Post job

Information security analyst jobs in Saint George, UT

- 342 jobs
All
Information Security Analyst
Senior Security Analyst
Data Security Analyst
Senior Security Engineer
Cyber Security Analyst
Information Technology Analyst
Senior Information Security Analyst
Senior Information Security Consultant
Senior Information Security Engineer
Cyber Security Specialist
Network Security Analyst
Information Assurance Analyst
Security System Engineer
  • Cyber Security Analyst

    Whsmith North America

    Information security analyst job in Las Vegas, NV

    We're looking for a seasoned Cybersecurity Analyst to take the fight to advanced threats. From incident response and malware analysis to threat hunting and vulnerability management, you'll be on the front lines safeguarding our systems, data, and users while contributing to the overall program maturity. If you thrive on solving complex problems and driving continuous improvement, this is your mission. Job Responsibilities Monitor and analyze security tools, systems, and network activity for threats or suspicious behavior. Investigate and triage alerts, perform threat hunting, and conduct malware and phishing analysis. Manage the full lifecycle of security incidents, from detection through resolution and documentation. Conduct vulnerability assessments, detection validation, and regular security reviews or audits. Maintain and optimize security monitoring platforms, infrastructure, and tooling. Collaborate with IT and third-party partners to implement security controls, apply fixes, and support incident response. Develop and maintain incident response playbooks, procedures, and security awareness initiatives. Ensure compliance with internal policies, industry standards, and regulatory requirements. Generate and maintain reports, dashboards, and metrics for ongoing security performance tracking. Provide occasional after-hours or on-call support as part of incident response efforts. Perform other related tasks as assigned. Technical Requirements Proficiency with SIEM tools and EDR platforms. Strong understanding of network protocols, security principles, and operating systems (Windows, Linux). Hands-on experience with firewall, IDS/IPS, and threat intelligence technologies. Familiarity with cloud security concepts (AWS, Azure, GCP). Knowledge of attack vectors, mitigation strategies, and incident investigation techniques. Education & Experience Bachelor's degree in Cybersecurity or equivalent with 2+ years of relevant experience. 2-4 years in cybersecurity operations or a similar role, ideally within a SOC environment. Relevant certifications preferred: CompTIA Security+, THM SAL1, HTB CJCA, Blue Team Level 1/2, Antisyphon Training , etc. Proven experience in incident response, risk management, and security policy development. Strong knowledge of cybersecurity frameworks, standards, and technologies. Required Skills Strong analytical and problem-solving skills with attention to detail. Excellent written and verbal communication abilities. Ability to work independently and collaboratively in a fast-paced environment. Skilled in documentation, reporting, and managing multiple priorities. Highly organized, adaptable, and committed to continuous learning. Nice to Have Experience in retail environments or with point-of-sale systems. Background in networking or infrastructure engineering. Familiarity with security frameworks (NIST, ISO 27001, CIS). Scripting skills in Python, PowerShell, or similar languages.
    $79k-111k yearly est. 2d ago
  • Bank Information Security Governance Senior

    USAA 4.7company rating

    Information security analyst job in Phoenix, AZ

    Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a dedicated Bank Information Security Governance Senior. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position. What you'll do: Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards. Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank. Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies. Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives. Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices. Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments. Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices. Mentors junior members of the IS governance team, providing guidance and support in their professional development. Enhances, and maintains awareness of the risk governance framework and its elements (RCSA). Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks. Prepares metrics reporting and participates in the metrics refresh process. Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline. Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures. What you have: Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree. 6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC Experience working on and implementing IT and/or IS policies, standards, and procedures. Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements. A strong understanding of regulatory and compliance requirements applicable to the organization. Ability to interpret complex IT/IS environments and detect early warning signals. Experience in identifying potential failure points and simulating risk scenarios. Proficiency in using data to identify trends, anomalies, and emerging risks. Understanding of cloud, cybersecurity, and digital transformation risks. Ability to articulate risk insights and influence stakeholders to take preventive actions. Familiarity with GRC platforms, vulnerability management tools, and risk dashboards. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience with data-driven analysis using AI tools and collaborating to drive process innovation Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision. Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization. Compensation range: The salary range for this position is: $114,080-$218,030. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on USAAjobs.com. Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $114.1k-218k yearly Auto-Apply 1d ago
  • Senior Security Engineer

    AMH 3.9company rating

    Information security analyst job in Las Vegas, NV

    Since 2012, we've grown to become one of the leading single-family rental companies and homebuilders in the country, recently recognized as a top employer by Fortune and Great Place To Work . At AMH, our goal is to simplify the experience of leasing a home through professional management and maintenance support, so our residents can focus on what really matters to them, wherever they are in life. The Senior Security Engineer is responsible for the research, testing, implementation, optimization, and maintenance of security products and services supported by effective change management. Other responsibilities include cloud security and cloud risk management. Additional responsibilities can include designing, testing, and implementing secure operating systems, networks, and databases. Password auditing, network based and Web application-based vulnerability scanning, virus management, and intrusion detection. Conducting risk audits and assessments, providing recommendations for application design. Monitoring and analyzing system access logs. Planning for security backup and system disaster recovery. Managing projects/processes, working independently with limited supervision. Coaching and reviewing the work of lower-level professionals. Problems faced are difficult and sometimes complex. Responsibilities Research, test, implement, optimize, and maintain new security products and services to address future and current threats supported by effective change management. Develops, maintains, and supports processes to support the IT Security Framework such as incident management, cloud risk management, and cloud security. Act as an escalation path to Security issues and lead forensic investigations. Identifies and investigates actual or potential information security violations. Performs follow up investigations with written reports. Participate in application and infrastructure projects to provide security planning and implementation. Develop dashboards and metrics that includes incident reporting and risk management reporting. Requirements High School Diploma or GED required Bachelor's degree in Computer Science, Information Technology, Information Security, and/or related field preferred Minimum of seven (7) years of experience in IT Security Minimum of three (3) years of experience in Cloud Technologies Experience in managing SIEM solutions Experience in endpoint and email security solutions Experience in Security incident management and reporting Advanced knowledge of networking/web, phishing/cyberattacks, and incident response CISSP, cloud security, and other security related certifications preferred Excellent verbal and written communication, planning, analysis and organizing skills May occasionally work evenings or weekends as this position is part of an on-call rotation. Compensation The anticipated pay range/scale for this position is $105,322.00 to $131,652.00 Annually. Actual starting base pay within this range will depend on factors including geographic location, education, training, skills, and relevant experience. Additional Compensation This position is eligible to receive a discretionary annual bonus. Perks and Benefits Employees have the opportunity to participate in medical, dental and vision insurance; flexible spending accounts and/or health savings accounts; dependent savings accounts; 401(k) with company matching contributions; employee stock purchase plan; and a tuition reimbursement program. The Company provides 9 paid holidays per year, and, upon hire, new employees will accrue paid time off (PTO) at a rate of 0.0577 hours of PTO per hour worked, up to a maximum of 120 hours per year. CA Privacy Notice: To learn more about what information we collect when you apply for a job, and how we use that information, please see our CA Job Applicant Privacy Notice found at **************************************
    $105.3k-131.7k yearly 2d ago
  • Sr Cyber Defense Security Specialist

