Post job

Information security analyst jobs in Scituate, RI

- 129 jobs
All
Information Security Analyst
Information Technology Analyst
Information Security Engineer
Information Security Officer
Securities Analyst
Information Systems Security Officer
Senior Cyber Security Analyst
Senior Information Security Consultant
Information Security Director
Information Security Manager
Senior Security Engineer
Security Architect
  • Chief Information Security Officer

    Trinity Life Sciences

    Information security analyst job in Waltham, MA

    Company Profile Trinity Partners, LLC ("Trinity") *********************************** is a leading healthcare consulting firm based in Waltham, MA that specializes in health care strategy for pharmaceutical, biotech and life sciences firms. Our clients include top tier to venture backed companies worldwide. Trinity provides services to these clients in a variety of practice areas including strategic planning, forecasting and market estimation, licensing and acquisitions, launch strategies, data warehousing and sales force effectiveness. The company consists of approximately 900 employees and is headquartered in Waltham, Massachusetts, with offices in New Jersey, New York, San Francisco, Pennsylvania, Germany, London & India. Trinity is an EEO employer. Chief Information Security Officer The Chief Information Security Officer will lead the development and execution of a comprehensive information security strategy for a global pharmaceutical consulting firm. They will act as the strategic leader of Trinity's cyber defense program as an integral part of the Trinity leadership team. This role will ensure the confidentiality, integrity, and availability of enterprise data, systems, and infrastructure across all geographies. The CISO will collaborate with executive leadership, IT, legal, compliance, and operations to embed security into the company's culture and business processes. The CISO will posses the ability to manage the cybersecurity team to identify, assess and prioritize threats and vulnerabilities across all of Trinity's environment, while effectively influencing and communicating across multiple teams to help create a cohesive security ecosystem. The ideal candidate will be able to build strong relationships across the business to help identify gaps in security controls, as well as direct internal audits. They will possess an ability to 'think like an adversary' and promote security throughout the organization. Key Objectives Strategic Leadership Develop and implement a global information security strategy aligned with business goals and regulatory requirements Establish and maintain enterprise-wide security policies, standards, and procedures. Lead the information security governance, risk management, including responsibility for audit readiness and post-assessment remediation plans, especially for ISO 27001 and 42001 gaps Define and report on key security metrics (e.g., incident response times, vulnerability remediation SLAs, phishing simulation results) to executive leadership and the board Lead the development and enforcement of cloud security strategies across Microsoft 365, Azure, AWS, and other SaaS platforms with emphasis on configuration management, monitoring, and incident detection/remediation in cloud environments Foster a security-first culture by engaging business leaders and department heads in regular security briefings and risk discussions. Lead threat detection, prevention, and response capabilities, including Security Operations Center (SOC) oversight. Ensure the timely investigation, response, and remediation of security incidents and breaches. Establish and document a framework-aligned, business-integrated security ecosystem for Trinity and enable mechanisms to showcase it to customers on a need basis. Lead data protection efforts across Trinity SaaS, Product and Internal environments, including cloud-native services and large-scale repositories. Software Development Lifecycle Oversight Integrate security practices into the full software development lifecycle, including secure architecture, code review, automated testing for vulnerabilities, and DevSecOps principles. Collaborate with IT and Product teams to ensure security controls are embedded from project initiation through deployment. Vendor & Third-Party Risk Management Oversee the security review process for third-party vendors, cloud providers, and partners. Ensure supply chain security and resilience. Operational Oversight Oversee the design and implementation of technical safeguards including access control, encryption, patch management, and threat detection systems Manage the cybersecurity team, including security engineers, analysts, and external vendors (e.g., Managed SOC services) Direct incident response planning and execution, including breach investigations and reporting Ensure secure configuration and monitoring of cloud-native services, including identity, access, and data protection controls Oversee data governance and protection strategies for large-scale data repositories, including SharePoint Online, OneDrive, and Teams Orchestrate regular security audits in SaaS ecosystems, to proactively identify vulnerabilities. Collaborate with international teams to maintain consistent security posture and incident response readiness globally Champion regular security audits and continuous improvement cycles, with a focus on cloud ecosystem vulnerabilities such as drift in Microsoft 365, AWS, Azure, among others. Compliance & Risk Management Work directly with General Counsel and Compliance group to ensure compliance with HIPAA, GDPR, NIST CSF, SOC 2, ISO 27001 and ISO 42001and other global data protection regulations relevant to pharmaceutical consulting Conduct regular risk assessments based on NIST RMF and develop mitigation plans Lead external security audits and accreditation surveys Ensure security practices are adapted to regional regulatory requirements and cultural contexts across North America, Europe, and Asia. Training & Awareness Champion a culture of security awareness across the organization specifically with development teams Develop and deliver training programs tailored to different roles and regions Demonstrated ability to communicate complex security concepts to the board, non-technical stakeholders, and external customers in plain, persuasive language. Technology & Innovation Evaluate and implement emerging security technologies (e.g., CASB, PAM, GRC tools) Align security architecture with frameworks such as NIST CSF, CIS 18, and OWASP Position Requirements: Education: Bachelor's or Master's degree in Information Security, Computer Science, or related field. * Work Experience: 10+[PL1] years of progressive experience in information security, including leadership roles and hands-on security engineering and vulnerability remediation. Other Skills: Knowledge and/or working skills in the following areas: * Experience in pharmaceutical, healthcare, or consulting industries preferred * Certifications such as CISSP, CISM, CEH, GSEC, ECSA, Security+ or CISA strongly preferred * Proven ability to lead cross-functional teams and manage global security operations * Strategic thinking and business acumen * Strong communication and stakeholder engagement skills with demonstrated record of translating technical content for business adoption * Experience with vendor management and contract negotiation * Familiarity with cloud security, application security, and data loss prevention * Understanding of modern threats and exploits * Ability to understand and communicate attack chains to management and key stakeholders * Develop, execute and track the performance of security measures to protect information and network infrastructure and computer systems * Identify, define and document system security requirements and recommend solutions to management * Identify and document security requirements and recommend solutions to management * Ownership of remediation activities for ISO and other regulatory gaps. * Experience managing or working with Managed Security Service Providers (MSSPs) and Security Operations Centers (SOCs). * Familiarity with Zero Trust architecture and identity-centric security models. About Us Trinity Life Sciences is a trusted strategic commercialization partner, providing evidence-based solutions for the life sciences. With 25 years of experience, Trinity is committed to revolutionizing the commercial model by providing exceptional levels of service, powerful tools and data-driven insights. Trinity's range of products and solutions includes industry-leading benchmarking solutions, powered by TGaS Advisors. To learn more about how Trinity is elevating life sciences and driving evidence to action, visit trinitylifesciences.com. Trinity's salary bands account for a wide range of factors that are considered in making compensation decisions including but not limited to skill sets and market demand for skills; level of experience and training; specific qualifications, performance, time in role/company, geographic location, and other business and organizational needs. A reasonable estimate of the current range is $250,000-$300,000 USD. In addition to your base salary, you will also be eligible for an annual discretionary performance bonus. Trinity's Commitment to Diversity, Equity & Inclusion Trinity Life Sciences is an Equal Opportunity Employer that prohibits discrimination and harassment of any kind. Trinity is committed to the principles of diversity, equity, and inclusion and to providing employees with a work environment that is free of discrimination and harassment. All employment decisions at Trinity are based on business needs, job requirements and individual qualifications, without regard to race, color, religion, disability, ethnicity, gender identity or expression, family, parental, or veteran status, and/or any other status based on identity or that is protected by the laws or regulations in the locations where we operate. Trinity will not tolerate any form of discrimination or harassment and encourages applicants of all ages and identities. For more information about Trinity's commitment to diversity, equity, and inclusion, you can visit our website.
    $250k-300k yearly 18d ago
  • Senior Cyber Security Analyst (42466)

