Information security analyst jobs in Mount Juliet, TN - 218 jobs
All
Information Security Analyst
Information Technology Analyst
Information Security Engineer
Cyber Security Analyst
Securities Analyst
Cyber Security Engineer
Certified Information Systems Security Professional
Senior Information Security Engineer
Security Engineer
Security Architect
Information Systems Security Officer
Data Security Analyst
Security System Engineer
Information Systems Engineer
Cyber Security Specialist
IT Portfolio Analyst
Dollar General 4.4
Information security analyst job in Nashville, TN
**This role is not approved for Sponsorship**
Plans, governs, and measures IT success-using flexibility, transparency, and value conversations to shape the business demand to optimize and transform Dollar General. Instrumental in the support of the CIO including, but not limited to program management, coordination, communication, and oversight.
Duties & Responsibilities:
Strategic Financial Management
Develop and produce complex financial analytics to support Strategic Solutions
Coordinate and provide funding request management, reporting and tracking
Establishes enterprise wide accounting and budgeting policies and processes, as well as necessary forms and templates to support them
Facilitate the budget/forecasting process, including distribution of assumptions, gathering of inputs, validation, and reporting of results across the enterprise
Govern & Measure
Ensures appropriate compliance & governance controls are in place for policy and protection of any sensitive data
Facilitates change management, governance processes, champion organizational change, and enforces compliance to changes throughout the enterprise
Guarantee IT maintains business partnership and service oriented view, ensuring IT and business strategies alignment
Tracking, analyzing, benchmarking, and consolidating reports for key performance indicators
Consolidate project/initiatives and portfolio performance metrics from across the organization into varying views
Develop and produce executive enterprise and IT leadership level strategic reporting and presentation materials
Develop, produce, and coordinate written materials and presentations executive and board-level reporting
Portfolio Management
Gain insight across and provide varying views and analysis into IT project/initiatives portfolio (health checks, scorecards, at-a-glance, retrospectives)
Support project change management providing basic tools, templates, and structures intended to keep any change effort monitored and transparent.
Develop and produce roadmaps for the portfolios across IT and the consolidation of overlapping teams and projects/initiatives
Team Development
IT coordination & representation for companywide committees, action teams, professional networks, and resource groups and programs
Knowledge, Skills, & Abilities:
Demonstrate leadership skills with the ability to manage through consulting, advising, and influencing all levels of the organization.
Strong interpersonal skills with ability to effectively listen and communicate efficiently both verbally and in written form
Knowledge of and/or experience with development methodology and/or Infrastructure management
Ability to organize, prioritize, delegate and follow-up, with emphasis on adherence to deadlines
Ability to proactively identify financial risks, issues, action items, and facilitate the identification and implementation of alternate solutions
Resolve conflicts and create lasting productive partnerships enterprise wide
Comfort dealing with ambiguity and the ability to work independently in a fast-paced environment
Strong analytical, problem solving, and decision-making skills
Creative ability to access information from different sources and compile for analyses and presentations
Detail oriented - must be able to detect errors, identify trends, and make recommendations for improvements
Ability to thoroughly understand how decisions impact other areas of the enterprise (Big Picture Perspective)
Extensive knowledge of the MS Office Suite with expertise in excel formulas and functions
High proficiency with financial modeling and techniques
Work Experience &/or Education:
Two to four years experience in IT required
Three to four years experience in Business Financial Analysis and Corporate Accounting required
Certified Scrum Master preferred
Bachelor's degree preferred
Retail experience preferred
CAPM preferred or willingness to obtain
$58k-72k yearly est. 1d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Engineer
Patriot Talent Solutions
Information security analyst job in Knoxville, TN
Knoxville, TN | Cybersecurity Engineer | Full-time
We are actively recruiting a Cybersecurity Engineer for our client in Knoxville, TN. This is a hybrid direct placement opportunity that will require some onsite work in Knoxville. The successful candidate will be responsible for the design, implementation, and ongoing management of advanced cybersecurity measures to protect sensitive data, systems, and networks. This role involves hands-on work with a wide range of security technologies, development and enforcement of security protocols, and proactive risk mitigation. The engineer collaborates with cross-functional IT teams to integrate security solutions into enterprise projects and ensure compliance with applicable regulatory requirements, including HIPAA. Must have a minimum of five years' experience in cybersecurity engineering, with a proven track record in designing and implementing security solutions within an enterprise environment.
Due to client request, candidates must be eligible to work in the United States without sponsorship.
Equal Opportunity Employer/Veterans/Disabled
$69k-94k yearly est. 3d ago
Cyber Security Engineer
Provisions Group 4.4
Information security analyst job in Knoxville, TN
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and SecurityInformation and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's informationsecurity strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
$65k-87k yearly est. 4d ago
IT Analyst
Visionaire Partners 4.1
Information security analyst job in Shelbyville, TN
This is a 3 month contract opportunity with a leading global organization based in Atlanta, GA. There is potential to extend. Candidates have the opportunity to work from home 2 days per week! Successful candidates have a high level of initiative and thrive in a fast paced, enterprise environment.
