Post job

Information security analyst jobs in Radcliff, KY

- 163 jobs
All
Information Security Analyst
Cyber Security Analyst
Cyber Security Engineer
Senior Security Analyst
Senior Security Specialist
Security System Engineer
Data Security Analyst
Security Engineer
Information Security Director
Information Systems Security Officer
Information Technology Analyst
Senior Information Security Consultant
Information Security Engineer
Information Systems Engineer
  • Information Security Analyst (W2 Contract)

    CBTS 4.9company rating

    Information security analyst job in Indianapolis, IN

    Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS-IT) under the guidance of the Security Manager. The essential functions of this role are as follows: Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement; Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment. Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits. Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53). Develops Standard Operating Procedures (SOP) for implementing security polices; Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems; Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data; Develops and implements procedures for use of information security management software; Proposes information security software enhancements; Performs periodic audits to assure security policies and standards are being followed and are effective. Develops recommendations for enhancements and generates reports where necessary; Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security; Mentors and provides guidance to new or other staff as needed; Performs related duties as assigned. Assist on other task as assigned. Thorough knowledge of information security management tools, policies, and standards of information security procedures; Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy; Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation; Familiarity with domain structures, user authentication, and digital signatures; Ability to develop and maintain information security standards; Ability to understand and apply complex computer logic to work; Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management; Experience in assessing security needs of teams and assist in their security training. Ability to communicate effectively both orally and in writing; Ability to be a team member as well as a team leader depending on the situation; Degree in information security or technology preferred; Security certification preferred (e.g. CISSP). Network Admin experience preferred.
    $60k-86k yearly est. 1d ago
  • Information Security Analyst

    State of Indiana 4.3company rating

    Information security analyst job in Indianapolis, IN

    Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS-IT) under the guidance of the Security Manager. The essential functions of this role are as follows: • Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement; • Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment. • Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits. • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53). • Develops Standard Operating Procedures (SOP) for implementing security polices; • Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems; • Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data; • Develops and implements procedures for use of information security management software; • Proposes information security software enhancements; • Performs periodic audits to assure security policies and standards are being followed and are effective. • Develops recommendations for enhancements and generates reports where necessary; • Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security; • Mentors and provides guidance to new or other staff as needed; • Performs related duties as assigned. • Assist on other task as assigned. Thorough knowledge of information security management tools, policies, and standards of information security procedures; • Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy; • Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation; • Familiarity with domain structures, user authentication, and digital signatures; • Ability to develop and maintain information security standards; • Ability to understand and apply complex computer logic to work; • Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management; • Experience in assessing security needs of teams and assist in their security training. • Ability to communicate effectively both orally and in writing; • Ability to be a team member as well as a team leader depending on the situation; • Degree in information security or technology preferred; • Security certification preferred (e.g. CISSP). • Network Admin experience preferred. Supervisory Responsibilities/Direct Reports: This role does not provide direct supervision to direct reports.
    $34k-44k yearly est. 3d ago
  • Information Security Analyst

    Java Developer In Pune

    Information security analyst job in Indiana

    What you will do: Respond to security incidents as part of the Incident Response Team. Research attempted or successful efforts to compromise systems security, determines causes of security violations, and designs countermeasures. Analyse network access requests and make recommendations to management around risks posed by proposed changes Utilize analytical and investigative processes to perform threat hunting activities across the organization. Analyse existing SIEM correlation rules and make tuning recommendations. Contribute to align to security best practice, mitigate known risks and align with business compliance objectives Assist other security operational teams with daily tasks such as account management/role assignments, access reviews, patch management operations, audit/testing remediation. Create and update documentation and train peers. Requirement: You're curious, passionate, authentic, and accountable. These are our values and influence everything we do. Open-minded and self-motivated to proactively contribute to the SAS Information Security program. 2-3 years of information security experience. Demonstrated experience of various IT platforms (i.e. networking, system admin, scripting etc.). Demonstrate experience with some of the following systems/methodologies or be interested in expanding domain expertise to include: Networking Enterprise ticketing systems (e.g. ServiceNow) Cloud technologies (e.g. Azure, AWS, O365, GCP) Scripting languages (Python, Shell, PowerShell) Log management/SIEMs (e.g. Azure Sentinel , Splunk) IDS/IPS Web content filtering DLP EDR EPM Active Directory/Azure AD Identity Management & Governance Container Security Application Security (SCA, DAST, SAST) Threat & Vulnerability Management Email Security Bug Bounty Program Public Key Infrastructure (PKI) and TLS Certificate Strong verbal and written communication and interpersonal skills as you will be interfacing with many internal customers. Ability to juggle multiple projects and priorities. Willing to work in shifts
    $65k-92k yearly est. Auto-Apply 28d ago
  • IT Security Analyst - IT Solutions - Indianapolis, IN

    American Structurepoint Engineering Traffic Project Manager In Indianapolis, Indiana 4.6company rating

    Information security analyst job in Indianapolis, IN

    Join American Structurepoint and become part of a team that goes the extra mile for our clients and communities. We live by our values - respect, staff development, results and family. Our team is encouraged to explore new ideas and turn our clients' dreams into reality. With exceptional benefits, training, and mentorship, we pave the way for a rewarding career. Ready for more than just a job? Explore opportunities with us and help improve the quality of life in the communities we serve. Group: Information Technology Position: IT Security Analyst Location: Indianapolis, IN Are you passionate about cybersecurity and ready to protect the digital backbone of an innovative engineering firm? We're looking for a skilled IT Security Analyst to join our team and help secure mission-critical systems, proprietary data, and infrastructure. Join a team where your cybersecurity expertise directly supports groundbreaking engineering projects. Apply now or message us to learn more! Responsibilities • Monitor and analyze network traffic for threats and vulnerabilities • Conduct regular security assessments and penetration testing • Work collaboratively with Infrastructure team to learn and review firewalls, antivirus, and intrusion detection/prevention systems - Maintain Secure by Design Approach • Investigate and respond to security incidents • Continually develop (update) and implement cybersecurity policies and procedures • Collaborate with engineering and IT teams to secure sensitive project data • Stay ahead of emerging threats and technologies • Be passionate about: o Learning new technologies o Working collaboratively in a team atmosphere Qualifications Must-Haves: • Bachelor's degree in Computer Science, Cybersecurity, or related field • 3+ years of experience in IT security roles • Strong knowledge of network protocols, firewalls, and endpoint protection • Experience with SIEM tools - Understand and develop queries and expressions • Basic Understanding of NIST, SOC2, CMMC or similar frameworks • Excellent communication and problem-solving skills • Excellent written and documentation skills Nice-to-Haves: • Certifications: CISSP, CISM, CEH, or Security+ • Experience with cloud security (AWS, Azure) • Scripting knowledge (Python, PowerShell) • Exposure to engineering software platforms (AutoCAD, SolidWorks) • Familiarity with Zero Trust architecture
    $69k-98k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    OSC Global

