Post job

Information security analyst jobs in Monroeville, PA - 58 jobs

All
Information Security Analyst
Securities Analyst
Security Engineer
Security Architect
Cyber Security Specialist
Cyber Security Engineer
Information Security Engineer
Senior Security Engineer
Security System Engineer
Senior Security Analyst
Information Assurance Engineer
Information Security Officer
  • Cyber Security Specialist

    First National Bank of Pennsylvania 3.7company rating

    Information security analyst job in Pittsburgh, PA

    Primary Office Location:626 Washington Place. Pittsburgh, Pennsylvania. 15219.Join our team. Make a difference - for us and for your future. Cyber Security Specialist Business Unit: Risk Management Reports to: Manager of Cyber Security Position Overview: This position is primarily responsible for performing all procedures necessary to ensure the safety of information systems assets and protecting systems from intentional or inadvertent access or destruction under the supervision of the Manager of Cyber Security. The incumbent demonstrates the ability to develop IT security standards and procedures, has demonstrated knowledge and understanding of IT industry trends and emerging technologies and an ability to relate them to the corporation and it's objectives. Primary Responsibilities: Investigates, escalates and documents cyber security events or incidents according to standard operating procedures (SOP), as needed. Writes comprehensive reports of incident investigations. Evaluates and improves Security Information and Event Management (SIEM) rule set based on threat and vulnerability indicators. Analyzes information from variable threat sources and provide necessary awareness to management, IT and impact business areas. Tracks remediation of identified issues based on incident investigations. Utilizes forensic resources to understand event impacts and generates incident reports. Assists management in preparation of reports of current threats. Uses PowerShell scripting or other programming languages to automate tasks. Leverages various toolsets to gain awareness of potentially suspicious activity and alerts to threats, intrusions and/or compromises. Performs other related duties and projects as assigned. All employees have the responsibility and the accountability to serve as risk managers for their businesses by understanding, reporting, responding to, managing and monitoring the risk they encounter daily as required by F.N.B. Corporation's risk management program. F.N.B. Corporation is committed to achieving superior levels of compliance by adhering to regulatory laws and guidelines. Compliance with regulatory laws and company procedures is a required component of all position descriptions. Minimum Level of Education Required to Perform the Primary Responsibilities of this Position: BA or BS Minimum # of Years of Job Related Experience Required to Perform the Primary Responsibilities of this Position: 3 Skills Required to Perform the Primary Responsibilities of this Position: Excellent communication skills, both written and verbal Excellent customer service skills Excellent project management skills Detail-oriented Strong security background in network/systems/physical security, authentication, authorization and usability. Comprehensive knowledge of the OSI model. Working knowledge of packet collection and analysis tools. Licensures/Certifications Required to Perform the Primary Responsibilities of this Position: Valid Drivers License CISSP, Security+, Network+, GCIA, GCIH, CEH, CISM, CSX Physical Requirements or Work Conditions Beyond Traditional Office Work: Heavy Lifting over 45 lbs. Equal Employment Opportunity (EEO): It is the policy of FNB not to discriminate against any employee or applicant for employment because of his or her race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, or status as a protected veteran. FNB provides all applicants and employees a discrimination and harassment free workplace.
    $86k-120k yearly est. 5d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information Security Sr Specialist

    Citizens 2.9company rating

    Information security analyst job in Pittsburgh, PA

    This role is for a Data Protection Analyst working in the Data Discovery and Protection Program. The Analyst is responsible for supporting, developing, and enhancing the Data at Rest Protection Program for both on-premise and cloud environments. The colleague will engage with Business Units across the organization, produce metrics and documentation, and implement and support tools related to the data protection program. A successful candidate will: + Assess existing scanning program to implement cloud scanning capabilities + Assist in deployment and maintenance of data scanning tools + Partner with other groups within the organization to identify and remediate data at rest access risk. + Work with risk partners to identify controls, determine control adequacy, and identify control monitoring opportunities and areas for improvement/enhancement + Assist in collecting, analyzing, and interpreting data access information and remediate permission compliance issues based on company security standards + Discern patterns of complex threat actor behavior, communicate an understanding of current and developing Cyber threats to key stakeholders, and stay current with emerging trends and threats in the field of insider threat Qualifications Required: + Understanding of information security concepts, best practices, and regulations related to data loss prevention + Understanding of enterprise security and networking technology and how the technology relates to the prevention, detection, and response of data loss + Advanced understanding of the Microsoft Office suite (e.g., Outlook, Word, Excel, PowerPoint, etc) + Excellent verbal and written communication skills (including but not limited to: correct English usage, grammar, spelling, punctuation, vocabulary, etc.). + Ability to execute work independently and as a team member with good interpersonal skills - using tact, patience and courtesy. + Experience as a security consultant + Working knowledge of cloud topology + Knowledge of file share security and Windows ACL administration + Familiarity with the Financial Services Industry + Knowledge of varying cloud platforms + Familiarity with cloud security at major cloud service providers + Certifications: Associate of (ISC)^2, CISSP, or similar. Education: + Bachelor's degree in Information Security, Computer Science or a related field OR + Bachelor's degree in Business or other field + 3 years relevant experience + Equivalent years: BA/BA = HS + 5 years of experience Pay Transparency The salary range for this position is $97,049 - $145,574 per year. Actual pay is based on various factors including but not limited to the work location, and relevant skills and experience. We offer competitive pay, comprehensive medical, dental and vision coverage, retirement benefits, maternity/paternity leave, flexible work arrangements, education reimbursement, wellness programs and more. Note, Citizens' paid time off policy exceeds the mandatory, paid sick or paid time-away policy of every local and state jurisdiction in the United States. For an overview of our benefits, visit ************************************** . Some job boards have started using jobseeker-reported data to estimate salary ranges for roles. If you apply and qualify for this role, a recruiter will discuss accurate pay guidance. Equal Employment Opportunity Citizens, its parent, subsidiaries, and related companies (Citizens) provide equal employment and advancement opportunities to all colleagues and applicants for employment without regard to age, ancestry, color, citizenship, physical or mental disability, perceived disability or history or record of a disability, ethnicity, gender, gender identity or expression, genetic information, genetic characteristic, marital or domestic partner status, victim of domestic violence, family status/parenthood, medical condition, military or veteran status, national origin, pregnancy/childbirth/lactation, colleague's or a dependent's reproductive health decision making, race, religion, sex, sexual orientation, or any other category protected by federal, state and/or local laws. At Citizens, we are committed to fostering an inclusive culture that enables all colleagues to bring their best selves to work every day and everyone is expected to be treated with respect and professionalism. Employment decisions are based solely on merit, qualifications, performance and capability. Why Work for Us At Citizens, you'll find a customer-centric culture built around helping our customers and giving back to our local communities. When you join our team, you are part of a supportive and collaborative workforce, with access to training and tools to accelerate your potential and maximize your career growth Background Check Any offer of employment is conditioned upon the candidate successfully passing a background check, which may include initial credit, motor vehicle record, public record, prior employment verification, and criminal background checks. Results of the background check are individually reviewed based upon legal requirements imposed by our regulators and with consideration of the nature and gravity of the background history and the job offered. Any offer of employment will include further information.
    $97k-145.6k yearly 40d ago
  • Information Assurance Engineer

    General Dynamics Mission Systems 4.9company rating

    Information security analyst job in Pittsburgh, PA

    Basic Qualifications Requires a Bachelor's degree in Engineering, or a related Science, Technology or Mathematics field. Also requires 2+ years of job-related experience, or a Master's degree and 6 months of job-related experience. CLEARANCE REQUIREMENTS: Ability to obtain a Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Responsibilities for this Position Knowledge, Skills and Abilities: Supports the development of RMF body of evidence for security requirements, including security plans, security testing plans, Security Control Traceability Matrices, and System Impact Analyses. Performs routine security verification tasks using manual and automated methods (Cyber Test Procedures and vulnerability scans). Supports the execution of Assessment and Authorization events. Collaborates with Development and Test teams to plan, implement, and support the verification of security requirements. Actively participates in an Agile team to organize, prioritize, and status work efforts. Champions security perspective for decisions related to implementing and verifying security controls in high-security, cloud-native DevSecOps environments. Self-directed and self-starting ability. Strong written and verbal communication skills. Excellent ability to communicate issues, impacts, and corrective actions. Strong security mindset and comfortable questioning system behavior inconsistent with key security principles. Familiar with NIST SP 800-53 & Risk Management Framework (RMF). Experience with FedRAMP is a plus. Familiar with Linux and Windows operating systems and their security features. Experience with Secure Technical Implementation Guides (STIGs). Understanding of the RMF Assessment and Authorization process. Experience with automation, virtualization, containerized application deployment and orchestration, and cloud-native solutions Strong use and understanding of systems engineering concepts, principles, and theories. Contributes to the achievement of business objectives. Recognizes and incorporates various security designs and lessons learned. Able to sell concepts and ideas effectively. Able to work directly with customers. Proficient in reporting relevant cyber systems engineering design. Regular contact with senior levels of security workgroups. Ability to lead security workgroups. Works under limited direction. Frequent contact with project leaders, other professionals within the Engineering department, project teams, and external customers' security professionals. Creative thinker and good multi-tasker. Strong understanding of Microsoft Office applications. Must be able to obtain a TS/SCI Clearance within six months after hire #LI-Hybrid Salary Note This estimate represents the typical salary range for this position based on experience and other factors (geographic location, etc.). Actual pay may vary. This job posting will remain open until the position is filled. Combined Salary Range USD $95,384.00 - USD $105,817.00 /Yr. Company Overview General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 12,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high-performance team! Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $95.4k-105.8k yearly Auto-Apply 48d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Information security analyst job in Pittsburgh, PA

