Information security analyst jobs in Saint George, UT - 414 jobs
All
Information Security Analyst
Cyber Security Analyst
Network Security Analyst
Data Security Analyst
Senior Security Analyst
Cyber Security Specialist
Security Architect
Sr Cyber Defense Security Specialist
Boyd Gaming 3.9
Information security analyst job in Las Vegas, NV
Boyd Gaming Corporation has been successful in gaming jurisdiction in which we operate in the United States and is one of the premier casino entertainment companies in the United States. Never content to rest upon our successes, we will continue to evolve and retain a position of leadership in our industry. Our past success, our current business philosophies and our sound business planning, combine to position Boyd Gaming Corporation to maximize value for our shareholders, our team members and our communities.
Job Description
Subject matter expert and technical leader who is passionate about complex informationsecurity technology, topics and issues. Responsible for technical and operational duties in the areas of computer network defense analysis, vulnerability assessment and management, incident response and management, threat intelligence, data loss prevention, digital forensics, and threat hunting. Provides customer service and technical support with the goal of improving the overall security posture of the organization.
Responsible for documenting, monitoring and reporting on various security related systems and processes to ensure system and data integrity, security and availability.
Creation of policy, day to day management, administration and maintenance of InformationSecurity tool set.
Identification of any tool or visibility gap in the existing tool set.
Identification of team requirements for any given technology, documentation of the current or proposed architecture, lead any proof of concept and document results, quantify any recommendations for the use of any new security tool, process or procedure.
Cross training the team on day to day use, standard operating procedures and tuning of the security tool set.
Analyze threat intelligence and risks. Identify and document impact to Boyd and any mitigation or remediation actions required.
Lead initiatives and own the outcomes related to remediation or mitigation against identified day zero attacks. Liaise with cross functional teams to facilitate and ensure implementation of any necessary tasks to defend against the risk.
Escalation point and technical subject matter expert for SecurityAnalysts and any third-party security providers.
Responsible for tracking all security incidents to resolution.
Leading defensive protocols and programs when attacks occur.
Simulating attacks to identify potential areas of weakness in defenses and alerting.
Writing detailed reports and providing accurate metrics.
Perform the role and duties of an internal expert on matters relating to threat detection and incident response.
Lead investigations into attacks and indicators of compromise. Provide a coordinated response to applicable complex cyber-attacks.
Contribute to the ongoing development and improvement of security monitoring and incident response processes and solutions as required to support Boyd's InformationSecurity program and exceed team objectives.
Tracking cybersecurity news and trends for applicable systems, and reporting concerns to appropriate resources.
Documenting and updating security related policies, including participation in the periodic review process and managing policy exceptions and risk acceptances in coordination with the Boyd Risk and Compliance teams.
Manage, update, modify alerts, adjust/tune event correlation rules to increase accuracy/relevance/effectiveness and create new rules based on threat changes and evolving risks.
Use creativity and innovation to automate and streamline team processes and procedures.
Perform event correlation, analysis of malicious activity indicators and appropriate response based on review and access to multiple security tools.
Qualifications
Bachelor's Degree in Information Technology or Cyber Security, and/or equivalent experience, Masters ' Degree in Computer Science or InformationSecurity (Preferred)
7-10 years of professional InformationSecurity Incident Response/ Forensics/ SOC experience
Proven experience with InformationSecurity industry best practices
Proven experience with System/ Application vulnerabilities, threats and exploitation
Proven experience with malware analysis (dynamic and static) or forensic examination
Advanced knowledge and understanding of Windows, Linux, Unix and networking
Understanding of ISO 27001 / 2700 2, NIST Cybersecurity Framework, COBIT, SOX, PCI, CCPA and ITIL.
Expert level computer and IT skills.
Advanced analytical and problem-solving skills.
High levels of creativity, patience and ability to remain calm and focused in a crisis.
Highly motivated, self-starter, competitive, and attracted to challenging opportunities
Demonstrated strong decision-making skills. Having a logical and analytical approach to problem-solving, being able to assess situations and decide on the best course of action; understanding test results and developing solutions.
Demonstrated advanced organizational and time management skills. Completing tasks in a timely manner; being detail-oriented, able to perform repetitive tests in a thorough and consistent manner; being able to work on several tasks at the same time while still accomplishing goals and deadlines.
Advanced communication skills. Being able to articulate technical issues and requirements in a clear and non-technical manner.
Excellent teamwork skills. Ability to partner with the business and cross functional IT teams, working as a cohesive and effective unit.
Highest levels of honesty, integrity and objectivity. Ability to remain objective when analyzing weaknesses and proposed new solutions; being responsible and understanding the level of trust required to handle private and highly sensitive information and situations.
Additional Information
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
$51k-74k yearly est. 3d ago
Looking for a job?
Let Zippia find it for you.
Cloud Security Architect
Axway 4.8
Information security analyst job in Scottsdale, AZ
Job ID 2025-8109 Category Technical/Engineering
The Axway Cloud Security team is seeking a new Cloud Security Architect who will be critical to delivering secure cloud services to customers in government, banking, financial services, healthcare, life sciences, manufacturing, and other security-conscious industries.
As a Cloud Security Architect, you will serve as a trusted advisor and thought leader, responsible for embedding security into the foundation of our cloud strategy and engineering practices.
Responsibilities
Lead the design and implementation of secure, scalable, and resilient cloud architectures across Customer Cloud Environments
Serve as the principal subject matter expert (SME) for security architecture, frameworks, and best practices.
