Information Systems, or other related field; or has 2-5 years of relevant experience.
Technical Skills to understand the role:
Analytical ability
Analyzing Security System Logs, Security Tools, and Data
Communicating Up, Down, and Across All Levels of the Organization
Creating, Modifying, and Updating Security Information Event Management (SIEM)
Deep Understanding of Risk Management Frameworks
Discovering Vulnerabilities in Information Systems
Evaluating and Deconstructing Malware Software
Familiarity with Security Regulations and Standards
Implement and Maintain Security Frameworks for Existing and New Systems
Maintaining Security Records of Monitoring and Incident Response Activities
Monitoring Compliance with Information Security Policies and Procedures
Network and System Administration Experience
Responding to Requests for Specialized Cyber Threat Reports
Performing Cyber and Technical Threat Analyses
Performing Security Monitoring
Producing Situational and Incident-Related Reports
Providing Host-Based Forensics
Providing Timely and Relevant Security Reports
Responding to Security Events
Supporting and Managing Security Services
#LI-MB1
Benefits may include:
Comprehensive medical, prescriptions, dental and vision plans
401(k) plan with a discretionary company match
Shareholder Purchase and Reinvestment Plan
Basic life and accidental death and dismemberment insurance premium paid by the company
Voluntary supplemental life insurance for employees, spouses and dependent children
Fertility and Family Building Benefits
Paid Disability benefits
Paid time off programs
11 Company paid holidays per year
Flexible spending account
Health savings account (available to High Deductible Health Plan participants only)
Employee Assistance Program
Educational Assistance Program
Voluntary benefits, such as Critical Illness, Hospital Indemnity, Pet Insurance and Accident Insurance
Title insurance policies and certain escrow services for the employee's primary personal residence at no charge
Transportation benefit plan for mass transit, parking and vanpool, in several markets
Note: If you currently are employed by Old Republic Title (or one of its wholly owned affiliated companies) please get in touch with your human resources representative regarding the application process.
For California applicants, please click the following link to view our CCPA Applicant Notice
Old Republic Title is an Equal Opportunity Employer
Auto-ApplyCyber Security Analyst
Information security analyst job in Doral, FL
Job Details Corporate Headquarters Miami - Doral, FLDescription
For nearly 30 years, DASI has been in the business of providing comprehensive aircraft inventory support for airlines, MROs, OEMs, and distributors. Headquartered in Miami, Florida, with service centers in London and Singapore, DASI is a truly global partner, serving customers' parts and inventory needs in more than 140 countries.
DASI is embracing the potential of online sales and their digital marketplace, which has been growing exponentially and has tremendous potential with the right technology team in place to support and take it to the next level.
Purpose:
At DASI, we offer a total e-procurement solution for aircraft parts to its customers. Our IT department plays a critical role in aligning technology with business goals, ensuring secure and high-quality service delivery. The role of Junior Cyber Security Analyst is key in supporting secure operations that safeguard digital assets, to achieve these goals. The ideal candidate will assist in monitoring, detecting, and responding to cybersecurity threats, supporting vulnerability management efforts, and contributing to overall risk mitigation activities.
This is an entry-level, full-time, onsite position offering a great opportunity to build foundational cybersecurity skills while contributing to a forward-thinking IT department. This role is ideal for early-career professionals or recent graduates looking to build practical experience in cybersecurity within a collaborative, fast-paced environment.
Key accountabilities:
Monitor and analyse security alerts from SIEM, EDR, and other tools.
Investigate suspicious activity and assist in incident response.
Assist with vulnerability scans and tracking remediation efforts.
Maintain and update security logs and reports.
Support compliance efforts (e.g., NIST, SOC 2) through documentation and audit preparation.
Assist in phishing simulations and awareness campaigns.
Maintain inventory of digital assets and help track security baselines.
Collaborate with IT and DevOps teams to implement security controls.
Stay informed on the latest cybersecurity threats and mitigation strategies.
Perform all other duties as assigned.
Key skills and competences:
Possess strong analytical and troubleshooting skills.
Possess excellent written and verbal communication skills.
Has an understanding of basic cybersecurity principles and network security concepts.
Shows an eagerness to learn and develop skills in cybersecurity.
Has a high degree of self-direction, motivation, and energy.
Experience and qualifications:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent practical experience.