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $88k-121k yearly est. Easy Apply 6d ago
  • Cyber Security Specialist

    First National Trust Company

    Information security analyst job in Pittsburgh, PA

    Primary Office Location:626 Washington Place. Pittsburgh, Pennsylvania. 15219.Join our team. Make a difference - for us and for your future. Cyber Security Specialist Business Unit: Risk Management Reports to: Manager of Cyber Security Position Overview: This position is primarily responsible for performing all procedures necessary to ensure the safety of information systems assets and protecting systems from intentional or inadvertent access or destruction under the supervision of the Manager of Cyber Security. The incumbent demonstrates the ability to develop IT security standards and procedures, has demonstrated knowledge and understanding of IT industry trends and emerging technologies and an ability to relate them to the corporation and it's objectives. Primary Responsibilities: Investigates, escalates and documents cyber security events or incidents according to standard operating procedures (SOP), as needed. Writes comprehensive reports of incident investigations. Evaluates and improves Security Information and Event Management (SIEM) rule set based on threat and vulnerability indicators. Analyzes information from variable threat sources and provide necessary awareness to management, IT and impact business areas. Tracks remediation of identified issues based on incident investigations. Utilizes forensic resources to understand event impacts and generates incident reports. Assists management in preparation of reports of current threats. Uses PowerShell scripting or other programming languages to automate tasks. Leverages various toolsets to gain awareness of potentially suspicious activity and alerts to threats, intrusions and/or compromises. Performs other related duties and projects as assigned. All employees have the responsibility and the accountability to serve as risk managers for their businesses by understanding, reporting, responding to, managing and monitoring the risk they encounter daily as required by F.N.B. Corporation's risk management program. F.N.B. Corporation is committed to achieving superior levels of compliance by adhering to regulatory laws and guidelines. Compliance with regulatory laws and company procedures is a required component of all position descriptions. Minimum Level of Education Required to Perform the Primary Responsibilities of this Position: BA or BS Minimum # of Years of Job Related Experience Required to Perform the Primary Responsibilities of this Position: 3 Skills Required to Perform the Primary Responsibilities of this Position: Excellent communication skills, both written and verbal Excellent customer service skills Excellent project management skills Detail-oriented Strong security background in network/systems/physical security, authentication, authorization and usability. Comprehensive knowledge of the OSI model. Working knowledge of packet collection and analysis tools. Licensures/Certifications Required to Perform the Primary Responsibilities of this Position: Valid Drivers License CISSP, Security+, Network+, GCIA, GCIH, CEH, CISM, CSX Physical Requirements or Work Conditions Beyond Traditional Office Work: Heavy Lifting over 45 lbs. Equal Employment Opportunity (EEO): It is the policy of FNB not to discriminate against any employee or applicant for employment because of his or her race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, or status as a protected veteran. FNB provides all applicants and employees a discrimination and harassment free workplace.
    $80k-113k yearly est. Auto-Apply 60d+ ago
  • AI Security Architect

    BNY External

    Information security analyst job in Pittsburgh, PA

    AI, Security Architect At BNY, our culture allows us to run our company better and enables employees' growth and success. As a leading global financial services company at the heart of the global financial system, we influence nearly 20% of the world's investible assets. Every day, our teams harness cutting-edge AI and breakthrough technologies to collaborate with clients, driving transformative solutions that redefine industries and uplift communities worldwide. Recognized as a top destination for innovators, BNY is where bold ideas meet advanced technology and exceptional talent. Together, we power the future of finance - and this is what #LifeAtBNY is all about. Join us and be part of something extraordinary. We're seeking a future team member for the role of AI Security Architect to join our Cybersecurity team. This role can be in Pittsburgh, PA or Lake Mary, FL or NYC, NY. Overview BNY is seeking a AI Security Architect to lead the design, implementation, and governance of security controls for AI/ML systems across the enterprise. This role will define the target architecture and security patterns for AI-enabled products and platforms, ensuring resilient, compliant, and trustworthy AI. The ideal candidate combines deep expertise in cybersecurity and cloud with hands-on knowledge of modern AI/ML infrastructure, data protection, adversarial threat models, and secure MLOps. Primary Responsibilities Define enterprise AI security architecture: develop reference architectures, guardrails, and standards for secure data pipelines, model training/inference, and AI-integrated applications across on-prem and cloud. Secure MLOps/ML platforms: architect identity, secrets management, network segmentation, and least-privilege access for feature stores, model registries, orchestration, and deployment pipelines. Data protection by design: establish controls for sensitive data ingestion, anonymization/pseudonymization, encryption (at rest/in transit), tokenization, and lineage across AI workflows. Adversarial ML defense: design controls and tests for model poisoning, evasion, model theft/exfiltration, prompt injection, jailbreaking, data leakage, and output manipulation. AI supply chain security: govern third-party models, APIs, and datasets; enforce SBOMs for AI components; evaluate provenance, licensing, and dependency risk. Policy and governance integration: translate AI security requirements into actionable standards and control evidence; align with enterprise risk, compliance, and model governance processes. Threat modeling and security testing: lead threat modeling for AI systems; design red-teaming and secure evaluation methods for models and agents; integrate chaos/resilience testing. Secure development lifecycle: embed AI-specific security checks (static/dynamic scans, IaC policy-as-code, data quality gates, bias/robustness checks) into CI/CD and change management. Runtime protection: implementing guardrails, content filters, output validation, rate limiting, anomaly detection, and monitoring for AI services and agentic workflows. Observability and incident response: define logging/telemetry (model inputs/outputs, drift, performance, safety events); integrate AI-specific playbooks into SOC operations. Zero Trust for AI: design identity-aware access, micro-segmentation, and continuous verification for data scientists, services, and agents. Privacy and ethics controls: partner with privacy and legal to operationalize consent, minimization, purpose limitation, and responsible AI guardrails, including human-in-the-loop where appropriate. Resilience and continuity: design disaster recovery, backup/restore, model reproducibility, and contingency plans for AI platforms and critical use cases. Vendor/platform assessments: evaluate cloud AI services, open-source frameworks, and commercial tools for security posture, compliance, and fit-for-purpose. Risk management: lead control testing and risk assessments for AI initiatives; document residual risks and remediation plans; support audits and regulatory queries. Reference implementations: deliver secure patterns, sample code, and automation (e.g., reusable Terraform/Policy-as-Code, secrets patterns, logging schemas) to accelerate adoption. Stakeholder leadership: partner with platform engineering, data science, enterprise architecture, cyber operations, and product teams to drive end-to-end secure outcomes. Coaching and enablement: build education and guidance for architects, data scientists, and engineers on secure AI practices, design patterns, and common pitfalls. Continuous improvement: track emerging threats, standards, and best practices; lead updates to architecture and controls; measure effectiveness via KPIs and control health. Required Qualifications 12+ years in cybersecurity/enterprise security architecture with 3+ years focused on AI/ML or data platform security at scale. Expertise in cloud security (AWS/Azure/GCP) including identity, secrets management, key management (KMS/HSM), network segmentation, and policy-as-code. Strong knowledge of AI/ML workflows: data ingestion/feature engineering, model training/inference, MLOps tooling (model registry, orchestrators, serving). Practical experience with adversarial ML concepts and defenses; familiarity with model robustness, prompt injection risks, and secure evaluation methods. Proficiency in designing observability/telemetry for AI systems (e.g., logging prompts/outputs, drift/quality metrics, safety events) with SIEM/SOAR integration. Hands-on with infrastructure-as-code (Terraform/CloudFormation), CI/CD, and secure SDLC practices tailored to data/ML systems. Deep understanding of data protection (encryption, tokenization, anonymization), privacy by design, and secure data lifecycle management. Strong stakeholder management and communication skills; ability to convert complex risks into clear architecture decisions and implementation guidance. Preferred Qualifications Experience architecting secure AI agents and LLM applications including guardrails, content filters, and output validation. Familiarity with standards and frameworks relevant to AI and data (e.g., NIST AI RMF, cloud CIS benchmarks, OWASP for ML/LLM, privacy controls). Background in model governance and risk management (e.g., testing for drift, bias, stability, and explainability) and integration with enterprise control frameworks. Programming/scripting proficiency (Python preferred) for reference implementations, automation, and security tooling integrations. Experience with container security, Kubernetes, service mesh, and microservices patterns in AI platforms. Prior leadership in enterprise-scale transformations, enabling secure adoption of AI across multiple business lines. At BNY, our culture speaks for itself, check out the latest BNY news at: BNY Newsroom BNY LinkedIn Here's a few of our recent awards: America's Most Innovative Companies, Fortune, 2025 World's Most Admired Companies, Fortune 2025 “Most Just Companies”, Just Capital and CNBC, 2025 Our Benefits and Rewards: BNY offers highly competitive compensation, benefits, and wellbeing programs rooted in a strong culture of excellence and our pay-for-performance philosophy. We provide access to flexible global resources and tools for your life's journey. Focus on your health, foster your personal resilience, and reach your financial goals as a valued member of our team, along with generous paid leaves, including paid volunteer time, that can support you and your family through moments that matter. BNY assesses market data to ensure a competitive compensation package for our employees. The base salary for this position is expected to be between $142,000 and $259,000 per year at the commencement of employment. However, base salary if hired will be determined on an individualized basis, including as to experience and market location, and is only part of the BNY total compensation package, which, depending on the position, may also include commission earnings, discretionary bonuses, short and long-term incentive packages, and Company-sponsored benefit programs. This position is at-will and the Company reserves the right to modify base salary (as well as any other discretionary payment or compensation) at any time, including for reasons related to individual performance, change in geographic location, Company or individual department/team performance, and market factors.
    $142k-259k yearly Auto-Apply 4d ago
  • Security Analyst

