Post job

Information security analyst jobs in Phoenix, AZ - 139 jobs

All
Information Security Analyst
Cyber Security Analyst
Information Security Engineer
Securities Analyst
Senior Security Analyst
Information Assurance Engineer
Information Technology Analyst
Security System Engineer
Information Systems Security Officer
Senior Information Security Analyst
  • IT Security Compliance Analyst (NERC CIP)

    Optomi 4.5company rating

    Information security analyst job in Scottsdale, AZ

    IT Security Compliance Analyst (NERC CIP) - Hybrid in Scottsdale, AZ Optomi, in partnership with a leader in the energy space, is looking to add a Security Analyst over IT Compliance! The Security Compliance Analyst will manage and audit a NERC CIP Compliance program. They will also oversee the governance framework (policies and procedures), risk register, and cybersecurity training programs. Responsibilities include monitoring compliance deadlines, creating and updating IT and OT policies, and participating in audits. Responsibilities: Manage and monitor the NERC CIP Compliance program governance and execution Create, update, and adapt the IT Governance Framework Plan, implement, and audit IT and OT policies, procedures, standards, and baselines Participate in audits, including preparation, evidence gathering, and mitigation of findings Present policies and procedures to stakeholders Track and meet compliance deadlines for governance reviews Must Have Skills: 4+ years of experience with NERC CIP Compliance program management and execution 4+ years of experience in an IT Governance Analyst role 4+ years of experience with Governance, Risk, & Compliance programs 4+ years of experience writing policies, procedures, standards, & baselines 4-year degree in IT, Engineering, History, or Writing; or comparable work experience Strong interpersonal and communication skills Ability to manage simultaneous projects and exercise independent judgment Experience with Firewalls, Servers, Office 365 Security, and Endpoint Security Experience with IDS/IPS, SIEM, Identity Management, and network monitoring solutions Preferred Skills: Experience working in a SOC Experience with Penetration Testing, Red and Blue teaming Security and/or network certifications Great awareness of cybersecurity trends and hacking techniques
    $77k-107k yearly est. 3d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information Security Analyst 2

    Rogers Corporation 4.8company rating

    Information security analyst job in Chandler, AZ

    This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices. Essential Functions: - Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration. - Support data and asset risk. - Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats. - Address various security problems across a disperse set of assets. - Other duties as assigned. Qualifications: - Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree - 2+ years of progressive cybersecurity experience - Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets Full-Time
    $81k-124k yearly est. 26d ago
  • Cyber Security Analyst - Vulnerability Management

    Runbuggy Inc.

    Information security analyst job in Tempe, AZ

    Requirements What You Will Be Doing:: Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure. Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities. Ensure that releases and product changes are reviewed and approved by the Security Team. Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies. Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks. Schedule and assist with remediation efforts from external and internal penetration tests and assessments. Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts. Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program. Oversee and help execute manual code review of key product components for security improvements. Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap. Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security. Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services. Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform. Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders. Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures. Other duties as assigned. What You Bring to the Team by Way of Skills and Experience: Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains. 3+ years' relevant experience as a Vulnerability Analyst required. A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred. Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc. Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc. Knowledge of containerized web application architecture and related vulnerabilities and issues. Deep understanding of vulnerability management, including risk assessment and remediation planning. Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB. Experience with software development and delivery for a SaaS company. Familiarity with cybersecurity frameworks, such as NIST CSF. Attention to detail, QA skills, the ability to “think forward,” adept at problem solving and addressing issues and complications before they expand. Certificates, Licenses, and/or Registrations: Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: Market-competitive pay based on education, experience, and location. Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. Employee wellness program. Employee rewards, discounts, and recognition programs. Generous company-paid holidays (12 per year), vacation, and sick time. Paid paternity/maternity leave. Monthly connectivity/home office stipend if working from home 5 days a week. A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies. Salary Description $90k/yr.-$110k, DOE
    $90k-110k yearly 4d ago
  • Principal Security Information Analyst

    Gen Mobile 3.9company rating

    Information security analyst job in Tempe, AZ

    Principal Information Security Analyst (Tier 2) As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams. In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance. Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend. Key Responsibilities: Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities Support the execution of incident response playbooks Qualification and Work Experience: 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks) Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry) Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP) Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning Effective communication and documentation skills in English, both written and verbal Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage #LI-AS1 Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds. We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency. To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
    $81k-118k yearly est. Auto-Apply 56d ago
  • Principal Security Information Analyst