Relevant certifications (e.g., CompTIA Security+, (ISC)² Certified in Cybersecurity (CC), Microsoft SC-900, GIAC Security Essentials (GSEC), or equivalent).
Exposure to compliance or regulatory frameworks is a plus, but not required.
Aerospace background or experience is a plus, but not required.
DASI, LLC. and group companies are an Equal Opportunities Employer
Cyber Security Analyst
Information security analyst job in Alabama
Cyber Security Analyst - (2400000X) Description AL-KHOBAR, KINGDOM OF SAUDI ARABIA Cyber Security Analyst Department Information Technology Institution Prince Mohammad bin Fahd University Reports to Manager - Cyber Security introduction The Cyber Security Analyst at Prince Mohammad bin Fahd University protects the university's digital assets, network, and data by identifying vulnerabilities, monitoring threats, and enforcing security measures. This role ensures compliance with security policies, supporting a safe environment for research and academic activities.
Job Purpose
The Cyber Security Analyst role is to safeguard the university's IT infrastructure by proactively monitoring, identifying, and addressing security threats. This position involves implementing security measures, responding to incidents, and ensuring compliance with security policies to protect data and maintain the integrity of university systems. The analyst plays a key role in supporting a secure environment for all digital and academic activities.
Duties and Responsibilities
Major Duties/ Responsibilities:
· Monitor all networks and computer systems to prevent, detect, and investigate security breaches.
· Perform penetration testing to ensure the company's networks are free of bugs that malware authors can take advantage of.
· Design and implement multilevel security strategies to protect networks and data resources.
· Plan computer and network security upgrades and test hardware and software related to the upgrade.
· Stay up to date on new information technologies and apply those innovations in the company's security standards and best practices.
· Lead analysis of current architecture, risk exposure and defining mitigation measures in order to develop suitable recommendations.
· Highlight Cyber Security threats and prepare the official reports.
· Lead assessments of company's security posture including benchmarking/maturity assessments.
· Lead design of cyber security solutions and development of detailed technical specifications for the approved designs.
· Lead implementation, integration and testing of approved security solutions.
· Provide specialist technical support and address technical problems related to applications and production equipment to ensure any complex/escalated issues are handled with no or minimal downtime.
· Oversee/perform preventive maintenance as per schedule to ensure relevant security systems/processes remain fit for purpose.
· Provide subject matter expertise for cyber security related projects throughout its lifecycle to ensure delivery is as per plan/budget and client/TCC expectations.
· Prepare and deliver technical presentations for successful project delivery
· Lead cybersecurity evaluation and configuration review services
· Anticipate future problem areas by monitoring workflows and network traffic patterns.
· Prepare and perform cyber security awareness activities.
· Prepare work papers documenting procedures performed and that fully support audit findings.
· Assist IT operational audits in accordance with the annual audit plan.
· Follows up the action plan progress (such as penetration tests, vulnerability scans) and ensures that recommendations are implemented in a timely manner
· Assist staff members when they need help with security products and processes.
Job-Specific Skills:
· Working experience in a SOC or NOSC environment
· Must have strong working knowledge of information technology, including applications, networks and systems.
· Knowledge in performing IT Audit reports
· Experience in performing Risk Assessments reports.
· Experience in developing Business Continuity Plans and Disaster Recovery Plans
· Knowledge in the usage of vulnerability assessment and penetration testing tools
· Knowledge of security attacks techniques, familiar with MITRE ATT@CK framework
· Experience in using MS Office, MS Visio, Project Management tool.
· Experience in project management, problem-solving, training/coaching, presentation skills, and conflict resolution skills.
· General knowledge of ISO 27001, ITIL or other control frameworks
· Experience in writing SOP's - operation manuals
· Independent, motivated, and ambitious personality
Qualifications & Experience (Required)
Bachelor's degree in computer science, technology or computer engineering
5 to 8 years of experience in progressively more complex and responsible operational roles within a dynamic Enterprise function
Certified CompTIA Security+, CEH, CCNA, CCNP, CISSP (preferred)
Experience in Cisco ASA, WatchGuard, Juniper, CheckPoint Firewall
Knowledge of network and web protocols, and an in-depth knowledge of Linux/Unix tools and architecture
Experience in Patch Management and vulnerably assessment.
Knowledge and understanding of relevant legal and regulatory requirements.
Knowledge of common information security management frameworks.
Experience in Information Security and NCA controls implementation.