REQUIRED SKILLS:
Associate's or Bachelor's degree in Information Technology, Business Administration, Supply Chain Management, or a related field.
1-3 years of experience (internships or part-time roles acceptable) in IT operations, procurement, inventory control, or asset lifecycle management.
Basic understanding of IT hardware and software lifecycles, including procurement, deployment, maintenance, and retirement.
PREFERRED SKILLS:
CompTIA A+ or IT Fundamentals+ (for hardware/software foundations).
ITIL Foundation certification.
ServiceNow Certified System Administrator (CSA) or basic platform training.
SAM/HAM practitioner courses from IAITAM (CHAMP, CSAM) or equivalent.
Must be authorized to work in the US. Sponsorships are not available.
Details
$66k-90k yearly est. 2d ago
Analyst, Information Security
Standard Aero 4.1
Information security analyst job in Maryville, TN
Build an Aviation Career You're Proud Of
At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term.
Summary:
As an IT SecurityAnalyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization.
What you'll do:
Conduct risk and security assessments through vulnerability analysis and reporting
Perform mitigation support for both internal and external security audits
Investigate, analyze and document security incidents to identify and document the root cause
Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary
Partner with IT Operation teams to remediate system vulnerabilities
Participates in the production of documentation and management reporting
Research security enhancements and make recommendations for improved policy and process
Analyze IT requirements and provide objective advice on the use of new IT security offerings
Stay up-to-date on information technology and cybersecurity trends and standards
Other IT Security-related duties as required
Capable of identifying, evaluating and mitigating significant risks within an enterprise.
Strong working experience with Microsoft Office Suite.
Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience.
Possess strong analytical skills attention to detail.
Ability to prioritize assignments while working on multiple projects
Ability to work independently and proactively to meet assigned objectives
Flexible with the ability to multi-task, effectively prioritize and work under pressure
Basic project management
Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.)
Analyze, report and respond to security alerts within the various IT technologies and global locations
Proactively remediate information technology security threats as a member of the security team
Assist in the designing, documenting, architecting and implementing IT security measures and controls
Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
Threat mitigation; malicious code detection, response and prevention; operating system security oversight
Minimum Qualifications:
Bachelor's degree in InformationSecurity, Computer Science, or a related field; equivalent experience may be considered.
5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering.
5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation.
5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks.
5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC).
Preferred Qualifications:
IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL
SDLC, and understand application security.
Containerization and Development Security Operations
Benefits that make life better:
Comprehensive Healthcare
401(k) with 100% company match; up to 5% vested
Paid Time Off starting on day one
Bonus opportunities
Health- & Dependent Care Flexible Spending Accounts
Short- & Long-Term Disability
Life & AD&D Insurance
Learning & Training opportunities
Raising the Standard of Excellence since 1911
With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us.
Inclusivity Is Our Standard
It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
$73k-103k yearly est. Auto-Apply 60d+ ago
Cyber Security Vulnerability Analyst
ITR 4.2
Information security analyst job in Oak Ridge, TN
Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities.
This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week.
Job Responsibilities:
• Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role.
• Mentor the DCO's junior staff, developing their technical and incident resolution skills.
• Participate in incident response activities involving multiple teams and functions.
• Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls.
• Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status.
• Automate key DCO functions using Tines technology
• Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities.
• Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities.
• Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats.
• Assist users with the creation, monitoring, and evaluation of policy and device exceptions.
• Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements.
• Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues
Candidates must be able to obtain a federal security clearance so US citizenship is required.
$69k-95k yearly est. 9d ago
Cyber Resilience Specialist
Slalom 4.6
Information security analyst job in Nashville, TN
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery.
What You'll Do
* Lead and facilitate Business Impact Assessments (BIAs) across business units
* Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems
* Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience
* Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles
* Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews
* Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations
* Support program governance, metrics, training, and awareness efforts
What You'll Bring
* 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting
* Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning
* Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms)
* Experience supporting risk assessments and regulatory audits
* Excellent facilitation and stakeholder management skills
* Strong writing skills to produce clear, client-ready plans and reports
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
#LI-MS12
$153k-186k yearly Easy Apply 10d ago
Data Security Analyst
Exeter Government Servi 4.1
Information security analyst job in Fort Knox, KY
Provide support to the lead securityAnalyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies.
Required Qualifications:
Experience in administrative support & MS Office proficiency
Bachelor's degree or 5 years of experience
U.S. citizen and MUST possess a current active DoD Secret clearance
Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
$64k-88k yearly est. Auto-Apply 60d+ ago
Cyber Security Analyst
OSC Global
Information security analyst job in Radcliff, KY
OSC EdgeTech, LLC is seeking a talented Cyber SecurityAnalyst to join the team.
OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge.
Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world.
OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits.
Position Overview
The Cyber SecurityAnalyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks.
Major Activities
Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager.
Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks.
Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions.
Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements.
Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations
Review and investigate security alerts and incidents from Microsoft 365 Defender
Utilize eMASS to maintain and update POA&M status
Review device compliance status from HBSS
Work with other NEC Operations team members to remediate and mitigate security vulnerabilities.
Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture.