    Gen Digital

    Information security analyst job in Tempe, AZ

    Principal Information Security Analyst (Tier 2) As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams. In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance. Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend. Key Responsibilities: * Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity * Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms * Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools * Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency * Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements * Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities * Support the execution of incident response playbooks Qualification and Work Experience: * 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis * Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis * Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks) * Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry) * Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation * Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies * Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP) * Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows * Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration * Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning * Effective communication and documentation skills in English, both written and verbal * Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects * Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred * Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage #LI-AS1 Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds. We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency. To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
    $78k-114k yearly est. Auto-Apply 59d ago
  • Information Assurance Engineer

    General Dynamics Mission Systems 4.9company rating

    Information security analyst job in Scottsdale, AZ

    Basic Qualifications Requires a Bachelor's degree in Engineering, or a related Science, Technology or Mathematics field. Also requires 5+ years of job-related experience, or a Master's degree plus 3 years of job-related experience. CLEARANCE REQUIREMENTS: Ability to obtain a Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Responsibilities for this Position General Dynamics Mission Systems has an immediate need for an Information Assurance Engineer in Scottsdale, AZ. Knowledge, Skills and Abilities: Strong security mindset and comfortable questioning system behavior that is inconsistent with key security principles Self-directed/ self-starting ability Skilled at executing complex tasks Excellent ability in communicating issues, impacts, and corrective actions Cybersecurity System Engineering, Risk Management Framework, Defense in Depth Active cybersecurity certifications such as ISC2 CISSP (preferred), Security+, CEH Ground to Satellite communication knowledge Ground operations experience Performs requirements analysis, requirements definition, requirements management, functional analysis, performance analysis, system design, detail trade studies under leadership of lead Cybersecurity System Engineer. Performs customer requirements analysis, develops system requirements and defines allocations to lower levels (elements and components) Performs detailed technical analyses for a subsystem or system elements Develops and evaluates systems, networks and information systems to ensure designs meet applicable governmental security specifications Secure Software Factory / Secure DevSecOps System accreditation/certification evaluation and test support to ensure all technical security features (e.g., identification, authentication, access control, labeling, and auditing) of the system are considered and function properly Contributes to the completion of major programs and projects Plans and executes project tasks for activities described above Demonstrates good judgment in selecting methods and techniques for obtaining solutions Designs a complete and complex framework, system or product Multi-level security domain expertise (and cross-domain) Quickly (with a more agile light-weight approach) decomposing requirements to a level that can avoid requirements bloat (and communicate/track impacts) People that may have a working relationship with related people from Iridium, SDA, Northrup, York, and Lockheed People with agile program experience Must be able to obtain a DoD Secret Clearance #LI-Hybrid Salary Note This estimate represents the typical salary range for this position based on experience and other factors (geographic location, etc.). Actual pay may vary. This job posting will remain open until the position is filled. Combined Salary Range USD $112,924.00 - USD $125,275.00 /Yr. Company Overview General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 12,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high-performance team! Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $112.9k-125.3k yearly Auto-Apply 56d ago
  • Cyber Security Analyst

    Washington Elementary School District 6 4.6company rating

    Information security analyst job in Phoenix, AZ

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Summary: Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. High School diploma or equivalent (G.E.D.) prior to being hired; Valid Arizona Department of Transportation Driver's License; Minimum of one year of experience in information security, network security, or a related technology field. Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. Experience working in an educational or public sector environment. Knowledge of emerging security technologies and trends. Experience administering a Cisco Local and Wide area networking environment; Experience with border network security devices such as Email filters and Firewalls; Experience administering Windows Server and Active Directory. Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: Ability to work independently and collaboratively in a team environment. Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Familiarity with scripting languages like Python or PowerShell for automating security tasks. Knowledge of common security frameworks, such as NIST. Understanding of networking concepts, firewalls, and data encryption techniques. Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 34d ago
  • Security Analyst