    Neighborhood Health Plan of Rhode Island 4.4company rating

    Information security analyst job in Smithfield, RI

    Senior Cyber Security Analyst is an experienced cyber security individual who maintains the security of an organization's technical environment. They study existing security hardware and software, evaluate new security options and makes recommendations for improvement. Senior Cyber Security Analyst also identifies weak spots in a cyber security system that may be breached and creates procedures to manage threats. Senior Cyber Security Analyst monitors networks for suspicious activity and potential cyber threats. They keep up on threat intelligence, install and maintain security software and encryption. They are responsible for aiding in the planning of security systems, implementing policy and identifying business processes that may violate intended and acceptable use policies. They monitor and remediate vulnerabilities. Senior Cyber Security Analyst works on advanced, complex technical projects or business issues requiring state of the art technical or industry knowledge. Duties and Responsibilities Responsibilities include, but are not limited to the following: * Assist in developing, operating, and evolving Cloud Access Security solutions and capabilities * Performs system security administration on designated technology platforms, including operating systems, applications and network security devices, in accordance with the defined policies, standards and procedures of the organization, as well as with industry best practices and vendor guidelines * Performs installation and configuration management of security systems and applications, including policy assessment and compliance tools, network security appliances and host-based security systems * Performs threat and vulnerability assessments, followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities Research, recommend, and implement streamlined automation processes * Develops and maintains documentation for security systems and procedures * Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems, firewalls and host-based security systems * Provide support to one or more projects simultaneously. Delivers projects on schedule * Deploys cloud-centric detection to detect threats related to cloud environments and services used by the organization * Assists and trains junior team members in the use of security tools, the preparation of security reports and the resolution of security issues * Applies patches where appropriate and, removes or otherwise mitigates known control weaknesses, such as unnecessary services or applications or redundant user accounts, as a means of hardening systems in accordance with security policies and standards Correlates activity across assets (endpoint, network, apps) and environments (on-premises, cloud) to identify patterns of anomalous activity * Using threat intelligence information research emerging threats and vulnerabilities to aid in the identification of incidents * Job Knowledge - Remains up-to-date in assigned area of responsibility: possesses skills and knowledge to perform job effectively; efficiently and safely; acquires, understands, and applies technical and professional information and skills; understands and adheres to policies and procedures * Supports the creation of security incident response, business continuity/disaster recovery plans, including conducting tests, publishing test results and making changes necessary to address deficiencies * Analyzes problems and alternative solutions and takes appropriate timely action to achieve desired business results. Seeks unique and novel solutions to problems and considers impact of final resolution * Perform security standards testing against computers before implementation to ensure security * Provide Key Performance Metrics to our Risk Management team to help coordinate risk tracking. * Educate internal teams on information security best practices. * Assist in technical audits of IT Systems and controls. * Other duties as assigned. * Corporate Compliance Responsibility - As an essential function, responsible for complying with Neighborhood's Corporate Compliance Program, Standards of Business Conduct, applicable contracts, laws, rules and regulations, policies and procedures as it applies to individual job duties, the department, and the Company. This position must exercise due diligence to prevent, detect and report unlawful and/or unethical conduct by fellow co-workers, professional affiliates and/or agents
    $79k-103k yearly est. 16d ago
  • Senior Manager, Information Security Office Consultant

    Dev 4.2company rating

    Information security analyst job in Providence, RI

    Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located. Company Name: Capital One Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. What You'll Do: Act as a central Information Security point of contact for the Enterprise Platform team Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment Work with line of business leadership to anticipate their objectives and needs to better serve the line of business Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization Basic Qualifications: High School Diploma, GED or equivalent certification At least 8 years of experience working in cybersecurity or information technology At least 7 years of experience providing guidance and oversight of Security concepts At least 7 years of experience performing security risk assessments and security architecture reviews At least 7 years of experience with architecture, software design, networking, and cloud infrastructure At least 5 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 4+ years of experience in IAM or related areas Experience building software utilizing public cloud (e.g. AWS, GCP, Azure) Familiarity with Cloud patch management practices such as system rehydration and image management Experience utilizing Agile methodologies Experience with Software Security Architecture Experience with Application Security Experience with Threat Modeling Experience with Penetration Testing or Vulnerability Management Experience with integrating SaaS products into an Enterprise Environment Experience with securing Container services Splunk-Fu / Enterprise Monitoring experience Financial services industry experience Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP) Experience in Offensive and Defensive Security techniques Experience in a regulated environment Strong conceptual thinking, influence and communication skills At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to [email protected] Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $243.8k-278.2k yearly 60d+ ago
  • Director Information Security