Define and communicate security reference architectures, design patterns, and standards that align with organizational and regulatory requirements
Partner with development, product, and operations teams to embed security throughout the software development life cycle (SDLC) and infrastructure as code (IaC) pipelines
Conduct architectural risk assessments and threat modeling for new and existing cloud solutions
Develop and drive automation strategies for continuous compliance, configuration management, and security control validation
Evaluate and integrate cloud-native and third-party security technologies (e.g., SIEM, CSPM, CWPP, XDR, etc.) to strengthen Axway's security posture
Collaborate with governance and compliance teams to ensure alignment with frameworks such as ISO 27001, SOC 2, NIST, GDPR, and CIS Benchmarks
Provide strategic guidance for vulnerability management processes, ensuring architectural consistency and rapid mitigation of risks
Engage in incident response activities as a cloud security SME, assisting with investigation, containment, and remediation efforts, and documenting findings and lessons learned
Mentor other team members, and contribute to developing a security-first culture across all relevant teams
Represent the Cloud Security organization in design reviews, risk committees, and customer-facing engagements as needed
Contribute to Axway's Cloud Center of Excellence (CCoE) and help define secure reference patterns across Axway's SaaS, single-tenant, and hybrid cloud offerings
Committed to developing and honing skills via certifications, instructional courses, security news feeds, and/or research
Qualifications
8+ years of progressive informationsecurity experience, with at least 4 years focused on cloud security architecture and engineering
Deep expertise in AWS and Azure security services, controls, and architecture principles
Proven ability to translate complex business and technical requirements into secure cloud architectures and actionable designs
Experience developing security architectures for distributed systems, containerized environments (Kubernetes), and hybrid or multi-cloud ecosystems
Demonstrated experience with DevSecOps practices, CI/CD security integration, and automation using APIs, IaC, and scripting
Strong understanding of network security, identity and access management (IAM), secrets management, data protection, and logging/monitoring architectures
Experience assessing, implementing, and maintaining enterprise solutions such as CIEM, CSPM, vulnerability management, and identity governance tools
Working knowledge of compliance and risk frameworks (ISO 27001, NIST, SOC 2, GDPR, CIS, CSA) and their application in cloud environments
Excellent communication skills with the ability to engage both technical and executive stakeholders and influence architectural direction
Strategic mindset with the ability to balance innovation, security, and business needs
Nice to Have
Security certifications such as:
(ISC)2: CISSP, CCSP
SANS: GCLD, GCSA, GCIA, GCPN, GPYC, GCIH, GPCS
AWS: Solutions Architect Professional, Security Specialty
Azure: Security Engineer Associate, Solutions Architect Expert
Bachelor's or Master's degree in Cybersecurity, Computer Science, or related field - or equivalent industry experience
Prior experience contributing to or leading cloud security strategy, governance programs, or security architecture boards
Company Overview
At Axway, we're more than a company-we're a pioneer. For 25 years, we've been empowering organizations to achieve digital transformation and unlock innovation. With a presence in 100 countries, 11,000+ customers, and a global team of over 1,400+ passionate professionals, Axway is driving the future of enterprise integration.
We're on a mission to a be the leaderin our space, empowering our customers withsecure, mission-critical softwareto manage and deliver impactful business outcomes from all theirdigital business interactions.
Why Axway?
We believe in the power of togetherness. When you're part of Axway, you're part of a culturally rich and globally connected community that thrives on exchanging ideas and tackling challenges head-on. Whether working remotely or onsite, you'll find camaraderie, collaboration, and the support of leadership to inspire you daily.
Here, you'll grow, innovate, and succeed because we're better together. Each step forward in your personal journey is one we take as a team. Join us, and let's accomplish extraordinary things together.
Axway is a proud member of 74Software. Learn more about how Axway is transforming the future:en.
Ready to shape the future? Let's get started-because at Axway, together, we can. Together, we will.
Axway is an EEO and AA Employer
#LI-KJ1
#LI-Hybrid
Connect With Us!
Not ready to apply? Connect with us for general consideration.
$109k-143k yearly est. 5d ago
Cyber Analyst (Mid-Level)
Peraton 3.2
Information security analyst job in Tucson, AZ
Responsibilities We are seeking a highly skilled and motivated Cyber Analyst to join our team at Davis-Monthan AFB supporting the Air Combat Command (ACC) Intelligence Directorate (A2). The Cyber Analyst will play a critical role in cryptologic support, cybersecurity operations, and system administration to protect mission-critical systems and networks. This position requires expertise in cyber threat analysis, cryptologic operations, and the ability to work in a fast-paced, mission-driven environment.
Key Responsibilities:
* Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems.
* Conduct cyber threat analysis to identify vulnerabilities, assess risks, and recommend mitigation strategies.
* Support the development and implementation of cyber defense measures to protect against emerging threats.
* Monitor, analyze, and respond to cyber incidents, ensuring timely resolution and reporting.
* Provide system administration support, including configuration, maintenance, and troubleshooting of enterprise and local network devices.
* Collaborate with cross-functional teams to integrate cybersecurity measures into ISR operations.
* Liaise with the Enterprise Service Desk (ESD) and Enterprise Service Center (ESC) to resolve technical issues and ensure system availability.
* Maintain compliance with all security protocols, policies, and regulatory requirements.
Qualifications
Required Qualifications:
* Required Experience: At least 6 years of experience conducting analysis relevant to the specific labor category with at least a portion of the experience within the last 2 years.
* Required Education: Bachelor's degree from a college or university accredited by an agency recognized by the U.S. Department of Education or have associate's degree from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 4 years of related experience, for a total of 10 years, as a substitute to the bachelor's degree.
* Technical Expertise:
* Proficiency in cryptologic support, cybersecurity operations, and system administration.
* Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification.
* Familiarity with cyber defense tools, network security, and incident response methodologies.
* Strong understanding of cyber threat analysis and mitigation strategies.
* Skills:
* Exceptional analytical and problem-solving skills.
* Strong written and verbal communication skills for producing reports and collaborating with teams.
* Ability to work effectively in a high-pressure, mission-critical environment.
* Security Clearance: Active Top Secret/SCI clearance is required.
Preferred Qualifications:
* Experience at Air Force Major Command (MAJCOM) Intelligence Directorate or similar military organization.
* Knowledge of cryptologic systems, tools, and methodologies.
* Familiarity with Air Force cybersecurity policies and procedures.
* Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent.
Why Join Us?
* Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations.
* Work in a dynamic and collaborative environment at Davis-Monthan AFB, a hub for Air Force intelligence and operational excellence.
* Access to professional development opportunities and career growth within the intelligence and cybersecurity community.