    Information security analyst job in Radcliff, KY

    OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team. OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge. Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world. OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits. Position Overview The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks. Major Activities Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager. Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks. Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions. Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements. Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations Review and investigate security alerts and incidents from Microsoft 365 Defender Utilize eMASS to maintain and update POA&M status Review device compliance status from HBSS Work with other NEC Operations team members to remediate and mitigate security vulnerabilities. Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture. Perform other duties as appropriate and as assigned. Knowledge/Skills/Abilities Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months. Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management. Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills. Great analytical, critical thinking and problem-solving abilities. Superior presentation and negotiation skills. Strong management and organizational skills. Adaptable and capable of working in fast-paced environments. Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint Required Qualifications Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS Must possess appropriate DISA ESS certifications and experience. Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP) Must be US citizen Must possess active secret security clearance or higher Must be able to pass pre-employment background check Preferred Qualifications Bachelor's degree in IT, IM, or Cyber Security ACAS certification obtained within the last three (3) years, preferred HBSS Administrator certification obtained within the last three (3) years, preferred E-Verify: OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization. Reasonable Accommodation: OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
    $64k-88k yearly est. 15d ago
  • Information Security Analyst

    Vergence 3.3company rating

    Information security analyst job in Indianapolis, IN

    . Must live in the Indianapolis area. Pay: $42.70/hour In this role you will: • Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement • Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment • Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53) • Develop Standard Operating Procedures (SOP) for implementing security polices • Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems • Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data • Develop and implement procedures for use of information security management software • Propose information security software enhancements • Perform periodic audits to assure security policies and standards are being followed and are effective • Develop recommendations for enhancements and generates reports where necessary • Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
    $42.7 hourly 21d ago
  • Data Security Analyst

    Exeter Government Servi 4.1company rating

    Information security analyst job in Fort Knox, KY

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies. Required Qualifications: Experience in administrative support & MS Office proficiency Bachelor's degree or 5 years of experience U.S. citizen and MUST possess a current active DoD Secret clearance Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $64k-88k yearly est. Auto-Apply 60d+ ago
  • Information Security Specialist

    Starplus Energy

    Information security analyst job in Kokomo, IN

    The Information Security Specialist supports the planning, implementation, and operation of StarPlus Energy's global and local security management systems. This position ensures compliance with international and Korean security regulations, establishes physical and IT infrastructure security systems, and coordinates with both corporate headquarters and Korean government authorities to prevent information leaks and respond to potential security threats. This position reports to the Information Security Manager. Roles & Responsibilities: Plan, develop, and operate corporate information security systems for facility and IT infrastructure protection Establish incident response procedures and maintain readiness against internal and external security threats Develop and operate the site's physical security management system, including access control, CCTV, and intrusion detection system Manage and oversee external security service providers (e.g., physical security guards, monitoring services, and system maintenance vendors) to sure proper performance and contract compliance Support vendor performance evaluations, documentation, and corrective actions when service issues arise Define and enforce information protection policies and procedures to ensure consistent implementation across the organization Establish and operate a security management framework for Korean National Core Technology (KNCT) compliance Assign protection grades, define and manage secure communication systems, and safeguard all data and documentation related to KNCT Coordinate and conduct security education and training for employees Develop and maintain incident response systems to address potential data or technology leakage Support internal and external security audits and inspections from Korean government and SDI Headquarters Perform security infrastructure vulnerability assessments and implement corrective actions as needed Prepare technical report, standard operating procedures (SOPs), and other documentation required for compliance and audit response Perform other position related duties as assigned
    $65k-92k yearly est. 5d ago
  • Information Security Analyst

    Novalink Solutions 3.1company rating

    Information security analyst job in Indianapolis, IN

    Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS -IT) under the guidance of the Security Manager. The essential functions of this role are as follows: • Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement; • Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment. • Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits. • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800 -53). • Develops Standard Operating Procedures (SOP) for implementing security polices; • Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems; • Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data; • Develops and implements procedures for use of information security management software; • Proposes information security software enhancements; • Performs periodic audits to assure security policies and standards are being followed and are effective. • Develops recommendations for enhancements and generates reports where necessary; • Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security; • Mentors and provides guidance to new or other staff as needed; • Performs related duties as assigned. • Assist on other task as assigned. Thorough knowledge of information security management tools, policies, and standards of information security procedures; • Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy; • Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation; • Familiarity with domain structures, user authentication, and digital signatures; • Ability to develop and maintain information security standards; • Ability to understand and apply complex computer logic to work; • Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management; • Experience in assessing security needs of teams and assist in their security training. • Ability to communicate effectively both orally and in writing; • Ability to be a team member as well as a team leader depending on the situation; • Degree in information security or technology preferred; • Security certification preferred (e.g. CISSP). • Network Admin experience preferred. Supervisory Responsibilities/Direct Reports: This role does not provide direct supervision to direct reports. Required / Desired Skills Skill Required / Desired Amount of Experience To be effectively with wide range of information technologists, including systems administrators, technical support, application development, end users Required 3 Years Network Admin experience Required 3 Years Security certification (e.g. CISSP, CRISC) Required 3 Years Ability to develop and maintain information security standards; Required 1 Years Ability to understand and apply complex computer logic to work Required 1 Years Degree in information security or technology Required 1 Years Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc.) Required Computer security compliance and auditing experience Required IRS, SSA computer security compliance and audit experience Required HIPAA experience Required
    $68k-98k yearly est. 20d ago
  • IT Compliance and Risk Management Analyst/ IT Security Analyst/ IT Auditor/ PCI Analyst (Cont to Hire)