    Care New England Health System 4.4company rating

    Information security analyst job in Warwick, RI

    The Director, Information Security holds primary responsibility for safeguarding the Care New England (CNE) computing environment. This includes securing systems across all CNE operating units, directing enterprise-wide cybersecurity strategy, and ensuring compliance with HIPAA, PCI, and all applicable federal, state, local, and industry regulations. The Director serves as the Chief Information Security Officer (CISO) for CNE, providing leadership in risk assessment, incident response, regulatory compliance, and cybersecurity governance. The role oversees information security tools, policies, vulnerability assessments, and monitoring systems; responds to security threats; leads mitigation activities; and collaborates closely with IS teams, Audit/Compliance, HR, Finance, and Legal. This leader develops and manages the Information Security program, directs security staff, sets security standards, leads incident management, evaluates emerging technologies, manages vendor relationships, and ensures organizational readiness through education, training, and participation in business continuity and disaster recovery planning. Duties and Responsibilities: Develop and maintain the enterprise Information Security Program. Establish protection goals, objectives, and metrics aligned with organizational strategy. Serve as the Chief Information Security Officer (CISO) for CNE. Coordinate with the Chief Privacy Officer to ensure compliant reporting of security incidents. Implement, manage, and maintain enterprise security systems and applications. Lead vulnerability assessments and ensure timely remediation. Oversee security incident response, forensic investigations, and threat mitigation efforts. Examine emerging technologies and assess their security implications. Lead ongoing risk assessment programs addressing information security and privacy. Ensure compliance with HIPAA, PCI, and applicable state and federal regulations. Develop and implement security policies, standards, guidelines, and procedures. Coordinate with IS teams, Audit/Compliance, HR, Finance, and Legal to align security efforts. Participate in disaster recovery and business continuity planning. Lead security education and awareness initiatives for staff across CNE. Manage security vendors responsible for operations, maintenance, and enhancements. Ensure vendor service delivery aligns with organizational security requirements and policies. Negotiate and manage contracts and service-level agreements with external partners. Manage, mentor, and develop information security staff. Promote professional growth and maintain awareness of industry trends. Provide input on resource allocation and security budgeting. Maintain 24-hour on-call availability to support critical operational needs. Perform other job-related duties as assigned. Requirements: Bachelor's Degree Required (computer science, MIS or related field) Minimum of 7-10 years of progressive experience in information security, Strong technical background in infrastructure, network security, firewalls, and cloud environments, Experience conducting forensic investigations and managing enterprise security products. Security certifications required: CISSP, GIAC, SANS, or similar. Audit certification preferred: CISA. Participation in national and regional security organizations preferred. Deep knowledge of cybersecurity principles, threat landscapes, and protection technologies. Strong working knowledge of enterprise infrastructure, network security, firewalls, and cloud platforms. Expertise in vulnerability management, forensic investigation, risk assessment, and incident response. Ability to develop enterprise-wide policies and governance frameworks. Strong communication skills for engaging executive leadership and cross-functional stakeholders. Exceptional organization, analytical, and decision-making abilities. Ability to manage technical teams and develop staff. Strong vendor management and contract negotiation skills. Ability to maintain confidentiality and uphold ethical and regulatory standards Additional Information: Care New England Health System (CNE) and its member institutions, Butler Hospital, Women & Infants Hospital, Kent Hospital, VNA of Care New England, Integra, The Providence Center, and Care New England Medical Group, and our Wellness Center, are trusted organizations fueling the latest advances in medical research, attracting top specialty-trained doctors, and honing renowned services and innovative programs to engage in the important discussions people need to have about their health. EEOC Statement: Care New England is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Ethics Statement: Employee conducts himself/herself consistent with the ethical standards of the organization including, but not limited to hospital policy, mission, vision, and values. Americans with Disability Act Statement: External and internal applicants, as well as position incumbents who become disabled must be able to perform the essential job-specific functions either unaided or with the assistance of a reasonable accommodation, to be determined by the organization on a case-by-case basis.
    $129k-189k yearly est. 15d ago
  • IT Security Engineer

    Bay State Milling 4.5company rating

    Information security analyst job in Quincy, MA

    Job Title: Security Engineer Department: Technology Reports To: VP of Technology Pay Range: $150,000 - $175,000 per year, depending on experience FLSA Status: Exempt WHO WE ARE: Bay State Milling Company is a family-owned leader in grain-based food ingredients, proudly serving the industry since 1899. For over 125 years, we've been on a mission to promote the growth of nutritious, sustainable, and accessible food choices. Our portfolio spans flours, grains, seeds, and innovative plant-based ingredients, all crafted to meet evolving consumer demands for healthfulness, great taste, and affordability. Rooted in five generations of ownership, we combine deep milling expertise with forward-thinking innovation. From our flagship mill in Winona, Minnesota to facilities across North America, we partner with growers and customers to deliver quality and trust at every step. Guided by our core values-Integrity, Creativity, Collaboration, Caring, and Quality-we relentlessly pursue better for the food system and the communities we serve. JOB SUMMARY: The Security Engineer plays a critical role in safeguarding Bay State Milling's digital assets, infrastructure, and data. This position is responsible for designing, implementing, and maintaining security solutions that protect against cyber threats and ensure compliance with industry standards and regulatory requirements. The Security Engineer collaborates closely with all areas of the technology team and business stakeholders to assess risks, respond to incidents, and continuously improve the company's security posture. ROLE & RESPONSIBILITIES: Design and implement secure network, system, and application architectures. Evaluate and deploy security tools, technologies, and frameworks. Monitor systems for security breaches and investigate incidents. Lead response efforts for security events, including containment, remediation, and reporting. Conduct regular vulnerability assessments and penetration testing. Coordinate remediation efforts with infrastructure and application teams. Ensure compliance with internal policies, industry standards (e.g., NIST, ISO 27001), and regulatory requirements. Support audits and risk assessments and maintain documentation of security controls. Develop and deliver security awareness programs for employees. Provide guidance and training to technical teams on secure coding and system hardening. Manage and enforce identity and access controls across systems and applications. Implement role-based access and least privilege principles. Integrate security into cloud environments and CI/CD pipelines. Collaborate with Development teams to embed security into development workflows. Stay current with emerging threats, technologies, and best practices. Recommend and implement improvements to security policies, procedures, and tools. MINIMUM EDUCATION & WORK REQUIREMENTS: Bachelor's degree in computer science, Information Security, Cybersecurity, or a related field. Minimum of 5 years of firsthand experience in cybersecurity engineering, security operations, or related technical roles. Preferred certifications can include CISSP, CISM, or Cybersecurity Architect Proven experience with security technologies such as firewalls, SIEM, IDS/IPS, endpoint protection, and cloud security platforms. Experience working in hybrid & cloud-native environments (e.g., AWS, Azure, GCP). Familiarity with secure software development practices and DevSecOps integration. KNOWLEDGE, SKILLS, AND ABILITIES: Strong understanding of network protocols, operating systems (Windows, Linux), and cloud infrastructure. Deep knowledge of cybersecurity frameworks (e.g., NIST, MITRE ATT&CK, ISO 27001). Experience with SIEM platforms (e.g., Splunk, Sentinel), EDR solutions, and threat intelligence tools. Ability to assess and mitigate risks in complex enterprise environments. Strong analytical and problem-solving skills with attention to detail. Excellent communication skills, with the ability to translate technical risks into business impact. Ability to work independently and collaboratively in cross-functional teams. Familiarity with regulatory requirements such as GDPR, or CCPA. Experience with container security (e.g., Kubernetes, Docker) and infrastructure-as-code (e.g., Terraform, CloudFormation).
    $150k-175k yearly 27d ago
  • Systems Security Analyst/Cyber Defense Analyst

    Actionet 4.7company rating

    Information security analyst job in Newport, RI

    DecisiveInstincts, LLC has an immediate opportunity for a Systems Security Analyst / Cyber Defense Analyst in Newport, RI. This position requires a Top Secret/SCI clearance. Immediate Opportunity: Systems Security Analyst / Cyber Defense Analyst Location: Newport, RI Clearance Required: Top Secret/SCI Key Responsibilities Analyze, document, and develop integration, testing, operations, and maintenance for system security. Utilize cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to monitor and mitigate threats. Apply defensive measures to identify, analyze, and report security events. Coordinate threat and mitigation strategies across the enterprise. Required Experience Network & Security Operations: Install, configure, and maintain security devices on EDU, SIPRNET, DMZ, and commercial ISP networks. Ensure compliance with DoD security and information assurance policies. Support unclassified and classified information security services. Security Tools & Technologies: Operate ACAS, McAfee HBSS, Corelight, and Cortex for threat detection and management. Implement SOAR orchestration and SIEM event correlation & analysis. Manage cloud security systems for DLP, email security, and threat prevention. Perform vulnerability scanning, penetration testing, and firewall administration. Cybersecurity Expertise: Analyze network alerts and identify causes of security incidents. Conduct security reviews, gap analysis, and risk mitigation. Apply knowledge of cyber threats, attack vectors, and mitigation strategies. Understand TCP/IP, DHCP, DNS, and OSI Model. Perform packet-level analysis and collect data from cyber defense resources. Education & Certifications Degree Requirement: Bachelor's in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science (ABET-accredited or CAE-designated institution). Certifications may be considered in lieu of a degree. ************Direct Applicants Only - No Agencies or Third-Party Recruiters***********
    $70k-97k yearly est. Auto-Apply 52d ago
  • Senior Information Systems Security Officer (ISSO) - Marlborough, MA