#AFACC
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range
$104,000 - $166,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
$104k-166k yearly Auto-Apply 16d ago
Information Security Analyst
Deem 4.7
Information security analyst job in Arizona
Our mission is simple. We make business travel less complicated for travelers, less costly for employers and more profitable for service providers. Using our industry-leading software solutions, employees book travel and car service and report those expenses faster and more easily than ever before. Corporations control costs more effectively. Travel management companies deliver more engaging customer experiences. Car service operators benefit from new efficiencies and widen their customer reach. In other words, everybody wins. We've helped thousands of forward-thinking companies modernize their systems, improve travel management and save money. Deem is backed by leading venture capital funds as well as corporate and private equity investors. The company is headquartered in San Francisco, CA and has an office in Bangalore, India.
We are seeking an experienced, talented, energetic, hands-on, and proactive InformationSecurityAnalyst to maintain and operate Deem's InformationSecurity programs. You will be responsible for developing policies and driving processes based on a combination of threat intelligence and regulatory compliance.
Responsibilities
Advise senior management in the development, implementation and maintenance of a company-wide informationsecurity infrastructure, and ensure appropriate control objectives for system integrity, confidentiality, accountability and assurance within the context of the company's risk tolerance.
Ensure conformance with enterprise policy standards, which include monitoring metrics, response integration and escalation, and various risk analysis.
Maintain internal governance and recommend adjustments as threats and practices evolve.
Operate the information protection effort to comply with industry standard audits including (SSAE-18, SOC , PCI 3.2).
Determine security violations and inefficiencies by conducting periodic internal audits.
Develop a prioritized plan to close security gaps. Work with engineering teams (product & operations) to implement solutions.
Be hands-on where/when appropriate, in installing and evaluating security tools.
Install and maintain security management and monitoring tools in corporate and production environments, including vulnerability scanning, SEIM, IDS, etc.
Make sound, well-reasoned recommendations on vendor and tool selection.
Provide security consultation as needed for product development and industry marketing solutions.
Manage Internal Penetration Testing & Vulnerability Assessment Tools and Programs.
Investigate security incidents and recommend actions needed to resolve situations.
Work with product engineering to test for and fix vulnerabilities in the product code.
Develop content for and administer Employee Security Training Programs.
Qualifications
3+ years in the technology industry, 3+ in an informationsecurity role
Expert knowledge of identity management, IDS, SEM/SIEM, WAF
Industry-standard certifications: CISSP, or equivalent
Expertise in compliance standards, most notably PCI and SSAE16
Experience leading security and compliance audits
Thorough understanding and up-to-date knowledge of the web security threats (XSS, code injection, etc.)
Strong troubleshooting and forensic skills and ability to effectively work in cross functional teams as needed to resolve issues
Strong written, oral, and interpersonal communications skills
Capable of performing penetration tests and collaborating with Engineering on the static security analysis and remediation
Coding experience with Ruby, Java, Python, Javascript, Bash, or C# are nice to have
$81k-117k yearly est. 60d+ ago
Information Security Analyst - IAM / CyberArk
Stratacuity
Information security analyst job in Chandler, AZ
Job Title: InformationSecurityAnalyst - IAM / CyberArk Client: Large Financial Services Institution Pay Range: $53.60 - $56.60/hr Contract Length: 18 months * Manage customer tickets in JIRA (approx. 300+ per month).
* Review submitted service accounts and determine eligibility for vaulting in CyberArk based on predefined criteria.
* Process involves cross-referencing multiple source files and following documented procedures.
Key Skills & Experience:
* 4+ years of InformationSecurity Analysis experience (or equivalent).
* Advanced Microsoft Office skills (Excel - VLOOKUPs, data connections, Power Query; PowerPoint).
* Experience with IAM tools (CyberArk, PAM solutions, HashiCorp).
* Familiarity with Tableau for reporting and analysis.
* Strong troubleshooting ability and attention to detail.
Advanced Microsoft Office Skills (PowerPoint, Excel - VLookups, data/connections, power queries) Experience with IAM Tools (CyberArk, PAM solutions, HashiCorp) Familiarity with Tableau
* MS Office Word, Excel, PowerPoint
2 - 4 Years
Cloud
2 - 4 Years
Cloud Security
2 - 4 Years
Cyber Security
2 - 4 Years
PowerBI and Tableau
2 - 4 Years
Tableau
2 - 4 Years
EEO Employer
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************.
Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details.
Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide.
Employee Type:
Contract
Location:
Chandler, AZ, US
Job Type:
Date Posted:
January 14, 2026
Similar Jobs
* InformationSecurity Data Analyst
* Information Systems Security Officer
* Information Systems Analyst
* Sr. GCS Cloud SecurityAnalyst
* IAM Systems Engineer
$53.6-56.6 hourly 3d ago
Cyber Security Analyst - Vulnerability Management
Runbuggy Inc.
Information security analyst job in Tempe, AZ
Requirements
What You Will Be Doing::
Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure.
Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities.
Ensure that releases and product changes are reviewed and approved by the Security Team.
Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies.
Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks.
Schedule and assist with remediation efforts from external and internal penetration tests and assessments.
Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts.
Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program.
Oversee and help execute manual code review of key product components for security improvements.
Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap.
Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security.
Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services.
Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform.
Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders.
Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures.
Other duties as assigned.
What You Bring to the Team by Way of Skills and Experience:
Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains.
3+ years' relevant experience as a Vulnerability Analyst required.
A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred.
Experienced as a securityanalyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc.
Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc.
Knowledge of containerized web application architecture and related vulnerabilities and issues.
Deep understanding of vulnerability management, including risk assessment and remediation planning.
Knowledge of the latest trends and awareness of current hacking techniques and cybercrime.
Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB.
Experience with software development and delivery for a SaaS company.
Familiarity with cybersecurity frameworks, such as NIST CSF.
Attention to detail, QA skills, the ability to “think forward,” adept at problem solving and addressing issues and complications before they expand.
Certificates, Licenses, and/or Registrations:
Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified InformationSecurity Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred.
What is in it for You and Why you Should Apply:
Market-competitive pay based on education, experience, and location.
Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan.
Employee wellness program.
Employee rewards, discounts, and recognition programs.
Generous company-paid holidays (12 per year), vacation, and sick time.
Paid paternity/maternity leave.