Having experience in IT, Operational IT, Cybersecurity, incident detection, incident response, and forensics.
Maintain quality service delivery by adhering to company standards and best practices.
Strong attention to detail with an analytical mind and outstanding problem-solving skills.
Familiarity with information technology concepts such as infrastructure, cyber security, and application controls.
Great awareness of cybersecurity trends and hacking techniques.
On-call network troubleshooting
Knowledge, Skills and Abilities (Required)
· Strong written and verbal communication skills
· Strong focus on first time quality
· Desire to grow technical skills and ability to learn new technologies swiftly
· High attention to detail, self-starter, result driven
· Ability to work in a cross-functional team
· Professional, polite, and attentive while also being accurate
· Always prepared and responsive, willing to meet each challenge directly
· Teamwork
· Problem solving, Leadership
· Perseverance and motivation
· Ability to work under pressure, Confidence
· Managing ambiguity, Resilience
· Analytical skills, IT skills
Disclaimer
PMU reserves the right to alter, amend and add responsibilities to this position in line with the institutional needs. Changes and amendments to this job description shall be within the academic framework and the general employment conditions. Primary Location: Al-KHOBARJob: AnalystOrganization: Information Technology DepartmentSchedule: Regular StandardJob Type: Full-time Job Posting: Feb 25, 2025, 9:10:34 AM
Auto-ApplyCyber Tabletop Analyst
Information security analyst job in Destin, FL
Responsibilities • Support the planning and execution of cyber exercises and wargames. • Assess resiliency of weapon systems and critical infrastructure. • Assist with course of action analysis and strategy development. • Coordinate exercise progress and activities between clients and DoD agencies.
• Support the development of a novel wargaming methodology.
Requirements
• Experience with cyberspace operations, operational planning, and cyber mission force operations.
• Experience with exercise and training activities, including tabletop exercises and professional analytic wargaming.
• Ability to work well in a fast-paced environment with a diverse team.
• Ability to prioritize mission-essential tasks toward wargame objectives.
• Ability to plan, conduct, and analyze research to inform cyberspace wargames.
• Top Secret clearance.
• HS diploma or GED and 4+ years of experience in an operational role with DoD or interagency partners, or Bachelor's degree and 3+ years of experience.
Nice-to-haves
• Experience in intelligence analysis and developing adversary capability assessments.
• Experience in a military staff environment.
• Experience briefing and delivering training to senior military and civilian leaders.
• Experience using modeling and simulation tools to conduct assessments.
• Possession of excellent organizational skills.
• TS/SCI clearance.
• Master's degree.
About Us: We are Command Post Technologies, Inc. (CPT). CPT is a Service-Disabled, Veteran-Owned Small Business (SDVOSB), providing engineering services in the areas of Cyber Security, Software Development, Test & Evaluation, and Strategic Planning. CPT employees appreciate working in a caring environment that promotes a healthy work-life balance. As individuals, we come together as a team, supporting a culture rooted in our core principles of integrity, determination, and innovation. In all CPT's collaboration efforts, our team prioritizes communication, accountability, and being resourceful to maximize efficiency and results.
What's In It for You
Leadership training
Career professional development
Tuition reimbursement
Flexible hours
Work/Life balance
Rewards and recognition
Parental Leave
Command Post Technologies, Inc. (CPT) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) founded in 2008 and headquartered in Suffolk, VA with personnel in various states including Virginia, Maryland, Florida, and Texas. With 2/3 of our staff being former military, CPT firmly believes in employing veterans. Command Post Technologies, Inc. is a unique provider of innovative solutions that enhance our corporate clients' productivity and empower our government clients with the ability to protect against all enemies: foreign and domestic. CPT adapts its successful military experiential approach to the needs of leaders in a global business environment and provides an elite leadership curriculum that results in a world-class, leadership-altering event.
Command Post Technologies Inc. (CPT) is an Equal Employment Opportunity and Affirmative Action employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identify, gender expression, sex, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. We take Affirmative Action to ensure equal opportunities for employees and potential employees without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sex, sexual orientation, marital status, veteran status, disability genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.?
We abide by the Pay Transparency Nondiscrimination Provision and will refrain from discharging or otherwise discriminating against employees or applicants who inquire about, discuss, or disclose their compensation or the compensation of other employees or applicants. An exception exists where the employee or applicant makes the disclosure based on information obtained while performing his or her essential job functions.