    Boyd Gaming 3.9company rating

    Information security analyst job in Las Vegas, NV

    Boyd Gaming Corporation has been successful in gaming jurisdiction in which we operate in the United States and is one of the premier casino entertainment companies in the United States. Never content to rest upon our successes, we will continue to evolve and retain a position of leadership in our industry. Our past success, our current business philosophies and our sound business planning, combine to position Boyd Gaming Corporation to maximize value for our shareholders, our team members and our communities. Job Description Subject matter expert and technical leader who is passionate about complex information security technology, topics and issues. Responsible for technical and operational duties in the areas of computer network defense analysis, vulnerability assessment and management, incident response and management, threat intelligence, data loss prevention, digital forensics, and threat hunting. Provides customer service and technical support with the goal of improving the overall security posture of the organization. Responsible for documenting, monitoring and reporting on various security related systems and processes to ensure system and data integrity, security and availability. Creation of policy, day to day management, administration and maintenance of Information Security tool set. Identification of any tool or visibility gap in the existing tool set. Identification of team requirements for any given technology, documentation of the current or proposed architecture, lead any proof of concept and document results, quantify any recommendations for the use of any new security tool, process or procedure. Cross training the team on day to day use, standard operating procedures and tuning of the security tool set. Analyze threat intelligence and risks. Identify and document impact to Boyd and any mitigation or remediation actions required. Lead initiatives and own the outcomes related to remediation or mitigation against identified day zero attacks. Liaise with cross functional teams to facilitate and ensure implementation of any necessary tasks to defend against the risk. Escalation point and technical subject matter expert for Security Analysts and any third-party security providers. Responsible for tracking all security incidents to resolution. Leading defensive protocols and programs when attacks occur. Simulating attacks to identify potential areas of weakness in defenses and alerting. Writing detailed reports and providing accurate metrics. Perform the role and duties of an internal expert on matters relating to threat detection and incident response. Lead investigations into attacks and indicators of compromise. Provide a coordinated response to applicable complex cyber-attacks. Contribute to the ongoing development and improvement of security monitoring and incident response processes and solutions as required to support Boyd's Information Security program and exceed team objectives. Tracking cybersecurity news and trends for applicable systems, and reporting concerns to appropriate resources. Documenting and updating security related policies, including participation in the periodic review process and managing policy exceptions and risk acceptances in coordination with the Boyd Risk and Compliance teams. Manage, update, modify alerts, adjust/tune event correlation rules to increase accuracy/relevance/effectiveness and create new rules based on threat changes and evolving risks. Use creativity and innovation to automate and streamline team processes and procedures. Perform event correlation, analysis of malicious activity indicators and appropriate response based on review and access to multiple security tools. Qualifications Bachelor's Degree in Information Technology or Cyber Security, and/or equivalent experience, Masters ' Degree in Computer Science or Information Security (Preferred) 7-10 years of professional Information Security Incident Response/ Forensics/ SOC experience Proven experience with Information Security industry best practices Proven experience with System/ Application vulnerabilities, threats and exploitation Proven experience with malware analysis (dynamic and static) or forensic examination Advanced knowledge and understanding of Windows, Linux, Unix and networking Understanding of ISO 27001 / 2700 2, NIST Cybersecurity Framework, COBIT, SOX, PCI, CCPA and ITIL. Expert level computer and IT skills. Advanced analytical and problem-solving skills. High levels of creativity, patience and ability to remain calm and focused in a crisis. Highly motivated, self-starter, competitive, and attracted to challenging opportunities Demonstrated strong decision-making skills. Having a logical and analytical approach to problem-solving, being able to assess situations and decide on the best course of action; understanding test results and developing solutions. Demonstrated advanced organizational and time management skills. Completing tasks in a timely manner; being detail-oriented, able to perform repetitive tests in a thorough and consistent manner; being able to work on several tasks at the same time while still accomplishing goals and deadlines. Advanced communication skills. Being able to articulate technical issues and requirements in a clear and non-technical manner. Excellent teamwork skills. Ability to partner with the business and cross functional IT teams, working as a cohesive and effective unit. Highest levels of honesty, integrity and objectivity. Ability to remain objective when analyzing weaknesses and proposed new solutions; being responsible and understanding the level of trust required to handle private and highly sensitive information and situations. Additional Information Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class. Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
    $51k-74k yearly est. 17h ago
  • Senior Cloud Security Engineer

    Irvine Technology Corporation

    Information security analyst job in Scottsdale, AZ

    We are seeking a Senior Cloud Security Engineer to join our client for a full-time, direct hire role that will be hybrid in Scottsdale, AZ. This role will design, deploy, and manage security technologies and modern automation tools for the enforcement of security controls across private and public cloud service platforms. Location: Hybrid in Scottsdale, AZ (4 days onsite) Compensation: This job is expected to pay about $130,000-150,000 plus benefits Relocation Assistance Available What You'll Do: Design, implement, and maintain custom and native security services across large-scale hybrid multi-cloud environments. Automate and orchestrate secure cloud migrations and operations using configuration management tools and workflows. Partner with architecture, engineering, and operations teams to deploy security controls aligned with business strategies and industry standards (NIST, CIS, ISO 27001/31000, CSA). Manage PKI services, certificate lifecycle, cryptographic solutions, SSH key management, CSPM, and CWPP platforms. Integrate DevSecOps practices into CI/CD pipelines, including vulnerability scanning (SAST, DAST, SCA), IaC scanning, and secure coding guidance. Maintain CSPM vulnerability dashboards for multi-cloud environments; generate compliance and leadership reports. Configure and optimize WAF, DDoS, and bot protection policies. Collaborate with SOC to develop Splunk event management, integrate cloud/SaaS logs, and enhance security alerting. Contribute to enterprise security standards, documentation, and architecture diagrams. Provide Tier III/IV support, knowledge transfer, and escalation for security and network operations. What Gets You the Job: 5+ years in cloud security and/or IT security engineering. Expertise in AWS, Azure, Salesforce, and Google Cloud; strong SaaS and application workload security knowledge. Background in Windows Server, Linux (RHEL), Apache, SAP Hybris, MySQL, Tomcat, and native cloud services. Strong understanding of network/web protocols (TCP/IP, UDP, IPSEC, HTTP/S, routing). Proficient in automation/scripting with Java, JSON, Python, Bash, or similar. 4+ years with LDAP/AD, cloud identity federation, OIDC/OAuth2, and SAML2 SSO. Skilled in PKI, certificate lifecycle, cryptographic solutions, and SSH key management. Knowledge of DevOps, Jenkins CI/CD, BitBucket, and secure coding practices for common vulnerabilities. Please send your resume to Hannah Xu, Senior Technical Recruiter for immediate consideration. Irvine Technology Corporation (ITC) is a leading provider of technology and staffing solutions for IT, Security, Engineering, and Interactive Design disciplines servicing startups to enterprise clients, nationally. We pride ourselves in the ability to introduce you to our intimate network of business and technology leaders - bringing you opportunity coupled with personal growth, and professional development! Join us. Let us catapult your career! Irvine Technology Corporation provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Irvine Technology Corporation complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
    $130k-150k yearly 17h ago
  • Principal Cyber Security Analyst - Threat Hunter