    RTX

    Information security analyst job in Marlborough, MA

    Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Security Clearance: DoD Clearance: SecretAt Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Our cybersecurity team is seeking a Senior Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in Marlborough, Massachusetts. The successful candidate will interface with the Information Systems Security Manager (ISSM) to ensure adherence with NIST Special Publications, customer directives, and company policies as applicable all NISPOM Chapter 8, DAAPM, JSIG policies. What You Will Do Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness. Investigating information system security violations and help prepare reports specifying corrective and preventative actions. Reviewing and approving (within authority) configuration management requests. Conducting technical and administrative assessments. Integrating new cybersecurity processes, procedures, and tools. Support the creation, review and update of cybersecurity documentation and other technical writing. Qualifications You Must Have Typically requires a University Degree or equivalent experience and minimum 5 years prior relevant experience, or an Advanced Degree in a related field and minimum 3 years' experience. Current IAM Level I certification (Security+ or other). Relevant Experience Considered in any combination: Cybersecurity, systems security or hardening Information Technology Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics) Physical security/security, policework/criminal justice, investigations, or Border Patrol Project or program management, office management, senior administration, or account management Qualifications We Prefer Experience working in DoD classified operating and/or laboratory environments. Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc. Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry. Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF). Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT). Familiarity with large multi-facility networks including various complex components, including Windows and Linux environments. Experience interpreting, implementing, and assessing DISA STIGs. Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication. What We Offer Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation. Relocation Non-Eligible - Relocation assistance not available Please consider the following role type definition as you apply for this role: Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products. We are RTX #LI-Onsite As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $77k-105k yearly est. Auto-Apply 60d+ ago
  • Systems Security Analyst/Cyber Defense Analyst

    Decisiveinstincts

    Information security analyst job in Newport, RI

    DecisiveInstincts, LLC has an immediate opportunity for a Systems Security Analyst / Cyber Defense Analyst in Newport, RI. This position requires a Top Secret/SCI clearance. Immediate Opportunity: Systems Security Analyst / Cyber Defense Analyst Location: Newport, RI Clearance Required: Top Secret/SCI Key Responsibilities Analyze, document, and develop integration, testing, operations, and maintenance for system security. Utilize cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to monitor and mitigate threats. Apply defensive measures to identify, analyze, and report security events. Coordinate threat and mitigation strategies across the enterprise. Required Experience Network & Security Operations: Install, configure, and maintain security devices on EDU, SIPRNET, DMZ, and commercial ISP networks. Ensure compliance with DoD security and information assurance policies. Support unclassified and classified information security services. Security Tools & Technologies: Operate ACAS, McAfee HBSS, Corelight, and Cortex for threat detection and management. Implement SOAR orchestration and SIEM event correlation & analysis. Manage cloud security systems for DLP, email security, and threat prevention. Perform vulnerability scanning, penetration testing, and firewall administration. Cybersecurity Expertise: Analyze network alerts and identify causes of security incidents. Conduct security reviews, gap analysis, and risk mitigation. Apply knowledge of cyber threats, attack vectors, and mitigation strategies. Understand TCP/IP, DHCP, DNS, and OSI Model. Perform packet-level analysis and collect data from cyber defense resources. Education & Certifications Degree Requirement: Bachelor's in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science (ABET-accredited or CAE-designated institution). Certifications may be considered in lieu of a degree. ************Direct Applicants Only - No Agencies or Third-Party Recruiters***********
    $75k-106k yearly est. Auto-Apply 60d+ ago
  • IT Helpdesk Analyst

    The Silk Companies 3.6company rating

    Information security analyst job in Warwick, RI

    WHY WORK AT SILK TITLE CO. Silk Title Co. is a privately owned, fast-growing company which handles billions of dollars a year in real estate transactions for some of the nation's top fin-tech institutions. Our motto, Service at Scale, combines our technology, proprietary processes, and talented team to deliver title insurance, search, and settlement services across the nation. Stuffy cover letters and fancy sounding resumes are not our thing. We want people with focused energy, solid work ethic and curious minds capable of absorbing everything we can teach about our business. Our employees are what make our company exceptional; we are a diverse team of problem solvers, QA experts, and business process gurus. We work hard but also know how to incorporate some fun through team building challenges. Our workplace exemplifies our core values of quality, communication, experience, transparency, and respect. ESSENTIAL RESPONSIBILITIES INCLUDE BUT ARE NOT LIMITED TO: • Provide Help Desk support to internal staff, clients, and partners through troubleshooting in person, on the phone, or remotely • Provide customer service by supporting enterprise PC, VoIP, and mobile devices • Champions IT policies and best practices • Configures user accounts through active directory and other proprietary systems • Provisioning, installing, and supporting infrastructure such as switches, firewalls, access points, PCs, printers, and scanners • Analyzing and monitoring systems and reports • Participates in other duties as assigned ***The IT Helpdesk Analyst must live within a commutable distance to the Warwick, RI office.***
    $83k-114k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Providence, RI

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 30d ago
  • Sr security Engineer

    Care It Services 4.3company rating

    Information security analyst job in Woonsocket, RI

    Job Overview: We are seeking a highly skilled and experienced Senior Security Engineer to join our IAM Engineering organization. The ideal candidate will have extensive solution-building experience across various Ping Identity products, including PingFederate, Ping DaVinci, PingOne, PingCentral, PingAccess, PingDirectory, AWS, and PingID Mobile. This role focuses on engineering rather than operations, and a background in Identity and Access Management (IAM) is a significant plus. Key Responsibilities: Design, develop, and implement IAM solutions using Ping Identity products such as PingFederate, PingDaVinci, PingOne, PingCentral, PingAccess, PingDirectory, and PingID Mobile. Architect and build secure and scalable IAM frameworks and solutions tailored to meet business and technical requirements. Collaborate with cross-functional teams to integrate IAM solutions with various applications and systems, ensuring seamless authentication and authorization processes. Develop and maintain AWS-based IAM solutions, leveraging cloud services to enhance security and scalability. Provide technical leadership and mentorship to junior engineers, fostering a culture of continuous learning and innovation. Conduct thorough security assessments and audits of IAM systems, identifying and mitigating potential risks and vulnerabilities. Stay current with the latest trends and best practices in IAM and security engineering, applying this knowledge to improve existing solutions. Work closely with stakeholders to understand their requirements and translate them into technical specifications and solutions. Develop and maintain comprehensive documentation for IAM solutions, including design documents, configuration guides, and operational procedures. Qualifications: Bachelor's degree in computer science, Information Security, or a related field. A master's degree is a plus. Minimum of 8+ years of overall experience in security engineering or a related field. At least 3+ years of experience with Ping Identity products, including PingFederate, Ping DaVinci, PingOne, PingCentral, PingAccess, PingDirectory, and PingID Mobile. At least 5+ years of experience with cloud services, particularly AWS. Strong engineering background with hands-on experience in building and deploying IAM solutions. Proficiency with AWS services and IAM integrations in cloud environments. In-depth understanding of IAM principles, including authentication, authorization, single sign-on (SSO), multi-factor authentication (MFA), and directory services. Experience with any programming language is a plus(Java preferably). Excellent problem-solving skills and the ability to troubleshoot complex IAM issues. Strong communication and collaboration skills, with the ability to work effectively in a team-oriented environment. Relevant certifications such as CISSP, CISM, or similar are a plus. Preferred Experience: Experience in Identity and Access Management (IAM) in large-scale enterprise environments. Familiarity with security standards and protocols such as SAML, OAuth, OpenID Connect, and LDAP. Experience with DevOps practices and tools for automation and continuous integration/continuous deployment (CI/CD). Compensation: $140,000.00 per year Who We Are CARE ITS is a certified Woman-owned and operated minority company (certified as WMBE). At CARE ITS, we are the World Class IT Professionals, helping clients achieve their goals. Care ITS was established in 2010. Since then we have successfully executed several projects with our expert team of professionals with more than 20 years of experience each. We are globally operated with our Head Quarters in Plainsboro, NJ, with focused specialization in Salesforce, Guidewire and AWS. We provide expert solutions to our customers in various business domains.
    $140k yearly Auto-Apply 60d+ ago
  • IT Security Analyst I