Mid-Level Cyber/Watch Floor Analyst
Information security analyst job in Huntsville, AL
Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk.
BASIC QUALIFICATIONS:
Minimum of 5 year of Splunk/SOC experience.
Bachelor's in a computer science related field
Active Top Secret Clearance
Ability and willingness to do shift work
MAIN RESPONSIBILITIES:
Responsible for monitoring computer networks for security issues.
Investigating security breaches and other cybersecurity incidents.
Document security breaches and assess the damage they cause.
Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.
Fix detected vulnerabilities to maintain a high-security standard.
Recommend best practices for IT security.
Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs.
Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files.
Decrypts data and provides technical summaries and input.
Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.
Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
PREFERRED QUALIFICATIONS
Microsoft Sentinel
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment.
All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.
Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
Powered by JazzHR
6IxgcPuXI3
Cyber Threat Emulation Analyst
Information security analyst job in Huntsville, AL
Job Description
or
Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
What You'll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
Measure defense-in-depth effectiveness against known vulnerabilities
Generate vulnerability assessment reports and escalate findings for review
Support enterprise Incident Response in accordance with DoD regulations and instructions
Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
What You Bring
Basic Requirements:
Must have 6, or more, years of general (full-time) work experience
Must have 4 years of combined experience with:
Performing manual or automated penetration tests in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
Must have 1 year of experience in management or leadership in a team environment
Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
Must have, or obtain within 6 months of start date, a PenTest+ certification
Must have an active DoD Secret Security Clearance
Desired Requirements:
Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field
Have experience with Cyber Threat Emulation tools, policies, and procedures
Have experience operating custom software on a Linux platform
Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
Be able to mentor and train personnel in a high-paced environment
Be familiar with DoD Security Operations Centers (SOC/CSSP)
Be familiar with DCO/CSSP-guiding security policies and procedures
Have an active DoD Top Secret clearance
Why LaunchTech?
At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence.
We offer competitive benefits, including:
Medical, Dental, and Vision coverage
401(k) with company match
Paid Time Off (PTO)
Opportunities to make a meaningful impact while advancing your career
And more
Ready to Join the LaunchTech Crew?
If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you.
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Powered by JazzHR
CkYm1Mbb4K
Cyber Security Analyst 2
Information security analyst job in Birmingham, AL
+ This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena.
+ The position is focused on cyber-physical security research for Transmission and Distribution.
+ The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches.
+ Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events.
+ Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems.
**Description:**
+ This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department.
+ The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution.
+ Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability.
**Qualification Requirements**
+ Experience in cybersecurity, including cyber security modeling and simulation
+ Experience with intrusion detection and risk assessment frameworks is required
+ Experience in power system modeling and simulation
+ Experience with data analytics including machine learning required
+ Experience with computer programming (Python, C#, SQL) desired
**Job Responsibilities:**
+ Develop research plan to evaluate new technology
+ Manage multiple tasks at one time
+ Provide documentation of study assumptions and methods used to arrive at results
+ Provide informative reports and presentations on projects
+ Some overnight travel may be required but this is not extensive.
**Other Knowledge, Skills & Abilities**
+ Must demonstrate good communication skills, both internal and external to the company
+ Must have excellent organizational skills
+ Must possess analytical skills as well as the ability to manage multiple projects simultaneously
+ Must work well in a team environment
+ Must have the ability to manage your own work schedule and work with limited direction
+ Must have strong initiative - a self-starter
+ Must be great at problem solving
**Education:**
+ Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required
+ Advanced degree in EE, computer science or other related fields strongly preferred.
**About US Tech Solutions:**
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** .
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Information Security Analyst
Information security analyst job in Doral, FL
SGP Recruiting provides both operations and strategic support to Tribal 8(a) and commercial organizations. Our client is a CVE-verified Veteran-Owned Small Business (VOSB) and a proud ISO 9001:2015 certified organization specializing in systems integration and enterprise management solutions. As a trusted GSA MAS contract holder, they deliver mission-critical telecommunications, network infrastructure, and IT services to Federal, State, and Local Government agencies, the U.S. Military, and private-sector clients.
They are seeking a motivated, career and customer-oriented Information Security Analyst in Doral, FL. Possible other locations for this position: Key West, Newport (FL), and Naval Station Guantánamo Bay (NSGB). Join a team dedicated to Meeting today's mission demands requires more than just technology - it requires the right people, the right expertise, and the right partners working together with precision and purpose. Propel your career forward and be part of something extraordinary.