    Mission Support and Test Services

    Information security analyst job in North Las Vegas, NV

    Mission Support and Test Services, LLC (MSTS) manages and operates the Nevada National Security Site (NNSS) for the U.S. National Nuclear Security Administration (NNSA). Our MISSION is to help ensure the security of the United States and its allies by providing high-hazard experimentation and incident response capabilities through operations, engineering, education, field, and integration services and by acting as environmental stewards to the Site's Cold War legacy. Our VISION is to be the user site of choice for large-scale, high-hazard, national security experimentation, with premier facilities and capabilities below ground, on the ground, and in the air. (See NNSS.gov for our unique capabilities.) Our 2,750+ professional, craft, and support employees are called upon to innovate, collaborate, and deliver on some of the more difficult nuclear security challenges facing the world today. + MSTS offers our full-time employees highly competitive salaries and benefits packages including medical, dental, and vision; both a pension and a 401k; paid time off and 96 hours of paid holidays; relocation (if located more than 75 miles from work location); tuition assistance and reimbursement; and more. + MSTS is a limited liability company consisting of Honeywell International Inc. (Honeywell), Jacobs Engineering Group Inc. (Jacobs), and HII Nuclear Inc. **Responsiblities** NNSS is seeking an experienced Cyber Security Analyst to join our team as a Principal Threat Hunting Analyst. This role is responsible for managing threat hunting activities across the enterprise such as supporting and performing all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity. In addition, the analyst will ensure all incident response processes and associated threat hunting techniques are well-defined, documented, tested, and managed. The analyst will evaluate threat intel to determine potential evolving threats to the enterprise and adapt/improve threat hunting and detection techniques accordingly, conduct forensics: host-based disk and memory as well as network; analysis to determine root cause and impact, and develop of use cases mapped to common frameworks (e.g., MITRE ATT&K) for detecting new/evolving threats, including supporting content for security tools. The ideal candidate will have at least 8 years of related experience and one or more of the preferred cyber security certifications listed below. **Key Responsibilities** + Develop and manage an enterprise threat hunting program. Support and perform all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity. + Manage programs and oversee processes in support of cyber threat intelligence analysis. + Mentor and train junior analysts and assist with prioritizing and completion of tasks. + Identify and prioritize cyber threats using open and closed source research into suspicious activity to collect and analyze information on adversary behavior. + Maintain awareness of trends and risks that can affect the organization as it relates to the intersection between geopolitics, third-party risk, and the cyber threat landscape. + Create and deliver a range of written and verbal products that arm cyber defense teams with actionable intelligence and provide organizational leaders with curated information that influences risk-based decision-making. + Review current Cyber Security threat information and assist the Threat Evaluation Team with mitigating vulnerabilities identified. + Collaborate with other outside Cyber Security interests such as Counterintelligence, other DOE sites, US CERT, and law enforcement. + Assist with data calls, FISMA reporting, compliance scanning and reporting, continuous monitoring, and compiling reports for auditors. + Perform other duties as assigned by Management. **Qualifications** + Bachelor's degree or equivalent training and experience in a computer-related field and at least 8 years of related experience. + Experience with structured analytic techniques (e.g., Diamond Model, Cyber Kill Chain) as well as a proven understanding of the MITRE ATT&K framework. + Experience with the utilization of Open-Source Intelligence (OSINT) as well as closed intelligence sources. + Experience analyzing raw data points from technical security controls, to include web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, etc. + Experience with engineering security detections and response technology integration (SOAR & SIEM), as well as Threat Intelligence Platform (TIP) product ingestion to improve proactive security measures. + Experience with link analysis tools. + Familiarity with the fundamentals of agile project management. + Familiar with compliance frameworks, security best practices, and product security baselines. + Experience using configuration management tools in a production environment. + Strong IT background, including networking fundamentals and systems. Able to demonstrate thorough understanding of basic principles, theories, standards, practices, protocols, and procedures used in Cyber Security. + Possess considerable organization and project management skills. + Ability to maintain strict confidentiality. + Ability to communicate effectively in English, both verbally and in writing, sufficient to communicate with coworkers, customers, write clear and concise reports, gather and collect information. + Ability to use multiple electronic devices including standard office machines, cellular phones, and security appliances. + General understanding of cybersecurity controls used to mitigate vulnerabilities. + Preferred Certifications (Please upload certification(s) as an attachment when applying.): + Certified Information Systems Security Professional (CISSP) + GIAC Security Essentials (GSEC) + GIAC Cyber Threat Intelligence (GCTI) + GIAC Certified Forensic Analyst (GCFA) + The primary work location will be at the Losee Road facility located in North Las Vegas, Nevada. + Work schedule will be 4/10's Monday through Thursday (subject to change). + Pre-placement physical examination, which includes a drug screen, is required. MSTS maintains a substance abuse policy that includes random drug testing. + Must possess a valid driver's license. MSTS is required by DOE directive to conduct a pre-employment drug test and background review that includes checks of personal references, credit, law enforcement records, and employment/education verifications. Applicants offered employment with MSTS are also subject to a federal background investigation to meet the requirements for access to classified information or matter if the duties of the position require a DOE security clearance. Substance abuse or illegal drug use, falsification of information, criminal activity, serious misconduct or other indicators of untrustworthiness can cause a clearance to be denied or terminated by DOE, resulting in the inability to perform the duties assigned and subsequent termination of employment. In addition, Applicants for employment must be able to obtain and maintain a DOE Q-level security clearance, which requires U.S. citizenship, at least 18 years of age. Reference DOE Order 472.2 (**************************************************************************************** , "Personnel Security". If you hold more than one citizenship (i.e., of the U.S. and another country), your ability to obtain a security clearance may be impacted. **Department of Energy Q Clearance** (position will be cleared to this level). Reviews and tests for the absence of any illegal drug as defined in 10 CFR Part 707.4 (*************************************************************************************************************** , "Workplace Substance Abuse Programs at DOE Sites," will be conducted. Applicant selected will be subject to a Federal background investigation, required to participate in subsequent reinvestigations, and must meet the eligibility requirements for access to classified matter. Successful completion of a counterintelligence evaluation, which may include a counterintelligence-scope polygraph examination, may also be required. Reference 10 CFR Part 709 (************************************************************************************ , "Counterintelligence Evaluation Program." MSTS is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, disability, veteran status or other characteristics protected by law. MSTS is a background screening, drug-free workplace. Annual salary range for this position is: **$116,001.60 - $176,904.00.** Starting salary is determined based on the position market value, the individual candidate education and experience and internal equity.
    $116k-176.9k yearly 14d ago
  • Principal Cyber Security Analyst - Threat Hunter