Monthly connectivity/home office stipend if working from home 5 days a week.
A supportive and positive space for you to grow and expand your career.
Pay Range Disclosure:
The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law.
Applicants must be currently authorized to work in the United States.
Please, no agencies.
Salary Description $90k/yr.-$110k, DOE
$90k-110k yearly 13d ago
Principal Security Information Analyst
Gen Digital
Information security analyst job in Tempe, AZ
Principal InformationSecurityAnalyst (Tier 2) As a Principal InformationSecurityAnalyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams.
In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance.
Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend.
Key Responsibilities:
* Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity
* Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms
* Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools
* Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency
* Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements
* Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities
* Support the execution of incident response playbooks
Qualification and Work Experience:
* 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis
* Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis
* Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks)
* Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry)
* Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation
* Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies
* Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP)
* Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows
* Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration
* Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning
* Effective communication and documentation skills in English, both written and verbal
* Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects
* Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred
* Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage
#LI-AS1
Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds.
We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency.
To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
$78k-114k yearly est. Auto-Apply 60d+ ago
Information Security Analyst 2
Rogers Corporation 4.8
Information security analyst job in Chandler, AZ
This role will provide informationsecurity direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices.
Essential Functions:
- Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration.
- Support data and asset risk.
- Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats.
- Address various security problems across a disperse set of assets.
- Other duties as assigned.
Qualifications:
- Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree
- 2+ years of progressive cybersecurity experience
- Sound comprehension of InformationSecurity practices, concepts, and theories for traditional Information Technology (IT) assets
Full-Time
Rogers Corporation ("Rogers") maintains a continuing policy of non-discrimination in
employment. It is Rogers policy to provide equal opportunity and access for all persons, without
regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age,
disability, or status as a disabled veteran or other protected veteran, in all phases of the
employment process and in compliance with applicable federal, state, and local laws and
regulations.
$81k-124k yearly est. 35d ago
Cyber Security Analyst - 26-00507
Navitaspartners
Information security analyst job in Phoenix, AZ
Job DescriptionJob Title: Cyber SecurityAnalystLocation: Phoenix, AZ (Onsite/Hybrid as applicable) Duration: 6-Month ContractRole Overview
We are seeking an experienced Cyber SecurityAnalyst to support the security, stability, and operational readiness of a newly implemented recording system within a complex IT infrastructure. The system operates on a Kubernetes-based, containerized platform, and this role plays a critical part in ensuring the environment is securely designed, properly configured, continuously monitored, and defensible from both a technical and governance perspective.
This position focuses on security oversight and operational assurance, rather than building the platform from the ground up. The analyst will collaborate closely with internal technical teams and external vendors to evaluate architecture, enforce security controls, and support ongoing operations in a highly regulated public-sector environment.
Key Responsibilities
Support the design review, security implementation, and operational readiness of a containerized recording system
Evaluate system architecture to ensure secure, stable, and compliant configurations
Implement and maintain security best practices across Kubernetes-based environments
Configure and manage access controls, monitoring, and logging mechanisms
Assist with vulnerability assessment, risk mitigation, and security hardening activities
Monitor system health, security events, and operational logs to identify and respond to potential risks
Collaborate with internal teams and third-party vendors to resolve security and operational issues
Ensure the platform meets reliability, security, and compliance expectations
Support governance, audit readiness, and documentation efforts as required
Contribute to maintaining a defensible security posture in a regulated public-sector environment
Required Skills & Experience
Practical, hands-on experience with Kubernetes and containerized platforms
Strong foundation in cybersecurity principles and best practices
Experience working in cloud or hybrid environments
Knowledge of:
Access control mechanisms
System monitoring and alerting
Centralized logging and log analysis
General infrastructure and application security
Ability to assess and secure systems without direct responsibility for platform build-out
Strong collaboration and communication skills
Preferred Skills & Experience
Experience supporting government systems or other highly regulated environments
Familiarity with compliance, governance, and audit requirements
Exposure to election infrastructure, public-sector IT, or similarly sensitive systems
Education Requirements
Bachelor's degree in a related field (e.g., Cybersecurity, Co
$75k-104k yearly est. 6d ago
Cyber Security Analyst
Insight Global
Information security analyst job in Phoenix, AZ
This is a rare opportunity to join a fast-growing team of informationsecurity experts as we transform, enhance, and expand the security program for one of the largest information technology providers in the world. You will join the United States Global Technology Operations (US GTO) Security Strategy and Solutions team supporting governance, risk, and compliance consulting services as well as security service delivery across one or more US-based industries.
The successful candidate will have a broad knowledge of current security practices, knowledge of specific Security Tools, as well as the ability to identify and apply legal, regulatory, and industry-specific security requirements.
You will help our client deploy effective security solutions and strategies. You must be able to collaborate with a variety of technical and management disciplines including infrastructure and security architecture, security operations, application development, project managers, product owners, and others.
Future duties and responsibilities
. Incident Response
. Security Investigations
. Security Engineering
. GRC
. Tools validation
. Vulnerability Management
. Reporting
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
. Clear written and verbal communication skills
. Ability to communicate with executive team
. Splunk- 3 years of experience
. Qualys- 2 years of experience
. Vulnerability Management-2 years of experience
. Governance-2 years of experience
. Risk Management-2 years of experience
. Incident Management-3 years of experience
. Education: Associate or bachelor's degree preferred
. Cyber Security Certification - Minimum Security+, but CISSP or CISM is preferred
$75k-104k yearly est. 5d ago
Jr. Information Security Analyst (Information Security Analyst I)
Lightspeed DMS
Information security analyst job in South Jordan, UT
Job Description
Lightspeed is a leading provider of cloud-based software for dealerships and Original Equipment Manufacturers (OEMs), serving the Powersport, Marine, RV, Trailer, Outdoor Power Equipment, and Golf Cart industries. Lightspeed's Dealer Management Solution (DMS) enables dealerships to optimize their end-to-end business operations, including sales, parts, service, rentals, accounting, and Customer Relationship Management (CRM). When implemented into their daily operations, Lightspeed helps dealers increase their profitability by selling more units, service, and parts, all while creating a more streamlined experience for customers. For nearly 40 years, Lightspeed has been empowering 4,500+ dealers across North America with the tools and technology they need to manage their dealerships.