Salary Range - $85 - 90K Annually.
Employment - Full time
Worksite Type - Onsite
Security Clearance Required - Secret
Responsibilities include but are not limited to:
· Design, development, and maintenance of insightful and actionable. The Cybersecurity Analyst is responsible for the design, development, and maintenance of insightful and actionable dashboards using the ConstantView platform dashboards using the ConstantView platform.
· Possess a high level of expertise in ConstantView's functionalities, data visualization techniques, and data analysis methodologies.
· Lead the development of dashboards that effectively translate complex data into clear and concise visual representations, enabling stakeholders to gain valuable insights and make informed decisions.
· Includes collaborating with business users to understand their information needs, identifying relevant data sources, and designing dashboards that align with business objectives.
· Manipulate and transform data, apply appropriate visualizations, and ensure the accuracy and reliability of dashboard outputs.
· They also maintain existing dashboards, troubleshoot issues, and implement enhancements based on user feedback and evolving business requirements.
· They possess a strong understanding of data modeling, SQL querying, and data governance principles and can communicate technical concepts to non-technical audiences.
· The Information Systems Specialist III provides direction and mentorship to subordinate staff.
Minimum Qualifications:
· Bachelor's degree in information systems, Computer Science, Data Analytics, or 4+ years of additional experience related field in lieu of a required Bachelor's degree
· 9+ years of relevant Information Systems Specialist experience.
· Experience in data analysis and reporting, with a significant portion focused on dashboard development.
· Proven expertise in using Constant View for dashboard creation and maintenance.
· Strong understanding of data visualization principles and best practices.
· Experience with data manipulation and transformation techniques using SQL or other tools. Experience with data modeling and database design concepts. Relevant ConstantView certifications (e.g., developer, administrator). Training or certifications in data visualization tools and techniques.
Desired Qualifications:
· Master's degree in a relevant field. Experience with other data visualization platforms (e.g., Tableau, Power BI).
· Experience with data storytelling and presentation skills. Experience with data governance and data quality management.
· Experience with agile-informed development methodologies.
· Experience with statistical analysis and data mining techniques.
· Certifications in relevant programming languages (e.g., Python, R). Certifications in data science or data engineering.
· Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
Our client provides a variety of benefits including company-paid health, dental & vision insurance coverage, as well as additional employee-paid health insurance options; company-paid life and disability insurance; 401k retirement savings plan with employer match; 10 company paid holidays per year, and paid time off.
Our client also considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
Auto-ApplyInformation Security Specialist (US) - Penetration Tester
Information security analyst job in Fort Lauderdale, FL
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist - Penetration Tester defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Responsibilities:
* Conduct Penetration Tests: Perform thorough and methodical penetration testing on web applications, mobile, AI, network infrastructures, and other systems to identify security vulnerabilities.
* Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
* Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
* Develop and Execute Test Plans: Design and execute detailed test plans
* Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
* Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements.
* Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
* Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications :
* Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
* Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
* Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
* Familiarity with security standards and frameworks Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyINFORMATION SECURITY ANALYST III - 73002976
Information security analyst job in Tallahassee, FL
Working Title: INFORMATION SECURITY ANALYST III - 73002976 Pay Plan: Career Service 73002976 Salary: $57,000.00 - $63,000.00 / annually Total Compensation Estimator Tool
Florida Department of Revenue
Information Services Program
Information Security Analyst III
Tallahassee
This is an Internal Agency Advertisement
If you have a desire to use your talent and skills at an organization that provides critical services to millions of individuals, businesses and families across the state, the Florida Department of Revenue invites you to apply to become an essential member of our team. We are committed to maintaining a diverse workforce and providing employment opportunities to veterans and individuals who have a disability. To learn more about the Department of Revenue's excellent array of benefits, including career training, tuition waivers, paid vacations, insurance, and retirement programs, visit our website.
JOB SUMMARY:
This is an advanced level support as an Information Security Analyst III position on the DOR Governance, Risk, and Compliance (GRC) Team, located in the Information Systems Program in Tallahassee. Cybersecurity is one of the fastest growing fields with endless opportunities for monitoring and mitigation of security threats. Customer service, time management, and effective communication are extremely important for this role. The incumbent serves as the point of contact regarding Risk Management on the Security GRC Team. This is independent work conducting organizational studies and evaluations, conducting risk assessments, business impact analysis assessments, providing technical assistance, and developing process and procedures to assist the organization in the analysis, assessment, and control of risks. May include program analysis, management consulting, and examination development.