    Nevada National Security Sites

    Information security analyst job in North Las Vegas, NV

    Mission Support and Test Services, LLC (MSTS) manages and operates the Nevada National Security Site (NNSS) for the U.S. National Nuclear Security Administration (NNSA). Our MISSION is to help ensure the security of the United States and its allies by providing high-hazard experimentation and incident response capabilities through operations, engineering, education, field, and integration services and by acting as environmental stewards to the Site's Cold War legacy. Our VISION is to be the user site of choice for large-scale, high-hazard, national security experimentation, with premier facilities and capabilities below ground, on the ground, and in the air. (See NNSS.gov for our unique capabilities.) Our 2,750+ professional, craft, and support employees are called upon to innovate, collaborate, and deliver on some of the more difficult nuclear security challenges facing the world today. MSTS offers our full-time employees highly competitive salaries and benefits packages including medical, dental, and vision; both a pension and a 401k; paid time off and 96 hours of paid holidays; relocation (if located more than 75 miles from work location); tuition assistance and reimbursement; and more. MSTS is a limited liability company consisting of Honeywell International Inc. (Honeywell), Jacobs Engineering Group Inc. (Jacobs), and HII Nuclear Inc. Bachelor's degree or equivalent training and experience in a computer-related field and at least 8 years of related experience. Experience with structured analytic techniques (e.g., Diamond Model, Cyber Kill Chain) as well as a proven understanding of the MITRE ATT&K framework. Experience with the utilization of Open-Source Intelligence (OSINT) as well as closed intelligence sources. Experience analyzing raw data points from technical security controls, to include web proxy, firewalls, IPS, IDS, enterprise antivirus solutions, etc. Experience with engineering security detections and response technology integration (SOAR & SIEM), as well as Threat Intelligence Platform (TIP) product ingestion to improve proactive security measures. Experience with link analysis tools. Familiarity with the fundamentals of agile project management. Familiar with compliance frameworks, security best practices, and product security baselines. Experience using configuration management tools in a production environment. Strong IT background, including networking fundamentals and systems. Able to demonstrate thorough understanding of basic principles, theories, standards, practices, protocols, and procedures used in Cyber Security. Possess considerable organization and project management skills. Ability to maintain strict confidentiality. Ability to communicate effectively in English, both verbally and in writing, sufficient to communicate with coworkers, customers, write clear and concise reports, gather and collect information. Ability to use multiple electronic devices including standard office machines, cellular phones, and security appliances. General understanding of cybersecurity controls used to mitigate vulnerabilities. Preferred Certifications (Please upload certification(s) as an attachment when applying.): Certified Information Systems Security Professional (CISSP) GIAC Security Essentials (GSEC) GIAC Cyber Threat Intelligence (GCTI) GIAC Certified Forensic Analyst (GCFA) The primary work location will be at the Losee Road facility located in North Las Vegas, Nevada. Work schedule will be 4/10's Monday through Thursday (subject to change). Pre-placement physical examination, which includes a drug screen, is required. MSTS maintains a substance abuse policy that includes random drug testing. Must possess a valid driver's license. MSTS is required by DOE directive to conduct a pre-employment drug test and background review that includes checks of personal references, credit, law enforcement records, and employment/education verifications. Applicants offered employment with MSTS are also subject to a federal background investigation to meet the requirements for access to classified information or matter if the duties of the position require a DOE security clearance. Substance abuse or illegal drug use, falsification of information, criminal activity, serious misconduct or other indicators of untrustworthiness can cause a clearance to be denied or terminated by DOE, resulting in the inability to perform the duties assigned and subsequent termination of employment. In addition, Applicants for employment must be able to obtain and maintain a DOE Q-level security clearance, which requires U.S. citizenship, at least 18 years of age. Reference DOE Order 472.2, “Personnel Security”. If you hold more than one citizenship (i.e., of the U.S. and another country), your ability to obtain a security clearance may be impacted. Department of Energy Q Clearance (position will be cleared to this level). Reviews and tests for the absence of any illegal drug as defined in 10 CFR Part 707.4, “Workplace Substance Abuse Programs at DOE Sites,” will be conducted. Applicant selected will be subject to a Federal background investigation, required to participate in subsequent reinvestigations, and must meet the eligibility requirements for access to classified matter. Successful completion of a counterintelligence evaluation, which may include a counterintelligence-scope polygraph examination, may also be required. Reference 10 CFR Part 709, “Counterintelligence Evaluation Program.” MSTS is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, disability, veteran status or other characteristics protected by law. MSTS is a background screening, drug-free workplace. Annual salary range for this position is: $116,001.60 - $176,904.00. Starting salary is determined based on the position market value, the individual candidate education and experience and internal equity. NNSS is seeking an experienced Cyber Security Analyst to join our team as a Principal Threat Hunting Analyst. This role is responsible for managing threat hunting activities across the enterprise such as supporting and performing all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity. In addition, the analyst will ensure all incident response processes and associated threat hunting techniques are well-defined, documented, tested, and managed. The analyst will evaluate threat intel to determine potential evolving threats to the enterprise and adapt/improve threat hunting and detection techniques accordingly, conduct forensics: host-based disk and memory as well as network; analysis to determine root cause and impact, and develop of use cases mapped to common frameworks (e.g., MITRE ATT&K) for detecting new/evolving threats, including supporting content for security tools. The ideal candidate will have at least 8 years of related experience and one or more of the preferred cyber security certifications listed below. Key Responsibilities Develop and manage an enterprise threat hunting program. Support and perform all phases of the incident response life cycle: preparation, analysis, containment, eradication, remediation, recovery, and post-incident activity. Manage programs and oversee processes in support of cyber threat intelligence analysis. Mentor and train junior analysts and assist with prioritizing and completion of tasks. Identify and prioritize cyber threats using open and closed source research into suspicious activity to collect and analyze information on adversary behavior. Maintain awareness of trends and risks that can affect the organization as it relates to the intersection between geopolitics, third-party risk, and the cyber threat landscape. Create and deliver a range of written and verbal products that arm cyber defense teams with actionable intelligence and provide organizational leaders with curated information that influences risk-based decision-making. Review current Cyber Security threat information and assist the Threat Evaluation Team with mitigating vulnerabilities identified. Collaborate with other outside Cyber Security interests such as Counterintelligence, other DOE sites, US CERT, and law enforcement. Assist with data calls, FISMA reporting, compliance scanning and reporting, continuous monitoring, and compiling reports for auditors. Perform other duties as assigned by Management.
    $116k-176.9k yearly Auto-Apply 14d ago
  • Security Analyst, IT

    Virgin Hotels 4.1company rating

    Information security analyst job in Las Vegas, NV

    YOUR MISSION (The Job Description): This job is located on-site at Virgin Hotels Las Vegas. Remote work is not available for this position. The Security Analyst will play a vital role in keeping all IT-related security, safety issues, and the day-to-day functionality of all network-related hardware and software secure. The Security Analyst will be responsible for generating reports for IT administrators and business managers to evaluate the efficacy of the security policies in place. Security Analyst will help make necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.
    $81k-113k yearly est. 1d ago
  • Data Security Analyst