    Artech Infosystems

    Information security analyst job in Frazer, PA

    Artech Information Systems is the #1 Largest Women-Owned IT Staffing Company in the U.S. and an employer of choice for over 7,200 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. Job Title: Security Analyst Location: Pittsburgh, PA/ Lake Mary, FL / Nashville, TN Duration: 12 months contract with possible extension/ conversion FTE Job Description: Client is looking for a talented and self-motivated individual with strong technical skills and the ability to rapidly learn new technologies. We are looking for an exceptional candidate that shares our passion for delivering solutions to complex security problems, while maximizing productivity and minimizing employee friction. The candidate will contribute to IAMO Transformation program by aiding in the configuration and implementation of the new SailPoint LCM product. The candidate will perform business critical analysis to help with the implementation of application access requests and workflows across IAM. This role will support access provisioning, remediation for audit findings, workflow creation and modifications, and ensuring revocations and certifications are completed within the guidelines established by Corporate Policy. This position is critical to ensure Service Level Objectives and Internal project deadlines are met. The candidate will require increased technical and analytical skillsets and provide Sailpoint Product Support with a focus on: • Experience with designing, developing, testing, implementing, and integrating IGA solutions involving SailPoint Identity Now (IIQ). • Experience in SailPoint Identity IQ implementation and configuration for application on-boarding for access request and approval and access certifications o Configuration of simple and advanced LCM workflows within SailPoint o Creating and managing workgroups in SailPoint o Configuration and management of most common direct connectors (i.e. Active Directory, LDAP, Mainframe, etc.) o Creation of preventative and detective Segregation of Duty rules o Experience with role-based access controls and configuring automate provisioning and deprovisioning. • Train and mentor other team members on the use of the SailPoint Identity Now platform. • Experience with identity lifecycle flows including leaver, joiner, and mover. • Experience with consultative and complex technical deployment projects, managing various stakeholder relationships. • Strong knowledge and experience with incident/problem management processes. • Possess critical thinking skills. • Strong functional knowledge of MS Office Suite software products, Jira, and Confluence. • Strong communications skills, oral and written. • Ability to collaborate and interact productively with team members and key stakeholders. • Ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood and actionable manner. • Ability to effectively influence and convince others to make appropriate changes in their priorities and behaviors for the benefit of the organization. • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business. • Ensures integration end state protects information resources against unauthorized use, inappropriate degrees of access, disclosure, damage and/or loss. • Design and code rules, applications, workflows, custom tasks, custom connectors, UI pages and custom reports in SailPoint Identity Now. • Develop working relationship with IT engineering resources to drive solution features adoption. • Develop control adoption templates for IT resources to understand and implement connections required for the SailPoint Identity Now service. • Review SailPoint IGA to ensure the solution is optimized for the highest level of service and establish an ongoing practice to perform periodic reviews. • Interpret policies and standards with InfoSec, Risk and Compliance teams, ensuring policies and standards are properly followed by IAM control solutions. • Design and maintain flowchart diagrams, process workflows and standard documentation required to sustain the SailPoint platform. • Promote security policies, standards, and best practices across the organization. • Supports and resolves system incidents, problems, and changes. Qualifications 5 years of Sailpoint experience -Will consider experience over degree -Locations: Pittsburgh, Lake Mary or Nashville -2000+ applications to be migrated into sailpoint -Configure workflows -Create/manage work groups -Create duty rules -Invisio, Confluence, Jira, Excel Additional Information All your information will be kept confidential according to EEO guidelines.
    $68k-97k yearly est. 60d+ ago
  • Enterprise Security Architect

    Excellerent Solutions

    Information security analyst job in Pittsburgh, PA

    Enterprise Security Architect Duration: Full Time Interview mode: Inperson Brand new role Serve as a member of the enterprise architecture team, providing technical security insight that aligns with business objectives and security requirements. Establish and evangelize the security architecture (principles, policies, standards and patterns) to development groups, business groups and other stakeholders; Govern adherence to the architecture golden rules. Analyze gaps between current and target security architecture and develops plans to close the gaps. Responsibilities: Works with IT departments, information security architects, technical architects, data custodians, and governance groups to develop and update Client security policies, standards, procedures, and solutions for secure application architecture. Ensures that security practices are aligned with Client's overall business strategies. Advises and drives the security maturity of the development lifecycle including secure coding and system security for operations. Recommends and implements changes in security procedures and practices using best-in-class information to ensure that Client is maintaining best-in-class security practices. Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Conducts Penetration Test, Vulnerability, and Risk assessments to improve the security architecture and security product toolset. Prepares system security reports by collecting, analyzing, and summarizing data and trends. Executes validation by external vendors. Verifies security systems and network configurations by developing and implementing test scripts while monitoring adherence to standards in architecture, application design, development, and testing frameworks. Qualifications Qualifications: Bachelor degree with Master preferred. Security certification required. 7 to 10 years of experience operating in a cloud environment (e.g. Azure, AWS, Rackspace) along with at least 5 years working in a dedicated information security role with a focus on Security Architecture for at least 3 years. 7 to 10 years of experience with PaaS, IaaS, SaaS, and/or mobile architecture Solid experience with security hacking tools and techniques. Solid understanding in application architectures and technology including web applications, mobile technology, identity and access management, security event and incident management as well as web security controls (e.g. Web Application Firewall, Database Activity Monitor, Distributed Denial of Service controls, etc.) Extensive working knowledge of web application security best practices to include, but not limited to, Cloud Security Alliance controls matrix, OWASP Top 10. Experience with compliance standards such as HIPAA, CMS, SOX, GLBA; as well as security frameworks such as SANS 20 CSC, CoBIT, or NIST. Previous involvement with developing and/or maintaining an Enterprise Security Architecture. Familiarity with TOGAF is a plus Strong understanding and experience of software development methodologies and life cycles Excellent written and verbal communications skills required, with the ability to explain advanced concepts to audiences of varying levels Can be counted on to exceed goals successfully, very bottom-line orientated while steadfastly pushes self and others for results. Has working knowledge of web application security best practices to include, but not limited to, Cloud Security Alliance controls matrix, OWASP Top 10. Demonstrated ability to make sound decisions using a mixture of analysis, wisdom, experience, and judgement coupled with a strong ability to learn on the fly (quickly learns new tasks, open to change). Certifications, licenses or registrations: Security+, CISSP, CISA, CEH Proven ability to organize/manage multiple priorities coupled with the flexibility to quickly adapt to ever-changing business needs. Additional Information All your information will be kept confidential according to EEO guidelines.
    $117k-174k yearly est. 60d+ ago
  • Security Analyst

    Atria Group 4.2company rating

    Information security analyst job in Pittsburgh, PA

    We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges. In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India. We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career. Job Description MUST HAVE: Experience with implementing a vulnerability scanner Familiarity with both Windows and Linux platforms Experience with a log management system (Splunk, Elastic Search, etc) General understanding of incident management systems Experience patching operating systems/applications Experience configuring operating systems/applications Knows and applies the fundamental concepts, practices and procedures of IT security hardware, software, management software, and troubleshooting tools Candidate should have a strong knowledge of IT security, including demonstrated knowledge of current security trends and issues Ability to effectively and professionally communicate with customers and technical support staff at remote locations including team members in foreign countries; excellent verbal and written communication skills Highly self-motivated and flexible Manage priorities for timely completion of assignments Strong analytical and problem-solving skills Demonstrated success managing confidential/secure information with a high level of integrity NICE TO HAVE: Nessus experience HP Service Manager Additional Information Good comm skills are a big priority Duration: 3+ Months LOCALS PREFERRED Interview: Phone+F2F
    $65k-104k yearly est. 60d+ ago
  • Security Analyst/Engineer