    Collabera 4.5company rating

    Information security analyst job in Phoenix, AZ

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. • Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here) • Collabera listed in GS 100 - recognized for excellence and maturity • Collabera named among the Top 500 Diversity Owned Businesses • Collabera listed in GS 100 & ranked among top 10 service providers • Collabera was ranked: • 32 in the Top 100 Large Businesses in the U.S • 18 in Top 500 Diversity Owned Businesses in the U.S • 3 in the Top 100 Diversity Owned Businesses in New Jersey • 3 in the Top 100 Privately-held Businesses in New Jersey • 66th on FinTech 100 • 35th among top private companies in New Jersey *********************************************** Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Position Details: Job Title : Security Analyst Work Location : 3202 W Behrend Dr., Phoenix, AZ - 85027 Duration : 12+ Months (Possible Extension) Job Description: • 2-3 years experience in direct development of Java or .NET web applications with a SQL database. • Required to have 1-2 years hands-on experience performing real-world software vulnerability assessments using blackbox and whitebox tools. • Must have implemented secure software development techniques. • Completed software vulnerability training with blackbox/whitebox tool exposure. • Strong understanding of "OWASP top 10" vulnerabilities and how to remediate them. • Excellent verbal and written communication skills and ability to work with and provide guidance to software development teams. • Experienced conducting vulnerability report debrief sessions with software development teams. • Broad understanding of the IT systems, technologies, and solutions, and how security controls integrate with these systems. • Expertise with security technologies such as various penetration testing frameworks, vulnerability scanners, and source code scanners. • Experienced working with Eclipse IDE and/or .NET IDE. • Experienced working with Source Management systems. Additional Information Hiring Manager is available to interview ASAP. If you are interested with the Opportunity please reach me ************
    $63k-85k yearly est. 60d+ ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Information security analyst job in Scottsdale, AZ

    Job Description L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability. Powered by JazzHR 6oXedfgOJk
    $87k-119k yearly est. 33d ago
  • F-16 MTT Information Systems Security Officer (ISSO)

    Trident Military Systems

    Information security analyst job in Mesa, AZ

    Job Description Trident Military Systems is seeking an Information Systems Security Officer (ISSO) to support Air National Guard (ANG) F-16 Mission Tactics Trainer (MTT) simulators in Mesa, AZ. The successful individual will have an excellent knowledge of the Risk Management Framework (RMF), the documentation, roles and responsibilities, and how to work on a team pursuing cybersecurity practices compliant with policy, regulation, and best practices. Work will be assigned based on available resources among the teammates, prioritization from the Air Force customer, and recurring deliverables based on contractual obligations and clearly assigned with deadlines. Location: Mesa, AZ Required Travel: 0 - 10% What you will do Participate as a cyber team member as they plan, manage and execute all RMF requirements at the Mesa, AZ site to include: Risk management strategy, policies, awareness/trainings, assessments, continuous monitoring, authorizations, implementations, and remediation Manage life-cycle cybersecurity risk to Air Force information systems Ensure F-16 MTT IT assets are assessed for cybersecurity risk to the USAF, subsequent residual risk associated with security controls implementation is assessed and mitigated with Plans of Actions and Milestones (POA&M), aligns with DODI 8510.01, and as documented in the RMF security authorization package for USAF IT Ensure compliance of internal policies and procedures; and develop, review and complete interconnectivity requirement documents Perform the primary duties and responsibilities of an Information System Security Officer (ISSO) for F-16 MTT simulators Knowledge of RMF process, DoDI 8500.01, eMASS and/or other governing documentation Work directly with the ISSM/FSO to ensure program and overall security needs are met Assist in security configuration/STIG validation of all operating systems and network devices Collaborate to ensure all systems are compliant and in scope of current accreditation Perform audits against approved HW/SW lists to ensure system compliance with approved baseline Review ACAS/Nessus vulnerability scans Ensure data backups are occurring in accordance with the continuous monitoring policy Review audit logs in Splunk to detect suspicious or unauthorized activity Assist in authoring and editing Cybersecurity related documents (e.g., ISA, SLA, CIE) Other duties as assigned What you must have 9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; 4 years relevant experience with PhD or Juris Doctorate in related field; or High School Diploma or equivalent and 13 years relevant experience Certified Information Assurance Technical (IAT) Level II Knowledge of NIST, RMF, and DoD security requirements and guidelines Proven experience in risk assessment, security incident management, and security awareness training Excellent written and verbal communication skills Operating knowledge of Windows/Linux operating systems Ability to work in a team environment and independently Must be a US citizen, currently hold and able to maintain a Secret Security Clearance Preferred Requirements Experience with software/tools: Nessus/ACAS Splunk ePolicy Orchestrator SCAP Compliance Checker (SCC) STIG Viewer Prior experience working on DoD contracts Physical Requirements The physical requirements listed here are representative of those that are needed by an employee to successfully perform essential job duties. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential duties. Must be able to lift and/or move up to 40 pounds Must be able to walk and/or climb stairs and/or ladders into a simulator or airplane cockpit Must be able to stoop, bend, and crawl on top or under simulators Must be able to distinguish colors Must have ACTIVE DoD SECRET CLEARANCE with the ability to upgarde to SAP/SAR. Must be a US CITIZEN.
    $76k-107k yearly est. 21d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Phoenix, AZ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 53d ago
  • Security Analyst

