Sr. Security Analyst - Perimeter Security Team
Information security analyst job in Tempe, AZ
Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship.
Job Overview
Position Schedule: Full-Time
This job posting is anticipated to remain open for 30 days, from 01-Dec-2025. The posting may close early due to the volume of applicants.
Team Overview:
As a Security Analyst you will work independently to manage 1 - 2 platforms within a product team and collaborate with colleagues to solve routine to difficult engineering challenges. You will ensure that all platforms within your span of responsibility meet your customer's requirements; are designed, built, documented, and maintained in adherence with the Firm's standards and architectural patterns; and are managed to the highest level for performance, stability, and security. As a Security Engineer you deeply understand network architecture and data flows, proxy solutions, remote access platforms and have the ability and drive to solve complex issues and manage competing priorities.
What You'll Do:
Identify and implement opportunities to improve solutions and ensure system availability while maintaining acceptable risk levels for the firm to remain in compliance with industry regulations and security framework.
Serve as a subject matter expert for proxy and intrusion prevention platforms, remote access connectivity, zero-trust, and network security monitoring.
Lead and oversee the solution design lifecycle for Zscaler and IPS, including stakeholder requirement gathering and prioritization, alignment with architectural standards and best practices, implementation planning, implementation execution, documentation completeness, and ongoing health monitoring and maintenance.
Provide design thinking and oversight for Zscaler and IPS to ensure cohesiveness, completeness, and effectiveness of the platform; and provide feedback to the Team Lead on the overall direction of the technology stack.
Continue to implement new features and performance improvements for Zscaler and IPS in partnership with key stakeholders.
Adhere to frameworks and processes for cohesive change management, health monitoring, performance monitoring, stability, and backups across the product space.
Support technology incidents including: triaging technology services performance segregation or outages, performing root cause analysis across a complex environment, and identifying short and long-term solutions while operating in stressful and time sensitive situations.
Effectively communicate with peers and leaders to ensure the awareness of progress, the awareness of challenges, the identification and escalation of risks, and the impact of ongoing security work. Including the ability to clearly discuss complex technical or security topics with a non-technical audience.
Establish and maintain effective communications and relationships across key departments, business areas, and vendors. Including supporting engagements with key vendors to ensure the correct level of support to the Firm and drive solution roadmaps to meet Firm needs.
Mentor and coach less senior team members and represent the Firm across the financial service's information security community through industry forums, working groups, and conference presentations.
Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page.
Hiring Minimum: $84100
Hiring Maximum: $143100
Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf.
Read More About Job Overview
Skills/Requirements
What Experience You'll Need:
Degree in Cyber Security, Computer Science, Computer Engineering, or Information Systems or related field preferred; or equivalent training and certifications (A+, Net+, Sec+, SANS, Cloud, etc), or related work experience
3-5 years of managing enterprise class proxy solutions, remote access solutions, network security platforms, on-prem and cloud data centers.
Experience in a variety of technical fields including software, infrastructure, and security engineering at an enterprise level. This experience gives you deep understanding of the full stack required to deliver and operate software and platforms at an enterprise level.
Understanding of core enterprise technology platforms including: infrastructure, software, data, cloud and cloud native platforms, microservices, API management, event streaming, CI/CD pipelines.
Experience with core enterprise level information security components, principles, practices, and procedures. Including common technology stack components, deep knowledge of threats and adversary tactics, and experience managing regulatory requirements and common frameworks used by security teams within the Financial Industry.
Understanding of core enterprise best practices, including: security risk management, architecture diagrams and documentation, digital transformation, change management, crisis management, business continuity, disaster recovery, and observability.
Experienced in designing and building highly scalable, distributed & secure solutions that run in a cloud environment such as Azure, AWS, or GCP. Including demonstrated proficiency in deploying infrastructure as code through Terraform, Ansible, or similar technologies.
Experience with managing and delivering on stakeholder requirements in a way that balances design functionality, cost optimization, and production support considerations.
Advanced experience with writing code/scripts in at least one language (Python, PowerShell, Bash, Go, etc)
Demonstrated competency with reading and generating architectural diagrams and maintaining full and accurate documentation of software, systems, and platforms.
Strong understanding of observability, performance monitoring, and root cause analysis principles to perform continuous platform improvements or quickly troubleshoot and restore services in a case of disruption.
Experience working with Product Teams and Agile methodology and practices
Demonstrated proficiency with proxy solutions and zero trust methodologies
Demonstrated proficiency with network security best practices
Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday.
Current INTERNAL home-based associates: While this role is posted as hybrid, if selected and accepted, you may retain your home-based status. Edward Jones intends in good faith to continue offering the role as home-based, though future business or regulatory needs may require on-site work.