    Collabera 4.5company rating

    Information security analyst job in Columbus, IN

    Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace. With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance. Location: Columbus, IN 47201 Job Title: Sr. IT Compliance and Risk Management Analyst Duration: 6 months (Contract to Hire) Job description: •Responsible for the execution of compliance audits. Reviews procedures and corresponding evidence to determine whether or not internal controls are being properly applied. •Leads or executes compliance audits and risk assessments within established control areas. •Tests and documents more complex computer system records for information system integrity and transaction accuracy; reports discrepancies. •Prepares less complex audit plans or assists with more complex plans. •Prepares formal written reports to communicate audit results to management, and makes recommendations as appropriate; defines compliance issues and identifies root causes for review by manager. •May provide technical guidance to contract audit staff to ensure that audit objectives are met. •May coach and mentor less experienced analysts. Qualifications • Bachelors Degree Required: PCI (Payment Card Industry)- this is a higher level position and only looking for PCI SME (Subject Matter Expert) experience. • Must Have IT Compliance Experience with PCI Management Side experience • This manager is looking for a candidate that has seasoned PCI Experience on is a subject matter ex]pert and worked with the management side if PCI with the ability to set the right type of internal controls. Additional Information If interested please contact: Himanshu Prajapat ************ himanshu.prajapat(@)collabera.com
    $65k-88k yearly est. 6h ago
  • Snr Info Security Analyst - M&R-DLP

    Standard Chartered 4.8company rating

    Information security analyst job in Indiana

    Apply now Work Type: Office Working Employment Type: Permanent Job Description: Key Responsibilities Cyber Security Incident Management Operations: * Monitor, detect & respond to any potential security threats and risks to the organisation, using the available technology toolset * Correlate and consolidate the alerts, reports, anomalies and other intelligence sources, put the threat/risk in context, and determine event/incident urgency and priority, and initiate an appropriate response * Continuously improve the accuracy and relevance of the Bank's detection tools and capabilities to keep pace with changing environments and regulatory/compliance requirements * Adhere to the defined security monitoring processes and procedures, and initiate improvements to them, driving maturity and relevance * Track and report the remediation of cybersecurity threats and risks, and provide domain expertise during remediation to the appropriate support groups * Track and document cybersecurity incidents from initial detection through final resolution * Operate within established standard operating procedures to handle security incidents * Research trends and countermeasures in computer/network vulnerabilities, exploits, and malicious activity * Support senior incident handlers during cybersecurity incident response activities * Perform root cause analyses and present findings to relevant stakeholders for remediation * Work closely with the other support groups to assess risk and provide recommendations for improving the Bank's security posture Strategy * Monitor, detect & respond to any potential security threats across the Bank to ensure all events are acted on in a timely manner. Business * Support senior incident handlers during cybersecurity incident response activities. * Work closely with the other support groups to assess risk and provide recommendations for improving the Bank's security posture. * Identify opportunities to improve detection and response capabilities of the team * Work with content engineering team to monitor and tune alerts. * Conduct research on attack patterns, techniques, and develop creative solutions to detect/prevent adversarial tools, techniques and procedures. * Collaborate with key stakeholders to continuously enhance playbooks as new products, logs, and capabilities are introduced to the organization. * Collaborate with key stakeholders in improving the Bank's detection posture. Processes * Ensure adherence to all internal and external policies, procedures and regulations. Risk Management * Be aware of, identify and escalate all risk issues and concentrations in accordance to the firm's Group Information and Cyber Security Policy. Where appropriate, direct remedial action and/or ensure adequate reporting to Risk Committees. Governance * Promote an environment where compliance with internal control functions and the external regulatory framework is a central priority of the service. Regulatory & Business Conduct: * Display exemplary conduct and live by the Group's Values and Code of Conduct. * Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct. * Effectively and collaboratively identify, escalate, mitigate and resolve risk, conduct and compliance matters. Key stakeholders * Tech, Transform and Ops * Cyber Security * Cyber Defence & Ops Technology * Cyber Defence Centre * Security Monitoring & Analytics * Group Threat Management Other Responsibilities: * Work within a 24x7 shift model * Provide after-hours rotational coverage when required Skills and Experience * Well-versed in Cybersecurity Incident Analysis and Response and Cybersecurity Defensive Operations (Blue Team) * Strong understanding of core Enterprise Information Technology and Computer Networking concepts (Desktop/Laptop, Mobile Device, Server, Network Device, LAN and WAN) * Basic knowledge of selected IT Service Management (ITSM) processes (Event Management, Incident Management, Change Management, Service Assets and Configuration Management, Service Level Management) * Exposure to Security Information and Event Management solutions, preferably Splunk ES. User Behaviour Analytics (UBA) exposure is desirable * Exposure to Endpoint Security and/or Endpoint Detection and Response tools, preferably Symantec * Demonstrated ability to work with a diverse, geographically-dispersed team Qualifications * Diploma or higher educational qualification in Engineering, Computer Science/Information Technology or an equivalent qualification in a relevant discipline * The following certifications are desirable but not mandatory: EC Council Certified Ethical Hacker (CEH), EC Council Certified Security Analyst (ECSA), SANS GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), Axelos Information Technology Infrastructure Library (ITIL) v3 Foundation About Standard Chartered We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion. Together we: * Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do * Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well * Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What we offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. * Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. * Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. * Flexible working options based around home and office locations, with flexible working patterns. * Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits * A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. * Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential. Apply now Information at a Glance * * * * *
    $68k-91k yearly est. 23d ago
  • Senior Security Operations Analyst