The Jr. InformationSecurityAnalyst I supports Lightspeed's cybersecurity operations by assisting with monitoring, analysis, and remediation of security incidents across enterprise systems and cloud environments. Working under the direction of senior analysts, this role helps ensure the confidentiality, integrity, and availability of company data while gaining experience in security tools, processes, and governance activities. The ideal candidate is detail-oriented, eager to learn, and passionate about developing technical and compliance skills in a collaborative environment.
What you'll do:
Monitor and investigate security alerts and events across SIEM, EDR, and network systems.
Assist in the investigation of potential security incidents under senior analyst guidance.
Help maintain documentation of incidents, findings, and remediation steps.
Perform vulnerability scanning and tracking remediation efforts.
Support maintenance of security tools and platforms (endpoint protection, SIEM, firewalls).
Assist with compliance tasks related to SOC 2, internal audits, and risk assessments.
Assist with gathering security metrics and reports on a monthly basis.
Contribute to updating security policies, standards, and procedures.
Perform third-party vendor security reviews and due diligence processes.
Assist in security awareness initiatives and internal training activities.
Collaborate with IT and engineering teams to ensure secure configurations and patch compliance.
Assist in the creation of automation scripts and the integration of AI with security workflows.
What you should have:
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, or a related field, or equivalent experience.
0-3 years of experience in informationsecurity, IT operations, or related technical roles.
Foundational knowledge of networking, operating systems, and cloud environments (AWS, Azure).
Strong experience securing and monitoring cloud environments (AWS, Azure).
Exposure to SIEM or EDR tools such as Splunk, Sentinel, or Defender.
Understanding of basic security concepts (vulnerabilities, exploits, least privilege, encryption).
Excellent analytical, problem-solving, and communication skills.
Knowledge of security frameworks such as NIST CSF and SOC 2.
Ability to work collaboratively in a team-oriented environment.
Preferred Qualifications:
CompTIA Security+, CySA+, or equivalent entry-level certification.
Experience with vulnerability scanners (Qualys, Nessus, or Rapid7).
Exposure to GRC or vendor risk management tools.
Exposure to SIEM platforms, Elastic, Splunk, Security Onion.
Familiarity with scripting or automation (PowerShell, Python).
Demonstrated interest in pursuing a long-term career in cybersecurity operations or compliance.
Inclusion and Diversity at Lightspeed:
At Lightspeed, we celebrate the uniqueness of every individual and encourage diverse perspectives. We believe that inclusion drives innovation and fosters meaningful connections. We are committed to building an environment where everyone feels valued and empowered to make an impact.
Equal Employment Opportunity Statement:
Lightspeed is an Equal Opportunity Employer and is dedicated to building a diverse and inclusive workforce. All qualified applicants will be considered for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, religion, age, disability, veteran status, or any other protected category.
Important Note:
Applicants must be authorized to work in the U.S.
Ready to apply?
Take the next step in your career-apply today and join a team where your skills will make an impact!
$69k-101k yearly est. 30d ago
Sr. Security Analyst
Maximus 4.3
Information security analyst job in Saint George, UT
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in informationsecurity, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$107k-146k yearly est. Easy Apply 8d ago
Data Security Analyst - C78843 7.5 Salt Lake City, Utah
CapB Infotek
Information security analyst job in Salt Lake City, UT
We are looking for a Data SecurityAnalyst for our long-term multiyear project out of Salt Lake City, Utah. Build software libraries and services to provide secure-by-default services to software engineering teams, including authentication systems, secure service architectures, endpoint control solutions, and cloud controls
· Partner with colleagues from across engineering and risk to ensure an outstanding developer experience that satisfies the firm's security needs
· Collaborate on feature design and problem solving
· Help to provide frictionless integration with the firm's runtime, deployment and SDLC technologies
· Manage the full lifecycle of software components, from requirements through design, testing, development, release and demise
· Help to communicate and promote best practices for security engineering across the firm
· Engage in production troubleshooting
Basic Qualifications
· A strong grounding in security concepts, including secure coding practices, trusted computing and principles of authentication and authorization
· A good understanding of public key and symmetric key cryptography
· The ability to reason about performance, security, and process interactions in complex distributed systems
· Proficiency in designing, developing and testing cross-platform software in one or more of Java, Golang or C#; open to using multiple languages
· Experience developing, deploying and supporting software across the full Continuous Delivery life-cycle
· The ability to understand and effectively debug both new and existing software
· Experience meeting demands for high availability, low latency and scale
· The ability to communicate technical concepts effectively, both in writing and orally, as well as the interpersonal skills required to collaborate effectively with colleagues across diverse engineering teams
Preferred Qualifications
· An understanding of regulated environments, e.g. financial services
· Experience building services using public cloud providers such as AWS, Azure or GCP
· Experience with threat modeling and risk assessment
· Experience of practical security engineering in a Linux and/or Windows environment
· Familiarity with service mesh concepts and service-oriented architectures
· Familiarity with data protection principles and solutions
· Experience with deploying software to containerized environments - Kubernetes/Docker
· Experience monitoring, measuring, auditing and supporting software
· Scripting skills using Python, PowerShell or bash
· Experience with Terraform or similar infrastructure-as-code platforms, as a user and/or as a service provider
$69k-98k yearly est. 60d+ ago
Cyber Security Analyst
Weber County, Ut 3.7
Information security analyst job in Ogden, UT
WAGE: $38.09 - DOE/DOQ DEPARTMENT: Information Technology PERSONNEL STATUS: Full Time BENEFITS: Health, Dental, Vision, Retirement, 401k match, Sick/Vacation, Life Insurance, Short-term Disability, Accident, Critical Illness; Parental Leave; Maternity Leave
WORK AUTHORIZATION & RESIDENCY:
Applicants must be legally authorized to work in the United States without employer sponsorship on a permanent basis.
This position requires regular onsite presence. Relocation assistance is not available, and candidates must be able to begin work without relocation support.