    Middlesex Savings Bank 3.6company rating

    Information security analyst job in Westborough, MA

    The IT Security Analyst I is responsible for supporting the Bank's IT Security preventative and reactive measures including but not limited to Technology governance, risk, and compliance. IT governance-related duties include ensuring security controls are in place, effective, and that risks are recorded and actively being managed. Other tasks include configuration management, asset management, patch management, software/hardware lifecycle, threat intelligence, user activity monitoring, and reporting thereof. This role is expected to be fully aware of the Bank's security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals. Other duties include collaboration with senior IT Security personnel to optimize security tools and processes. Performs any functions, within scope of authority and expertise, to provide the highest level of service and responsiveness to customers and co-workers. This is a Hybrid work schedule, 3 days in the office and 2 days remote in Massachusetts. Responsibilities * IT Governance • Maintain the Bank's IT security program control framework to ensure compliance with industry standards (NIST, CIS, FFIEC) and MSB's IT security control requirements. • Develop systems and processes for identifying, managing, and reporting risks. • Provide governance, risk, and compliance data insights to drive improvement across the IT system. • Compile metrics/reporting for the weekly IT Governance report. Facilitate weekly presentation to stakeholders. • Design and implement security controls for our infrastructure and critical systems. • Assigns responsibility for IT Governance related issues and tracks them to resolution. • Continually working to improve the Banks overall security posture. • Track and understand emerging security practices and threats. Leverage this knowledge to improve security configurations across the enterprise and hunt for potential or active t threats. • Manage daily volume of offline computers. Triage and resolve issues so computers can join network and be managed. • Reconcile asset type risk scores regularly and report metrics and issues to IT Division. * IT Security Control Programs • Configuration Hardening: Conduct hardening assessments of hardware and software to identify noncompliance of standards and define remediation requirements. Regular maintenance of configuration hardening benchmarks. • Vulnerability Management: Monitoring, delegation, and investigation of vulnerabilities in a severity-prioritized process. Development, deployment, and automation of scripts for remediation of vulnerabilities. • Patch Management: Systematic testing, deployment, and reporting of system patches. • Threat Intelligence: Monitor, triage, and report on Threat Intelligence alerts accordingly. • Software/Hardware Management: Reconciliation of end-of-life/end-of-support hardware and software. Authorization of software based on weight of business need and risk. Regular upkeep of software versions within Bank infrastructure. * System & Application Administration• Workstation ownership - building, securing, and ongoing management of assigned workstation assets.• Identifying and mitigating vulnerabilities on assigned assets and applications.• Application ownership - configuring, implementing, securing, and ongoing management of the Bank's security applications.Security Operations• Recommend additional security solutions or enhancements to existing security solutions to improve overall security.• Participate in investigations into problematic activity.• Consults with third party vendors/suppliers as required. Requirements Education * Bachelor's Degree in computer science, information systems or equivalent work experience is required Work Experience * 2+ years experience supporting security components and applying security best practices across an enterprise application/network infrastructure is required Additional Requirements * Experience with managing and securing Microsoft Windows or Linux is preferred. * Working knowledge of IT security controls and how to determine their effectiveness. Knowledge, Skills, and Abilities * Understanding of common security technologies and functions (Endpoint AV, Patch Management, Encryption, Vulnerability Scanning, etc.) * Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles * Passion and enthusiasm for Cyber Security * Demonstrates excellent communication, facilitation, efficient decision making and problem solving skills Licenses and Certifications * Certified Information Systems Security Professional (CISSP) or equivalent security related certification Preferred Expected Pay Range From: $62,682 To: $111,280The pay range is the salary we in good faith expect to pay for this role at the time of posting. Actual compensation paid may fluctuate higher or lower than the posted range and the range may be modified in the future due to several factors including, but not limited to, relevant experience, certifications, and qualifications, internal equity, adjustments to the requirements and responsibilities of the job, business needs, and economic and market data. EEO Statement Middlesex Savings Bank is an Equal Opportunity Employer/protected Veterans/Individuals with Disabilities
    $62.7k-111.3k yearly Auto-Apply 37d ago
  • Information Security Manager