Perform other duties as appropriate and as assigned.
Knowledge/Skills/Abilities
Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months.
Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with SecurityInformation and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management.
Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills.
Great analytical, critical thinking and problem-solving abilities.
Superior presentation and negotiation skills.
Strong management and organizational skills.
Adaptable and capable of working in fast-paced environments.
Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint
Required Qualifications
Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience
Demonstrated work experience as Cyber SecurityAnalyst in DoD or Federal government environments
Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS
Must possess appropriate DISA ESS certifications and experience.
Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP)
Must be US citizen
Must possess active secret security clearance or higher
Must be able to pass pre-employment background check
Preferred Qualifications
Bachelor's degree in IT, IM, or Cyber Security
ACAS certification obtained within the last three (3) years, preferred
HBSS Administrator certification obtained within the last three (3) years, preferred
E-Verify:
OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.
Reasonable Accommodation:
OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
$64k-88k yearly est. 22d ago
Information Security Engineer
Heaven Hill Brands 4.6
Information security analyst job in Louisville, KY
Job Description: with a base location in Louisville, KY. What the Role Is The InformationSecurity Engineer is responsible for strengthening and supporting Heaven Hill's cybersecurity program. This hands-on technical role focuses on implementation, monitoring, and continuous improvement of security controls across cloud and on-premise environments.
The Engineer supports governance and risk management efforts and plays a key role in incident response and in deploying and maintaining secure technology solutions.
This position will collaborate with IT and business units to ensure Heaven Hill's data and systems remain resilient against evolving threats, while helping enable secure and efficient access through identity and access management solutions.
This role is instrumental in advancing Heaven Hill's overall security maturity and ensuring that cybersecurity enables, rather than limits, innovation and operational excellence.
How You Will Spend Your Time? Security Engineering & OperationsDesign, implement, monitor, and maintain security controls across cloud, identity, endpoint, and network environments.
Implement and manage Privileged Access Management (PAM) and Role-Based Access Control (RBAC) programs that align with business needs and support POLP (Principle of Least Privilege).
Support and enhance Identity Management solutions, including user provisioning, Single Sign-On (SSO) integrations, and secure application configurations.
Support secure configuration and hardening of Windows and Linux servers, as well as Windows and mac OS workstations.
Manage and maintain DNS and domain registrar configurations to ensure secure and reliable name resolution and domain integrity.
Implement, integrate, and manage authentication, including Kerberos, FIDO2, Smart Cards, passkeys, certificate-based authentication, and TLS or key management solutions.
Administer and support Public Key Infrastructure (PKI), including certificate issuance, renewal, and lifecycle management.
Perform vulnerability scanning and coordinate remediation activities.
Administer and optimize core security platforms such as endpoint detection and response (EDR) and securityinformation and event management (SIEM) systems, including alert tuning, integration, and incident response support.
Develop and maintain automation or scripting (e.
g.
, PowerShell, Python) to improve efficiency in security monitoring, configuration management, and response processes.
Monitor security events, investigate incidents, perform root cause analysis, and drive post-incident improvements.
Collaborate with IT and business teams to ensure security considerations are integrated into infrastructure and project planning from the outset.
Risk & GovernanceConduct and document formal risk assessments, identify, evaluate, and communicate risk mitigation strategies.
Develop, update, and maintain cybersecurity policies, standards, and procedures aligned with the NIST framework.
Partner across the business to build awareness, ensure accountability, and foster a risk-informed culture.
Support security aspects of vendor assessments and technology evaluations.
Collaboration & Continuous ImprovementProvide security guidance for new initiatives, integrations, and system changes.
Contribute to incident response planning, tabletop exercises, and lessons-learned reviews.
Develop, maintain, and refine security operations and incident response playbooks to support consistent and effective response activities.
Stay informed on emerging threats, technologies, and best practices relevant to manufacturing and spirits production environments.
Who You Are… Required Skills and Experience:Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or equivalent experience along with Information Technology related associate's degree.
Minimum 5 years of experience in cybersecurity engineering and/or IT engineering.
Strong cloud security experience, including the design input, configuration, and operation of controls in cloud and hybrid environments.
Hands-on experience with Microsoft Entra ID (Azure AD), including Conditional Access, identity lifecycle management, and integration within hybrid Active Directory environments.
Experience with enterprise email security, endpoint protection, network security, data protection.
Experience implementing and managing Microsoft Purview for data protection, governance, and compliance.
Experience supporting third-party risk management or vendor assessments.
Strong understanding of identity, endpoint, and network security architectures and their integration across enterprise environments.
Experience performing root cause analysis during and after security incidents.
Experience developing or contributing to security documentation such as policies, standards, or procedures.
Strong communication skills across technical and non-technical audiences.
Experience in manufacturing or industrial environments.
Familiarity with OT/ICS security principles, including network segmentation, asset visibility, and industrial protocol security.
Valued but not Required Skills and Experience:Professional certifications such as CISSP, CISM, CRISC, or equivalent.
Understanding secure application deployment or DevSecOps principles.
Physical Requirements While performing duties of job, employee is occasionally required to:Stand; walk; use hands and fingers to handle or feel objects; use a computer; and reach with hands and arms.