MINIMUM REQUIREMENTS:
* Currently employed with the Florida Department of Revenue.
* Four years or more experience working in Information Technology or Information Security.
* Two years or more providing guidance to managers and their staff.
* Experience collaborating with various stakeholders, teams, or executive management.
* Experience conducting research and analyzing complex data, requirements, and information.
* Experience planning, organizing, and coordinating efforts across an organization.
* One year experience with NIST Risk Management Framework.
* Working knowledge and experience in Microsoft Office applications, specifically, Excel and Word.
PREFERENCES:
* Experience with ISO/IEC 20000.
* Experience with F.A.C. 60GG-2.
* Experience with NIST Cybersecurity Framework.
* Experience with cybersecurity rules and IRS Pub 1075.
* Experience utilizing SharePoint.
* Experience documenting processes, policies, and procedures.
* Advanced level experience in Microsoft Office Suite.
* Experience using project management, IT task management, Change Management, or other audit-related software.
* Strong verbal and written communication skills with the ability to communicate appropriately with technicians, as well as management.
SPECIAL NOTES:
* Failing to respond, or providing a response such as "see resume," "n/a" or similar, to a qualifying question that requires an explanatory response will disqualify the applicant from further consideration.
* This position is located in Tallahassee.
* This position is not eligible for telework.
* The tentative salary for this position is $60,000.00 annually.
SALARY: $57,000.00 - $63,000.00 / annually
BENEFITS:
Benefits include, but are not limited to, health insurance, life insurance, tuition waivers, paid sick and personal leave, paid parental leave, 10 paid holidays annually, retirement savings, and vision and dental insurance.
ADDITIONAL INFORMATION YOU NEED TO KNOW
CONTACT INFORMATION: Sangeetha Mohan Doss, **************, **************************************.
SCREENING DISCLAIMER: Your responses to qualifying questions must be verifiable by skills and/or experiences you stated on your candidate profile and/or resume.
SKILLS VERIFICATION TEST OR ONLINE SKILLS ASSESSMENT: If you meet the minimum job requirements, we might require you to take a skills verification test or an online skills assessment to be considered for an interview.
CANDIDATE POOL: Future vacancies may be filled from this advertisement for a period of up to six months.
CRIMINAL BACKGROUND CHECKS: You will be required to undergo a National Level-2 criminal background check which requires you to provide your fingerprints.
REMINDER: Male candidates born on or after October 1, 1962, will not be eligible for hire or promotion unless they are registered with the Selective Services System (SSS) before their 26th birthday or have a Letter of Registration Exemption from the SSS. For more information, please visit the SSS website at *******************
The State of Florida is an Equal Opportunity Employer/Affirmative Action Employer, and does not tolerate discrimination or violence in the workplace.
Candidates requiring a reasonable accommodation, as defined by the Americans with Disabilities Act, must notify the agency hiring authority and/or People First Service Center (***************. Notification to the hiring authority must be made in advance to allow sufficient time to provide the accommodation.
The State of Florida supports a Drug-Free workplace. All employees are subject to reasonable suspicion drug testing in accordance with Section 112.0455, F.S., Drug-Free Workplace Act.
VETERANS' PREFERENCE. Pursuant to Chapter 295, Florida Statutes, candidates eligible for Veterans' Preference will receive preference in employment for Career Service vacancies and are encouraged to apply. Certain service members may be eligible to receive waivers for postsecondary educational requirements. Candidates claiming Veterans' Preference must attach supporting documentation with each submission that includes character of service (for example, DD Form 214 Member Copy #4) along with any other documentation as required by Rule 55A-7, Florida Administrative Code. Veterans' Preference documentation requirements are available by clicking here. All documentation is due by the close of the vacancy announcement.
Location:
Easy ApplyCyber Forensic Analyst III (Onsite - Saint Petersburg, FL)
Information security analyst job in Plantation, FL
WHO WE ARE:
ELYON provides the Program Management for its Channel of Commercial Technology companies in Government that consist of Small Businesses and New Technology start-ups.
ELYON advocates for policies that can improve government services and maintain our government's competitive advantage, by bringing more technology into government programs.