    Link Technologies 4.0company rating

    Information security analyst job in Scottsdale, AZ

    Link Technologies is seeking a Software Development Architect for a well-established client in Scottsdale, AZ. Established in 2000, Link Technologies has provided professional services in the areas of Information Technology, Engineering, Business Support, Project Management, and Cyber Security/Information Assurance to some of America's top Corporations and Government Agencies at the Federal, State, and Local level. Seeking a Security Analyst for a 6-month contract to hire with a well-established client in the Scottsdale, AZ area Job Description Position Description: The Security Analyst is a member of the security team and performs technical activities for delivering effective host, network, data and application security services. This position will have primary responsibility for security platforms in the production and test environments and will monitor and maintain network and computer security policies with a focus on managing vulnerabilities. Major Areas of Responsibility: · Assists in planning, directing and coordinating activities, specifically relative to Information Security · Assists in developing and enforcing the organization's security policies, standards, and guidelines, security awareness, security information portion of the business continuity and disaster recovery plans, and all industry and government compliance issues · Assists in incorporating the design, deployment, management, control, and updating of platform and user-specific security policies on a diverse range of internal hardware platforms supporting various software and operating systems · Conducts risk management analysis to identify areas of risk and to develop security measures to prevent losses · Monitors use of data files and regulate access to safeguard information in computer files. · Works with business owners, IT managers, staff, and vendors in order to provide timely and efficient IT coordination of security services to meet the needs · Create reports on status of information security programs and projects, as required · Communicates with senior executives through oral and written reports and presentations, as required · Develops and implements IT system security plans, projects and initiatives · Plans, implements, manages, and coordinates security measures and controls for information systems to regulate access to computer data and prevent unauthorized modification, destruction, or disclosure of information Qualifications Requirements: • Bachelor degree or equivalent experience in engineering, technology, or related field • Minimum 2 years security experience • Extensive background with Nessus Vulnerability Scanner • Understanding of PEN testing performance and remediation • Experience with Microsoft Advanced Threat Analytics • Ability to create dashboards in Splunk Analytics • Solid understanding of Cisco ASA • Experience in identifying network security vulnerabilities • Willingness to respond swiftly and effectively to network security events • Must work well in a team environment • Must be self-motivated and able to work independently • Experience at working both independently and in a team-oriented, collaborative environment is essential • Can conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities • Reacts to project adjustments and alterations promptly and efficiently Working Conditions: • Expected work hours are Monday through Friday, regular business hours • Some travel required; may be extensive depending on project • Flexible during times of change Additional Information: • All candidates must be legally eligible to work for any employer in the United States without sponsorship or a third party employer • This role is on-site; remote work is not an option unless otherwise specified Additional Information All your information will be kept confidential according to EEO guidelines.
    $68k-95k yearly est. 1d ago
  • Information Security Analyst Senior