Occasionally lift and/or move up to 20 pounds.
BenefitsPaid Vacation11 Paid HolidaysHealth, Dental & Vision eligibility from day one FSA/HSA401K match EAPMaternity/Paternity Leave Heaven Hill and its affiliates are committed to fostering a diverse workforce as an Equal Employment Opportunity company.
We invite applications from candidates of all backgrounds, without regard to race, religion, color, sex, sexual orientation, natural origin, gender identity or expression, age, disability, veteran status, or any other legally protected characteristic.
$69k-90k yearly est. 15d ago
Sr. Information Security Engineer
North Star Staffing Solutions
Information security analyst job in Goodlettsville, TN
Job Requirements & Qualifications: •Designs, put into practice, administers, and supports multiple informationsecurity platforms, systems, and applications. Supports a variety of technologies in a hands-on manner. •Performs internal security risk assessments, security risk assessments of third party business partners, and detailed security risk assessments of various technologies. (Examples include directory services, database platforms, client and server operating systems, programming languages, web services, firewalls, remote access technologies, messaging platforms, encryption solutions, wireless technologies, internally-hosted applications, externally-hosted applications, and cloud services).
•Supports defined Company operating principles via effective, pragmatic informationsecurity controls. Analyzes, defines, implements, and administers efficient business processes related to informationsecurity programs. Represents the informationsecurity function through pragmatic consultation and participation in a defined SDLC.
•Maintains knowledge of current and up-and-coming security, compliance, and technical developments. Identifies present and prospective future vulnerabilities and collaborates with suitable leaders to identify, recommend, and develop risk remediation plans, ad to track remediation outcomes and timelines.
•Works with the informationsecurity management team to administer, maintain, and continuously improve HIPAA, PCI DSS, SOX, and internal controls compliance programs, investigate known or suspected security incidents, support internal and external audits, and assist in the development of appropriate audit response Management Action Plans.
•Promotes security best practices via awareness, example, and compliance with policies and regulatory requirements.
•Uses project management best practices to initiate, manage, and close projects, often simultaneously across a variety of projects. Creates and maintains a variety of documents related to projects and informationsecurity.
•Guide and cross-train junior department team members lead meetings construct and uphold strong partnerships with multiple departments coordinate vendor support engagements etc.
Knowledge, Skills, and Abilities
•Knowledgeable with and ability to apply time-proven, generally-accepted security management concepts, techniques, and methodologies.
•Strong understanding of pragmatic implementation of informationsecurity controls, holistic defense-in-depth strategies, protocols used to interconnect networks, and publish application resources.
•Strong, efficient written and verbal communication skills that enables effective communications to multiple audiences.
•Ability to occasionally work unscheduled shifts and in an on-call capacity and be available for occasional travel (up to 25%).
•Strong internal (security recommendations) and external (vendor support) negotiation skills.
•Ability to influence and encourage others.
•Strong understanding of PCI, HIPAA, and SOC regulatory requirements.
•Development/analysis proficiency in one or more scripting languages.
•Development/analysis proficiency in TSQL.
•Capability to learn and preserve new skills required to adapt to growing business and technical environments.
•Strong perceptive of present and emergent informationsecurity technologies and trends.
Qualifications
Work Experience and/or Education
•Bachelor's and/or Master's degree in informationsecurity or computer information systems.
•6+ years of informationsecurity generalist experience (broad and deep in data, application, system, and network security domains) with complex technical initiatives.
•Active CISA, CISSP, or CISM certification.
•Experience identifying and addressing security risks associated with host and network operating systems (e.g. Windows, Linux, AS400, PAN OS, AIX, Cisco IOS, etc.) enterprise services (e.g. directory services, email, web publishing, database, virtualization, etc.) content management, client-server, and collaboration, thin-client, and web-based applications enterprise applications (e.g. Lawson) cloud services (e.g. SaaS, IaaS, etc.) data storage, etc.
•Hands-on SME/lead experience with the design, implementation, and administration of at least 5 of the following technologies: Palo Alto Networks, IBM Tivoli Endpoint Manager (BigFix), IBM QRadar (SIEM), Qualys Vulnerability Scanning Solutions, Tenable Nessus, Juniper SSL VPN GlobalScape EFT Server Symantec Data Loss Prevention (Vontu), RSA SecurID, and CyberArk Password Management.
Additional Information
$88k-117k yearly est. 1d ago
Night Shift Security Analyst
Arctiq
Information security analyst job in Brentwood, TN
Arctiq is a leader in professional IT services and managed services across three core Centers of Excellence: Enterprise Security, Modern Infrastructure and Platform Engineering. Renowned for our ability to architect intelligence, we connect, protect, and transform organizations, empowering them to thrive in today's digital landscape. Arctiq builds on decades of industry expertise and a customer-centric ethos to deliver exceptional value to clients across diverse industries.