    Peraton 3.2company rating

    Information security analyst job in Arizona

    Responsibilities Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO - Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E: Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information/point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU/A), Service Level Agreements (SLA). • Cyber Defense Operations (CDO) Support. Provide sufficient staffing to maintain on-site capability IAW PWS paragraph 5.4: Place of Work and Work Hours to work directly with GCC Operations personnel in conducting initial triage/cyber incident analysis to include, review correlated events, system/device logs, and SIEM event data to determine and recommend/take immediate DCO-IDM response actions. Immediate response actions can include submission of a cyber-incident response ticket, making an initial determined category of cyber incident (IAW Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510), and/or notifying DCO/ARCYBER/Higher Headquarters IAW Commander's Critical Information Requirements (CCIR) reporting requirements. All other CDO operations must have an on-call capability to take actions as required to respond to cyber incidents IAW policy and/or Government direction. • Incident Analysis and Mitigation. Provide incident analysis and mitigation support by conducting incident analysis and recommending mitigation measures in response to general or specific Advanced Persistent Threats (APT), (attempted exploits/attacks, malware delivery, etc.) on Army networks. In support of incident analysis and mitigation, the Contractor shall: • Block/deny access by hostile sites or restrict access by specific ports/protocols and/or applications. • Provide recommendations to the supporting operations and maintenance organization to take necessary action where the CSSP-D Division does not administratively control the sensor grid. • Provide justification of IDMs and/or operational impact (implied or accepted risk) to a Configuration Control Board (CCB) and/or Authorizing Official (AO), as required, for mitigation action (IDM) approval. If deemed appropriate (or as requested), the internal defensive measure may involve coordination of a Network Damage Assessment (NDA), Network Assistance Visit (NAVs), or other version of the Computer Defense Assistance Program (CDAP) mission. • Monitor all sensors and agents managed by the GCC for security event analysis and response and maintain/update the triage database with current threat data and response methods in real-time with follow-up recurring within 72 hours of last response. The Contractor shall respond to a detected event and perform triage, ensure proper handling of the associated trouble ticket (TT), and process events accordance with appropriate TTPs. • Provide all initial cyber incident reports to Law Enforcement and Counterintelligence (LE/CI) agencies and: • Maintain an up-to-date POC list for LE/CI agencies as routinely provided by the Major Cybercrimes Unit (MCU) and Cyber Counterintelligence agencies. • In cases where an active investigation will be opened, LE/CI agencies will provide written request that will include the official case number, specific data logs, and other required information IAW local TTPs. • Provide support and expertise include the provision of the required data along with a summary or analysis of the data. Data and answers provided in the analysis shall pertain specifically to requirements in the LE/CI official request or within CSSP-D TTPs. • Provide all initial cyber incident investigation reports to LE/CI . • Maintain a Master Station Log (MSL) to document high visibility cyber incidents, defined as events identified in an ARCYBER Task Order, a Named Operation, or a Category 1 (CAT1), with status, discuss DCO topics, share internal tasks between shifts, document call outs, and share any additional relevant instructions between shifts and up through GCC Leadership and Operations reporting channels. The MSL must be available for Government inspection at any given time to ensure accurate tracking of the above information. Qualifications Basic Qualifications: 2 years with BS/BA; 0 years with MS/MA; 6 years with no degree Certifications: DCWF Code511 Intermediate (one of the following: CEH, GMON, GRID, Cloud+, FITSP=O, GCED, GDSA, GSEC, Pentest+, Security+) Possess and maintain a Secret security clearance Demonstrated experience in information security or related field Demonstrated experience developing data security standards Experience in application level, database, file system and full disk encryption Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
    $80k-128k yearly Auto-Apply 2d ago
  • Sentinel - Systems Security Engineer - 16416

    Northrop Grumman 4.7company rating

    Information security analyst job in Roy, UT

    RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. Join Northrop Grumman on our continued mission to push the boundaries of possible across land, sea, air, space, and cyberspace. Enjoy a culture where your voice is valued and start contributing to our team of passionate professionals providing real-life solutions to our world's biggest challenges. We take pride in creating purposeful work and allowing our employees to grow and achieve their goals every day by Defining Possible. With our competitive pay and comprehensive benefits, we have the right opportunities to fit your life and launch your career today. Northrop Grumman Defense Systems is seeking a Systems Security Engineer, (Level 2), that will support the Sentinel (GBSD) program performing Hardware Assurance. This position will be located in Roy, UT and will support the Ground Based Strategic Deterrent (GBSD) program. The Mission Defense Team (MDT) is seeking a highly motivated and qualified system engineer to serve as a Hardware Assurance Engineer, Level 2. You will be responsible for assessing and prioritizing a broad spectrum of hardware security threats. Key protection activities will involve vendor research, hardware assurance, program protection, counterfeit prevention, and supply chain security. Additional Responsibilities include: Assessment and analysis of threats, vulnerabilities, and risk for identified mission-critical functions and critical components Support courses of action based on knowledge and experience, initiative, guidance, and established regulations and policies Research, analyze data, and derive facts per identified vulnerabilities Participate in a variety of working groups and customer meetings; ensure communication of risk environment with stakeholders Contributes to program plans, goals, objectives, and milestones to for Hardware Assurance Review technical security assessments of SSE environments to identify points of vulnerability, non-compliance with established standards and regulations and recommended mitigation strategies Execute completion Statement of Work requirements, Program Milestone Exit Criteria, and program maturity commitments Ensure the architecture and design of systems are functional and secure; support the design, development, implementation, and integration of security systems and system components Self-starters compelled to take action in the workplace without requiring prompting from supervisors Support MDT with other duties as assigned In addition to technical skills, you will be a self-starter with strong time management skills. Your organizational skills and ability to anticipate future challenges will serve you well Basic Qualifications Must be a US Citizen with an active DoD Secret Clearance, at time of application, current and within scope, with an investigation date within the last 6 years Must have the ability to obtain and maintain Special Access Program (SAP) approval within a reasonable period of time, as determined by the company to meet its business need Requires a bachelor's degree in a STEM (Science, Technology, Engineering or Mathematics) discipline from an accredited university and 2 years of related experience; or a master's degree with 1 year Minimum 2 years of applying and understanding Systems Security Engineering principles applicable to US Government Defense Programs Minimum 2 years in showing the ability to communicate effectively and clearly present technical approaches and findings Experience in any of the full product life cycles of: ASIC Design, FPGA Design Experience in HDL (VHDL/Verilog), implementing designs using RTL Ability to show self as team player, able to multi-task, able to generate quality work products independently, able to make excellent judgement and show interpersonal skills Preferred Qualifications Degree in Aerospace Engineering, Systems Engineering, Mechanical Engineering, Software Engineering, or similar ICBM Experience Experience developing Systems Security Engineering requirements for hardware and software assurance Evaluating program processes and compliance strategies for large, complex multi-site programs Demonstrated experience and familiarity with vulnerability management Experience with Model-based Systems Engineering (MBSE) concepts and tools A solid understanding of Program Protection applicable to US Government Defense Programs and applied knowledge in the application of SSE principles across a broad spectrum of security measures (Cybersecurity, Counterfeit Awareness, Anti-Tamper, HW/SW Assurance, OPSEC, etc.) to protect critical program information (CPI) Top Secret clearance Position Benefits As a full-time employee of Northrop Grumman, you are eligible for our robust benefits package including: Medical, Dental & Vision coverage 401k Educational Assistance Life Insurance Employee Assistance Programs & Work/Life Solutions Paid Time Off Health & Wellness Resources Employee Discounts ****************************************************************** This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off. This role may offer a competitive relocation assistance package. #Sentinelsystems Primary Level Salary Range: $77,200.00 - $115,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
    $77.2k-115.8k yearly Auto-Apply 36d ago
  • Data Security Analyst - C78843 7.5 Salt Lake City, Utah

    CapB Infotek

    Information security analyst job in Salt Lake City, UT

    We are looking for a Data Security Analyst for our long-term multiyear project out of Salt Lake City, Utah. Build software libraries and services to provide secure-by-default services to software engineering teams, including authentication systems, secure service architectures, endpoint control solutions, and cloud controls · Partner with colleagues from across engineering and risk to ensure an outstanding developer experience that satisfies the firm's security needs · Collaborate on feature design and problem solving · Help to provide frictionless integration with the firm's runtime, deployment and SDLC technologies · Manage the full lifecycle of software components, from requirements through design, testing, development, release and demise · Help to communicate and promote best practices for security engineering across the firm · Engage in production troubleshooting Basic Qualifications · A strong grounding in security concepts, including secure coding practices, trusted computing and principles of authentication and authorization · A good understanding of public key and symmetric key cryptography · The ability to reason about performance, security, and process interactions in complex distributed systems · Proficiency in designing, developing and testing cross-platform software in one or more of Java, Golang or C#; open to using multiple languages · Experience developing, deploying and supporting software across the full Continuous Delivery life-cycle · The ability to understand and effectively debug both new and existing software · Experience meeting demands for high availability, low latency and scale · The ability to communicate technical concepts effectively, both in writing and orally, as well as the interpersonal skills required to collaborate effectively with colleagues across diverse engineering teams Preferred Qualifications · An understanding of regulated environments, e.g. financial services · Experience building services using public cloud providers such as AWS, Azure or GCP · Experience with threat modeling and risk assessment · Experience of practical security engineering in a Linux and/or Windows environment · Familiarity with service mesh concepts and service-oriented architectures · Familiarity with data protection principles and solutions · Experience with deploying software to containerized environments - Kubernetes/Docker · Experience monitoring, measuring, auditing and supporting software · Scripting skills using Python, PowerShell or bash · Experience with Terraform or similar infrastructure-as-code platforms, as a user and/or as a service provider
    $69k-98k yearly est. 60d+ ago
  • Information Security and Compliance Analyst