    Limbach Facility Services LLC 4.4company rating

    Information security analyst job in Fernway, PA

    Who We Are… Since our founding in 1901, Limbach's primary core value has always been simple: We Care. That commitment extends to our people, our customers, and the communities we serve-driving a culture of belonging across our industry. Limbach Facility Services LLC, a subsidiary of Limbach Holdings, Inc., (NASDAQ: LMB), is a leading building systems solutions firm delivering mission-critical systems that support life's most important moments. We specialize in revitalizing and maintaining HVAC, mechanical, electrical, plumbing, and control systems within existing facilities-ensuring buildings are always ready to perform when it matters most. Learn more about Limbach by checking out our YouTube channel: We Are Limbach - YouTube From healthcare and education to government and commercial facilities, we partner with building owners and operators to safeguard reliability, efficiency, and comfort where it's needed most. Our vision is to create value for building owners targeting opportunities for long term relationships. Our purpose is to create great opportunities for people. Learn more about Limbach's commitment to our people and career opportunities, straight from our employees via the Limbach Unlocked podcast: Limbach Unlocked - Why We Chose Limbach We carry out our vision and purpose through a commitment to our four core values… We Care We Act with Integrity We Are Innovative We Are Accountable The Benefits & Perks… Base salary range of $130K - $140K Full portfolio of medical, dental, and vision benefits, along with 401K plan and company match. HSA, FSA, and life insurance offerings. Maximize your professional development with our award-winning Learning & Engagement team. Engage in our “We Care” culture through our ERGs, brought to you by EMBRACE. Career pathing flexibility and mobility. Who You Are… As Security Analyst / Engineer, you will serve as the organization's primary, hands-on security operations lead. Reporting directly to the CIO, the candidate will triage SOC outputs, tune detection logic, drive automated response through SOAR playbooks, own the vulnerability management lifecycle, and lead incident response from detection through remediation and post-incident lessons learned. They act as a trusted partner to our outsourced SOC, the quarterback for IR, and the technical voice to the CIO and Board on operational security posture working closely with our IT Operations leader. This Position… Some examples of the work you might do includes: Security Operations & Monitoring: Serves as the primary liaison to our outsourced SOC and vCISO. Triage, validate, and prioritize alerts from SIEM (e.g., Google Chronicle, GrayMatter, or equivalent). Ensures log integrity, enrichment, and actionable alerting. SOAR & Automation: Builds, maintains, and iterates SOAR playbooks (Google SOAR or comparable) to automate containment, enrichment, and evidence collection; lowers MTTR by automating low-risk actions while preserving human judgment for high-impact events. Incident Response: Lead detection → containment → eradication → recovery workflows. Owns post-incident reviews, creates remediation roadmaps, and tracks closure of corrective actions. Conducts regular tabletop exercises and maintains IR runbooks and escalation paths. EDR/MDR/XDR Management: Administers and tunes EDR/MDR/XDR platforms (deployment health, telemetry, detection rules, containment capabilities). Investigates endpoint events, performs root cause analysis, and coordinates remediation with IT operations. Vulnerability Management: Operates the vulnerability management program (Rapid7, Tenable.io, or equivalent): schedules scans, triages findings, prioritizes by risk and asset criticality, and shepherds remediation with engineering teams. Proposes and verifies system hardening measures and baselines. Detection Engineering: Authors correlation rules, analytic searches, and detection content; reduces false positives while increasing meaningful detections. Builds dashboards and KPIs that communicate detection coverage and efficacy. M&A & Integration Security: Leads security due diligence and integration activities for acquisitions: identities & accesses reviews, vulnerability scans, endpoint posture checks, and integration playbooks to onboard new entities into Limbach's security baselines. Training & Knowledge Transfer: Develops and delivers IR and detection training for IT and business teams. Produces clear operational documentation, SOPs, and playbooks. Coaches SOC engineers and champions continuous improvement. Reporting & Executive Communication: Produces monthly operational and executive risk reports (incidents, vulnerability trends, MTTR, coverage gaps). Briefs the CIO and Board with concise risk-based recommendations. Third-Party Coordination: Manages relationships and SLAs with MDR/MSSP/MDR providers, forensic firms, and other security partners. What You Need… 5+ years of progressive, hands-on cybersecurity experience, with significant time spent in SOC and incident response environments. Demonstrated experience in incident response, threat hunting, and digital forensics. Demonstrated expertise with SIEM and SOAR platforms (Google Chronicle, GrayMatter, Chronicle SOAR, or comparable). Proven track record managing EDR/MDR/XDR solutions and performing endpoint investigations. Hands-on experience owning vulnerability programs with Rapid7, Tenable.io, or similar tooling. Experience writing detection logic, playbooks, and incident runbooks; demonstrable success in alert tuning and automation. Real-world experience coordinating cross-functional incident response activities and driving remediation to completion. Scripting and automation skills (PowerShell, Python, Bash) to automate enrichment, containment, and evidence collection. Strong Windows and Linux administration/forensics fundamentals; network fundamentals and packet-level troubleshooting. Familiarity with cloud security (Azure, Microsoft 365, Intune, Conditional Access) and endpoint management tools. Knowledge of security controls, hardening standards, and configuration baselines. Ability to read and interpret logs and telemetry across endpoints, network devices, and cloud services. Superior written and verbal communication; able to explain technical findings to non-technical and executive audiences. Decisive under pressure, methodical in evidence collection, and disciplined in documentation. Collaborative, tactful, and experienced at working with cross-functional teams (IT ops, HR, Legal, vendor partners). Strong project management and organizational skills with an eye for measurable outcomes. Ability to travel up to 15% of the time. Preferred Qualifications: Relevant industry certifications, including advanced training from SANS in incident handling, threat hunting, and digital forensics (e.g., SEC504, FOR508, FOR572, or equivalent). Certifications: CISSP, GCIH, GCFA, ECIH, or Security+ (or equivalent). Prior role as a dedicated incident responder or IR team lead. Experience with Microsoft Defender for Endpoint, Azure Security Center, and native cloud telemetry. Familiarity with compliance frameworks (SOC 2, NIST CSF/800-171, ISO 27001) and how detection/IR maps to them. Experience in multi-site enterprise environments and with M&A integration security. Conduct Standards: Maintains appropriate Company confidentiality at all times. Protects the assets of the Company and ethically upholds the Code of Conduct & Ethics in all situations. Cultivates and promotes the “Hearts & Minds” safety culture. Consistently exemplifies the Core Values of the Company (we CARE, we act with INTEGRITY, we are INNOVATIVE, and we are ACCOUNTABLE). Work Environment: This position operates primarily in an office environment and routinely utilizes standard office equipment, such as computers, phones, copiers, and filing cabinets. The Company's Remote Work Policy is applicable to this position. Physical Demands: In performing the duties of this job, the incumbent is regularly required to talk, hear, perform repetitive motion, and possess an appropriate degree of both visual acuity and manual dexterity. This is considered a sedentary position, which means possible exertion up to ten (10) pounds of force occasionally, and/or negligible amount of force frequently or constantly to lift, carry, push, pull, or otherwise move objects. This job description is intended to describe the general nature of work being performed by the individual who assumes this role, not an exhaustive list of responsibilities. Duties, responsibilities, and activities may change at any time, with or without notice, as business needs dictate. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position. Limbach Facility Services LLC is an Equal Opportunity Employer. #LFS
    $130k-140k yearly 30d ago
  • Principal Information Security Officer - Mellon College of Science - Pittsburgh Supercomputing Center