    RWS 4.0company rating

    Information security analyst job in Indiana

    Job Purpose Job Purpose The Senior SecOps Analyst will support the organization's cybersecurity operations by managing and maintaining security tools, responding to incidents, and assisting in vulnerability management. About Product & Technology Product & Technology plays a pivotal role in aligning the organization with its strategic objectives and enhancing shareholder value. Product & Technology is responsible for establishing unified standards and governance practices throughout the company. Additionally, we oversee the development and maintenance of core applications essential for the seamless operation of various functions across the organization. We are committed to driving and executing future roadmaps that are in line with the overall strategic direction of RWS. With a global reach, Product & Technology provides support services to over 7500 end users worldwide. We take pride in managing the information security operation and safeguarding all our assets. Our core functions encompass Enterprise & Technical Architecture, Network & Voice, Infrastructure, Service Delivery, Service Operations, Data & Analytics, Security & Quality Compliance, Transformation, Application Development, Enterprise Platforms, With a dedicated team of over 500 staff, Product & Technology ensures a strong presence across all regions, enabling efficient and effective support to our global operations. Job Overview Key Responsibilities Operate and maintain cybersecurity monitoring and response tools to ensure optimal performance and recommend improvements where necessary. Utilize automation techniques to enhance the effectiveness and efficiency of operational security tasks. Collaborate with IT Infrastructure teams to implement automated solutions that improve security tooling and associated platforms. Respond to cybersecurity threats and incidents detected by security tools, processes, and Managed Detection and Response (MDR) partners. Follow established incident response processes and runbooks and contribute to their continuous improvement. Support the implementation and operation of the Vulnerability Management program. Monitor for new vulnerabilities, assess potential business impact, and assist in coordinating remediation activities. Perform core tasks such as monitoring and resolving support tickets related to security tooling. Ensure cybersecurity tools are up to date, healthy, and fully functional. Provide advice and guidance on cybersecurity to other areas of the organization when required. Assist with security audits by gathering and sharing information and evidence related to security control configuration and performance. Skills & Experience Experience in a similar role in Security Operations Experience of key cybersecurity controls such as Anti-malware, EDR/XDR/NDR, SIEM, Email and Web Security, Vulnerability Management, SOAR/automation Understanding of common cybersecurity threats and mitigation techniques with a keen interest in keeping your knowledge and skills up to date Understanding of Cloud security fundamentals, including how to monitor and secure IaaS, PaaS and SaaS platforms, Azure AD, Microsoft 365 and Azure Security, CSPM Strong general IT skills and a good understanding of IT Infrastructure, including Windows laptops and servers, cloud platforms such as Microsoft Azure/Office 365/AWS, networking and firewalls. Experience or a strong desire to learn scripting and automation techniques such as Python An analytical mindset with strong problem-solving skills. Excellent communication skills, both written and verbal, able to explain technical information in a simplistic manner. Ability to show leadership and mentor less experienced members of the team. Life at RWS Life at RWS - If you like the idea of working with smart people who are passionate about growing the value of ideas, data and content by making sure organizations are understood, then you'll love life at RWS. Our purpose is to unlock global understanding. This means our work fundamentally recognizes the value of every language and culture. So, we celebrate difference, we are inclusive and believe that diversity makes us strong. We want every employee to grow as an individual and excel in their career. In return, we expect all our people to live by the values that unite us: to partner, putting clients fist and winning together, to pioneer, innovating fearlessly and leading with vision and courage, to progress, aiming high and growing through actions and to deliver, owning the outcome and building trust with our colleagues and clients. RWS embraces DEI and promotes equal opportunity, we are an Equal Opportunity Employer and prohibit discrimination and harassment of any kind. RWS is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions at RWS are based on business needs, job requirements and individual qualifications, without regard to race, religion, nationality, ethnicity, sex, age, disability, or sexual orientation. RWS will not tolerate discrimination based on any of these characteristics. RWS Values Get the 3Ps right - Partner, Pioneer, Progress - and we´ll Deliver together as RWS. Recruitment Agencies: RWS Holdings PLC does not accept agency resumes. Please do not forward any unsolicited resumes to any RWS employees. Any unsolicited resume received will be treated as the property of RWS and Terms & Conditions associated with the use of such resume will be considered null and void.
    $84k-113k yearly est. Auto-Apply 7d ago
  • Information Security Engineer

    Heaven Hill Brands 4.6company rating

    Information security analyst job in Louisville, KY

    Job Description: with a base location in Louisville, KY. What the Role Is The Information Security Engineer is responsible for strengthening and supporting Heaven Hill's cybersecurity program. This hands-on technical role focuses on implementation, monitoring, and continuous improvement of security controls across cloud and on-premise environments. The Engineer supports governance and risk management efforts and plays a key role in incident response and in deploying and maintaining secure technology solutions. This position will collaborate with IT and business units to ensure Heaven Hill's data and systems remain resilient against evolving threats, while helping enable secure and efficient access through identity and access management solutions. This role is instrumental in advancing Heaven Hill's overall security maturity and ensuring that cybersecurity enables, rather than limits, innovation and operational excellence. How You Will Spend Your Time? Security Engineering & OperationsDesign, implement, monitor, and maintain security controls across cloud, identity, endpoint, and network environments. Implement and manage Privileged Access Management (PAM) and Role-Based Access Control (RBAC) programs that align with business needs and support POLP (Principle of Least Privilege). Support and enhance Identity Management solutions, including user provisioning, Single Sign-On (SSO) integrations, and secure application configurations. Support secure configuration and hardening of Windows and Linux servers, as well as Windows and mac OS workstations. Manage and maintain DNS and domain registrar configurations to ensure secure and reliable name resolution and domain integrity. Implement, integrate, and manage authentication, including Kerberos, FIDO2, Smart Cards, passkeys, certificate-based authentication, and TLS or key management solutions. Administer and support Public Key Infrastructure (PKI), including certificate issuance, renewal, and lifecycle management. Perform vulnerability scanning and coordinate remediation activities. Administer and optimize core security platforms such as endpoint detection and response (EDR) and security information and event management (SIEM) systems, including alert tuning, integration, and incident response support. Develop and maintain automation or scripting (e. g. , PowerShell, Python) to improve efficiency in security monitoring, configuration management, and response processes. Monitor security events, investigate incidents, perform root cause analysis, and drive post-incident improvements. Collaborate with IT and business teams to ensure security considerations are integrated into infrastructure and project planning from the outset. Risk & GovernanceConduct and document formal risk assessments, identify, evaluate, and communicate risk mitigation strategies. Develop, update, and maintain cybersecurity policies, standards, and procedures aligned with the NIST framework. Partner across the business to build awareness, ensure accountability, and foster a risk-informed culture. Support security aspects of vendor assessments and technology evaluations. Collaboration & Continuous ImprovementProvide security guidance for new initiatives, integrations, and system changes. Contribute to incident response planning, tabletop exercises, and lessons-learned reviews. Develop, maintain, and refine security operations and incident response playbooks to support consistent and effective response activities. Stay informed on emerging threats, technologies, and best practices relevant to manufacturing and spirits production environments. Who You Are… Required Skills and Experience:Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or equivalent experience along with Information Technology related associate's degree. Minimum 5 years of experience in cybersecurity engineering and/or IT engineering. Strong cloud security experience, including the design input, configuration, and operation of controls in cloud and hybrid environments. Hands-on experience with Microsoft Entra ID (Azure AD), including Conditional Access, identity lifecycle management, and integration within hybrid Active Directory environments. Experience with enterprise email security, endpoint protection, network security, data protection. Experience implementing and managing Microsoft Purview for data protection, governance, and compliance. Experience supporting third-party risk management or vendor assessments. Strong understanding of identity, endpoint, and network security architectures and their integration across enterprise environments. Experience performing root cause analysis during and after security incidents. Experience developing or contributing to security documentation such as policies, standards, or procedures. Strong communication skills across technical and non-technical audiences. Experience in manufacturing or industrial environments. Familiarity with OT/ICS security principles, including network segmentation, asset visibility, and industrial protocol security. Valued but not Required Skills and Experience:Professional certifications such as CISSP, CISM, CRISC, or equivalent. Understanding secure application deployment or DevSecOps principles. Physical Requirements While performing duties of job, employee is occasionally required to:Stand; walk; use hands and fingers to handle or feel objects; use a computer; and reach with hands and arms. Occasionally lift and/or move up to 20 pounds. BenefitsPaid Vacation11 Paid HolidaysHealth, Dental & Vision eligibility from day one FSA/HSA401K match EAPMaternity/Paternity Leave Heaven Hill and its affiliates are committed to fostering a diverse workforce as an Equal Employment Opportunity company. We invite applications from candidates of all backgrounds, without regard to race, religion, color, sex, sexual orientation, natural origin, gender identity or expression, age, disability, veteran status, or any other legally protected characteristic.
    $69k-90k yearly est. 8d ago
  • Cyber Security Analyst