Read More About Skills/Requirements
Awards & Accolades
At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received.
Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones
Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones
Read More About Awards & Accolades
About Us
Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns.
Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging.
People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career.
View our Purpose, Inclusion and Citizenship Report.
¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating.
Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law.
#LI-HO
Senior Security Engineer - IAM Analyst
Information security analyst job in Tempe, AZ
Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship.
Job Overview
Position Schedule: Full-Time
This job posting is anticipated to remain open for 30 days, from 01-Dec-2025. The posting may close early due to the volume of applicants.
Team Overview:
As an IAM Analyst you will work independently to identify and define IAM solution requirements for both existing capabilities and the expansion of new features. You will ensure that all platforms within your span of responsibility meet your customer's requirements; designed, built, documented, and maintained in adherence with the Firm's standards and architectural patterns; and are managed to the highest level for performance, stability, and security. Serving as a Security practicioner, you will bring deep industry knowledge and experience to understand the threat landscape and use that knowledge to shape the platforms that the Firm depends on for critical identity lifecycle functions. In this role you will regularly engage in leading-edge technology initiatives, including research, vetting, and adoption of emerging technologies, tools and methodologies in alignment with the overall security strategy.
What You'll Do:
Identify and implement opportunities to improve solutions that combat advanced and relevant threats while considering integration into the environment, stability, availability, disaster recovery, and cost-effectiveness.
Serve as a subject matter expert for the identity management platform (Saviynt) and be a key contributor to stabilization and expansion efforts.
Lead conversations centered on solving for complex business requirements in solution designs, and ensuring compliance with internal standards, policies, and regulatory requirements.
Identify potential gaps in existing IAM processes or systems and recommending solutions to improve security and efficiency.
Manage SOX compliance, auditing, and access review processes.
Collaborate with internal teams and stakeholders to understand requirements and develop solutions.
Effectively document solutions and configurations for future reference.
Produce, maintain, and facilitate distribution of training resources to effectively empower key stakeholders with the information needed to meet Firm objectives and/or drive adoption of new processes.
Establish and maintain effective communications and relationships across key departments, business areas, and vendors, including supporting engagements with key vendors to ensure the correct level of support to the Firm and drive solution roadmaps to meet Firm expectations.
Creating and maintaining documentation for IAM processes, procedures, solution designs, requirements, etc.
Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page.
Hiring Minimum: $99200
Hiring Maximum: $168900
Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf.
Read More About Job Overview
Skills/Requirements
What Experience You'll Need:
Minimum 4-5 years experience
In-depth understanding of Saviynt product functionality, including provisioning, access certification, SOD, analytics, RBAC, workflow, email notifications, etc.
Experience designing JML flows for Saviynt automation.
Experience integrating applications with Saviynt using various connectors.
Solid understanding of workflows in ARS and the ability to leverage Saviynt analytics tools.
Experience managing SOX compliance, auditing, and access review processes within Saviynt.
Experience with configuration management of Rules Technical Users, UI Global Configurations, Backend configurations, and GSP files.
Excellent written and verbal communication skills.
Experience with APIs and integrations
Strong analytical and problem-solving skills
Excellent communication and collaboration skills
Experience using ticketing systems (e.g., Jira)
**Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday.**
Current INTERNAL home-based associates: While this role is posted as hybrid, if selected and accepted, you may retain your home-based status. Edward Jones intends in good faith to continue offering the role as home-based, though future business or regulatory needs may require on-site work.
Read More About Skills/Requirements
Awards & Accolades
At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received.
Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones
Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones
Read More About Awards & Accolades
About Us
Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns.
Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging.
People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career.
View our Purpose, Inclusion and Citizenship Report.
¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating.
Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law.
#LI-HO
Bank Information Security Governance Senior
Information security analyst job in Phoenix, AZ
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplySenior Cloud Security Engineer
Information security analyst job in Scottsdale, AZ
We are seeking a Senior Cloud Security Engineer to join our client for a full-time, direct hire role that will be hybrid in Scottsdale, AZ. This role will design, deploy, and manage security technologies and modern automation tools for the enforcement of security controls across private and public cloud service platforms.
Location: Hybrid in Scottsdale, AZ (4 days onsite)
Compensation: This job is expected to pay about $130,000-150,000 plus benefits
Relocation Assistance Available
What You'll Do:
Design, implement, and maintain custom and native security services across large-scale hybrid multi-cloud environments.
Automate and orchestrate secure cloud migrations and operations using configuration management tools and workflows.
Partner with architecture, engineering, and operations teams to deploy security controls aligned with business strategies and industry standards (NIST, CIS, ISO 27001/31000, CSA).