    Arizona Department of Administration 4.3company rating

    Information security analyst job in Phoenix, AZ

    DEPT OF EMERGENCY AND MILITARY AFFAIRS The Department of Emergency & Military Affairs (DEMA), led by The Adjutant General, provides emergency management and military capabilities to the citizens of Arizona and the nation. The Emergency Management Division consists of three sections-operations, preparedness, and financial administration. Each section works collaboratively across the agency and with external partners to manage emergency responses and reduce the impacts of disasters. Additionally, DEMA is the headquarters for the Arizona National Guard, the primary combat reserve of the United States military. The Arizona Army and Air National Guard provide military forces and equipment to accomplish community, state, and federal missions. INFORMATION SECURITY ANALYST SENIOR Job Location: Papago Park Military Reservation (PPMR), Phoenix, AZ Posting Details: Salary: Up to $37.7612 per hour (DOE) Grade: 24 Closing Date: January 15, 2026 Job Summary: Responsible for safeguarding computer systems and networks by conducting risk assessments, identifying vulnerabilities, responding to security incidents, and developing security policies and procedures. Key duties include monitoring systems for suspicious activity, performing technical analyses of breaches, and collaborating with other departments to implement and maintain strong security practices. Actively participates in promoting a continuous improvement of workplace culture, through the use of teamwork, root cause analysis and problem solving, standard operating procedures, and review of performance metrics. Job Duties: Responsibilities include: • Conducts audits of information systems compliance, to include network devices; servers; and end user devices, related to security standards, guides and application updates to enable and ensure accreditation of all systems IAW with all command, Army, and DOD security directives, policies and procedures. • Conducts investigations of security incidents, reports findings to leadership and remediates findings based on guidance from the Cybersecurity service provider and IAW with all command, Army, and DOD security directives, policies and procedures to include computer viruses and sanitation of highly classified information from organization. • Maintains an operational knowledge base of past, current and possible future threats to the security posture by attending courses, conferences, seminars, Online research, and information sharing between other Cybersecurity/Information Assurance professionals. Must anticipate the effects of new emerging technology and develop policies to control it to prevent security violations. • Troubleshoots problems and implements changes on multiple computer platforms. Diagnoses system failures to isolate source of problems between equipment, system software, and application programs. Provides solutions by modifying codes, devising fixes, documenting problems and advising responsible party. Interacts with peers and vendors to resolve hardware and software problems and reports unresolved problems. Knowledge, Skills & Abilities (KSAs): Knowledge of: • A variety of operating systems (ex. Windows OS.) on desktop and server. • Customer service and support principles and methods used to deliver a wide range of customer support services. • System software, hardware and networking and how they all interconnect/work together. • Applying methods for evaluating, implementing, and disseminating IT security tools and procedures. • IT security certification and accreditation requirements; network operations and protocols; and computer forensics principles. Skilled in: • Troubleshooting problems and implementing changes on multifaceted and interdependent computer platforms. • Applying IT security principles, methods, and tools. • Implementing and supporting IT security applications • Applying methods for evaluating, implementing, and disseminating IT security tools and procedures • Prioritizing and planning work activities; ensuring proper protection of evidence is used in investigating computer crimes. Ability to: • Utilize excellent interpersonal, written and oral communication skills. • Apply IT security certification and accreditation requirements. • Execute on network operations and protocols. • Prioritize workload based on Risk Management needs and impact to the organization. • Work within guidelines of established methods; obtain, clarify and provide information within established parameters and guidelines. Selective Preference(s): Desired qualifications include any combination of experience, education, and training that meets the knowledge, skills, and abilities as described. A Bachelor of Science degree in Information Technology, Cybersecurity, Information Systems, Data Science, Computer Science, or Software Engineering is preferred. Security+, Pentest+, SSCP, CEH, CCSP, GSEC certification are preferred. Pre-Employment Requirements: • This position requires possession of and ability to retain a current, valid Arizona state-issued driver's license appropriate to the assignment. Employees who drive on state business are subject to driver's license record checks, must maintain acceptable driving records and must complete any required driver training (see Arizona Administrative Code R2-10-207.12.) • Must be a U.S. citizen. • Candidates for this position will be required to submit to a criminal background investigation as well as possess the ability to achieve a favorable Tier 3 investigation for the purpose of obtaining/maintaining a Secret clearance eligibility and Common Access Card (CAC) within one year of hire. • This is an Information Assurance position. The candidate must meet the requirements for certification at Level II in the Information Assurance Technician within 6 months, or less, of appointment to this position. Certification requirements may be found in DODI 8140 and DOD 8570.01-M Information Assurance Workforce Improvement Program. This includes a Bachelor's degree of any kind and CompTIA Security+ certification or higher. If this position requires driving or the use of a vehicle as an essential function of the job to conduct State business, then the following requirements apply: Driver's License Requirements. All newly hired State employees are subject to and must successfully complete the Electronic Employment Eligibility Verification Program (E-Verify). Benefits: The State of Arizona offers a comprehensive benefits package to include: • Sick leave • Vacation with 10 paid holidays per year • Health and dental insurance • Retirement plan • Life insurance and long-term disability insurance • Optional employee benefits include short-term disability insurance, deferred compensation plans, and supplemental life insurance Learn more about the Paid Parental Leave pilot program here. For a complete list of benefits provided by The State of Arizona, please visit our benefits page Retirement: Eligible DEMA employees participate in excellent retirement programs provided by the Arizona State Retirement System (ASRS) and for fire personnel the Public Safety Personnel Retirement System (PSPRS). Contact Us: If you have any questions, please feel free to contact *************. DEMA is a smoke-free work environment. ADA/EEO Employer The State of Arizona is an Equal Opportunity and Reasonable Accommodation Employer
    $37.8 hourly 3d ago
  • Security Systems Engineer