    Mutualone Bank 4.1company rating

    Information security analyst job in Natick, MA

    Title: Information Security Manager Department: Information Security Reports to: SVP, Chief Information Officer Supervises: None Classification: Exempt Date Prepared: April 2025 Summary / Objective The Information Security Manager is responsible for developing, implementing, and maintaining the organization's information security program in compliance with the FFIEC IT Examination Handbook and other regulatory requirements. The ISM ensures the protection of sensitive data, manages cyber risks, and works closely with management, IT, risk, and compliance teams to enforce security policies, controls, and best practices. The initial training period will be on-site. After the initial training period, time to be determined, this will be a hybrid role. Experience & Education Requirements: Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field or equivalent experience. Industry-recognized certifications such as CISSP, CISM, CISA, CRISC, or GIAC preferred 5+ years of experience in information security, cybersecurity, or IT risk management, preferably within a financial institution. Strong understanding of FFIEC guidelines, Information Security frameworks, PCI-DSS, GLBA, and banking regulations. Experience with security architecture, incident response, SIEM tools, and identity & access management (IAM). Familiarity with cloud security, digital banking risks, and payment systems security. Job Requirements: Strong risk management skills and mindset. Extensive knowledge of cyber security concepts, principles, methods, and products. General knowledge of financial and banking technology including core banking software, loan origination platforms, online and mobile banking platforms, general ledger software, ATM technology, etc., preferred. Proficiency in interpreting and analyzing impact of federal and state regulations, with proficiency in banking regulations required, preferred. Experience performing compliance reviews/audits for a financial institution, preferred. Experience in developing and delivering Information/Cyber Security or other technical training. Ability to communicate complex technical topics to non-technical audience. Ability to keep pace with the rapidly evolving threat landscape. Proficient in Microsoft Office Suite products. Qualifications Specific Job Functions: Governance and Security Program Management Maintain an enterprise-wide information security program in alignment with FFIEC guidelines and industry best practices. Establish and enforce security policies, standards, and procedures to protect the institution's assets, including customer and financial data. Report security risks and incidents to senior management and the Board of Directors. Ensure compliance with regulatory requirements such as GLBA, BSA/AML, PCI-DSS, and other applicable laws. Serve as back up for the risk assessment process, evaluating threats and vulnerabilities to information assets. Risk Management and Compliance Oversee the implementation of technical and administrative security controls to mitigate risks. Monitor compliance with security policies and procedures through audits, reviews, and gap analyses. Ensure the organization follows an established industry framework (e.g., NIST, CIS). Serve as back up for information security risk assessments. Work with IT in ongoing IAM updates and review and monitor IAM reports Incident Response and Business Continuity Develop and maintain the Incident Response Plan (IRP) and coordinate responses to cyber threats, security breaches, and fraud attempts. Complete annual tests and exercises. Establish and test the Business Continuity Plan (BCP) in coordination with IT and Risk Management and individual business units. Complete annual tests and exercises. Serve as the primary point of contact for information security incidents, ensuring appropriate reporting, remediation, and maintaining documentation. Cybersecurity Monitoring and Threat Intelligence Work with IT to oversee real-time security monitoring, including Security Information and Event Management (SIEM) solutions, to detect and respond to threats. Perform reviews of daily, weekly, and monthly Information Security reports. Collaborate with third-party security providers and government agencies (e.g., FS-ISAC, CISA, FBI) for threat intelligence sharing. Oversee regular penetration testing and vulnerability assessments to proactively identify weaknesses. Employee Training and Awareness Design and lead security awareness training programs for employees, ensuring a strong culture of cybersecurity. Conduct phishing simulations, tabletop exercises, and cybersecurity drills to enhance employee readiness. Reporting and Communication Prepare and present security reports, risk assessments, and incident updates to executive management. Communicate regulatory updates, cyber risks, and compliance matters to stakeholders in a clear and concise manner. Privacy Establish and maintain policies, procedures, standards, and guidelines for the Bank's Privacy Program. Responsible for updating Privacy Policy and notices, as necessary. General Assist internal, external, and regulatory auditors with the collection of requested materials, as assigned with their respective engagements. Provide regular reporting to bank management for the Information Security Program and all GLBA compliance. Ensures that areas of direct responsibilities operate within guidelines set for State and Federal laws. Participates in user groups for third-party services providers, industry trade groups and educational programs to remain abreast of current issues and requirements that impact the Bank. Ensure compliance with BSA regulations as appropriate to the position In the performance of respective tasks and duties, the employee is expected to maintain knowledge of and ensure compliance with Bank Secrecy Act regulations and adheres to compliance procedures and internal/operational risk controls in accordance with all applicable regulatory standards, requirements and policies as well as attending all required training sessions and completing all required on-line training courses. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. Other Duties This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. It is expected that from time-to-time other duties, both related and unrelated to the above, may be assigned and therefore, required.
    $87k-106k yearly est. 60d+ ago
  • Overnight Security Analyst - Hingham, MA ($28.85/hour)

    Securitas Inc.

    Information security analyst job in Quincy, MA

    Job Specification: Title: Security Operations Center Supervisor Schedule: Thursday-Saturday (10:30pm-6:30am) Pay: $28.85/hour The Security Operations Center (SOC) Supervisor oversees the daily operations of the SOC to ensure the continuous protection of people, property, and assets. The supervisor is responsible for managing SOC Analysts, ensuring compliance with post orders, coordinating incident response, and maintaining communication with site management, field personnel, and clients. Key Responsibilities * Supervise, train, and mentor SOC Analysts to ensure effective performance and adherence to operational procedures. * Oversee monitoring of Avigilon and related security systems across all client sites. * Ensure all incidents, alarms, and emergencies are responded to promptly and documented accurately. * Conduct quality control checks on incident reports, shift summaries, and communications. * Coordinate with site supervisors, managers, and law enforcement as needed during critical incidents. * Develop, review, and update SOC post orders, policies, and standard operating procedures. * Ensure proper shift coverage, scheduling, and timely dissemination of information between shifts. * Assist in performance evaluations, disciplinary actions, and ongoing professional development of SOC staff. * Provide leadership during emergencies and maintain command presence in high-stress situations. Qualifications * High school diploma or equivalent required; Associate or Bachelor's degree preferred (Criminal Justice, Security Management, or related field). * Minimum of 2-4 years of experience in a Security Operations Center, with at least 1 year in a leadership or supervisory role. * Proficient in Avigilon Control Center (ACC) and other video management or access control systems. * Strong leadership, communication, and decision-making skills under pressure. * Experience in report writing, investigation management, and coordination with external agencies. * Proficiency with Microsoft Office Suite and incident tracking software. * Ability to train and motivate a diverse team in a 24/7 operational environment. * Must meet standards for professionalism, conduct, and background clearance. "Securitas is committed to diversity, equity, inclusion and belonging in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other applicable legally protected characteristic." #MetroBoston
    $28.9 hourly 32d ago
  • Multiple permanent positions_Certified Security Architect_w2

    360 It Professionals 3.6company rating

    Information security analyst job in Cumberland, RI

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Job Description We are looking to fill multiple full time positions as Information Security Architects in Cumberland RI. Qualifications A minimum of 5+ years of relevant security domain experience. 3+ years of hands on technical experience in network and perimeter security A minimum of 3 years in an architecture role and be able to lead/step up as needed Demonstrated expertise in integrating/developing security solutions in a 7x24 production environment Prior experience in defining the technology strategy for a large, global organization, and the ability to influence and persuade peers and colleagues in other reporting structures Strong Plus Skills: Industry recognized certifications such as CISA, CISM, CISSP, or SANS GIAC are a plus Virtualization Security experience is a strong plus (VMware ESX 6.x, Hytrust, Hypervisor, in-hypervisor malware control. Virtual NIC, NSX or equivalent.) Knowledge of risk assessment methodologies, IT policies and standards Knowledge of vulnerability identification tools, Qualys, Veracode, Qualys WAS. Additional Information In person interview is acceptable.
    $104k-135k yearly est. 60d+ ago
  • INFORMATION TECHNOLOGY ANALYST

    City of New Bedford, Ma 4.2company rating

    Information security analyst job in New Bedford, MA

    For a description, see PDF at: ********************** s3. amazonaws. com/wp-content/uploads/sites/45/**********3253/Information-Technology-Analyst-7. 22. 25. pdf
    $63k-79k yearly est. 4d ago
  • IT Strategy & Planning Analyst Co-op - Fall 2026