JOB OVERVIEW:
Implement, monitor, and maintain Weber County's enterprise-wide Information Technology (IT) security programs which are designed to protect the confidentiality, integrity, and availability of all County systems and resources, including but not limited to voice, data, network, applications, and computer infrastructure, and their associated information assets. Support Weber County's InformationSecurity Officer with day to day security tasks.
ESSENTIAL FUNCTIONS:
Applicants must be prepared to demonstrate the ability to perform the essential functions of the job with or without reasonable accommodation.
Have an enthusiasm and passion for security, be able to work independently or as part of a larger security team.
Hands on virus/malware identification, investigation and mitigation on county endpoints as they arise.
Act in an advisory role to other teams both internal to IT and throughout the county.
Stays current with technical knowledge in information systems, security and privacy technologies, best practices, and use of appropriate security controls and methods.
Deploys, as instructed, the InformationSecurity plans and short-term and long-term strategies for the IT organization and the County.
Deploys and integrates IT security and privacy-related programs designed to protect the County's systems, applications, and data.
Identifies and communicates security issues and their impact on the IT organization and the County and assists with executing successful solutions while tracking and achieving measurable results.
Complies with and promotes all IT security policies, processes, procedures, and best practices.
Establishes and maintains positive business relationships with users countywide to actively market and educate them on the importance of security cooperation and compliance.
Designs, develops, implements, and monitors informationsecurity systems and controls.
Documents processes and monitors systems that report on the effectiveness of systems and controls necessary to protect the County's information technology systems, assets, and interests.
Monitors compliance with the organization's informationsecurity policies and procedures among employees, contractors, partners, and other third parties and resolves potential issues as needed.
Assists with informationsecurity risk assessments and serve as informationsecurity subject matter expert to countywide customers.
Responds, as directed, to informationsecurity incidents and follow up to ensure that proper protection and corrective measures have been taken.
Participates, as instructed, in forensics investigations and audits as required.
Implements, as instructed, security controls for systems that accept payment card data.
Implements, as instructed, the County's cloud security strategy to protect County IT systems and data in PaaS, SaaS, and IaaS environments.
Embraces managed security service options as they are considered.
Maintains required certifications as specified by the InformationSecurity Officer.
Other duties as assigned.
Any one position may not include all of the duties listed, nor do the listed examples include all duties which may be found in positions of this class. Applicants must be prepared to demonstrate the ability to perform the essential functions of the job with or without reasonable accommodation.
SUPERVISORY RESPONSIBILITIES:
None
EDUCATION/EXPERIENCE:
Education: Bachelor's Degree from and accredited college or university in Information Technology/Security or closely related field.
OR
Technical College certificate in Security/IT with additional technical certifications (Security+, Network+, etc.) plus (six) 6 months to (two) 2 years related experience.
OR
An equivalent combination of education and five (5) years of related experience.
KNOWLEDGE, SKILLS, AND ABILITIES (KSA):
Knowledge: Knowledge of security controls for application development and management. Basic understanding of IT systems, computer infrastructure & software (e.g., computer, server, storage, networking, firewall, OS, databases, web servers, virtualization). General understanding of how to reverse engineer attacks. Introductory level knowledge of InformationSecurity or Information technology standards. Introductory knowledge of Linux, Windows and Network system administration practices, access control, and auditing/logging procedures within an enterprise class environment. Introductory knowledge of security related tools including vulnerability assessment tools, Host Based Security Systems, log aggregation and SIEMs, File Integrity Monitoring Software.
Skills: communications skills, both verbal and written, as well as the ability to communicate well with people in a variety of positions, roles, and levels; Leveraging networking tools to map networks on a basic level.
Abilities: Ability to create and maintain effective documentation, including policies, processes, and procedures. Ability to prioritize workload in order to meet commitments. Basic networking skills (IP Addressing, subnets, simple network tools). Ability to multitask and prioritize projects, appropriately manage expectations, make difficult judgment calls and communicate complex issues in an easy to understand format. Ability to prepare multiple types of documentation, policies, guides, communications, presentations, etc. Initiative driven attitude and a willingness to take on challenging tasks independently. Professional, self-motivated and a strong sense of urgency.
SPECIAL QUALIFICATIONS:
Due to the nature of this position, the successful candidate may be required to complete a pre-employment background check prior to starting the position.
PHYSICAL DEMANDS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is frequently required to sit and talk or hear, use hands to finger, handle, or feel objects, tools, or controls; and reach with hands and arms. The employee is occasionally required to walk.
The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision and the ability to adjust focus.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually quiet.
$38.1 hourly 4d ago
Cyber Security Analyst
Weber County Corp
Information security analyst job in Ogden, UT
WAGE: $38.09 - DOE/DOQ DEPARTMENT: Information Technology PERSONNEL STATUS: Full Time BENEFITS: Health, Dental, Vision, Retirement, 401k match, Sick/Vacation, Life Insurance, Short-term Disability, Accident, Critical Illness; Parental Leave; Maternity Leave
WORK AUTHORIZATION & RESIDENCY:
Applicants must be legally authorized to work in the United States without employer sponsorship on a permanent basis.
This position requires regular onsite presence. Relocation assistance is not available, and candidates must be able to begin work without relocation support.
JOB OVERVIEW:
Implement, monitor, and maintain Weber County's enterprise-wide Information Technology (IT) security programs which are designed to protect the confidentiality, integrity, and availability of all County systems and resources, including but not limited to voice, data, network, applications, and computer infrastructure, and their associated information assets. Support Weber County's InformationSecurity Officer with day to day security tasks.
ESSENTIAL FUNCTIONS:
Applicants must be prepared to demonstrate the ability to perform the essential functions of the job with or without reasonable accommodation.
Have an enthusiasm and passion for security, be able to work independently or as part of a larger security team.
Hands on virus/malware identification, investigation and mitigation on county endpoints as they arise.
Act in an advisory role to other teams both internal to IT and throughout the county.
Stays current with technical knowledge in information systems, security and privacy technologies, best practices, and use of appropriate security controls and methods.
Deploys, as instructed, the InformationSecurity plans and short-term and long-term strategies for the IT organization and the County.
Deploys and integrates IT security and privacy-related programs designed to protect the County's systems, applications, and data.