    Cmu

    Information security analyst job in Pittsburgh, PA

    Carnegie Mellon University is a private, global research university that stands among the world's most renowned education institutions. With ground-breaking brain science, path-breaking performances, creative start-ups, big data, big ambitions, hands-on learning, and a whole lot of robots, CMU doesn't imagine the future, we invent it. If you're passionate about joining a community that challenges the curious to deliver work that matters, your journey starts here! The Pittsburgh Supercomputing Center (PSC) a joint research center of Carnegie Mellon University and the University of Pittsburgh, was established in 1986, and for over 30 years has provided university, government, and industrial researchers with access to several of the most powerful systems for advanced computational research, communications, and data storage available to scientists, engineers, and scholars nationwide for unclassified research. PSC advances science across a wide spectrum of fields, including artificial intelligence/machine learning, medical imaging, weather modeling, cell biology, and genomics. PSC provides a high performance computing and communications service in support of the nation's computational science work. In addition, PSC is a member of NSF ACCESS, a national computer collaboration of 15 partners from across the U.S. that provides high performance computing, networking, data, scientific visualization and instrument services to the nation's scientists. The overall responsibility of the Principal Information Security Officer (PISO) is to lead teams of PSC staff members, particularly from the Networking and Systems & Operations groups, in order to develop and implement plans for integrated network-, host- and human-based information security practices and procedures for PSC. The PISO keeps PSC leadership informed about current, ongoing, and emerging security risks affecting both PSC and the broader academic community. In addition to internal responsibilities, the PISO serves in external roles as a key member of Trusted CI-the NSF Cybersecurity Center of Excellence-and in a leadership capacity for the NSF ACCESS Security Team. Within PSC, the PISO collaborates with staff to assess computer security risks, select and implement appropriate safeguards, develop and execute security plans, monitor the effectiveness of measures, and lead responses to security incidents. In Trusted CI, the PISO undertakes similar responsibilities as directed by its leadership, with a particular focus on advancing cybersecurity interoperability. Core Responsibilities: Oversees information security of leading edge computing and communications equipment. that is in round-the-clock use by the national research community. PSC's Equipment is valued at roughly $60 million. Leads teams of cybersecurity experts from PSC. Oversees ACCESS Security Team activities including: policy development, incident response, project planning and advancement, vulnerability evaluation and risk management, reporting requirements to ACCESS and NSF. Actively participates in Trusted CI projects and initiatives, assists with center operations, and leads projects with other Trusted CI staff. Will serve as PSC site lead and Co-PI for Trusted CI. Coordinate security in PSC: Conduct periodic assessments of PSC's cybersecurity program (based on the Trusted CI Framework core). With input from members of a team and/or leadership, enhance PSC's cybersecurity program. Stay current with new security threats, technological advances, and regulatory requirements. Explore applicable cybersecurity improvement strategies and tactics. Lead team that carries out the implementation plans. Coordinate periodic audits of compliance of PSC practices and procedures to requirements, regulations, and standards. Lead PSC incident response, including protection and custody of evidence. Interact with law enforcement or organizations as necessary. Oversee development, maintenance, and dissemination of PSC's documentation on center information security policies and procedures. Participate in local and national computer security incident response groups. Develop and promote cybersecurity awareness among staff and users. Work with trusted partners/projects (CMU/Pitt/HuBMAP/Neocortex/BIL) IRT cybersecurity projects and programs. Serve as a [CP}ISO on related projects (Neocortex, HuBMAP, BIL, SenNet, ACCESS, etc Regularly report to PSC management on information security posture and oversee scheduled security training for staff and users. Acts as team leader. Determines own and team's priorities based on overall goals, and may deviate from established procedures and practices as long as end results meet performance objectives and established goals. Gives advice and counsel to PSC, Trusted CI and ACCESS higher management which significantly influence decisions. Performs under minimal supervision. All normal duties and responsibilities are handled independently. Only the most difficult or unique situations are referred to higher management levels. Assesses the severity of an information security or system problem independently and makes a problem determination quickly. Regular status reports and attendance at various meetings is required. Adaptability, excellence, and passion are vital qualities within Carnegie Mellon University. We are in search of a team member who can effectively interact with a varied population of internal and external partners at a high level of integrity. We are looking for someone who shares our values and who will support the mission of the university through their work. Qualifications: Minimum Bachelor's Degree in Computer Science or a related field. Minimum requirements include knowledge and skills developed through 10+ years of work experience in a related job discipline. A graduate degree in cybersecurity or related field, or certification such as CISSP, CISM, CISA, or CRISC is preferred. Broad understanding of current computer, data and networking information security practices in a high performance computing and communications environment; demonstrated ability to apply that knowledge to develop and implement a practical, effective security program. Excellent analytical, technical, reasoning, and innovative problem-solving skills. Ability to lead teams and to function competently in a team environment. Ability to interact and communicate effectively and courteously with members of PSC, the broader university community, ACCESS and its partner sites, Trusted CI, and the NSF Cyberinfrastructure community. A combination of education and relevant experience from which comparable knowledge is demonstrated may be considered. Requirements: Successful background check Joining the CMU team opens the door to an array of exceptional benefits. Benefits eligible employees enjoy a wide array of benefits including comprehensive medical, prescription, dental, and vision insurance as well as a generous retirement savings program with employer contributions. Unlock your potential with tuition benefits, take well-deserved breaks with ample paid time off and observed holidays, and rest easy with life and accidental death and disability insurance. Additional perks include a free Pittsburgh Regional Transit bus pass, access to our Family Concierge Team to help navigate childcare needs, fitness center access, and much more! For a comprehensive overview of the benefits available, explore our Benefits page. At Carnegie Mellon, we value the whole package when extending offers of employment. Beyond credentials, we evaluate the role and responsibilities, your valuable work experience, and the knowledge gained through education and training. We appreciate your unique skills and the perspective you bring. Your journey with us is about more than just a job; it's about finding the perfect fit for your professional growth and personal aspirations. Are you interested in an exciting opportunity with an exceptional organization?! Apply today! Location Pittsburgh, PA Job Function Security Position Type Staff - Regular Full Time/Part time Full time Pay Basis Salary More Information: Please visit “Why Carnegie Mellon” to learn more about becoming part of an institution inspiring innovations that change the world. Click here to view a listing of employee benefits Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran. Statement of Assurance
    $97k-147k yearly est. Auto-Apply 6d ago
  • Cyber Security Engineer

    Microbac 4.0company rating

    Information security analyst job in Cranberry, PA

    Come join our family! Microbac Laboratories is an essential business offering competitive pay and benefits including medical, dental, vision, life insurance, disability, generous paid time off including vacation, holidays and flex-time, a wellness program, referral bonus, tuition reimbursement and more! Whether you are just starting your career in science or looking to further it, Microbac will put you on the path of an exciting career with room to grow. Quality, safety, giving back to our communities, diversity and inclusion, customer success and employee wellbeing are part of our core culture. We are looking for motivated individuals to join our family as a Cybersecurity Engineer. ABOUT MICROBAC Microbac Laboratories, Inc. is a premier commercial laboratory testing firm that partners with clients worldwide, offering laboratory solutions to the life science, food and nutrition, and environmental industries and serves our clients with the utmost expertise and respect for their market requirements, constraints, and challenges. We embody a company-wide commitment to exceptional customer experience, which has been refined over nearly 50 years of trusted, analytical and measurement experience. Through our network of laboratories, offices, and field services, we have the flexibility to meet the unique requirements for each client, project, and scope. As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and nutrition and life science markets. JOB SUMMARY We are seeking a hands-on Cybersecurity Engineer to own day-to-day security operations and incident response across our network of 30+ laboratories. This role is execution-focused and ideal for a candidate who enjoys working in lean environments, partnering closely with Infrastructure and Quality teams, and directly configuring and operating security controls. You will serve as the primary escalation point for security incidents while helping mature the organization's security posture as the business grows. Essential Functions: Own daily cybersecurity operations, monitoring alerts and responding to incidents Act as the primary escalation point for security events Lead incident response from detection through remediation and root cause analysis Configure and maintain security controls across business platforms Manage identity, access controls, MFA, Conditional Access, and privileged access models Perform hands-on investigations Develop, test, and maintain incident response playbooks and escalation paths Create security policies and translate them into enforceable technical controls Partner closely with Infrastructure on architecture, network changes, cloud services, and new tools Continuously assess risk, identify gaps, and implement practical security improvements Partner with Quality to ensure compliance with industry standard regulations Set a positive example through high standards and professional conduct. Continuously monitor emerging cybersecurity threats, regulatory changes, and industry best practices to keep organizational security strategies current and effective. Other duties as assigned. Minimum Requirements: Bachelor's degree in Computer Science, Information Systems or related field. 3+ years of experience in cybersecurity related positions Willingness to travel to lab locations as needed to provide on-site IT support. Preferred Qualifications: Certifications: CompTIA Security+, CompTIA CySA+, GSEC, CompTIA PenTest+, CCSP, CISSP, CISM Knowledge of advanced persistent threats (APTs) and their tactics, techniques, and procedures (TTPs) Fundamental understanding of Windows, Mac OSX, and Linux operating systems Fundamental understanding of OSI model, basic networking and troubleshooting concepts Experience with programming or scripting, including PowerShell, Bash, Python, Yara, and Perl Experience in managing SSO/IAM, email security, phishing and user awareness training Experience in EDR platforms Experience with cloud deployments such as Azure, AWS or similar platforms Experience working with distributed teams and other cross functional stakeholders Familiarity with commercial solutions for logging and security event management, including SIEM or SOAR platforms Familiarity with vulnerability management and IDS/IPS Demonstrated intermediate experience with security incident detection, response frameworks, and established incident handling procedures Understanding and knowledge of various log formats from a variety of network and computer devices Knowledge of Cyber risks and threats related to Cyber attackers Knowledge of recent Cyber events and interpreting kill chain process and threat impacts Presentation, analytical, and critical-thinking skills Ability to manage competing priorities and workload WORKING CONDITIONS AND PHYSICAL REQUIREMENTS The physical demands and working conditions described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Physical Requirements: While performing the duties of this job, the employee is regularly required to use hands to finger, handle, or feel objects, tools; talk or hear. The employee is occasionally required to stand, walk, and sit. The employee must occassionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include color vision and depth perception. Working Conditions: Home internet acceptable for remote computer work. The noise level in the work environment is usually moderate. This job may require travel less than 20% As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and life science markets. OTHER: This is not an exhaustive list of all duties an employee may be required to perform. Microbac reserves the right to revise the job description at any time. Employment is at-will. Microbac, promotes a drug-free, alcohol-free workplace. Applicants considered for hire must pass a drug test before beginning work. Refusal to submit to testing will result in disqualification of further employment consideration. Microbac is an Equal Opportunity Employer - We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. All qualified applicants will receive consideration for employment.
    $81k-111k yearly est. Auto-Apply 11d ago
  • Senior Cloud Security Engineer