    Mantech 4.5company rating

    Information security analyst job in Crane, IN

    ManTech seeks a motivated, career and customer-oriented **Cyber Security Analyst** to join our team in **Crane, Indiana.** This is an onsite position. As a core member, you will assist in the research & design, engineering, integration, testing, training, logistics, laboratory research, field engineering, and acquisition and operations analysis in support of a variety of Navy and Marine Corps programs and projects with a focus on defensive cyber technologies, mission assurance, and resilience capabilities for the tactical network environment. Your effort will go towards dramatically increasing the warfighter's effectiveness. If you enjoy working on a highly collaborative and dynamic team and want to make a difference for the warfighter, then we would love to have you on our team! **Responsibilities include but are not limited to:** + Review and evaluate System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), systems and networks diagrams, Security Requirements Traceability Matrices (SRTMs), Risk Assessments, and associated Information Systems (IS) Certification and Accreditation (C&A) documents in accordance with Department of Defense (DoD), Intelligence Community (IC), National and Agency standards + Observe, evaluate, and document IS security certification testing and prepare Security Certification Test Reports (SCTRs) with findings and recommendations regarding systems; Approval To Operate (ATO) + Inspect systems, networks, sites for compliance to InfoSec standards and policies + Additional duties include producing periodic progress reports, preparing various forms of correspondence concerning deficiencies and statuses of SSPs/SSAAs, maintaining and reporting statistics on personal C&A efforts + Knowledge of DoD, IC, and National Security Policies, Regulations, Directives, and Instructions **Minimum Qualifications:** + High School Diploma + Knowledge of commonly used concepts, practices, and procedures within the particular field + 1+ years of experience in the field or in a related area + Hands-on experience with networking technologies such as routers, switches, firewalls, and VPNs **Preferred Qualifications:** + Bachelors Degree + Familiarity with network vulnerability scanners, web scanners, and database scanners is a plus + Knowledge of cloud computing concepts and technologies + CISSP, CISM, CCNA, CASP, or equivalent. **Clearance Requirements:** + Must have a current and active TS/SCI clearance **Physical Requirements:** + The person in this position must be able to remain in a stationary position 50% of the time. + Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $60k-77k yearly est. 60d+ ago
  • Senior Security Specialist

    Orange Business 3.3company rating

    Information security analyst job in Indiana

    Orange Business is here! About us Join us at Orange Business! We are a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business. Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities. About the role We are building a specialized Security Change Qualification Team to support one of our major customers with high-quality technical expertise. This team will play a critical role in ensuring the seamless qualification and coordination of changes across complex IT infrastructures. The Security Change Qualification Specialist will act as a key bridge between the customer and the operational SOC team, ensuring that all security change requests are accurately qualified and clearly defined for seamless implementation. The ideal candidate will possess a mix of technical expertise, coordination capabilities, and communication skills to excel in this highly visible and critical role. Primary responsibility is to provide Tier 2 network security support of Firewall/Proxy/LB environments. This position interfaces with external clients and is highly visible. Responsible for general architecture, initial configurations and subsequent management of one or more Firewall/VPN based/IPS/Proxy/DLP/Sandbox systems. Provide 24x7 production support to accept, operate and maintain security elements. There are off shift activities and pager rotation. Troubleshoot end to end network security issues and find the root cause. Conduct risk assessments on all work performed. Conduct daily, weekly, and monthly proactive maintenance activities including configuration changes and version upgrades as per business directive. Good to have certification on security domain like ITIL,Firewall, Proxy, Cloud Security etc. Good written and verbal communication skills / fluent English. 4-10 years of experience. About you Palo Alto- (5220, 5240, 5310) (Firewall, Panaroma, Global Protect) and Pulse Secure (Ivanti). Proxy:- •Zscaler (ZIA, ZPA, ZDX)- PAC file, NSS, MCAS, Various Policy Types- URL & Cloud app, DLP, Sandbox, Advance Cloud Firewall etc. APP Segment, APP Connector. Load Balancers:- F5 (1600,3600,3900,6400) Leading Industry security Certifications (CCSA, CCNP Security, PCNSA/PCNSE, BCCPA, ZCCA-IA, ZCCP-IA, ZCCA-PA) You bring a can-do attitude, tackle challenges head-on and challenge the status quo with new and innovative ideas. What we offer • Global Opportunities: Work in multi-national teams with opportunity to collaborate with colleagues and customers from all over the world. • Flexible Work Environment: Flexible working hours and possibility to combine work from office and home (hybrid ways of working). • Professional Development: training programs and upskilling/re-skilling opportunities. • Career Growth: Internal growth and mobility opportunities within Orange. • Caring and Daring Culture: Health and well-being programs and benefits, diversity & inclusion initiatives, CSR and employee connect events. • Reward Programs: Employee Referral Program, Change Maker Awards. Only your skills matter Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neuroatypia, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
    $91k-131k yearly est. Auto-Apply 49d ago
  • SP28 Senior Information Systems Security Officer (ISSO)