Identifies and communicates security issues and their impact on the IT organization and the County and assists with executing successful solutions while tracking and achieving measurable results.
Complies with and promotes all IT security policies, processes, procedures, and best practices.
Establishes and maintains positive business relationships with users countywide to actively market and educate them on the importance of security cooperation and compliance.
Designs, develops, implements, and monitors informationsecurity systems and controls.
Documents processes and monitors systems that report on the effectiveness of systems and controls necessary to protect the County's information technology systems, assets, and interests.
Monitors compliance with the organization's informationsecurity policies and procedures among employees, contractors, partners, and other third parties and resolves potential issues as needed.
Assists with informationsecurity risk assessments and serve as informationsecurity subject matter expert to countywide customers.
Responds, as directed, to informationsecurity incidents and follow up to ensure that proper protection and corrective measures have been taken.
Participates, as instructed, in forensics investigations and audits as required.
Implements, as instructed, security controls for systems that accept payment card data.
Implements, as instructed, the County's cloud security strategy to protect County IT systems and data in PaaS, SaaS, and IaaS environments.
Embraces managed security service options as they are considered.
Maintains required certifications as specified by the InformationSecurity Officer.
Other duties as assigned.
Any one position may not include all of the duties listed, nor do the listed examples include all duties which may be found in positions of this class. Applicants must be prepared to demonstrate the ability to perform the essential functions of the job with or without reasonable accommodation.
SUPERVISORY RESPONSIBILITIES:
None
EDUCATION/EXPERIENCE :
Education: Bachelor's Degree from and accredited college or university in Information Technology/Security or closely related field.
OR
Technical College certificate in Security/IT with additional technical certifications (Security+, Network+, etc.) plus (six) 6 months to (two) 2 years related experience.
OR
An equivalent combination of education and five (5) years of related experience.
KNOWLEDGE, SKILLS, AND ABILITIES (KSA):
Knowledge: Knowledge of security controls for application development and management. Basic understanding of IT systems, computer infrastructure & software (e.g., computer, server, storage, networking, firewall, OS, databases, web servers, virtualization). General understanding of how to reverse engineer attacks. Introductory level knowledge of InformationSecurity or Information technology standards. Introductory knowledge of Linux, Windows and Network system administration practices, access control, and auditing/logging procedures within an enterprise class environment. Introductory knowledge of security related tools including vulnerability assessment tools, Host Based Security Systems, log aggregation and SIEMs, File Integrity Monitoring Software.
Skills: communications skills, both verbal and written, as well as the ability to communicate well with people in a variety of positions, roles, and levels; Leveraging networking tools to map networks on a basic level.
Abilities: Ability to create and maintain effective documentation, including policies, processes, and procedures. Ability to prioritize workload in order to meet commitments. Basic networking skills (IP Addressing, subnets, simple network tools). Ability to multitask and prioritize projects, appropriately manage expectations, make difficult judgment calls and communicate complex issues in an easy to understand format. Ability to prepare multiple types of documentation, policies, guides, communications, presentations, etc. Initiative driven attitude and a willingness to take on challenging tasks independently. Professional, self-motivated and a strong sense of urgency.
SPECIAL QUALIFICATIONS:
Due to the nature of this position, the successful candidate may be required to complete a pre-employment background check prior to starting the position.
PHYSICAL DEMANDS :
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is frequently required to sit and talk or hear, use hands to finger, handle, or feel objects, tools, or controls; and reach with hands and arms. The employee is occasionally required to walk.
The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision and the ability to adjust focus.
WORK ENVIRONMENT :
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually quiet.
$38.1 hourly 5d ago
Lead Information Security Analyst - GRC Project Leadership
Wells Fargo 4.6
Information security analyst job in Chandler, AZ
About this role: Wells Fargo is seeking a Lead InformationSecurityAnalyst to join a dynamic team dedicated to safeguarding our customers and the company's most critical assets. In this pivotal role, you will provide technical leadership in Cybersecurity Governance, Risk, and Compliance while driving projects and mentoring team members to achieve exceptional results. You're the kind of person who can lead, is coachable and enjoys partnering with others to complete projects.
The position requires deep expertise in policy compliance and vulnerability management, with a strong focus on cryptography, encryption key lifecycle management, and digital certificate governance. The ideal candidate will have demonstrated experience in designing and implementing policy compliance or vulnerability management programs and leading initiatives or teams to successful completion. Most of all we need a person who can manage cyber projects, has keen organizational skills and is highly collaborative.
This is a hybrid role at Wells Fargo.
There is no Visa sponsorship or Visa Transfers.
The position is seated in the location posted on the requisition.
In this role, you will:
* Provide advanced informationsecurity consultation for policy compliance, risk management, security controls and remediation monitoring
* Lead projects and coordinate team efforts to ensure timely delivery of security initiatives
* Direct informationsecurity risk assessment and research, and recommend remediation plans and strategies
* Perform Governance, Risk, and Compliance activities to identify and prioritize key risk areas, monitor remediation, and escalate critical risks to senior management
* Conduct user engagement on vulnerabilities and identified areas of policy non-adherence, report and advise on moderately complex remediation or mitigation plans
* Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, encryption keys and digital certificates
* Review and correlate technical data such as vulnerability or endpoint scanning reports (e.g., Qualys, Tanium), key and certificate management reports, and security logs
* Analyze identified vulnerabilities, assess their potential impact, and prioritize remediation efforts based on risk levels
* Develop and maintain security policies and procedures related to information protection, encryption, and certificate management
* Create detailed process documentation and governance artifacts for security controls, metrics, and escalation routines
Required Qualifications:
* 5+ years of InformationSecurity experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
* 4+ years in a vulnerability management or governance, risk and compliance role, identifying and prioritizing areas of policy non-adherence, report development, remediation monitoring and escalation to senior management
* Strong experience with vulnerability or endpoint scanning tools (e.g., Qualys, Tanium)
* Solid understanding of cryptography, encryption key management, and digital certificate lifecycle
* Proven ability to lead projects and/or teams, including planning, coordination, and delivery
Desired Qualifications:
* IT Security certification (CISSP, CRISC, GIAC, Cloud, etc)
* Demonstrated expertise of Governance, Risk and Compliance principles for monitoring adherence to InformationSecurity policies
* Experience with or strong conceptual understanding of data protection principles, frameworks and technologies
* Knowledge of Cloud service providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) or MS Azure
* Documentation skills including design diagrams, process flows, security controls and evidence archival
* Proven ability to plan, manage, and deliver complex projects or security initiatives, including defining scope, setting timelines, coordinating resources, and ensuring successful outcomes
* Knowledge of financial institution security procedures and data protection principles
* Experience with Agile methodology and product delivery
* Ability to communicate confidently and professionally
* Ability to negotiate, influence, and collaborate to build successful relationships
* Strong time management skills including the ability to handle multiple deliverables concurrently
* Ability to influence across all organizational levels
Job Expectations:
* Work independently and lead governance routines on a regular cadence
* Identify security vulnerabilities, perform product mapping, conduct trend analysis, perform risk assessments, and evaluate remediation alternatives
* Engage with stakeholders to monitor remediation and escalate critical risks
* Prepare executive ready
* Develop and maintain documentation for security controls and metrics, governance routines, escalation events, and consequence model
* Drive continuous improvement in policy adherence monitoring, vulnerability management and cryptographic security processes
Posting End Date:
1 Feb 2026
* Job posting may come down early due to volume of applicants.