    Veracity Insurance

    Information security analyst job in Pleasant Grove, UT

    Job DescriptionAt Veracity, we aim to be a different kind of insurance partner - one that is free from outside investors, venture capital, or the pressures of a corporate parent. Ours is a culture of empowerment - one that believes in effort, results, and accountability. We believe that transparency fosters trust, trust fosters growth, and that growth drives innovation. Our commitment to rigorous evaluation and relentless execution lead to rapid evolution. We answer only to the small business owners we serve, and this independence allows us to stay focused on what matters most: helping their businesses thrive by providing expert guidance and best-in-class insurance policies. We're growing fast and want you to be a part of it! We're seeking a talented, detail-oriented Information Security and Compliance Analyst to join our team. Reporting to the Technical Operations and Information Security Manager, this role is responsible for supporting the organization's cybersecurity posture by maintaining and enhancing security policies, controls, and monitoring systems, and ensuring compliance with frameworks such as SOC 2 and PCI DSS to protect company and client data. Key Responsibilities Strengthen the organization's cybersecurity posture by implementing, maintaining, and improving security policies, standards, and technical controls Monitor security tools and system activity to identify, investigate, and escalate potential threats or vulnerabilities Support vulnerability management, including performing scans, tracking remediation, and validating fixes Maintain accurate, audit-ready documentation and coordinate evidence collection for SOC 2, PCI DSS, and other compliance frameworks Support incident response processes, including triage, documentation, and post-incident follow-up Assist with user access reviews, control testing, risk assessments, and security awareness efforts Collaborate with IT, Engineering, and Compliance teams on secure configurations, remediation plans, and cross-functional security initiatives Participate in routine policy, procedure, and control reviews to ensure alignment with regulatory requirements and security best practices Maintain detailed logs and reports of security activities, metrics, and compliance obligations Identify opportunities to strengthen controls, streamline processes, and enhance overall security program maturity Required to perform other duties as requested, directed, or assigned Requirements and Qualifications Bachelor's degree in information systems, IT, Cybersecurity, or a related field 2-3 years of experience in security compliance, auditing, or governance (SOC 2 experience preferred) Strong integrity, attention to detail, and accountability in handling sensitive or regulated information Proactive problem-solving skills with the ability to anticipate and address risks effectively Strong collaboration and communication skills with experience working across technical and compliance teams Ability to remain composed and effective under pressure, including during audits and security incident Perks Health, dental, and vision plans Amazing work-life balance with 4 weeks of Paid Time Off 10 Paid Company Holidays with 2 floating holidays 401K Programs with employer match Personal assistance programs for support in a healthy personal and work life Why Veracity? Here at Veracity, you'll be part of a team of trailblazers and visionaries. We're not just revolutionizing the way people “do” insurance; we are creating a whole new paradigm. Here, you will experience a vibrant and inclusive workplace where your ideas matter! With us, you have a chance to: Engage in groundbreaking projects that are reshaping the insurance landscape Collaborate with a group of dedicated, like-minded professionals Experience a culture that prioritizes growth and development Compensation Range: $75k/yr - $85k/yr We are proud to be an equal-opportunity employer. We are committed to providing equal opportunities to all qualified applicants, regardless of race, color, religion, sex, national origin, disability, or any other legally protected characteristics. If you need accommodation, please let us know during the interview process. Powered by JazzHR tg FX77drAm
    $75k-85k yearly 4d ago
  • Senior Analyst Info Security

    Palms 4.4company rating

    Information security analyst job in Las Vegas, NV

    The Senior Analyst Info Security is responsible for leading and supporting both short-term and long-term cybersecurity initiatives across the enterprise. This includes managing and maintaining secure systems, data, and network infrastructure, as well as conducting enterprise-wide security gap assessments, vulnerability remediation, and implementation of security controls. The role also encompasses the development and enforcement of compensating controls and exception management processes to ensure the organization's security posture remains resilient and compliant with industry standards. This role promotes a security-first mindset across the organization and contributes to the continuous improvement of the enterprise's security posture through proactive monitoring, technical support, and training initiatives. Essential Functions & Responsibilities: Manage the full lifecycle of cybersecurity toolsets, including planning, acquisition, deployment, administration, monitoring, and decommissioning. Provide incident response and issue management for security investigations, including intrusion detection, malware, denial of service attacks, and privileged account misuse. Develop and maintain standard operating procedures and training materials. Monitor security alerts and logs to identify and investigate potential threats, reducing incident response time and improving detection accuracy. Collaborate with IT and business units to ensure security controls are implemented and maintained across enterprise systems. Provide high-level technical support, including configuration changes, policy recommendations, and diagnostics of network security issues. Maintain awareness of regulatory gaming requirements, internal control standards (MICS), and enterprise policies related to information security. Manages and maintains PCI compliance. This includes implementing PCI policy, standards, and procedures, assigning training and tracking to completion, and working with PCI assessors in assuring compliance. Participate in operational planning and contribute to strategic security initiatives. Promote a culture of security awareness and operational excellence across departments. Emergency on-call to support after-hours security incidents and operational support. Perform other duties as assigned to support the efficient operation of the department. Required Qualifications: Ability to secure and maintain a Nevada Gaming Registration. High School diploma or GED required. Bachelor's degree in information technology, Information Security, or a related field preferred. Minimum of 6 years of experience in information security or related roles. Experience in casino environments is strongly preferred. Familiarity with the following technologies and practices: Data Loss Protection Forensic Software Suites Network Infrastructure Virtualization Platform Security Operating Systems Security Access Management and Privileged Access Management Security Information and Event Monitoring (SIEM) Incident Response Programs PCI (Payment Card Industry) Strong communication and presentation skills. Ability to troubleshoot using the OSI model and analyze network traffic. Understanding of standards, policies, procedures, and operational effectiveness. Ability to work in a fast-paced, high-demand environment. Certifications from organizations such as ISC2, CompTIA, ISACA, GIAC, or equivalent preferred (e.g., CISSP, Security+, CISM). Physical Demands & Work Environment: The physical demands and working environment described here are representative of those that an employee encounters and must be met by an employee to successfully perform the essential functions of this job. Primary work environment is in a climate-controlled office setting. Work requires travel to attend meetings, trade shows, and conferences. Incumbents may be required to work evening, weekend and holiday shifts. Must be able to work in a fast-paced, high-demand environment. Strength sufficient to exert up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects and/or move up to 40 pounds occasionally. Sedentary work: involves sitting most of the time. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine, and computer printer. Physical activities that apply to the essential functions of the position are balancing, stooping, kneeling, crouching, reaching, pushing, pulling, lifting, grasping, talking, hearing, and repetitive motions. Hearing sufficient to hear conversational levels in person, via videoconference and over the telephone. Speech sufficient to make oneself heard and understood in person, in front of groups, in meetings, via videoconference and over the telephone. Visual acuity that meets the requirements of the position: The worker is required to have close visual acuity to perform an activity such as preparing and analyzing data and figures; transcribing; viewing a computer terminal; expansive reading and visual inspection of employees, visitors or facility. Mobility sufficient to safely move in an office environment, walk, stoop, bend and kneel, and enter, exit and operate a motor vehicle in the course of travel to promotional events, meetings, conferences, trade shows and San Manuel properties. Endurance sufficient to sit, walk and stand for extended periods, and maintain efficiency throughout the entire work shift and during extended work hours. The employee may be exposed to fumes or airborne particles including secondhand smoke. Equal Opportunity Employer: Palms Casino Resort provides equal employment opportunities to all team members and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Palms Casino Resort, its affiliates and subsidiaries, will make reasonable accommodations in compliance with applicable law. We are committed to creating a work environment where the growth and well-being of our team members is the top priority. Join our team today!
    $111k-146k yearly est. Auto-Apply 60d+ ago
  • Sr. Security Analyst