    Exyte Group

    Information security analyst job in Chandler, AZ

    Discover your exciting role The Security Systems Engineer designs and implements security solutions to protect facilities, identifies vulnerabilities, and develops strategies to prevent unauthorized access, ensuring effective risk mitigation and compliance with security standards. Explore your tasks and responsibilities * Design and implement integrated security systems tailored for advanced technology and cleanroom environments. * Identify and assess vulnerabilities specific to sensitive facility operations and controlled environments. * Conduct comprehensive threat, risk, and vulnerability assessments for high-value assets and critical infrastructure. * Specify and deploy appropriate security devices and controls that do not compromise cleanroom protocols. * Consult with stakeholders on security requirements, best practices, and regulatory compliance. * Develop strategies to prevent unauthorized access while maintaining operational continuity. * Ensure all security solutions meet industry standards, facility-specific guidelines, and cleanroom requirements. * Collaborate with internal teams, external vendors, and facility managers to deliver effective technical solutions. * Support both large-scale and small-scale security projects, from design through commissioning and validation. * Prepare and maintain detailed documentation for security system designs, installations, and compliance audits. * Other duties as assigned Show your expertise Minimum Required * Bachelor's degree in Engineering or a related field. * 2-5 years of experience as a Security Systems Engineer or in a similar role, preferably in advanced technology or cleanroom facilities. Preferred * Relevant certifications (e.g., CISSP, PSP, or similar) are highly desirable. * Prior experience as a consulting engineer preferred * Prior experience with Advanced Technology * Experience working within a team environment * Experience in the quality control review process * Experience contributing to continuous improvement processes Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time. Non-Solicitation: We are not currently accepting third-party agency candidates for this position. Any agency candidate submitted to any employee of Exyte may be contacted by Exyte without obligation to the third-party agency. Exyte US, Inc. is proud to be an Affirmative Action and Equal Employment Opportunity employer that is committed to celebrating diversity and supporting an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance. We prohibit discrimination and harassment of any kind based on race, color, religion, age, sex (e.g., pregnancy, childbirth and related medical conditions, sexual orientation, gender identity or expression), national origin, disability status, genetic information, protected veteran status, or any other protected characteristic as outlined by federal, state, or local laws. Contact: You want to be part of the Exyte team? We look forward to receiving your application! For further questions and information, please do not hesitate to contact Phillip Turner via E-Mail at ************************ Please note that we only consider applications submitted through our application portal. Applications sent via email will not be considered due to data protection regulations.
    $78k-112k yearly est. Easy Apply 1d ago
  • Information Security Analyst 2

    Rogers Corporation 4.8company rating

    Information security analyst job in Chandler, AZ

    This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices. Essential Functions: * Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration. * Support data and asset risk. * Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats. * Address various security problems across a disperse set of assets. * Other duties as assigned. Qualifications: * Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree * 2+ years of progressive cybersecurity experience * Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
    $81k-124k yearly est. 26d ago
  • Cyber Security Analyst - Vulnerability Management

    Runbuggy OMI, Inc.

    Information security analyst job in Tempe, AZ

    About Us: RunBuggy is the most technically advanced automotive logistics platform on the market. Period. Backed by Porsche Ventures and Hearst Ventures, RunBuggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale. RunBuggy's end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, RunBuggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app. Since launching in 2019, RunBuggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S. We're not just building a better logistics platform - we're redefining the future of automotive transportation. About the Role: The Cybersecurity Analyst - Vulnerability Management plays a critical role in safeguarding our products and supporting infrastructure. This position is responsible for identifying and mitigating emerging threats, managing product-related security issues, and leading the vulnerability management program across the product lifecycle. Candidates must be authorized to work in the US for any employer and must be within a commutable distance of Tempe, AZ. Please do not apply if you do not meet these requirements. Candidates who include a cover letter explaining how their experience aligns with the position will receive priority in the review and interview process. Requirements What You Will Be Doing:: * Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure. * Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities. * Ensure that releases and product changes are reviewed and approved by the Security Team. * Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies. * Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks. * Schedule and assist with remediation efforts from external and internal penetration tests and assessments. * Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts. * Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program. * Oversee and help execute manual code review of key product components for security improvements. * Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap. * Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security. * Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services. * Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform. * Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders. * Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures. * Other duties as assigned. What You Bring to the Team by Way of Skills and Experience: * Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains. * 3+ years' relevant experience as a Vulnerability Analyst required. * A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred. * Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc. * Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc. * Knowledge of containerized web application architecture and related vulnerabilities and issues. * Deep understanding of vulnerability management, including risk assessment and remediation planning. * Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. * Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB. * Experience with software development and delivery for a SaaS company. * Familiarity with cybersecurity frameworks, such as NIST CSF. * Attention to detail, QA skills, the ability to "think forward," adept at problem solving and addressing issues and complications before they expand. Certificates, Licenses, and/or Registrations: * Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: * Market-competitive pay based on education, experience, and location. * Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. * Employee wellness program. * Employee rewards, discounts, and recognition programs. * Generous company-paid holidays (12 per year), vacation, and sick time. * Paid paternity/maternity leave. * Monthly connectivity/home office stipend if working from home 5 days a week. * A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies. Salary Description $90k/yr.-$110k, DOE
    $90k-110k yearly 23d ago
  • Information Assurance Engineer