    Amentum

    Information security analyst job in Crane, IN

    Amentum is looking for a Sr. Information System Security Officer (ISSO) to support Program Offices within Department of Defense Strategic Systems Programs (SSP). The ISSO will support non-enterprise information systems of large-scaled programs of record (POR), as well as multiple Science and Technology (S&T) programs. The System ISSO will provide direct support to the Program Office Technical Lead onsite at NSWC Crane and will be expected to travel regularly to SPHQ or Field Activities. The System ISSO is responsible for ensuring that the appropriate operational Cybersecurity posture is maintained for the systems under their purview. They ensure that the applicable system level security objectives are defined for implementation and assist in creating the security authorization package. Job Duties and Responsibilities: Ensure systems are accredited, and the standard operating procedures include required security procedures. Ensure that the systems are operated and maintained such that they stay within the accepted level of residual Cybersecurity risk. Ensure that Cybersecurity documentation is developed, maintained, and updated as required. Implement SSP responses to DoD IAVAs and IAVBs. Initiate investigative procedures for security events, and institute protective or corrective measures when a security incident or vulnerability is discovered. Report in conjunction with the User Representative (UR) to the branch ISSM on Cybersecurity incidents. Work with the URs to ensure that incident response plans and contingency plans are developed and tested prior to system operation and annually thereafter, and results documented in the Security Authorization Package. Participate in all engineering reviews for systems under their cognizance. In alignment with the Risk Management Framework (RMF), implement security controls, document security measures, and oversee the security posture of information systems operating under Interim Authorization to Test (IATT), preparing authorization packages, and working with various stakeholders to ensure the system's security. Collaborate with System Administrators to ensure security configurations, patches, and access controls are implemented and maintained during testing. Develop requirements for large-scale or service specific pilot projects. Support (prepare, review, and present) the Program Office's DoD Acquisition process in the development of the Objective Quality Evidence (OQE) (i.e. Cyber Security Strategy, GAO responses, Clinger Cohen Act, Cyber Test & Evaluation Strategy, etc.) for multiple programs, in compliance with SSP Regulations. Support the Program Office Technical Lead as needed identifying issues and action items, document OQE, and participating in ISSO discussions. Provide customer interactions with Program Offices and associated contractors/subcontractors. Customer interactions will be a combination of teleconferences and on-site meetings. Interface with the SSP Functional Authorizing Official (FAO, formerly AODR) Coordinate and collaborate with the stakeholders, including SSP representativ.es and contractors/subcontractors through assessments, subject matter expert input to proposals, technical interchange meetings, status teleconferences, email correspondence, and other meetings as required. Support development of technical presentations and provide comments on the technical content. Develop System Security Plans detailing the security controls implemented for each information system. Work with SSP programs to develop and maintain lifecycle plans. Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner. Evaluate performer deliverables and presentations. Required Qualifications: Bachelor of Science Degree in Cybersecurity, Computer Science, Computer Engineering or equivalent 5+ years of relevant experience Must be able to obtain and maintain a US Government Top Secret/Critical Nuclear Weapons Design Information Clearance OR a TS/SCI Clearance. Interim Top-Secret Clearance is required to begin work. Please note US Citizenship is required to obtain and maintain a Top-Secret Clearance. CompTIA Security+ or equivalent certification Ability to collaborate with large and highly competent technical teams. Strategic high-level thinking Ability/experience with planning an initiative involving large-scale, networked systems. Must be a United States citizen to obtain clearance. Willing and able to travel 40% or more. Preferred Qualifications: 10+ years of relevant experience Graduate degree in Cybersecurity, Certified Information Systems Security Professional (CISSP) certification, or Certified Information Security Manager (CISM) certification Active Top Secret Clearance Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.
    $60k-81k yearly est. Auto-Apply 60d+ ago
  • Senior Manager, Information Security Office Consultant

    Dev 4.2company rating

    Information security analyst job in Valparaiso, IN

    Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located. Company Name: Capital One Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. What You'll Do: Act as a central Information Security point of contact for the Enterprise Platform team Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment Work with line of business leadership to anticipate their objectives and needs to better serve the line of business Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization Basic Qualifications: High School Diploma, GED or equivalent certification At least 8 years of experience working in cybersecurity or information technology At least 7 years of experience providing guidance and oversight of Security concepts At least 7 years of experience performing security risk assessments and security architecture reviews At least 7 years of experience with architecture, software design, networking, and cloud infrastructure At least 5 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 4+ years of experience in IAM or related areas Experience building software utilizing public cloud (e.g. AWS, GCP, Azure) Familiarity with Cloud patch management practices such as system rehydration and image management Experience utilizing Agile methodologies Experience with Software Security Architecture Experience with Application Security Experience with Threat Modeling Experience with Penetration Testing or Vulnerability Management Experience with integrating SaaS products into an Enterprise Environment Experience with securing Container services Splunk-Fu / Enterprise Monitoring experience Financial services industry experience Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP) Experience in Offensive and Defensive Security techniques Experience in a regulated environment Strong conceptual thinking, influence and communication skills At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to [email protected] Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $89k-121k yearly est. 60d+ ago
  • Systems Engineer - Physical Security

    People Driven Technology, Inc.