Manage PKI services, certificate lifecycle, cryptographic solutions, SSH key management, CSPM, and CWPP platforms.
Integrate DevSecOps practices into CI/CD pipelines, including vulnerability scanning (SAST, DAST, SCA), IaC scanning, and secure coding guidance.
Maintain CSPM vulnerability dashboards for multi-cloud environments; generate compliance and leadership reports.
Configure and optimize WAF, DDoS, and bot protection policies.
Collaborate with SOC to develop Splunk event management, integrate cloud/SaaS logs, and enhance security alerting.
Contribute to enterprise security standards, documentation, and architecture diagrams.
Provide Tier III/IV support, knowledge transfer, and escalation for security and network operations.
What Gets You the Job:
5+ years in cloud security and/or IT security engineering.
Expertise in AWS, Azure, Salesforce, and Google Cloud; strong SaaS and application workload security knowledge.
Background in Windows Server, Linux (RHEL), Apache, SAP Hybris, MySQL, Tomcat, and native cloud services.
Strong understanding of network/web protocols (TCP/IP, UDP, IPSEC, HTTP/S, routing).
Proficient in automation/scripting with Java, JSON, Python, Bash, or similar.
4+ years with LDAP/AD, cloud identity federation, OIDC/OAuth2, and SAML2 SSO.
Skilled in PKI, certificate lifecycle, cryptographic solutions, and SSH key management.
Knowledge of DevOps, Jenkins CI/CD, BitBucket, and secure coding practices for common vulnerabilities.
Please send your resume to Hannah Xu, Senior Technical Recruiter for immediate consideration.
Irvine Technology Corporation (ITC) is a leading provider of technology and staffing solutions for IT, Security, Engineering, and Interactive Design disciplines servicing startups to enterprise clients, nationally. We pride ourselves in the ability to introduce you to our intimate network of business and technology leaders - bringing you opportunity coupled with personal growth, and professional development! Join us. Let us catapult your career!
Irvine Technology Corporation provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Irvine Technology Corporation complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
Information Security Analyst
Information security analyst job in Mesa, AZ
Who we are...
Verra Mobility is a global leader in smart mobility. We develop technology-enabled solutions that help the world move safely and easily. We are fostering the development of safe cities, working with police departments and municipalities to install over 4,000 red-light, speed, and school bus stop arm safety cameras across North America. We are also creating smart roadways, serving the world's largest commercial fleets and rental car companies to manage tolling transactions and violations for over 8.5 million vehicles. And we are a leading provider of connected systems, processing nearly 165 million transactions each year across 50+ individual tolling authorities.
Culture
Verra Mobility Corporation is a rapidly-growing, entrepreneurial company that operates with a people-first philosophy and approach. The company lives by its core values-Do What's Right, Lead with Grace, Win Together, and Own It-in everything it does for its customers and team members. The company seeks to grow aggressively, both organically and through acquisition, to continue to be the undisputed market leader with these five core competencies: bias for action, customer focus, teamwork, drive for results, and commitment to excellence.
Position Overview:
The Information Security Analyst is responsible for monitoring the organization's networks and systems to detect security breaches and suspicious activities. They conduct regular assessments and respond to incidents by investigating and mitigating threats. Their duties include maintaining and updating security tools and software to protect data. They document security incidents and prepare reports to inform management about potential risks. Additionally, the security analyst will evaluate and improve existing security related processes and procedures.
Essential Responsibilities:
Monitors log and event output from multiple information security tools including but not limited to security information and event management (SIEM) technology, firewalls, networks, secure web/e-mail proxy, threat intel platforms, and end user security platforms.
Investigates anomalies and responds according to established standard operating procedures.
Performs routine but critical information security technology tasks including but not limited to SIEM tuning, secure web proxy configuration changes, e-mail security investigations, firewall change request reviews and software approval assessments.
Participates and leads security incident response procedures.
Processes any information security policy changes needed as determined by information security team leadership.
Researches trending threats and provides regular reports with accompanying security tools impact analyses.
Acts as a technical resource during internal and external audit engagements and is responsible for gathering security related technical evidence as required.
Educates employees in information security best practices.
Stays abreast of developments in the information security industry.
Takes initiative on leading security related projects as determined by information security team leadership.
Represents the information security team on cross team co-operative projects with other shared service organizations as required.
Qualifications:
Required
Bachelors, Information Technology or High School Diploma/GED and appropriate on the job experience in information technology and/or information security.
Minimum of one year experience as an information security analyst or two years of experience in a technical focused IT role (including but not limited to service desk, server administration, network administration, IT compliance or other systems support role).
Ability to deal with changing priorities and multi-task several projects.
Ability to identify compromised systems and lead remediation efforts.
Excellent presentation and communication skills.