    General Dynamics Mission Systems 4.9company rating

    Information security analyst job in Scottsdale, AZ

    Basic Qualifications Education Requirements: Requires a Bachelor's degree in Engineering, or a related Science, Technology or Mathematics field. Also requires 2+ years of job-related experience or a Master's degree. Clearance Requirements: Ability to obtain a Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Responsibilities for this Position Knowledge, Skills and Abilities: Solid application of systems engineering concepts, principles, and theories. Solid understanding of verification and validation process. Skilled in communicating issues, impacts, and corrective actions to leadership. Demonstrated ability to clearly recognize and report relevant system security concerns and issues. Ability to participate in and contribute to multiple work groups. Perform regular vulnerability scans using ACAS to identify security weaknesses and vulnerabilities within the system. Analyze scan results and provide detailed reports on findings, including risk assessments and recommended mitigations. Implement and manage system security patching processes to ensure timely updates and compliance with security policies. Collaborate with cross-functional teams to address vulnerabilities and ensure the security of all systems. Develop and maintain documentation related to security compliance, vulnerability management, and patch management processes. Stay current with the latest cybersecurity trends, threats, and technologies to proactively protect the organization's assets. Ensure compliance with relevant regulatory requirements and industry standards (e.g., NIST, RMF, STIG, etc.). Conduct security audits and assessments to verify compliance with established security policies and procedures. Reviews results of vulnerability assessments and code reviews and informs management of vulnerabilities, risk and mitigation. Proven ability to leverage technical expertise in the following: Nessus (ACAS) Vulnerability Assessment, installation, and management Security Technical Implementation Guide (STIGs) to identify, analyze, and remediate security threats Network and Systems Administration Implementing secure configurations based on NIST (800-53, 800-171) with Continuous Monitoring (CONMON) principles Knowledge of Risk Management Framework (RMF) is a plus Must be able to obtain a Secret Clearance #LI-Hybrid Salary Note This estimate represents the typical salary range for this position based on experience and other factors (geographic location, etc.). Actual pay may vary. This job posting will remain open until the position is filled. Combined Salary Range USD $95,384.00 - USD $105,817.00 /Yr. Company Overview General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 12,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high-performance team! Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $95.4k-105.8k yearly Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Washington Elementary School District 4.6company rating

    Information security analyst job in Phoenix, AZ

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: * Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. * Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. * Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. * User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. * Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. * Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. * High School diploma or equivalent (G.E.D.) prior to being hired; * Valid Arizona Department of Transportation Driver's License; * Minimum of one year of experience in information security, network security, or a related technology field. * Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. * Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. * Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. * Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. * Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. * Experience working in an educational or public sector environment. * Knowledge of emerging security technologies and trends. * Experience administering a Cisco Local and Wide area networking environment; * Experience with border network security devices such as Email filters and Firewalls; * Experience administering Windows Server and Active Directory. * Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: * Ability to work independently and collaboratively in a team environment. * Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. * Familiarity with scripting languages like Python or PowerShell for automating security tasks. * Knowledge of common security frameworks, such as NIST. * Understanding of networking concepts, firewalls, and data encryption techniques. * Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. * Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. * Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 35d ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Information security analyst job in Scottsdale, AZ

    L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
    $87k-119k yearly est. Auto-Apply 60d+ ago
  • IT Security Engineer (Tempe)