    Federal Home Loan Bank of Pittsburgh 4.1company rating

    Information security analyst job in Pittsburgh, PA

    Seeking an experienced and dedicated Senior Cloud Security Engineer to join our team. This role is crucial for ensuring the security and compliance of our cloud infrastructure in a highly regulated financial environment. The ideal candidate will have a strong background in cloud security, a deep understanding of regulatory requirements, and the ability to design, implement, and maintain secure cloud solutions. Primary Success Factors * Design, develop, and deploy scalable cloud-based security solutions to protect sensitive financial data and ensure compliance with industry regulations. * Perform comprehensive vulnerability testing, risk analyses, and security assessments to identify and mitigate potential threats. * Develop and coordinate robust cloud security procedures * Monitor for and respond to security incidents in the cloud environment, utilizing advanced security tools and techniques. * Collaborate with IT and development teams to ensure cloud solutions are securely integrated with existing software and infrastructure, following best practices and security standards. * Keep abreast of the latest security issues, regulatory changes, and industry trends to proactively address emerging threats. * Assist with the design of security training and awareness programs to educate staff about cloud security risks and responsibilities, fostering a culture of security within the organization. * Regularly report on the status of cloud security, including any breaches or vulnerabilities, to senior management and stakeholders. * Work with third-party vendors to ensure that security requirements are met and maintain strong relationships with external security partners. * Maintain compliance with all relevant security and privacy laws and regulations, including PCI-DSS, GDPR, SOX, and other industry-specific standards Required Experience * Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Specific experience will be considered in lieu of a degree. * Minimum of 7 years of experience * Relevant certifications in Cyber Security, with Cloud specific certifications a plus. * Proven experience in cloud security engineering, preferably in a financial institution, with a track record of successfully implementing secure cloud solutions. * Strong knowledge of cloud platforms and cloud security best practices, including identity and access management, encryption, and network security. * Experience with regulatory compliance frameworks such as PCI-DSS, GDPR, and SOX, and the ability to navigate complex regulatory environments. * Excellent problem-solving skills and the ability to work under pressure, with a proactive and detail-oriented approach to security. * Strong communication and collaboration skills, with the ability to effectively convey complex security concepts to both technical and non-technical audiences. * Experience with DevSecOps practices and tools, including continuous integration and continuous deployment (CI/CD) pipelines. * Knowledge of infrastructure as code (IaC) and automation tools, such as Terraform, Ansible, or CloudFormation. * Familiarity with security monitoring and incident response tools, such as SIEM, IDS/IPS, and EDR solutions. * Ability to deliver with minimal management oversight We welcome applicants from outside the Pittsburgh area to apply. The Bank offers relocation assistance to candidates that are able to relocate within 90 days of their start date. It is the policy of the Federal Home Loan Bank of Pittsburgh to ensure equal employment opportunity (EEO) for all employees and applicants for employment without regard to race, religion, color, sex, national origin, age, disability status, genetic information, veteran's status, ancestry, sexual orientation or status as a parent as defined by applicable law. It is the Bank's policy to comply with applicable laws concerning the employment of persons with disabilities, including reasonable accommodation for applicants and employees with disabilities.
    $115k-156k yearly est. Auto-Apply 60d+ ago
  • Engineer - Information Security

    Federated Hermes, Inc.

    Information security analyst job in Pittsburgh, PA

    * Bachelor Degree in Computer Science, Information Systems, Information Security or Networking, or equivalent work experience required; Master Degree preferred * Minimum of 5 years of practical experience in leading development and implementation of at least two information technology disciplines Azure or other Cloud environment, including technical architecture, network management, application development, middleware, database management or operations required * Advanced, specialized technical skills in Security Technologies, including IAM, PAM required * Experience with implementing and configuring Identity Security tools required * Demonstrated ability to estimate the financial impact of architecture alternatives; to apply solutions to business problems; and, to quickly comprehend the functions and capabilities of new technologies required * Functional knowledge of cloud environments such as Azure, Office 365, AWS and related security tools such as Security Center, Sentinel or similar tools required * Extensive experience with Delinea, SailPoint, Active Directory and CrowdStrike technologies and Just-in-Time access methods * Experience applying best practices to management and best practices for privileged accounts and privileged entitlements * Experience applying best practices to service account management * Experience applying best practice methodologies to securing cloud environments, such as Cloud Security Alliance, NIST required MAJOR DUTIES: * Design, develop, test and implement solutions to problems involving multiple technologies utilizing advanced specialized technical skills in the context of defined Reference Architectures * May establish and administer standards and conventions in relevant technologies * Stand up Microsoft Servers and other Security products * Develop system documentation to convey designs and develop support documentation as appropriate * Keep abreast of advances and developing trends and standards in technology * Upgrade and patch security Equipment * Develop interfaces from Corporate/Cloud servers to IAM/PAM technologies * Assist in the identification, response, investigation, and remediation of potential breaches of and issues surrounding data security * Consult and assist internal IT staff in proving out concepts to support migration of existing on-premises applications and infrastructure to Azure hybrid PaaS/IaaS deployment * Assist in implementing CIS Controls for hardware and Software environments * Ensure deliverables relative to project needs * Apply best practice methodologies to securing the company's cloud environments and applications * Review technical designs and specification for adherence to standards * Conduct third party Vendor Security Reviews as needed * Participate in task estimation and planning HOURS/LOCATION: * 8:30 a.m. - 5:00 p.m. (Overtime as required) * Warrendale location (Hybrid schedule) * Work at downtown location when required EXPLANATORY COMMENTS: * Good communication and interpersonal skills * Good decision making and problem solving skills * Good analytical skills with attention to detail and accuracy * Ability to work on multiple projects simultaneously * Ability to work effectively both individually and as a member of a project team
    $81k-110k yearly est. 60d+ ago
  • Security Systems Engineer

    Dagostino Electronic Services 4.1company rating

    Information security analyst job in Pittsburgh, PA

    The Systems Engineer position is responsible for providing full cycle implementation and support of customer systems, while working across multiple company departments to ensure full client satisfaction. Under the direction of a manager or dispatcher, coordinates the design and maintenance of all access control, intrusion, and video surveillance systems. Incumbent receives and evaluates work orders and requests, investigates requests and troubleshoots problems where appropriate, establishes priorities and coordinates with contractors, when required. Requirements Essential functions and responsibilities: Assists with security systems integration, mapping and software updates and helps train personnel in the use of these systems. Assists on new projects in both existing areas and new construction helping with security assessments, vendor selection, technology upgrades, product selections, testing, field verification of systems and inspection of work in progress for compliance with standards Assess work sites, conditions, and logistics for each project; Develop Method of Procedure based on pre-project assessment. Design, develop and provide documentation of systems, configurations, and other pertinent information for the customer. Communicate with clients to resolve issues in a professional and confidential manner; Develop and execute client specific solutions. Manage the allocation of project resources, including software, hardware, tools, and related items specific to each customer and/or project. Direct the work responsibilities of union labor personnel based on specific project needs. Design and oversee training programs for new and existing customers; Determine which customers receive training. Collaborate with Customer Relationship Managers on demonstrations for new and potential clients. Perform installation, configuration, programming, and final commissioning of customer systems. Work collaboratively with installation, project management and engineering teams. Perform infrastructure services, including pulling cables, installing wall, and ceiling cabling, and installing surface mounted devices, as required. Perform system wiring and terminations services, as required. Deliver on-going remote and on-site technical support for existing customers and systems. Additional responsibilities may be required as necessary, including but not limited to: Provide internal support for basic trouble shooting. Organizes and manage parts stock and tools. Perform other duties as needed. Success factors/job competencies: Effectively communicate both in writing and verbally Work independently and prioritize multiple tasks and adapt to needed change Analysis Mechanical aptitude Comprehend technical language and read and interpret blueprints, wiring diagrams, and schematics Safety orientation Customer Focus Attention to Detail Teamwork/Collaboration Stay abreast of changes in security technology Physical demands and work environment: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Individual will be required to travel to customer sites as needed. While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts. The employee is occasionally exposed to outside weather conditions and risk of electrical shock. Individual will regularly be required to lift, push, pull, and carry up to 50 pounds, and occasionally up to 75 pounds. Incumbent will be required to use a computer with keyboard, telephone, or handheld mobile device for extended periods of time, and office machinery as needed. Incumbent must be able to read, see, hear, and speak. Workdays and Shifts: Position works Monday-Friday, daylight hours, and additional time as needed to complete work. Education/Certification(s)/License(s) required: Bachelor's Degree in Electronics, Information Technology or related field, or equivalent experience. May be required to participate in safety trainings and/or certifications provided by the Company or customers. Valid driver's license, as employee will be required to travel to local and overnight client sites as needed. Manufacturer specific certifications, as required. Responsible to maintain active certifications and obtain new and updated certifications as required by the Company. Experience/Other required: Position requires two (2) to three (3) years of relevant experience in the electronic services. Strong knowledge of Microsoft Office. Strong computer skills with advanced software aptitude. Security systems to include, service and maintenance across a broad spectrum of access control, intrusion and video surveillance systems such as, Genetec, Milestone, Bosch, and DMP. Applicants must be currently authorized to work in the United States on a full-time basis. Visa sponsorship is not available for this position. This is a full-time, in-person position, and candidates must be able to work from our office located in Pittsburgh, Pennsylvania.
    $90k-127k yearly est. 60d+ ago
  • Senior Cloud Security Engineer