    Delhaize America 4.6company rating

    Information security analyst job in Quincy, MA

    Ahold Delhaize USA, a division of global food retailer Ahold Delhaize, is part of the U.S. family of brands, which includes five leading omnichannel grocery brands - Food Lion, Giant Food, The GIANT Company, Hannaford and Stop & Shop. Our associates support the brands with a wide range of services, including Finance, Legal, Sustainability, Commercial, Digital and E-commerce, Technology and more. Co-op Program Overview: Get an insider view of the fast-changing grocery retail industry while developing relevant business, technical and leadership skills geared towards enhancing your career. This paid Co-op experience is an opportunity to help drive business results in an environment designed to promote and reward diversity, innovation and leadership. Our mission is to create impactful early talent programs that provide cohorts with meaningful project work, learning and development sessions, and mentorship opportunities. Applicants must be currently enrolled in a bachelor's or master's degree program. Applicants must be currently authorized to work in the United States on a full-time basis and be available from July 13, 2026 through December 4, 2026. We have a hybrid work environment that requires a minimum of three days a week in the office. Please submit your resume including your cumulative GPA. Transcripts may be requested at a future date. * Approximate 6-month Co-op session with competitive pay * Impactful project work to develop your skills/knowledge * Career assistance & mentoring in obtaining full time positions within ADUSA * Leadership speaker sessions and development activities * One-on-one mentoring in your area of interest * Involvement in group community service events * Networking and professional engagement opportunities * Access to online career development tools and resources * Opportunity to present project work to company leaders and gain executive visibility Department/Position Description: The Strategy & Transformation team creates and maintains the IT organization's strategy in alignment with the overall business strategy, while executing various portfolio planning and governance processes to ensure our investment portfolio aligns with the IT strategy. The Co-op will gain hands-on experience by contributing to the development of financial and resource estimation models, assisting with the 2027 IT strategic planning efforts, and automating various reports and manual tasks to improve operational efficiency. During their session, they will learn how to analyze large datasets, extract meaningful insights, and effectively communicate their findings through well-structured presentations. Qualifications: * Currently pursuing a degree in Information Technology and Operations, Business, or a related field * Strong analytical and problem-solving skills * Ability to analyze large data sets and generate insights * Proficiency in Microsoft Excel and Power BI * Familiarity with Microsoft Office Suite, especially PowerPoint * Excellent communication and interpersonal skills * Ability to work independently and as part of a team Individual cohort pay rates vary based on location, academic year, and position. ME/NC/PA/SC Salary Range: $18.10 - $31.00 IL/MA/MD Salary Range: $20.00 - $34.20 #LI-Hybrid At Ahold Delhaize USA, we provide services to one of the largest portfolios of grocery companies in the nation, and we're actively seeking top talent. Our team shares a common motivation to drive change, take ownership and enable our brands to better care for their customers. We thrive on supporting great local grocery brands and their strategies. Our associates are the heartbeat of our organization. We are committed to offering a welcoming work environment where all associates can succeed and thrive. Guided by our values of courage, care, teamwork, integrity (and even a little humor), we are dedicated to being a great place to work. We believe in collaboration, curiosity, and continuous learning in all that we think, create and do. While building a culture where personal and professional growth are just as important as business growth, we invest in our people, empowering them to learn, grow and deliver at all levels of the business.
    $18.1-31 hourly 60d+ ago
  • Chief Information Security Officer

    Trinity Life Sciences

    Information security analyst job in Waltham, MA

    Job Details Waltham, MA - Waltham, MA $250000.00 - $300000.00 Salary/year Description Company Profile Trinity Partners, LLC (“Trinity”) *********************************** is a leading healthcare consulting firm based in Waltham, MA that specializes in health care strategy for pharmaceutical, biotech and life sciences firms. Our clients include top tier to venture backed companies worldwide. Trinity provides services to these clients in a variety of practice areas including strategic planning, forecasting and market estimation, licensing and acquisitions, launch strategies, data warehousing and sales force effectiveness. The company consists of approximately 900 employees and is headquartered in Waltham, Massachusetts, with offices in New Jersey, New York, San Francisco, Pennsylvania, Germany, London & India. Trinity is an EEO employer. Chief Information Security Officer The Chief Information Security Officer will lead the development and execution of a comprehensive information security strategy for a global pharmaceutical consulting firm. They will act as the strategic leader of Trinity's cyber defense program as an integral part of the Trinity leadership team. This role will ensure the confidentiality, integrity, and availability of enterprise data, systems, and infrastructure across all geographies. The CISO will collaborate with executive leadership, IT, legal, compliance, and operations to embed security into the company's culture and business processes. The CISO will posses the ability to manage the cybersecurity team to identify, assess and prioritize threats and vulnerabilities across all of Trinity's environment, while effectively influencing and communicating across multiple teams to help create a cohesive security ecosystem. The ideal candidate will be able to build strong relationships across the business to help identify gaps in security controls, as well as direct internal audits. They will possess an ability to ‘think like an adversary' and promote security throughout the organization. Key Objectives Strategic Leadership Develop and implement a global information security strategy aligned with business goals and regulatory requirements Establish and maintain enterprise-wide security policies, standards, and procedures. Lead the information security governance, risk management, including responsibility for audit readiness and post-assessment remediation plans, especially for ISO 27001 and 42001 gaps Define and report on key security metrics (e.g., incident response times, vulnerability remediation SLAs, phishing simulation results) to executive leadership and the board Lead the development and enforcement of cloud security strategies across Microsoft 365, Azure, AWS, and other SaaS platforms with emphasis on configuration management, monitoring, and incident detection/remediation in cloud environments Foster a security-first culture by engaging business leaders and department heads in regular security briefings and risk discussions. Lead threat detection, prevention, and response capabilities, including Security Operations Center (SOC) oversight. Ensure the timely investigation, response, and remediation of security incidents and breaches. Establish and document a framework-aligned, business-integrated security ecosystem for Trinity and enable mechanisms to showcase it to customers on a need basis. Lead data protection efforts across Trinity SaaS, Product and Internal environments, including cloud-native services and large-scale repositories. Software Development Lifecycle Oversight Integrate security practices into the full software development lifecycle, including secure architecture, code review, automated testing for vulnerabilities, and DevSecOps principles. Collaborate with IT and Product teams to ensure security controls are embedded from project initiation through deployment. Vendor & Third-Party Risk Management Oversee the security review process for third-party vendors, cloud providers, and partners. Ensure supply chain security and resilience. Operational Oversight Oversee the design and implementation of technical safeguards including access control, encryption, patch management, and threat detection systems Manage the cybersecurity team, including security engineers, analysts, and external vendors (e.g., Managed SOC services) Direct incident response planning and execution, including breach investigations and reporting Ensure secure configuration and monitoring of cloud-native services, including identity, access, and data protection controls Oversee data governance and protection strategies for large-scale data repositories, including SharePoint Online, OneDrive, and Teams Orchestrate regular security audits in SaaS ecosystems, to proactively identify vulnerabilities. Collaborate with international teams to maintain consistent security posture and incident response readiness globally Champion regular security audits and continuous improvement cycles, with a focus on cloud ecosystem vulnerabilities such as drift in Microsoft 365, AWS, Azure, among others. Compliance & Risk Management Work directly with General Counsel and Compliance group to ensure compliance with HIPAA, GDPR, NIST CSF, SOC 2, ISO 27001 and ISO 42001and other global data protection regulations relevant to pharmaceutical consulting Conduct regular risk assessments based on NIST RMF and develop mitigation plans Lead external security audits and accreditation surveys Ensure security practices are adapted to regional regulatory requirements and cultural contexts across North America, Europe, and Asia. Training & Awareness Champion a culture of security awareness across the organization specifically with development teams Develop and deliver training programs tailored to different roles and regions Demonstrated ability to communicate complex security concepts to the board, non-technical stakeholders, and external customers in plain, persuasive language. Technology & Innovation Evaluate and implement emerging security technologies (e.g., CASB, PAM, GRC tools) Align security architecture with frameworks such as NIST CSF, CIS 18, and OWASP Qualifications Position Requirements: Education: Bachelor's or Master's degree in Information Security, Computer Science, or related field. Work Experience: 10+[PL1] years of progressive experience in information security, including leadership roles and hands-on security engineering and vulnerability remediation. Other Skills: Knowledge and/or working skills in the following areas: Experience in pharmaceutical, healthcare, or consulting industries preferred Certifications such as CISSP, CISM, CEH, GSEC, ECSA, Security+ or CISA strongly preferred Proven ability to lead cross-functional teams and manage global security operations Strategic thinking and business acumen Strong communication and stakeholder engagement skills with demonstrated record of translating technical content for business adoption Experience with vendor management and contract negotiation Familiarity with cloud security, application security, and data loss prevention Understanding of modern threats and exploits Ability to understand and communicate attack chains to management and key stakeholders Develop, execute and track the performance of security measures to protect information and network infrastructure and computer systems Identify, define and document system security requirements and recommend solutions to management Identify and document security requirements and recommend solutions to management Ownership of remediation activities for ISO and other regulatory gaps. Experience managing or working with Managed Security Service Providers (MSSPs) and Security Operations Centers (SOCs). Familiarity with Zero Trust architecture and identity-centric security models. About Us Trinity's salary bands account for a wide range of factors that are considered in making compensation decisions including but not limited to skill sets and market demand for skills; level of experience and training; specific qualifications, performance, time in role/company, geographic location, and other business and organizational needs. A reasonable estimate of the current range is $250,000-$300,000 USD. In addition to your base salary, you will also be eligible for an annual discretionary performance bonus. Trinity's Commitment to Diversity, Equity & Inclusion Trinity Life Sciences is an Equal Opportunity Employer that prohibits discrimination and harassment of any kind. Trinity is committed to the principles of diversity, equity, and inclusion and to providing employees with a work environment that is free of discrimination and harassment. All employment decisions at Trinity are based on business needs, job requirements and individual qualifications, without regard to race, color, religion, disability, ethnicity, gender identity or expression, family, parental, or veteran status, and/or any other status based on identity or that is protected by the laws or regulations in the locations where we operate. Trinity will not tolerate any form of discrimination or harassment and encourages applicants of all ages and identities. For more information about Trinity's commitment to diversity, equity, and inclusion, you can visit our website.
    $250k-300k yearly 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Providence, RI