    Information security analyst job in Carmel, IN

    People Driven Technology, Inc is a fast-growing, family-owned technology integrator delivering innovative IT outcomes across the Midwest. With decades of combined experience in business, technology, and engineering, we focus on creating simple, scalable outcomes for our customers. Guided by values of integrity, passion, and teamwork, we prioritize the success of our customers over revenue, building lasting relationships with both customers and strategic partners. The Systems Engineer - Physical Security will be responsible for working alongside project management and enterprise architects to install, commission and test various physical security systems in a variety of environments. Candidates need to be proactive, customer-focused, and resourceful with a strong understanding of how physical security technology protects business assets. The Physical Security Engineer will be involved in the entire project delivery cycle, including leading projects implementation, commissioning, and maintenance. Ideal candidate will be located near West Lafayette area. What You Would Do Deploy access control and video management systems based on industry best practice standards Install low-voltage wire and hardware for access control and video surveillance systems Setup, program, and configure network appliances and related software Commission and test newly installed access control and video surveillance systems Review, interpret and properly execute project plans: drawings, specifications, project data Participate in project meetings with stakeholders, both internal and external Create training documents and instruct end-users in the use of systems Maintain accurate installation and service records and create precise as-built documentation Provide subject matter expertise related to access control and video surveillance systems Respond to phone, email, voicemail, and verbal inquiries and collaborate closely with vendors to inspect, troubleshoot, and assure timely resolution of service issues Safely operate and maintain assigned company vehicle Obtain and maintain industry certifications and licenses Perform other related duties as assigned What We Are Looking For High School Diploma/GED or Bachelor's degree or equivalent experience Certification in one or more of the following: Genetec, Avigilion, and Milestone Previous access control and/or video surveillance system installation experience preferred Demonstrated ability to build and maintain strong customer relationships; will serve as the primary point of contact for a high-touch customer Mechanically inclined and resourceful Analytical and critical thinker Proficient with Microsoft Office Suite Self-starter that is excited to be part of the initial group of employees for a high-growth company Excellent verbal and written communication skills with the ability to effectively interact with all stakeholders Comfortable managing multiple and changing priorities, and meeting deadlines in an entrepreneurial environment What We Would Offer You Comprehensive medical, dental, and vision plans for you and your dependents. 401(k) Retirement Plan with Employer Match, Health Savings Account, Life Insurance, and Long-Term Disability. Competitive compensation. Collaborative and welcoming office culture. Work-life balance and unlimited paid time off. Company vehicle and necessary equipment. Recruitment Agency Notification People Driven Technology, Inc does not accept unsolicited agency resumes. Do not forward resumes to our careers email address, People Driven employees, or any other company location. People Driven Technology, Inc is not responsible for any fees related to unsolicited resumes. Equal Opportunity Employer People Driven Technology, Inc is proud to be an equal opportunity workplace and is an affirmative action employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. All hiring decisions are based on merit, qualifications, and our business needs. People Driven Technology, Inc is dedicated to working with and providing reasonable accommodations to individuals with disabilities. If you need reasonable accommodations because of a disability for any part of the employment process, please contact the recruiter and let us know the nature of your request and your contact information.
    $78k-107k yearly est. 60d+ ago
  • IT Infrastructure Analyst

    Eli Lilly and Company 4.6company rating

    Information security analyst job in Lebanon, IN

    At Lilly, we unite caring with discovery to make life better for people around the world. We are a global healthcare leader headquartered in Indianapolis, Indiana. Our employees around the world work to discover and bring life-changing medicines to those who need them, improve the understanding and management of disease, and give back to our communities through philanthropy and volunteerism. We give our best effort to our work, and we put people first. We're looking for people who are determined to make life better for people around the world. Lilly IT builds and maintains capabilities using cutting edge technologies like most prominent tech companies. What differentiates Lilly IT is that we create new possibilities through tech to advance our purpose - creating medicines that make life better for people around the world, like data driven drug discovery and connected clinical trials. We hire the best technology professionals from a variety of backgrounds, so they can bring an assortment of knowledge, skills, and diverse thinking to deliver innovative solutions in every area of our business. Research IT unites science with technology to accelerate the Research and Development of medicines and to deliver therapeutic innovations. The team leverages technology and platforms to streamline scientific experimentation to help Researchers follow the science, to understand the disease and identify potential therapies. They are at the forefront of advanced analytics to enable data driven drug discovery; to innovate so Scientists can rapidly analyze and accelerate the discovery of new medicines. What You Will Do: Closely listen, interpret, and understand customer needs into technical terms to solution and action Coordinate with other Lilly groups and vendors regarding requirements, operating system requirements, additional hardware requirements and costs Create strategy and plan to provide qualified infrastructure platforms and be able to execute the defined plan. Troubleshooting problems on platforms including Citrix, RealVNC, VDI, Linux, Windows OS, iGel technology and other workstation connected hardware as well as Telecom. Experience in configuring DNS, NTP, Proxy, etc, for specialized Manufacturing and Lab workstations. Provide strategy for immediate and future upgrades/patching of hardware and software applications. Providing supporting documentation for validation and testing of upgrades Drive the validation of new and existing systems by providing technical design information to assure GMP data integrity Your Minimum Requirements: Bachelor's degree in computer science, Information Technology or related technical field Minimum 4+ years in a technical or operational IT role, with experience supporting end-user workspaces, hardware (e.g., scanners, printers), networking systems, and/or telecom technologies Minimum 3+ years of experience in Manufacturing or Clinical development facilities. Minimum of 3+ years work experience in pharma, GMP, FDA or other highly regulated environments Qualified candidates must be legally authorized to be employed in the United States. Lilly does not anticipate providing sponsorship for employment visa status (e.g., H-1B or TN status) for this employment position. What You Should Bring: GMP Knowledge Advanced knowledge of network technologies Experience troubleshooting network connected devices in a complex segmented lab and manufacturing network environment Other: This is a hybrid position located at Lilly Technical Center -N until the completion of the Lebanon Medicine Foundry Lilly is dedicated to helping individuals with disabilities to actively engage in the workforce, ensuring equal opportunities when vying for positions. If you require accommodation to submit a resume for a position at Lilly, please complete the accommodation request form (******************************************************** for further assistance. Please note this is for individuals to request an accommodation as part of the application process and any other correspondence will not receive a response. Lilly is proud to be an EEO Employer and does not discriminate on the basis of age, race, color, religion, gender identity, sex, gender expression, sexual orientation, genetic information, ancestry, national origin, protected veteran status, disability, or any other legally protected status. Our employee resource groups (ERGs) offer strong support networks for their members and are open to all employees. Our current groups include: Africa, Middle East, Central Asia Network, Black Employees at Lilly, Chinese Culture Network, Japanese International Leadership Network (JILN), Lilly India Network, Organization of Latinx at Lilly (OLA), PRIDE (LGBTQ+ Allies), Veterans Leadership Network (VLN), Women's Initiative for Leading at Lilly (WILL), en Able (for people with disabilities). Learn more about all of our groups. Actual compensation will depend on a candidate's education, experience, skills, and geographic location. The anticipated wage for this position is $64,500 - $151,800 Full-time equivalent employees also will be eligible for a company bonus (depending, in part, on company and individual performance). In addition, Lilly offers a comprehensive benefit program to eligible employees, including eligibility to participate in a company-sponsored 401(k); pension; vacation benefits; eligibility for medical, dental, vision and prescription drug benefits; flexible benefits (e.g., healthcare and/or dependent day care flexible spending accounts); life insurance and death benefits; certain time off and leave of absence benefits; and well-being benefits (e.g., employee assistance program, fitness benefits, and employee clubs and activities).Lilly reserves the right to amend, modify, or terminate its compensation and benefit programs in its sole discretion and Lilly's compensation practices and guidelines will apply regarding the details of any promotion or transfer of Lilly employees. #WeAreLilly
    $64.5k-151.8k yearly Auto-Apply 13d ago
  • Network System Engineer (4059) INFORMATION SERVICES LCSB