We Value Equal Opportunity
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.
Applicants with Disabilities
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo.
Drug and Alcohol Policy
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy to learn more.
Wells Fargo Recruitment and Hiring Requirements:
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
$81k-112k yearly est. 1d ago
Cyber Security Analyst
Washington Elementary School District 6 4.6
Information security analyst job in Phoenix, AZ
Pay Grade: PP (Non-Exempt Support Staff Salary System)
Department: Management Information Systems (MIS)
Accountable To: Administrator of MIS
FLSA Status: Non-Exempt
Calendar: 261 Days
Summary:
Under general direction, incumbent is responsible for protecting the school district's
technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites.
Essential Functions:
Threat detection and analysis: Actively monitor security alerts from various sources, including SecurityInformation and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc.
Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts.
Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls.
Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies.
User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures.
Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment.
Performs other job related duties as assigned.
Required Qualifications:
To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary.
High School diploma or equivalent (G.E.D.) prior to being hired;
Valid Arizona Department of Transportation Driver's License;
Minimum of one year of experience in informationsecurity, network security, or a related technology field.
Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services.
Experience with security tools, including SIEM, antivirus software, and intrusion detection systems.
Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card.
Preferred Qualifications:
It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position.
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise.
Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP.
Experience working in an educational or public sector environment.
Knowledge of emerging security technologies and trends.
Experience administering a Cisco Local and Wide area networking environment;
Experience with border network security devices such as Email filters and Firewalls;
Experience administering Windows Server and Active Directory.
Experience with VMWare and Veeam (or other backup and recovery platform)
Knowledge and Skills Required:
To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Skills required, but not limited to, for this position include:
Ability to work independently and collaboratively in a team environment.
Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
Familiarity with scripting languages like Python or PowerShell for automating security tasks.
Knowledge of common security frameworks, such as NIST.
Understanding of networking concepts, firewalls, and data encryption techniques.
Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences.
Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities.
Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack.
Physical Requirements:
The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus.
Working Conditions:
The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels.
The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
$48k-60k yearly est. 42d ago
Network Security Analyst
Mindlance 4.6
Information security analyst job in Lehi, UT
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network SecurityAnalyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional Information
Thanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
$75k-95k yearly est. 2d ago
Data Security Analyst Sr
The University of Utah 4.0
Information security analyst job in Salt Lake City, UT
The Data SecurityAnalyst Senior position in the InformationSecurity Office ( ISO ) is responsible for leading and supporting security initiatives which mitigate risk and ensure data integrity at the University of Utah and University Health Care. This includes providing security guidance and technical risk assessments of new or ongoing projects, responding to, and analyzing security incidents, and implementing new security technologies or processes. This is a highly collaborative position which requires strong analytical and communication skills.
Responsibilities
· Communicate security risks, incidents, and mitigation strategies to senior management and relevant stakeholders. · Collaborate with IT teams, system administrators, and network securityanalysts to ensure cohesive security strategy and technical implementations. · Collaborate in the development of action plans to improve security posture. · Assist the University in meeting compliance obligations regarding informationsecurity. · Contribute to incident response procedures and play a key role in incident response activities and help develop strategies to prevent future occurrences. · Analyze digital evidence from endpoints, servers, and cloud environments to identify the root cause of breaches, malware infections, or other security issues. · Provide security evaluation and guidance regarding new technologies or processes. · Assist in legal discovery and evidence acquisition and preservation. · Support and configure security safeguards in major cloud platforms. · Participate in security assessments of departments and colleges. · Evaluate, select, implement, and maintain endpoint security solutions such as endpoint detection and response ( EDR ). This will include working with portions of the Microsoft Extended Detection and Response suite. · Support the Security Operations Center ( SOC ) leverage technology and data to accomplish their responsibilities. · Stay up-to-date and informed about emerging threats, vulnerabilities, and security solutions through research and industry publications. This job description is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to the job. Work Environment and Level of Frequency typically required Nearly Continuously: Office environment. Physical Requirements and Level of Frequency that may be required Nearly Continuously: Sitting, hearing, listening, talking. Often: Repetitive hand motion (such as typing), walking. Seldom: Bending, reaching overhead.
Minimum Qualifications
Requires a bachelor's degree in area of specialty, or equivalency (one year of education can be substituted for two years of related work experience); and 2-4 years of experience in the field or in a related area. Applicants must demonstrate the potential ability to perform the essential functions of the job as outlined in the position description.
$54k-74k yearly est. 60d+ ago
Network Security Analyst
Mindlance 4.6
Information security analyst job in Lehi, UT
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at *************************
Job Description
Job Title: Network SecurityAnalyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional InformationThanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
$75k-95k yearly est. 60d+ ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Saint George, UT?
The average information security analyst in Saint George, UT earns between $63,000 and $133,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Saint George, UT