Job Summary:
Do you have an analytical and flexible mindset, a demonstrated strong work ethic and are motivated to seek out and solve complex security problems? If so, Arctiq invites you to join their Security Operations Center team. As a Night Shift Security Operations Centre (SOC) Analyst, you will be responsible for handling cybersecurity events. Analyze and respond to alerts, compromise, breaches and proactively develop defensive measures and capabilities. Handle informationsecurity incidents and other adverse security events.
Responsibilities:
Monitor and triage security events, incidents, and alerts in a 24/7/365 environment.
Conduct initial triage and analysis of security events and incidents.
Escalate complex incidents to Tier 2/3 analysts as needed.
Respond to security incidents in accordance with established incident response procedures.
Participate in incident response activities and provide status updates to stakeholders.
Document and maintain an accurate record of all security incidents, events, and alerts.
Maintain a high level of awareness of current and emerging security threats and trends.
Collaborate with other teams and departments within the organization to resolve security incidents.
Continuously improve processes and procedures for incident response and security event management.
Provide excellent quality of Customer Service.
Meet or exceed customer expectation.
Understand the overall processes and procedures of the Arctiq SOC and the relevance of the procedures to the managed client.
Work non-traditional hours in a 24 x 7 service environment.
Experience
2+ years in an IT security role or IT support role with significant security responsibilities.
Demonstrated expertise in one or more of the following domains Data Security, Digital Forensics, Incident Response and Analysis, IT Systems and Operations, Network Security, Systems and Applications Security or Vulnerability Management.
Excellent oral and written communication skills.
Individuals will be required to submit to a background examination.
Demonstrated ability in effective communication and collaborating in a high-performance team environment.
Demonstrated commitment to customer service.
Experience functioning in diverse workgroups
Experience working with a SIEM
Arctiq is an equal opportunity employer. If you need any accommodations or adjustments throughout the interview process and beyond, please let us know. We celebrate our inclusive work environment and welcome members of all backgrounds and perspectives to apply.
We thank you for your interest in joining the Arctiq team! While we welcome all applicants, only those who are selected for an interview will be contacted.
$61k-84k yearly est. 11d ago
Information Systems and Analytics (Cybersecurity), Professional Practice-Track Faculty
MTSU Jobs
Information security analyst job in Murfreesboro, TN
Job Title
Information Systems and Analytics (Cybersecurity), Professional Practice-Track Faculty Department
Information Systems and Analytics
University Expectation
MTSU seeks candidates committed to innovative teaching and meaningful service. We also seek to attract culturally and academically diverse faculty who value working with diverse students.
Salary
The salary is commensurate with education and experience.
Job Summary/Basic Function
The Department of Information Systems and Analytics at Middle Tennessee State University invites applicants for a full-time professional practice-track faculty position in cybersecurity at the rank of assistant or associate professor. The start date for the position is August 1, 2026.
Required Education
A master's degree in information systems, cybersecurity, computer science or a closely related field is required by the appointment date.
Required Related Experience
Ten (10) years of professional experience in information technology, that includes experience in cybersecurity disciplines such as network security, ethical hacking/penetration testing, cyber analytics, incident response, or cyber defense.
Other Desirables
Applicants with demonstrated expertise in data analytics and curriculum development will receive special consideration.
Documents Needed to Apply
To successfully apply, applicants must include a cover letter, curriculum vitae, and statement of teaching philosophy as separate attachments at the time of online application.
Special Instruction to Applicants
For more information about serving as a faculty member at Middle Tennessee State University, please visit our faculty recruitment webpage.
If you need help applying, please contact Mitzi Dunkley, Faculty Recruitment Specialist, at **************. If you have position-specific questions, please contact Melinda Korzaan at ************************.
MTSU offers a comprehensive benefits package, including but not limited to the following:
Sick Leave
Vacation Leave for Administrative/Classified Staff/12-month Faculty
13 paid University holidays
Medical, dental, vision, and life insurance
Retirement plans
Optional 401K and 403B Deferred Compensation Plans
Educational benefits for the employee and their spouse and dependents
Click here for additional information.
MTSU is an equal opportunity employer. All qualified individuals are encouraged to apply.
Proof of U.S. citizenship or eligibility for U.S. employment is required before employment (Immigration Control Act of 1986). Clery Act crime statistics for MTSU are available at *********************************************** or by contacting MTSU Public Safety at **************.
MTSU is a Tobacco & Drug-Free campus.
This position requires a criminal background check. Therefore, you will be required to provide information about your criminal history to be considered.
For individuals requiring reasonable accommodation to apply: In compliance with the Americans with Disabilities Act Amendments Act (ADAAA), if you have a disability and would like to request an accommodation to apply for a position with MTSU, please call ************ or email ************.
Application Review Date: 11/03/2025
$76k-102k yearly est. Easy Apply 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Frankfort, KY
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including InformationSecurity, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 41d ago
Temporary- Cyber Security Analyst
Tennessee Board of Regents 4.0
Information security analyst job in Nashville, TN
Title: Temporary - Cyber SecurityAnalyst
Under the directive of the InformationSecurity Officer, the cyber securityanalyst will implement security strategies and best practices in accordance with regulatory standards.
ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in informationsecurity and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in informationsecurity, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of InformationSecurity Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 60d+ ago
Temporary- Cyber Security Analyst
The College System of Tennessee 3.9
Information security analyst job in Nashville, TN
Title: Temporary - Cyber SecurityAnalyst Under the directive of the InformationSecurity Officer, the cyber securityanalyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in informationsecurity and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in informationsecurity, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of InformationSecurity Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 3d ago
Security Analyst
Firstbank 4.6
Information security analyst job in Nashville, TN
Description This position administers the enforcement of corporate, regulatory, and risk management policies and assists in developing, implementing, and achieving the strategic goals of the InformationSecurity Program. The InformationSecurity program includes policies, standards, procedures, and controls (technical, administrative, and physical) to protect customer, consumer, and proprietary information against reasonably foreseeable risks. This role is responsible for management of or auditing and reporting on intrusion prevention systems, content filtering systems, SIEM and event management systems, Antivirus, and vulnerability assessment programs.ESSENTIAL FUNCTIONS:
Leading efforts to reduce overall risk by monitoring and tuning security alerts and investigating incidents.
Defining, planning, implementing, maintaining, and upgrading security measures, policies and controls.
Implement products and services as required to maintain compliance with existing, new, or changing regulations and auditing recommendations.
Administer security policies to control access to resources observing least privilege.
Manage and maintain patch installation for operating systems, software applications and Hardware as part of the overall vulnerability management system.
Create and maintain security documentation to include policies, standards, procedures, and reports as required to support the InformationSecurity program.
Protect systems by defining access privileges, control structures, and resources.
Work closely with technology and compliance teams for troubleshooting security related problems as well as identifying and implementing security strategy.
Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity, and make recommendations based on those findings,
Research attempts to compromise security posture and recommend solutions.
Manage the user awareness training program and provide additional end-user training as needed.
Design, implement, and report on security system activity, and perform end-user activity audits.
Work with vendors to arrange for upgrades, updates, patches and replacements on software and hardware.
Assist with 3rd party due diligence as pertains to cybersecurity best practices.
Perform other duties as assigned
KNOWLEDGE, SKILLS & ABILITIES: Education: A Bachelor's degree or 5 years of related experience.
Experience: 3+ years relevant InformationSecurity or IT Audit experience.
Certifications & Licenses: Relevant security or IT Audit certification.
FirstBank does not accept unsolicited resumes from agencies and staffing firms. Recruitment agencies and consultants may not submit resumes directly to managers. FirstBank will not pay fees to any third-party agency or company that does not have a signed agreement as an approved vendor. FirstBank in an Equal Opportunity Employer, including disability.
$60k-81k yearly est. Auto-Apply 45d ago
Physical Security Systems Engineer
xAI
Information security analyst job in Memphis, TN
xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates.
About the Role
As a Physical Security Systems Engineer at xAI, you'll design, implement, and maintain advanced security systems to safeguard our facilities, assets, and personnel. Working onsite in Memphis, Tennessee, you'll tackle complex challenges, leveraging your deep expertise in security technologies to strengthen our infrastructure at a fast-scaling company. Expect to dive into system optimization, ensure robust protection, and travel regularly to xAI sites to support our mission of accelerating human scientific discovery through AI.
This is an in-person role based in Memphis, Tennessee, with regular travel required to all xAI sites.
Responsibilities
Develop detailed design plans for the installation of physical security systems including access control, surveillance cameras, intrusion detection, and alarm systems.
Collaborate with InfoSec, IT and facility management teams to integrate security hardware with existing systems across locations.
Manage health and configuration of security network infrastructure
Regularly assess the performance of installed security systems and make necessary adjustments or upgrades.
Conduct preventive maintenance to ensure all security equipment is in optimal working condition.
Diagnose and resolve hardware issues promptly to minimize downtime and security risks.
Keep detailed records of all service and maintenance activities.
Participate in or lead security audits to identify vulnerabilities in physical security measures.
Recommend and implement solutions to address identified security gaps.
Liaise with vendors for procurement of security hardware, ensuring compliance with organizational standards and budget constraints.
Manage relationships with external contractors for installation and maintenance services.
Train security and facility staff on the use of new security systems.
Ensure all security hardware installations meet local, state, and federal regulations.
Maintain up-to-date documentation on system configurations, maintenance schedules, and security incident responses.
Required Qualifications
Minimum of 5 years in a role focused on physical security systems design.
Proven experience with CCTV, access control, and intrusion detection systems.
Experience using CAD software and reading architectural drawings
Experience using Bluebeam software
Preferred Qualifications
Bachelor's degree in Electrical Engineering, Computer Science, or related field; or equivalent experience in security systems.
Ability to interpret security objectives, develop project schedules and manage adherence to established timetables.
Familiarity with Genetec software is a plus.
Proficiency in hardware troubleshooting and system diagnostics.
Experience configuring security and network architecture in integrated security systems.
Familiarity with current security technology trends and innovations.
Certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional) are highly desirable.
Excellent problem-solving abilities and attention to detail.
Strong communication skills for effective collaboration with team members and stakeholders.
Ability to work under pressure in a dynamic environment on highly condensed timelines.