    Lexington Clinic 4.4company rating

    Information security analyst job in Lexington, KY

    The Network System Engineer will be responsible for designing, implementing, and maintaining the clinic's network and telecommunications infrastructure. This role is to ensure the stability and integrity of voice, data, video, and wireless network services. This role will collaborate closely with the Chief Systems Architect, Director of IT Infrastructure and Operations, and other IT resources to execute the technology roadmap in alignment with the overall strategic plan. The Network Systems Engineer will also work closely with other internal and external resources as needed to perform their duties. PREFERRED QUALIFICATIONS: Education: A bachelor's degree in computer science, information technology, or a related field is preferred. However, industry experience and relevant certifications may be considered in place of a degree. i.e., Cisco Networking or Cisco Contact Center Certifications or CompTIA Network+ are a plus. Experience: A minimum of 5 years of experience in design, implementation and support of enterprise network and telecommunication environments. Ideally the candidate will have experience in medium to large environments. Past experience in healthcare organization is a plus, but not a requirement. Technical expertise: The ideal candidate should have experience or proficiency in configuring routers, switches, firewalls, VLANs, VPNs and other network devices according to design specifications. The ideal candidate should have some experience in support of enterprise phone systems including call center systems, call routing, etc. The candidate must have experience monitoring network performance, availability, and security to ensure optimal operation. Ability to maintain routine tasks, such as firmware updates and patching. Ability to troubleshoot and resolve network\phone system outages and performance issues in a timely manner. Maintain accurate and up-to-date documentation, including network and phone system diagrams, configurations, and inventory records. Analyze network and phone system usage patterns to plan for capacity upgrades and improvements as the organization grows. Provide guidance and support in maintaining phone extensions, call routing, voicemail and auto-attendant systems as needed. Analytical and problem-solving skills: Must possess strong analytical and problem-solving skills to identify and solve complex issues efficiently and effectively. Knowledge of industry regulations: S hould have a thorough understanding of industry regulations, such as HIPAA and HITECH, and ensure that all systems are designed and implemented in compliance with these regulations. Collaborating with stakeholders: Must be able to collaborate with stakeholders across the organization, including business leaders, IT teams, and external partners. They must have excellent communication skills and be able to communicate effectively with technical and non-technical stakeholders to ensure that everyone is aligned and working towards the same goals. Providing technical leadership: Should provide technical guidance to the technology team, leveraging their expertise in the technology landscape, industry trends, and emerging technologies to ensure that the organization is utilizing the most efficient and effective solutions. Adaptability: Must be able to adapt to new technologies, software, and regulatory changes that arise as healthcare IT systems continue to evolve. Project management skills: Should possess experience in project management, including planning, budgeting, and tracking progress to ensure timely project delivery. Technology budgets: Should collaborate with all the IT Directors, to provide input on technology budgets for projects and initiatives. Ensuring system security and stability: Responsible for ensuring that the organization's technology systems are secure and stable. They should work closely with all the IT Directors and security teams to ensure that systems are protected from potential threats. Cisco Phone System Requirements: Demonstrated experience with Cisco enterprise phone systems, including configuration, deployment, and ongoing support. Ability to manage Cisco call routing, voicemail, auto-attendant, and call center features. Proficiency in troubleshooting Cisco phone system outages and performance issues. Maintain accurate documentation for Cisco phone system configurations and inventory. Data Cabling & Punch Down Skills: Skilled in pulling, terminating, and testing data cables (Cat5e, Cat6, etc.) for network and phone systems. Ability to perform punch downs on patch panels, phone blocks, and network jacks according to industry standards. Ensure all cabling work meets organizational and regulatory requirements for reliability and safety. Switch & Wireless Access Point Deployment: Experience deploying, configuring, and maintaining enterprise-grade network switches. Ability to install and set up wireless access points, ensuring optimal coverage and security. Perform upgrades and expansions of network infrastructure as needed, including physical installation and logical configuration. Familiarity with Data Rack Styles: Demonstrated knowledge of various data rack styles and configurations, including experience working in unconventional or challenging data closet environments. Ability to adapt installation and maintenance practices to suit unique physical layouts and constraints. PHYSICAL GUIDELINES: Physical guidelines include the ability to move, traverse, position self, remain in a stationary position and negotiate steps for up to eight hours per day; use basic office equipment; visual and auditory acuity. NOTE: This document is intended to describe the general nature and level of work performed. It is not intended to act as an exhaustive list of all duties, skills, and responsibilities required of personnel so classified. Attendance is an essential function of the job. LEXINGTON CLINIC IS AN EQUAL OPPORTUNITY EMPLOYER (EOE)
    $78k-99k yearly est. Auto-Apply 5d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Radcliff, KY?

The average information security analyst in Radcliff, KY earns between $58,000 and $111,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Radcliff, KY

$80,000
Job type you want
Full Time
Part Time
Internship
Temporary