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 30d ago
  • IT Security Analyst I

    Middlesex Savings Bank 3.6company rating

    Information security analyst job in Westborough, MA

    The IT Security Analyst I is responsible for supporting the Bank's IT Security preventative and reactive measures including but not limited to Technology governance, risk, and compliance. IT governance-related duties include ensuring security controls are in place, effective, and that risks are recorded and actively being managed. Other tasks include configuration management, asset management, patch management, software/hardware lifecycle, threat intelligence, user activity monitoring, and reporting thereof. This role is expected to be fully aware of the Bank's security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals. Other duties include collaboration with senior IT Security personnel to optimize security tools and processes. Performs any functions, within scope of authority and expertise, to provide the highest level of service and responsiveness to customers and co-workers. This is a Hybrid work schedule, 3 days in the office and 2 days remote in Massachusetts. Responsibilities IT Governance • Maintain the Bank's IT security program control framework to ensure compliance with industry standards (NIST, CIS, FFIEC) and MSB's IT security control requirements. • Develop systems and processes for identifying, managing, and reporting risks. • Provide governance, risk, and compliance data insights to drive improvement across the IT system. • Compile metrics/reporting for the weekly IT Governance report. Facilitate weekly presentation to stakeholders. • Design and implement security controls for our infrastructure and critical systems. • Assigns responsibility for IT Governance related issues and tracks them to resolution. • Continually working to improve the Banks overall security posture. • Track and understand emerging security practices and threats. Leverage this knowledge to improve security configurations across the enterprise and hunt for potential or active t threats. • Manage daily volume of offline computers. Triage and resolve issues so computers can join network and be managed. • Reconcile asset type risk scores regularly and report metrics and issues to IT Division. IT Security Control Programs • Configuration Hardening: ▪ Conduct hardening assessments of hardware and software to identify noncompliance of standards and define remediation requirements. ▪ Regular maintenance of configuration hardening benchmarks. • Vulnerability Management: ▪ Monitoring, delegation, and investigation of vulnerabilities in a severity-prioritized process. ▪ Development, deployment, and automation of scripts for remediation of vulnerabilities. • Patch Management: ▪ Systematic testing, deployment, and reporting of system patches. • Threat Intelligence: ▪ Monitor, triage, and report on Threat Intelligence alerts accordingly. • Software/Hardware Management: ▪ Reconciliation of end-of-life/end-of-support hardware and software. ▪ Authorization of software based on weight of business need and risk. ▪ Regular upkeep of software versions within Bank infrastructure. System & Application Administration • Workstation ownership - building, securing, and ongoing management of assigned workstation assets. • Identifying and mitigating vulnerabilities on assigned assets and applications. • Application ownership - configuring, implementing, securing, and ongoing management of the Bank's security applications. Security Operations • Recommend additional security solutions or enhancements to existing security solutions to improve overall security. • Participate in investigations into problematic activity. • Consults with third party vendors/suppliers as required. Requirements Education Bachelor's Degree in computer science, information systems or equivalent work experience is required Work Experience 2+ years experience supporting security components and applying security best practices across an enterprise application/network infrastructure is required Additional Requirements Experience with managing and securing Microsoft Windows or Linux is preferred. Working knowledge of IT security controls and how to determine their effectiveness. Knowledge, Skills, and Abilities Understanding of common security technologies and functions (Endpoint AV, Patch Management, Encryption, Vulnerability Scanning, etc.) Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Passion and enthusiasm for Cyber Security Demonstrates excellent communication, facilitation, efficient decision making and problem solving skills Licenses and Certifications Certified Information Systems Security Professional (CISSP) or equivalent security related certification Preferred Expected Pay Range From: $62,682To: $111,280 The pay range is the salary we in good faith expect to pay for this role at the time of posting. Actual compensation paid may fluctuate higher or lower than the posted range and the range may be modified in the future due to several factors including, but not limited to, relevant experience, certifications, and qualifications, internal equity, adjustments to the requirements and responsibilities of the job, business needs, and economic and market data. EEO Statement Middlesex Savings Bank is an Equal Opportunity Employer/protected Veterans/Individuals with Disabilities
    $62.7k-111.3k yearly Auto-Apply 27d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Scituate, RI?

The average information security analyst in Scituate, RI earns between $63,000 and $124,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Scituate, RI

$89,000

What are the biggest employers of Information Security Analysts in Scituate, RI?

The biggest employers of Information Security Analysts in Scituate, RI are:
  1. Citizens Financial Group
  2. Citizens Alliance
Job type you want
Full Time
Part Time
Internship
Temporary