    Lightspeed DMS

    Information security analyst job in South Jordan, UT

    Job Description Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships. The Senior Security Analyst is responsible for team lead activities, such as monitoring, analyzing, and responding to security incidents across enterprise systems, cloud environments, and networks. This role ensures the confidentiality, integrity, and availability of organizational information through proactive detection, incident response, and continuous improvement. The ideal candidate will have a strong technical background in leading threat analysis, SIEM integration and management, vulnerability management, and incident handling. What you'll do: Monitor and investigate security alerts and events across SIEM, EDR, and network systems. Conduct root cause analysis and coordinate remediation of security incidents. Lead vulnerability assessments and ensure timely patching and mitigation. Develop and maintain incident response playbooks and escalation procedures. Collaborate with IT, DevOps, and Development teams to strengthen overall security posture. Lead proactive threat hunting and continuous tuning of detection mechanisms. Support internal and external audits (e.g., SOC 2) and risk assessments by providing evidence and guidance. Perform firewall management, including rule changes, troubleshooting, and SOP development for hybrid cloud/on-prem environments. Lead to red/blue team exercises and implement findings to improve defenses. Coordinate and assist with enterprise pen-tests, risk assessments, and compliance initiatives. Serve as a lead security advisor to business and technical teams, providing guidance on secure design, risk mitigation, and compliance using industry frameworks and best practices. What you should have: Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience. 8+ years of experience in information security, incident response, or SOC operations. Proven hands-on experience with SIEM tools (Splunk, Sentinel, QRadar, etc.) and EDR/XDR platforms (CrowdStrike, Darktrace, Microsoft Defender). Strong experience securing and monitoring cloud environments (AWS, Azure). Deep knowledge of security frameworks (NIST CSF, ISO 27001, SOC 2). Advanced scripting and automation proficiency (Python, PowerShell, Terraform). Excellent analytical, problem-solving, and communication skills. Preferred Qualifications: Relevant certifications such as AWS Security, CISSP, GCIH, GCIA, GPEN, GWAPT preferred. Experience integrating AI and automation into security operations workflows. Hands-on experience performing dynamic application security testing and red team exercises across endpoint and cloud environments. Expert-level networking and firewall expertise with platforms such as Palo Alto, Cisco, or Checkpoint. Master's degree in Cybersecurity, Information Technology, or a related field. Inclusion and Diversity at Lightspeed: At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact. Equal Employment Opportunity Statement: Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category. Important Note: Applicants must be authorized to work in the U.S. Ready to apply? Take the next step in your career-apply today and join a team where your skills will make an impact!
    $90k-125k yearly est. 28d ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Information security analyst job in Scottsdale, AZ

    L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
    $87k-119k yearly est. Auto-Apply 32d ago
  • Senior Security Analyst - Tucson, AZ

    RTX Corporation

    Information security analyst job in Tucson, AZ

    Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Security Clearance: DoD Clearance: Top Secret At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. The Principal Analyst, Security will perform a wide variety of tasks as part of the Special Access Programs (SAP) Security Team. Duties include but are not limited to: developing, reviewing and administering the program's security policies in a fast-paced, deadline driven environment to ensure compliance with the NISPOM, DoDM 5205.07, JSIG, and ICD-705. You will provide oversight and guidance related to security policies and procedures to ensure successful contract execution. What You Will Do * Administer security procedures (NISPOM, DoDM 5205.07, ICD 705, and JSIG), as they relate to operating in a classified environment for: personnel processing, media control, marking and control of documents / materials, security education, visitor control, destruction of classified, and physical security. * Develop, prepare, and implement local SOPs, OPSEC Plans, and proprietary test plans utilizing risk management principles. * Provide security oversight and management to subcontractors. * Conduct and/or participate in internal reviews and/or Government inspections. * Investigate security infractions/violations and prepare reports specifying the potential for loss or compromise and the associated risk to the program(s). * Collaborate and assist the ISSO / ISSM on implementation of JSIG requirements. * This position may require travel on company business. * Must be able to obtain and maintain SAP access * A valid driver's license is required, as this position may involve escorting individuals across business locations Qualifications You Must Have * Typically requires a Bachelor's degree and a minimum of 2 years of prior relevant experience OR in absence of a degree, 6 years of relevant experience is required. Advanced degrees may be considered in lieu of prior experience. * Previous experience as a security professional supporting SAP and/or SCI programs. Qualification We Prefer * Experience with any of the following: NISPOM, DoDM 5205.07, JSIG, and/or ICD 705. * Degree major in Business Management, Security and/or Risk Management, Government Policy, Information Management, Criminal Justice, or other related field of study. * At least 6 years of National Security experience preferred. * Completed related training and/or certification with DCSA and/or CDSE (ex. Introduction to SAPs, ICD-705, SFPC, SPSC, PSC, etc.) What We Offer * Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Safety, Trust, Respect, Accountability, Collaboration, and Innovation. * This position is not eligible for Relocation assistance Learn More & Apply Now! * Please consider the following role type definition as you apply for this role. Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintnance employees, as they are essential to the development of our products. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 66,000 USD - 130,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills. Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement. Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance. This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply. RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $87k-118k yearly est. Auto-Apply 17d ago
  • Network Security Analyst

    Mindlance 4.6company rating

    Information security analyst job in Lehi, UT

    Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst Duration: 6 Months Location: Lehi, UT Required: • Minimum 3+ years exp. • Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred) • Review requests for new firewall policy • Understanding of IP stack • Ability to prioritize work and meet defined SLAs • Good communication skills - both verbal and written Additional Information Thanks & Regards, ______________________________________________________________________________________________________ Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
    $75k-95k yearly est. 7h ago
  • IT Operations & Cybersecurity Analyst