ELYON advocates on behalf of our nation's innovative, new technology and small businesses looking to work with the U.S. government. We do this by aligning the voice of our small business members with advocacy for change in federal policy that will make the government market more accessible to small businesses and the commercial technology ecosystem.
The Channel's founding Technical Board Members include former government leaders and IT executives passionate about bringing best-of-breed technology to the government.
We are seeking a skilled and experienced Cyber Forensic Analyst III to join our team!
Successful ELYON employees possess the following traits:
An ability to get things done: You are persistent, resourceful, results-oriented, and action oriented. You constantly plan ahead and foresee issues before they occur.
Analytical: In order to improve your comprehension of the market and the demands and problems of your clients, you have good analytical abilities and are at ease reading quantitative data.
Creative mind-set: You are able to solve problems creatively and swiftly adjust. You possess a thorough understanding of product management principles and the ability to apply them when analysing data and making recommendations.
Emotional Intelligence: You have a strong sense of self and excellent perception of how important relationships function. You are upbeat, sympathetic, adaptable, and inquisitive. Your genuineness, warmth, and competence help you win the respect of your co-workers.
Trustworthy: You have a strong sense of morality, principles, and purpose. You are trustworthy because of how you conduct yourself. You are a living example of the company's values.
Position Description:
We are seeking a highly skilled Cyber Forensic Analyst to support high-impact investigative and intelligence missions involving cybercrime, cryptocurrency, and financial crime. You will work alongside federal agency teams, partner law enforcement agencies, and regulatory bodies to conduct technical and financial investigations. This role requires expertise in analyzing complex cyber threats, blockchain transactions, digital assets, and hidden wealth strategies.
You'll need to bring both analytical rigor and a tenacious, detail-oriented mindset to help us trace digital breadcrumbs in support of critical investigations across national security and criminal enforcement efforts.
Multiple options: St Petersburg, FL
Key Responsibilities
Cybercrime Investigative Case Support
Work directly on cases with a cyber nexus in collaboration with law enforcement teams and external partners, using advanced investigative tools and techniques:
Conduct cryptocurrency tracing and analysis using blockchain forensics tools.
Gather and analyze dark web intelligence to identify threat actors, forums, and illicit activity.
Perform data analytics to uncover patterns, relationships, and anomalies.
Analyze electronic evidence, including servers, hard drives, communications, and OSINT sources.
Draft subpoenas targeting financial institutions and cryptocurrency exchanges.
Participate in inter-agency meetings with law enforcement, prosecutors, and other stakeholders.
Identify overlapping financial transactions and alternative stores of wealth, such as:
Prepaid and store gift cards
Monetary instruments
NFTs and digital assets
Cold/public crypto wallets
High-end real estate and luxury goods
Cyber-Financial Investigative Support
Assist in comprehensive financial tracing operations involving both fiat and digital currencies:
Analyze bank records, wire transfers, and credit card transactions to track illicit funds.
Draft targeted subpoena requests to financial institutions and crypto platforms.
Participate in investigative interviews under agency direction.
Identify and correlate layered financial networks and hidden asset channels.
Apply knowledge of financial laws and frameworks, including:
Bank Secrecy Act (BSA)
Asset Forfeiture practices
Money Laundering statutes
OFAC and sanctions compliance
Required Qualifications
8+ years of direct experience in cybercrime investigations, blockchain analysis, or digital forensics.
Security Clearance Required: Active Secret or above preferred
Proven experience with cryptocurrency investigations, darknet operations, or forensic platforms (e.g., Chainalysis, TRM, CipherTrace).
Familiarity with financial investigative techniques, including subpoena processes and transactional analysis.
Strong working knowledge of cyber law, digital evidence handling, and financial crime statutes.
Excellent interpersonal and written communication skills; ability to draft clear, concise, and actionable reports.
Ability to work independently in a fast-paced, mission-driven environment.
Preferred Qualifications
Prior experience supporting federal investigations preferred (FBI, DHS, IRS-CI, HSI, etc.).
Certifications such as CFE, CFCE, GCFA, CFCI, or CAMS
Familiarity with blockchain intelligence platforms and open-source investigation tools.
Understanding of evolving technologies in digital assets and cyber-enabled crime.
Why Join Us
Work on cutting-edge investigations with national impact.
Collaborate with elite teams fighting complex financial and cyber threats.
Opportunity for professional growth, certifications, and hands-on casework.