    Techstra Solutions

    Information security analyst job in Pittsburgh, PA

    Techstra Solutions is seeking an experienced and dedicated Senior Cloud Security Engineer to join our team. This role is crucial for ensuring the security and compliance of our cloud infrastructure in a highly regulated financial environment. The ideal candidate will have a strong background in cloud security, a deep understanding of regulatory requirements, and the ability to design, implement, and maintain secure cloud solutions. Primary Success Factors · Design, develop, and deploy scalable cloud-based security solutions to protect sensitive financial data and ensure compliance with industry regulations. · Perform comprehensive vulnerability testing, risk analyses, and security assessments to identify and mitigate potential threats. · Develop and coordinate robust cloud security procedures · Monitor for and respond to security incidents in the cloud environment, utilizing advanced security tools and techniques. · Collaborate with IT and development teams to ensure cloud solutions are securely integrated with existing software and infrastructure, following best practices and security standards. · Keep abreast of the latest security issues, regulatory changes, and industry trends to proactively address emerging threats. · Assist with the design of security training and awareness programs to educate staff about cloud security risks and responsibilities, fostering a culture of security within the organization. · Regularly report on the status of cloud security, including any breaches or vulnerabilities, to senior management and stakeholders. · Work with third-party vendors to ensure that security requirements are met and maintain strong relationships with external security partners. · Maintain compliance with all relevant security and privacy laws and regulations, including PCI-DSS, GDPR, SOX, and other industry-specific standards Required Experience · Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Specific experience will be considered in lieu of a degree. · Minimum of 7 years of experience · Relevant certifications in Cyber Security, with Cloud specific certifications a plus. · Proven experience in cloud security engineering, preferably in a financial institution, with a track record of successfully implementing secure cloud solutions. · Strong knowledge of cloud platforms and cloud security best practices, including identity and access management, encryption, and network security. · Experience with regulatory compliance frameworks such as PCI-DSS, GDPR, and SOX, and the ability to navigate complex regulatory environments. · Excellent problem-solving skills and the ability to work under pressure, with a proactive and detail-oriented approach to security. · Strong communication and collaboration skills, with the ability to effectively convey complex security concepts to both technical and non-technical audiences. · Experience with DevSecOps practices and tools, including continuous integration and continuous deployment (CI/CD) pipelines. · Knowledge of infrastructure as code (IaC) and automation tools, such as Terraform, Ansible, or CloudFormation. · Familiarity with security monitoring and incident response tools, such as SIEM, IDS/IPS, and EDR solutions. · Ability to deliver with minimal management oversight Location: This position is based in Pittsburgh, PA and required to be on site (Hybrid) This is a full-time W2 Salaried position. Applicants must be legally authorized to work in the United States now and in the future without the need for sponsorship. At Techstra Solutions, we help top companies and brands achieve the business value of Digital and Talent Transformation. We believe there are three components in successful business transformation: Business Strategy, Technology and Talent. It is the coming together of these three disciplines that enables companies to take full advantage of opportunities. It differentiates us. Our approach is holistic and all-encompassing. We consider the full picture as we guide our clients on this journey. We are experts in transformation, business strategy, technology, innovation, and human capital management. We deliver our expertise through client consulting, innovative staffing solutions and software development. From strategy through implementation, we are dedicated to bringing our clients world-class business and talent solutions that fit strategic requirements and most importantly, deliver results. Equal Employment Opportunity Statement Techstra Solutions is an equal opportunity employer. The Company makes its decisions on merit, and its policy of equal opportunity prohibits discrimination in all phases of the employment process, including, but not limited to, recruitment, hiring, promotion, selection, transfer, demotion, layoff, termination, compensation, benefits, and other terms and conditions of employment. The policy of equal opportunity applies without regard to race, color, creed, religion, gender,, sexual orientation, gender identification, pregnancy, marital status, national origin, ancestry, age, disability that can reasonably be accommodated without undue hardship, military status, veteran status, genetic predisposition or carrier status, alienage or citizenship, domestic partnership status, arrest or conviction record, status as a victim of domestic violence, or any other protected categories under federal, state, or local law. The Company also prohibits discrimination or harassment based upon the perception that a person has, or is associated with a person who has, any of these characteristics.
    $97k-135k yearly est. Auto-Apply 60d+ ago
  • Enterprise Infrastructure Patch and Security Engineer

    All Lines Technology 3.3company rating

    Information security analyst job in Pittsburgh, PA

    Job DescriptionPurpose Reduce security risk and maintain patch compliance across Infrastructure Services using approved tooling and processes (Windows Server, Enterprise Linux, cloud/on‑prem, network devices, and assets in scope). What You'll Do Own Security Remediation Program management aligned to Security's findings (Critical/High/Medium). Plan, schedule, and execute monthly OS patching (Windows/Linux) with canaries, maintenance windows, and rollback. Run zero-day/out‑of‑band patching with expedited assessment and change controls. Deliver extended remediations (cipher/protocol, file rights, 3rd‑party updates) and coordinate vendor engagement. Operate tooling: MECM/SCCM, Ansible, Rapid7, Ivanti ITSM, Cisco DNA, Panorama, Venafi; perform manual deployments where required. Manage quarterly component updates and certificate lifecycle (PKI/DigiCert), including self‑signed to PKI migration feasibility. Publish compliance reports, audit artifacts, and governance updates; chair weekly Security-Infrastructure standups. What You'll Bring 5+ years in infrastructure security/patch management across Windows Server & Enterprise Linux (RHEL/others). Hands‑on experience with MECM/SCCM, Ansible, Rapid7, Ivanti ITSM, Cisco DNA, Panorama, Venafi/PKI. Strong ITIL change & incident management, CMDB updates, compliance reporting. Scripting skills (PowerShell/Bash/Python), canary strategies, rollback procedures. Nice‑to‑have: ITIL v4, Security+, RHCSA/RHCE, Microsoft Certified, CCNA/CCNP, GIAC/GVM. Powered by JazzHR Z3CShR2iOT
    $85k-112k yearly est. 14d ago
  • Application Security Engineer

    HDJ & Associates

    Information security analyst job in Pittsburgh, PA

    Are you ready to elevate security practices to new heights? Our organization is on the lookout for a dynamic Application Security Engineer who will revolutionize our application security strategies. Located in the vibrant city of Pittsburgh, PA, this on\-site role is the perfect opportunity to collaborate with key stakeholders in Technology, Product, and Strategic Business Units to tackle the most pressing security challenges head\-on. As a Application Security Engineer, you will spearhead the secure software development lifecycle, embedding cutting\-edge security practices at every step of our DevOps pipelines and application security processes. Your expertise in maturity models like DSOMM (DevSecOps Maturity Model), CI\/CD pipelines, and vulnerability management tools will be crucial in transforming our security landscape. Join forces with our engineering, DevOps, Product, and Technology teams to implement automated security controls, threat modeling, and risk mitigation strategies that will shape the future of our software development lifecycle. This role requires minimal travel and the ability to work in a fast\-paced, dynamic environment. The position may involve working outside normal business hours to address urgent compliance or security incidents. Key Responsibilities DevSecOps & Maturity Measurement Implementation: Assess, report, and assist with improving application security and DevSecOps Maturity, utilizing a measurement framework such as DSOMM or BSIMM, across the organization. Define and implement security policies, standards, and best practices for DevOps, CI\/CD pipelines, and cloud security. Work with development and DevOps teams to integrate automated security testing (SAST, DAST, SCA, IaC security scanning, etc.) into pipelines. Establish security gates in CI\/CD workflows to prevent deployment of vulnerable code. Application Security & Code Vulnerabilities: Perform code reviews, static\/dynamic security testing (SAST\/DAST), and secure coding guidance to developers. Identify and remediate vulnerabilities in application code, libraries, containers, and infrastructure as code (IaC). Develop and enforce secure coding standards in alignment with OWASP, NIST, and other frameworks. Conduct threat modeling and security architecture reviews for applications and services. For example, assist application teams with developing accurate data flow diagrams and developing appropriate identity management solutions. Manage and mature Bot Management services for all applications. Assist with WAF management and maturity. Improve secrets management and API security. Vulnerability Management & Risk Reduction: Manage and mature enterprise\-wide Bug Bounty program (e.g. BugCrowd, HackerOne) Manage vulnerability scanning tools (e.g., Tenable, Qualys, Sonar, Snyk) and prioritize remediation efforts. Track, assess, and coordinate the remediation of vulnerabilities across the application, infrastructure, and cloud environments. Develop risk\-based vulnerability management workflows and collaborate with engineering teams to drive fixes. Monitor security dashboards and metrics, ensuring vulnerabilities are patched in alignment with SLAs. Security CI\/CD Automation & Tooling: Implement security automation using APIs, scripts, and cloud\-native security controls. Work with DevOps engineers to integrate security tooling (like SemGrep, Snyk, Cycode) or within Jenkins, GitHub, GitLab CI\/CD, or AWS DevOps. Automate security findings triage, reporting, and prioritization processes. Security Awareness & Collaboration: Train and mentor developers on secure coding, threat modeling, DevSecOps, and vulnerability management best practices. Collaborate with security operations, incident response, and compliance teams on security initiatives. Participate in security assessments, penetration testing, and security incident investigations. Requirements Qualifications & Experience Bachelor's Degree in Information Security, Cybersecurity, Computer Science, or a related field OR a minimum of 6 years' equivalent experience in lieu of a degree 4+ years of experience in application security, DevSecOps, and security engineering OR a combination of 2+ years experience as a developer and 2+ years in application security, DevSecOps, and security engineering Hands\-on experience with DevSecOps tools (SAST, DAST, SCA, container security, IaC security), integrating security solutions within CI\/CD pipelines, strong knowledge of secure coding principles (OWASP Top 10, SANS CWE Top 25), and familiarity with AI ML or LLM usage within security tooling. Experience with vulnerability management, web app penetration testing tooling, and security certifications like CISSP, OSCP, GCPN, GCSA, AWS Security Specialty, or CSSLP are preferred. Proficiency in Bot Management tooling, client\-side monitoring tooling, and implementing maturity measurement frameworks such as DSOMM or BSIMM in an enterprise setting. Ability to understand and communicate best\-practice system architectures, data flows, and security controls within modern web applications and cloud (SaaS\/PaaS, IaaS). Excellent verbal and written communication skills, with the ability to communicate complex security concepts to technical and non\-technical stakeholders. "}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"641871163","FontFamily":"PuviRegular","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Engineering"},{"field Label":"Work Experience","uitype":2,"value":"5+ years"},{"field Label":"City","uitype":1,"value":"Pittsburgh"},{"field Label":"State\/Province","uitype":1,"value":"Pennsylvania"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"15205"}],"header Name":"Application Security Engineer","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00133003","attach Arr":[],"custom Template":"5","is CandidateLoginEnabled":true,"job Id":"**********06714003","FontSize":"15","google IndexUrl":"https:\/\/hdjassociates.zohorecruit.com\/recruit\/ViewJob.na?digest=UnBknG4YeUTpH3g.ao7JoWAjgPO2l6C2tdKjPQTIaoc\-&embedsource=Google","location":"Pittsburgh","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
    $79k-110k yearly est. 60d+ ago
  • AI Security Engineer