    Arizona Department of Education 4.3company rating

    Information security analyst job in Tempe, AZ

    IT Security Engineer (Tempe) Type: Charter Job ID: 131811 County: East Maricopa Contact Information: ASU Preparatory Academy 1130 E University Dr. #230 Tempe, Arizona 85044 District Website Contact: Kathy Piippo Phone: ************ Fax: District Email : Salary Range: $60,000.00 - $69,500.00 USD annually. As part of Arizona State University's charter to provide access and excellence, ASU Preparatory Academy (ASU Prep) shares this commitment by demonstrating all students can achieve at the highest levels, regardless of their background. To scale our current impact, ASU Prep is advancing a major expansion program taking fundamental responsibility for the communities we serve. The IT Security Engineer provides technical support for the school network infrastructure, ensuring reliable connectivity, server operations, and user access across all campuses. This position plays a key role in maintaining stable, secure, and efficient network systems to support teaching, learning, and administrative operations. QUALIFICATIONS: * Bachelor's degree in Computer Science, Information Technology or a related field, or an Associate's Degree, preferred. * Certifications such as Security+, Cysa+, CISSP or equivalent are strongly preferred. * 3+ years of progressive IT experience, including networking and infrastructure support. * 3+ years of experience delivering excellent customer service. * Knowledge of basic networking principles and troubleshooting. * Understanding of cybersecurity best practices, CIPA/FERPA compliance, and basic IAM principles. * Active AZ Department of Public Safety (DPS) IVP Fingerprint Clearance Card. * Any equivalent combination of experience, training and/or education from which comparable knowledge, skills and abilities may be considered. DUTIES AND RESPONSIBILITIES: * Work closely with IT teams, developers, and management to embed security into all aspects of technology operations. * Implement a user awareness program to reduce phish prone behavior among staff and students. * Conduct risk assessments and develop mitigation strategies to reduce exposure. * Manage and maintain security tools like antivirus software, SIEM (Security Information and Event Management) systems, and endpoint protection platforms. * Identify, design and implement security solutions like IDS, EDR, OS hardening, patch management, etc. * Proactively monitor network/software security events and assist teams to troubleshoot and mitigate. * Lead efforts to detect and manage vulnerabilities across the organization. * Conduct security audits to uncover weaknesses. * Collaborate with teams and leadership to develop and disseminate security policies, standards, and procedures. * Support content filtering tools and ensure compliance with CIPA, FERPA, and cybersecurity policies. * Maintain detailed documentation for security related activities. * Participate in IT planning sessions to align infrastructure decisions with instructional and organizational needs. * Coordinate with service providers and vendors including Arizona State University Enterprise Technology for security related advanced troubleshooting of network issues. * Additional duties will be assigned as needed. KNOWLEDGE, SKILLS AND ABILITIES: * Strong diagnostic and troubleshooting skills. * Effective communication and interpersonal skills, especially in high-stakes or customer-facing scenarios. * Strong organizational skills and a solution-focused attitude. * Knowledge of common information systems, connectivity, integrations from a security perspective. * Effective organizational skills. * Effective written and oral communication. * Demonstrated knowledge in Edtech is a plus. * Demonstrated knowledge with common e-learning tools and platforms is a plus. PHYSICAL DEMANDS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand and talk or hear and sometimes walk and sit. The employee must use hands, arms and fingers to input data, handle, feel or reach. While performing the duties of this job, the employee may occasionally push or lift up to 30 lbs. such as boxes, supplies, etc. Specific vision abilities required by this job include close vision such as to read handwritten or typed material, and the ability to adjust focus, close vision, distance vision, color vision, peripheral vision and depth perception. LOCATION: UCENT - Hybrid TRAVEL: Travel required to all sites, meetings, trainings and/or conferences and occasional overnight travel may be required. This job description is subject to change at any time. Other: What about learning drives us to do more than deliver the lesson? Maybe we're overachievers. Or maybe we just know what real impact looks like. Each one of us has seen passion win over fear, vision become relentless focus and belief in human potential make it all the way to the finish line. Our mission is to design new models for educational success and raise academic achievement for all learners. Are you ready to find a career with a company whose mission, vision, and values align with yours? Can you see yourself fitting into this mission with us? For more information please visit: ********************************
    $60k-69.5k yearly 17d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Phoenix, AZ?

The average information security analyst in Phoenix, AZ earns between $66,000 and $135,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Phoenix, AZ

$95,000

What are the biggest employers of Information Security Analysts in Phoenix, AZ?

The biggest employers of Information Security Analysts in Phoenix, AZ are:
  1. Citizens Financial Group
  2. Motion Recruitment
  3. Citizens Alliance
Job type you want
Full Time
Part Time
Internship
Temporary