Regular sitting at a desk or computer for extended periods, typing and writing. Occasionally walking, around the facility and standing.
xAI is an equal opportunity employer. For details on data processing, view our
Recruitment Privacy Notice.
$65k-90k yearly est. Auto-Apply 2d ago
Analyst IT Report -Technology Development
Shelby County Schools 4.6
Information security analyst job in Memphis, TN
Destination 2025, our 10-year strategic plan, is designed not only to improve the quality of public education, but also to create a more knowledgeable, productive workforce and ultimately benefit our entire community. What will success look like in 2025?
By 2025, 80 percent of seniors will be on track to learn in a postsecondary classroom or enter the workforce straight out of high school; 90 percent of students will earn their high school diploma on time; and every student will enroll in a postsecondary opportunity college or career-ready.
We believe:
Proficiency in literacy is the foundation of all learning, and we are committed to making that a top priority for students.
As we raise expectations of our students, innovative and varied practices are needed in the classroom to provide students with learning experiences that will prepare them for life after graduation.
Successful teachers and leaders are the drivers for student success. That means continuing to provide educators with the support and tools needed to make classroom teaching impactful.
Although 2025 is in the future, the work is happening to produce engaged and prepared students.
By devoting time and other resources to schools, community members can have a direct impact on student achievement.
How will we get there?
Teachers, parents and community leaders have worked with us to develop the high-leverage priorities to focus all of our efforts and resources over the next 10 years - early literacy, post-secondary readiness, teacher and staff development, high quality schools and community engagement.
Job Description
Purpose and Scope 1. Work with the Leadership and Department to gather requirements to design, develop, test and deploy reports and strategic and operational dashboards.
2. Responsible for day-to-day designs, developments, monitoring and support of assigned reports and dashboards.
3. Develops Excel, SQL, or application specific reports.
4. Pulls data from various data sources and combine into a single report, either via Data Warehouse or through direct integration.
5. Builds reports to help identify data patterns to scrub/clean data and maintain good data hygiene.
6. Provide database development expertise (stored procedures, views etc.) for application development, design, implementation, verification, debugging, optimizing and maintenance of SQL Server database objects and process for the application, reporting and interface modules
7. Perform report development with strong stored procedure skills utilizing SQL Server 2008 R2, 2005, 2000
8. Design code and test SQL Server reporting services components (user interface, Stored Procedures, Tables etc.)
9. Experience in complete development lifecycle from requirements through deployment and maintenance
10. Provides end-user training on report writing software and support users in ad-hoc report creation.
11. Develops and applies solutions to complex problems which require the regular use of ingenuity and creativity and competency in SQL and EXCEL.
12. Converses with management to determine type, scope, and purpose of analyses. May lead a team in the effort. Works with other analysts and management to complete assigned project work.
13. Deals with complex problems and provides solutions that are innovative and ingenious, achieving quality and work process improvements.
14. May ensure that the workgroup's goals and activities are in sync with and support the broader goals and objectives of the organization; and that the execution of responsibilities are in accordance to lawful and ethical standards.
15. Directs and assists in the preparation and maintenance of a variety of narrative and statistical repmis, records, correspondence, and files related to assigned service, activities, and operations; provides for appropriate research and compiles reports, as needed.
16. Performs other related duties as assigned or directed.
Qualifications
Essential Job Functions Delivers at a high level of competency Information Technology software development. Assesses and performs analysis on data, and prepares data to facilitate Technical Services functions of organization. Responsibilities require understanding of both theory and practice. Minimum Qualifications Graduation from an accredited college or university with a Bachelor's Degree in Computer Science plus an additional four (4) years related experience, or equivalent, for a total education/experience of 8 years. Prefer experience with MS SQL Server 2008 R2, 2005 Reporting Services, Integration Services. Prefer 2+ years' experience in use and application of stored procedures, DTS package, SSIS package, and Crystal reports. Experience with multi-dimensional Data Sources, reporting tool such as MS Reporting services, Tableau preferred.
Degree Equivalency Formula:
Bachelor's Degree= 4 years plus required years of experience.
Master's Degree= 2 years plus required years of experience. Where Master's degrees are required, years for Bachelor's Degrees must be included. Knowledge, Skills, and Abilities Basic understanding and familiarity with database structure (particularly SQL).
Strong analytic and problem-solving skills, with the ability to swiftly and accurately understand complex data and perform analysis
Skill in developing data-supported solutions and using fact-based logic; ability to translate complex analysis in easy-to-understand manner and present to a broad audience
Strong written and verbal communication skills
Outstanding leadership skills and ability to build high-performing teams through both recruitment and selection and professional development
Ability to tackle the operational challenges of the merged school district in a complex, changing political and educational environment
Ability to manage daily administrative tasks without losing sight of long-term goals and planning
Additional Information
Why Memphis?
Shelby County
Schools-one of the 25 largest school districts in the nation-is located in
Memphis, TN, a
city
known for its great food, original music, professional sports, high-quality
arts in the most affordable urban setting in the nation
. Not only that, but Memphis is a hotbed and national leader
for groundbreaking work in education.