    Preamble

    Information security analyst job in Pittsburgh, PA

    We are seeking an experienced AI Security Engineer to lead the development of next -generation cybersecurity solutions for advanced AI systems. This individual will be responsible for researching, designing, and implementing cutting -edge security controls to protect AI models, data pipelines, and infrastructure from adversarial attacks, privacy vulnerabilities, and regulatory risks. The ideal candidate has a strong background in AI and understanding of cybersecurity principles, has been published in leading academic conferences (NeurIPS, ICLR, Black Hat, DEFCON, etc.), and has experience working at a frontier AI lab. Requirements Experience: 5+ years in AI/ML with a strong focus on cybersecurity. Education: Bachelor's or Master's in Computer Science, Cybersecurity, AI/ML, or a related field. PhD preferred. Technical Expertise: Strong understanding of AI security challenges, including adversarial ML, LLM backdoor, (in)direct prompt injections, model poisoning, and data leakage. Proficiency in cybersecurity frameworks (NIST, MITRE ATLAS, OWASP AI Top 10) and security tools. Hands -on experience with AI frameworks (TensorFlow, PyTorch, OpenAI API, Hugging Face) and securing AI pipelines. Expertise in cryptography, secure data handling, and privacy -preserving AI techniques (federated learning, differential privacy). Proficiency in Python and security -related programming (e.g., secure coding, AI model evaluation). Familiarity with AI agents, autonomous agents, large language models (LLMs), and multi -modal AI systems. Preferred: Experience in compliance, regulatory, or risk frameworks for AI (e.g., OWASP, MITRE, GDPR, HIPAA, GLBA, NIST AI RMF). An interest in robotics would be preferred as well. Publication & Research: Proven track record of research contributions in top AI/ML and cybersecurity conferences. Industry Experience: Prior work at a leading AI research lab, security -focused AI startup, or a major tech company's AI division. Benefits Competitive salary and equity options. 100% paid medical insurance coverage. Research and publication opportunities. Opportunity to work on cutting -edge AI security challenges that expand beyond software systems. Flexible work environment with remote and in -office options. Access to industry -leading AI security research and resources. A dynamic, mission -driven team shaping the future of AI security.
    $79k-110k yearly est. 60d+ ago
  • Cyber Security Engineer

    Microbac 4.0company rating

    Information security analyst job in Cranberry, PA

    Come join our family! Microbac Laboratories is an essential business offering competitive pay and benefits including medical, dental, vision, life insurance, disability, generous paid time off including vacation, holidays and flex-time, a wellness program, referral bonus, tuition reimbursement and more! Whether you are just starting your career in science or looking to further it, Microbac will put you on the path of an exciting career with room to grow. Quality, safety, giving back to our communities, diversity and inclusion, customer success and employee wellbeing are part of our core culture. We are looking for motivated individuals to join our family as a Cybersecurity Engineer. ABOUT MICROBAC Microbac Laboratories, Inc. is a premier commercial laboratory testing firm that partners with clients worldwide, offering laboratory solutions to the life science, food and nutrition, and environmental industries and serves our clients with the utmost expertise and respect for their market requirements, constraints, and challenges. We embody a company-wide commitment to exceptional customer experience, which has been refined over nearly 50 years of trusted, analytical and measurement experience. Through our network of laboratories, offices, and field services, we have the flexibility to meet the unique requirements for each client, project, and scope. As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and nutrition and life science markets. JOB SUMMARY We are seeking a hands-on Cybersecurity Engineer to own day-to-day security operations and incident response across our network of 30+ laboratories. This role is execution-focused and ideal for a candidate who enjoys working in lean environments, partnering closely with Infrastructure and Quality teams, and directly configuring and operating security controls. You will serve as the primary escalation point for security incidents while helping mature the organization's security posture as the business grows. Essential Functions: Own daily cybersecurity operations, monitoring alerts and responding to incidents Act as the primary escalation point for security events Lead incident response from detection through remediation and root cause analysis Configure and maintain security controls across business platforms Manage identity, access controls, MFA, Conditional Access, and privileged access models Perform hands-on investigations Develop, test, and maintain incident response playbooks and escalation paths Create security policies and translate them into enforceable technical controls Partner closely with Infrastructure on architecture, network changes, cloud services, and new tools Continuously assess risk, identify gaps, and implement practical security improvements Partner with Quality to ensure compliance with industry standard regulations Set a positive example through high standards and professional conduct. Continuously monitor emerging cybersecurity threats, regulatory changes, and industry best practices to keep organizational security strategies current and effective. Other duties as assigned. Minimum Requirements: Bachelor's degree in Computer Science, Information Systems or related field. 3+ years of experience in cybersecurity related positions Willingness to travel to lab locations as needed to provide on-site IT support. Preferred Qualifications: Certifications: CompTIA Security+, CompTIA CySA+, GSEC, CompTIA PenTest+, CCSP, CISSP, CISM Knowledge of advanced persistent threats (APTs) and their tactics, techniques, and procedures (TTPs) Fundamental understanding of Windows, Mac OSX, and Linux operating systems Fundamental understanding of OSI model, basic networking and troubleshooting concepts Experience with programming or scripting, including PowerShell, Bash, Python, Yara, and Perl Experience in managing SSO/IAM, email security, phishing and user awareness training Experience in EDR platforms Experience with cloud deployments such as Azure, AWS or similar platforms Experience working with distributed teams and other cross functional stakeholders Familiarity with commercial solutions for logging and security event management, including SIEM or SOAR platforms Familiarity with vulnerability management and IDS/IPS Demonstrated intermediate experience with security incident detection, response frameworks, and established incident handling procedures Understanding and knowledge of various log formats from a variety of network and computer devices Knowledge of Cyber risks and threats related to Cyber attackers Knowledge of recent Cyber events and interpreting kill chain process and threat impacts Presentation, analytical, and critical-thinking skills Ability to manage competing priorities and workload WORKING CONDITIONS AND PHYSICAL REQUIREMENTS The physical demands and working conditions described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Physical Requirements: While performing the duties of this job, the employee is regularly required to use hands to finger, handle, or feel objects, tools; talk or hear. The employee is occasionally required to stand, walk, and sit. The employee must occassionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include color vision and depth perception. Working Conditions: Home internet acceptable for remote computer work. The noise level in the work environment is usually moderate. This job may require travel less than 20% As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and life science markets. OTHER: This is not an exhaustive list of all duties an employee may be required to perform. Microbac reserves the right to revise the job description at any time. Employment is at-will. Microbac, promotes a drug-free, alcohol-free workplace. Applicants considered for hire must pass a drug test before beginning work. Refusal to submit to testing will result in disqualification of further employment consideration. Microbac is an Equal Opportunity Employer - We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. All qualified applicants will receive consideration for employment.
    $81k-111k yearly est. 13d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Monroeville, PA?

The average information security analyst in Monroeville, PA earns between $67,000 and $130,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Monroeville, PA

$94,000
Job type you want
Full Time
Part Time
Internship
Temporary