Competitive salary, benefits, and mission-driven culture.
Benefits:
Paid sick leave, Medical/Dental (optional), 401 (k) Retirement Plan (optional), Employer Paid Life Insurance, Employer Paid Short Term Disability, Optional Life Insurance.
ELYON International, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Advanced Acquisition Analyst/Cyber Security Analyst/CompTIA Certified
Information security analyst job in Redstone Arsenal, AL
Support the Missile Defense Agency (MDA) with development and analysis of programmatic data for program management support, to include monitoring and reporting against the acquisition program baselines, and assistance with program oversight and execution briefings. Alternative responsibilities may encompass development and execution of acquisition strategies/plans, contract requirements packages (e.g., writing SOWs, CDRLs, special provisions, source selection evaluation plans) and supporting prime contract monitoring/management activities. CompTIA Certification Preferred.
Certified Authorization Professional (CAP) certification (or ability to attain within 90 days after employment)
Provide interpretation and execution of MDA Acquisition policy, directives, guidance, and instructions
Provide program management support in developing, maintaining, and reporting against program baselines, gathering and analyzing programmatic data for internal Agency oversight reviews of programs (e.g., MDAR, DPR, PER, PMRs, internal reviews)
Prepare briefings and correspondence in response to internal taskings and external RFIs (e.g., GAO/Congressional/DoDIG/DoD oversight organizations)
Analyze acquisition requirements and provide recommendations during pre-solicitation phase through contract execution
Support program and contract management processes through the preparation and/or review of acquisition and program management documentation, briefings, white papers, reports, metrics
Provide support through all phases of the acquisition cycle with an emphasis on cybersecurity throughout the process
Requirements
Prior MDA experience preferred.
Advanced level - Master's degree required and/or 15 years' experience
Intermediate level - Bachelor's degree required and/or 10 years' relevant experience
Knowledge and experience in acquisition, procurement, and contracting highly desirable
Solid background in MS Office tools suite (e.g., Word, Excel, PowerPoint, Access) essential
Must possess exceptionally strong communications and analytical skills, be a self-starter, detail oriented, work well with a team, interacts with multiple levels and functional areas and able to manage customer and contractor relationship
SECRET or above Security Clearance required.
Network Security II (Boundary)
Information security analyst job in Montgomery, AL
DLS Engineering is seeking a Network Security II (Boundary) professional for a full-time position in support of the Air Force Intranet Control (AFINC) program at Gunter Annex in Montgomery, Alabama. This is an on-site position.
As part of AFINC, the mission of the 26th Network Operations Squadron (26 NOS) is to provide mission assurance to the warfighter through the operation, management, and defense of the Department of Defense Information Network (DODIN). In the execution of its mission, the 26 NOS maintains network infrastructure, to include routers, switches, proxies, firewalls, servers, workstations, printers, Storage Area Networks (SAN) and test labs, to provide maneuverability and defense of both classified and unclassified networks.
A day in the life:
Install, monitor, configure, troubleshoot, upgrade, patch, harden, maintain, and operate intrusion detection/prevention systems, firewalls, load balancers, and web proxies to protect AFNet resources from both internal and external threats according to Department of Defense security standards
Perform complex analytics on boundary protection systems to protect system assets from compromise, data loss, and other requirements. Perform Defense Cyberspace Operations (DCO) and DODIN operations.
When I read the below it sounds like me:
5+ years of experience with Enterprise DOD boundary protection and CSSP operations.
IAT-II Certification (required)
Palo Alto: Network Security Professional OR Cisco Certified Network Administrator (CCNA) OR Palo Alto Networks Certified Network Security Administrator (PCNSA)
Active Secret Clearance
Other information:
We offer a competitive salary and a 401k program with company match.
We offer a comprehensive benefits package including health, vision, dental, life, and disability insurance.
We offer a generous paid time off package
If accommodation is needed with the application and / or the interview process for applicants with disabilities, please contact Human Resources at ************.
DLS is an E-Verify company.
DLS is an equal employment opportunity employer. Qualified applicants will receive consideration without regard to age, race, religion, sex (pregnancy, sexual orientation, gender identity), national origin, or disability. We encourage all qualified applicants to apply. If you believe you have been discriminated against, please contact Barbara Ellison. You also have the right to file a charge of discrimination with the equal employment opportunity commission.
Must be able pass a government background check, which will be completed before employment.