    Baxter Aerospace 4.2company rating

    Information security analyst job in Saint George, UT

    Responsive recruiter ABOUT THE ROLE:We are seeking a detail-oriented and proactive IT Operations & Cybersecurity Analyst to join our team. This role will be responsible for ensuring the stability, security, and efficiency of our IT systems and infrastructure. The ideal candidate will have a strong technical background in IT operations paired with hands-on cybersecurity experience, with a passion for problem-solving and protecting organizational assets. RESONSIBILITIES Monitor, maintain, and optimize IT systems, networks, and applications to ensure high availability and performance. Provide technical support, escalating issues to vendors or engineering teams when necessary. Manage user accounts, permissions, access controls, and system configurations in line with operational and security standards. Monitor security alerts, logs, and events to detect, investigate, and respond to threats. Implement and enforce IT and security policies, compliance requirements, and best practices. Collaborate across IT, security, and business teams to support projects and technology upgrades. REQUIREMENTS Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or equivalent experience. 2-5 years of experience in IT operations, cybersecurity, or a hybrid IT/security role. Proficiency with Microsoft Office 365, and UniFi. Hands-on experience with security tools. Strong understanding of firewalls, VPNs, IAM, and network security architecture. Familiarity with scripting or automation (PowerShell, Python, or Bash) preferred. Knowledge of compliance frameworks (ITAR). Excellent problem-solving, communication, and collaboration skills. ABOUT OUR COMPANY: At Baxter Aerospace, we are building a new way to fight forest fires in a digitally connected world. We are known for our innovation, precision, and commitment to quality. We foster a collaborative and fast-paced environment where excellence is both expected and rewarded. We are looking for top-tier team members to join our mission in advancing satellite communication equipment used for critical missions like aerial firefighting, camera data transmission from aircraft, and deployed team coordination. For more information about our company, please visit our website: BaxterAerospace.com. EXPECTED HOURS/SCHEDULE: Full Time: Monday-Friday, 8 AM-6 PM BENEFITS: Pay Depends on Experience Health Insurance: Medical, Dental, and Vision Included Opportunity for Growth and Development Compensation: $70,000.00 - $95,000.00 per year
    $70k-95k yearly Auto-Apply 60d+ ago
  • Data Security Analyst Sr

    The University of Utah 4.0company rating

    Information security analyst job in Salt Lake City, UT

    The Data Security Analyst Senior position in the Information Security Office ( ISO ) is responsible for leading and supporting security initiatives which mitigate risk and ensure data integrity at the University of Utah and University Health Care. This includes providing security guidance and technical risk assessments of new or ongoing projects, responding to, and analyzing security incidents, and implementing new security technologies or processes. This is a highly collaborative position which requires strong analytical and communication skills. Responsibilities · Communicate security risks, incidents, and mitigation strategies to senior management and relevant stakeholders. · Collaborate with IT teams, system administrators, and network security analysts to ensure cohesive security strategy and technical implementations. · Collaborate in the development of action plans to improve security posture. · Assist the University in meeting compliance obligations regarding information security. · Contribute to incident response procedures and play a key role in incident response activities and help develop strategies to prevent future occurrences. · Analyze digital evidence from endpoints, servers, and cloud environments to identify the root cause of breaches, malware infections, or other security issues. · Provide security evaluation and guidance regarding new technologies or processes. · Assist in legal discovery and evidence acquisition and preservation. · Support and configure security safeguards in major cloud platforms. · Participate in security assessments of departments and colleges. · Evaluate, select, implement, and maintain endpoint security solutions such as endpoint detection and response ( EDR ). This will include working with portions of the Microsoft Extended Detection and Response suite. · Support the Security Operations Center ( SOC ) leverage technology and data to accomplish their responsibilities. · Stay up-to-date and informed about emerging threats, vulnerabilities, and security solutions through research and industry publications. This job description is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to the job. Work Environment and Level of Frequency typically required Nearly Continuously: Office environment. Physical Requirements and Level of Frequency that may be required Nearly Continuously: Sitting, hearing, listening, talking. Often: Repetitive hand motion (such as typing), walking. Seldom: Bending, reaching overhead. Minimum Qualifications Requires a bachelor's degree in area of specialty, or equivalency (one year of education can be substituted for two years of related work experience); and 2-4 years of experience in the field or in a related area. Applicants must demonstrate the potential ability to perform the essential functions of the job as outlined in the position description.
    $54k-74k yearly est. 60d+ ago
  • Senior Security Engineer - Application

    Vasion

    Information security analyst job in Saint George, UT

    Job Description Vasion is seeking a Senior Security Engineer - Application who embodies our core values and is eager to join our dynamic team. We are dedicated to enabling digital transformation for everyone by providing an affordable, integrated SaaS solution that simplifies business operations. Vasion offers a flexible working environment for our 400+ employees around the globe, including at our headquarters in St. George, Utah, and offices in the UK, Germany, and Lehi, Utah. Role Overview As a Senior Security Engineer-Application Security, you will be responsible for safeguarding our software applications from security vulnerabilities and threats. You will work closely with development teams to integrate security best practices throughout the software development lifecycle, perform security assessments, and respond to emerging threats. Your role is crucial in ensuring our applications remain secure and compliant with industry standards. Responsibilities Analyze code from penetration test and make security recommendations to improve the security posture of the application. Analyze security systems and seek improvements on a continuous basis Report possible threats or software issues Research weaknesses and find ways to counter them Find cost-effective solutions to cybersecurity problems Understand software, hardware and internet needs while adjusting them according to our business environment Develop best practices and security standards for the organization Test company software, firmware and firewalls Monitor production networks for security issues. Investigate security breaches and other cybersecurity incidents. Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities. Fix detected vulnerabilities to maintain a high-security standard. Develop company-wide best practices for IT security. Perform penetration testing. Help colleagues install security software and understand information security management. Research security enhancements and make recommendations to management. Stay up-to-date on Cybersecurity trends and security standards. Requirements Bachelor's degree in computer science or cyber security or equivalent job experience 3 + years experience in information security or related fields. Proven experience in conducting security assessments, code reviews, and penetration testing. Familiarity with secure software development practices and tools. Strong understanding of web and mobile application security vulnerabilities (e.g., OWASP Top Ten). Familiarity with programming languages such as Go, PHP, Python, or JavaScript. Experience with security tools such as Burp Suite, OWASP ZAP, static and dynamic analysis tools. Knowledge of cloud security (e.g., AWS, Azure) and container security (e.g., Docker) is desirable. Excellent problem-solving skills and attention to detail. Strong communication skills, with the ability to explain complex security issues to non-technical stakeholders. Ability to work independently and collaboratively in a team environment. Benefits Flexible work environment Discretionary Vacation Bonus Flexible paid time off Paid parental leave Competitive pay A full suite of traditional benefits Training/Advancement opportunities 401k with company match and immediate vesting Financial wellness education Company-contributed HSA Onsite perks include gym, pickleball, snacks & drinks, arcade, theater room, etc. Our Core Values Vasion looks for people who will exemplify its four core values and are driven to become: Action Owners, with principles drawn from Extreme Ownership by Jocko Willink and Leif Babin Candor Seekers, illustrated in Radical Candor by Kim Scott People Builders, as detailed in Leadership and Self-deception by The Arbinger Institute Storytellers, guided by principles from Building a StoryBrand: Clarify Your Message So Customers Will Listen by Donald Miller WE ARE CURRENTLY HIRING REMOTELY IN THE FOLLOWING STATES: AL, AR, AZ, CA, CO, FL, GA, ID, IL, IN, KY, MA, MD, MI, MN, MO, MT, NC, NE, NJ, NM, NV, NY, OH, OR, PA, TN, TX, UT, VA, VT, WA, WY More about Vasion Visit ********************** to learn more about Vasion. Additional Information Vasion is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, national origin, disability, veteran status, gender identity, sexual orientation and other legally protected characteristics.
    $105k-147k yearly est. 28d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Saint George, UT?

The average information security analyst in Saint George, UT earns between $63,000 and $133,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Saint George, UT

$92,000
Job type you want
Full Time
Part Time
Internship
Temporary