Benefits
:
SCS
benefits include the following:
State
retirement plan
Paid
holidays
Paid
vacation
Paid
sick days
Heath
Care Insurance (e.g. Medical, Dental)
$64k-88k yearly est. 1d ago
Network System Engineer (4059) INFORMATION SERVICES LCSB
Lexington Clinic 4.4
Information security analyst job in Lexington, KY
The Network System Engineer will be responsible for designing, implementing, and maintaining the clinic's network and telecommunications infrastructure. This role is to ensure the stability and integrity of voice, data, video, and wireless network services. This role will collaborate closely with the Chief Systems Architect, Director of IT Infrastructure and Operations, and other IT resources to execute the technology roadmap in alignment with the overall strategic plan. The Network Systems Engineer will also work closely with other internal and external resources as needed to perform their duties.
PREFERRED QUALIFICATIONS:
Education: A bachelor's degree in computer science, information technology, or a related field is preferred. However, industry experience and relevant certifications may be considered in place of a degree. i.e., Cisco Networking or Cisco Contact Center Certifications or CompTIA Network+ are a plus.
Experience: A minimum of 5 years of experience in design, implementation and support of enterprise network and telecommunication environments. Ideally the candidate will have experience in medium to large environments. Past experience in healthcare organization is a plus, but not a requirement.
Technical expertise: The ideal candidate should have experience or proficiency in configuring routers, switches, firewalls, VLANs, VPNs and other network devices according to design specifications. The ideal candidate should have some experience in support of enterprise phone systems including call center systems, call routing, etc. The candidate must have experience monitoring network performance, availability, and security to ensure optimal operation. Ability to maintain routine tasks, such as firmware updates and patching. Ability to troubleshoot and resolve network\phone system outages and performance issues in a timely manner. Maintain accurate and up-to-date documentation, including network and phone system diagrams, configurations, and inventory records. Analyze network and phone system usage patterns to plan for capacity upgrades and improvements as the organization grows. Provide guidance and support in maintaining phone extensions, call routing, voicemail and auto-attendant systems as needed.
Analytical and problem-solving skills: Must possess strong analytical and problem-solving skills to identify and solve complex issues efficiently and effectively.
Knowledge of industry regulations: S hould have a thorough understanding of industry regulations, such as HIPAA and HITECH, and ensure that all systems are designed and implemented in compliance with these regulations.
Collaborating with stakeholders: Must be able to collaborate with stakeholders across the organization, including business leaders, IT teams, and external partners. They must have excellent communication skills and be able to communicate effectively with technical and non-technical stakeholders to ensure that everyone is aligned and working towards the same goals.
Providing technical leadership: Should provide technical guidance to the technology team, leveraging their expertise in the technology landscape, industry trends, and emerging technologies to ensure that the organization is utilizing the most efficient and effective solutions.
Adaptability: Must be able to adapt to new technologies, software, and regulatory changes that arise as healthcare IT systems continue to evolve.
Project management skills: Should possess experience in project management, including planning, budgeting, and tracking progress to ensure timely project delivery.
Technology budgets: Should collaborate with all the IT Directors, to provide input on technology budgets for projects and initiatives.
Ensuring system security and stability: Responsible for ensuring that the organization's technology systems are secure and stable. They should work closely with all the IT Directors and security teams to ensure that systems are protected from potential threats.
Cisco Phone System Requirements: Demonstrated experience with Cisco enterprise phone systems, including configuration, deployment, and ongoing support. Ability to manage Cisco call routing, voicemail, auto-attendant, and call center features. Proficiency in troubleshooting Cisco phone system outages and performance issues. Maintain accurate documentation for Cisco phone system configurations and inventory.
Data Cabling & Punch Down Skills: Skilled in pulling, terminating, and testing data cables (Cat5e, Cat6, etc.) for network and phone systems. Ability to perform punch downs on patch panels, phone blocks, and network jacks according to industry standards.
Ensure all cabling work meets organizational and regulatory requirements for reliability and safety.
Switch & Wireless Access Point Deployment: Experience deploying, configuring, and maintaining enterprise-grade network switches. Ability to install and set up wireless access points, ensuring optimal coverage and security. Perform upgrades and expansions of network infrastructure as needed, including physical installation and logical configuration.
Familiarity with Data Rack Styles: Demonstrated knowledge of various data rack styles and configurations, including experience working in unconventional or challenging data closet environments. Ability to adapt installation and maintenance practices to suit unique physical layouts and constraints.
PHYSICAL GUIDELINES:
Physical guidelines include the ability to move, traverse, position self, remain in a stationary position and negotiate steps for up to eight hours per day; use basic office equipment; visual and auditory acuity.
NOTE:
This document is intended to describe the general nature and level of work performed. It is not intended to act as an exhaustive list of all duties, skills, and responsibilities required of personnel so classified. Attendance is an essential function of the job.
LEXINGTON CLINIC IS AN EQUAL OPPORTUNITY EMPLOYER (EOE)
$78k-99k yearly est. Auto-Apply 13d ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Mount Juliet, TN?
The average information security analyst in Mount Juliet, TN earns between $58,000 and $110,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Mount Juliet, TN