Demonstrable verbal and written communication experience.
Detail-oriented individuals that work well in a team environment and have a hunger to learn.
Analytical and problem-solving skills
Must be located in Arizona, Florida, or Indianapolis and willing to commute up to two days into office.
Preferred
Experience with using and/or managing a commercial SIEM.
Candidates should have a working knowledge of basic information security concepts and beginning to intermediate familiarity with common security technologies such as anti-virus, firewalls, DLP, web content filters, proxy servers, intrusion prevention systems, Windows event logging and syslog.
Candidates should be familiar with networking fundamentals and have a basic to intermediate understanding of common network and application layer protocols such as TCP/IP, HTTP, DNS, SMTP and FTP.
Information Security certifications, such as: CISSP, GSEC, GCED, Security+, etc. are a plus.
Other entry level IT certifications, such as: Network+, Linux+, etc. are a plus.
This position is not open to relocation and does not provide sponsorship now or in the future.
Verra Mobility Values
An ideal candidate for this role naturally works in alignment with the Verra Mobility Core Values:
Own It. We focus on high performance and drive toward breakthrough outcomes. Our employees ensure accountability, optimize and align work, focus on the customer, and cultivate innovation.
Do What's Right. We champion integrity and good character. Our team members model ethical behavior, demonstrate good judgment and are courageous.
Lead with Grace. We express humility and compassion, and we are authentic and candid. Our employees demonstrate self-awareness, care for others, instill trust, and communicate effectively.
Win Together. We believe in growing and inspiring people together. We seek people who collaborate, value differences, think and act globally, foster an engaging work environment, and recognize and develop others.
With your explicit consent which you provided as part of the application process, we will retain candidate personal data solely for the business purpose for which it was collected. In no event will we retain such data more than two (2) years following the closure of the recruitment process relating to the role for which you applied or in the event other related job opportunities arise within the company. Verra Mobility Applicant Privacy Notice
Verra Mobility is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
.
Auto-ApplyF-35 Information System Security Officer - Luke AFB, AZ (Early Career)
Information security analyst job in Glendale, AZ
What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected.
The Work:
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at Luke AFB. Typical ISSO responsibilities include but are not limited to:
Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
Supporting the development and maintenance of cybersecurity related plans and procedures.
Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
Creating, collecting and retaining data to meet reporting requirements.
Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
Conducting self-inspections and preparing for customer inspections.
Interacting professionally during the enforcement of security policy and procedures.
Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
Who we are:
Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems.
Why Join Us:
Your Health, Your Wealth, Your Life
With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
Ability to obtain and maintain Special Access Program (SAP) access.
Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $76,500 - $134,895. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $88,000 - $152,490. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
Sr Analyst, Cloud Security Assurance
Information security analyst job in Scottsdale, AZ
The Company PayPal has been revolutionizing commerce globally for more than 25 years. Creating innovative experiences that make moving money, selling, and shopping simple, personalized, and secure, PayPal empowers consumers and businesses in approximately 200 markets to join and thrive in the global economy.
We operate a global, two-sided network at scale that connects hundreds of millions of merchants and consumers. We help merchants and consumers connect, transact, and complete payments, whether they are online or in person. PayPal is more than a connection to third-party payment networks. We provide proprietary payment solutions accepted by merchants that enable the completion of payments on our platform on behalf of our customers.
We offer our customers the flexibility to use their accounts to purchase and receive payments for goods and services, as well as the ability to transfer and withdraw funds. We enable consumers to exchange funds more safely with merchants using a variety of funding sources, which may include a bank account, a PayPal or Venmo account balance, PayPal and Venmo branded credit products, a credit card, a debit card, certain cryptocurrencies, or other stored value products such as gift cards, and eligible credit card rewards. Our PayPal, Venmo, and Xoom products also make it safer and simpler for friends and family to transfer funds to each other. We offer merchants an end-to-end payments solution that provides authorization and settlement capabilities, as well as instant access to funds and payouts. We also help merchants connect with their customers, process exchanges and returns, and manage risk. We enable consumers to engage in cross-border shopping and merchants to extend their global reach while reducing the complexity and friction involved in enabling cross-border trade.
Our beliefs are the foundation for how we conduct business every day. We live each day guided by our core values of Inclusion, Innovation, Collaboration, and Wellness. Together, our values ensure that we work together as one global team with our customers at the center of everything we do - and they push us to ensure we take care of ourselves, each other, and our communities.
Job Summary:
Sr. Analyst, Cybersecurity Operations focused on cloud security. As a key player in our Cloud Assurance team, you will help provide comprehensive visibility into cloud infrastructures, monitor for misconfigurations, and proactively detect threats.
Job Description:
Essential Responsibilities:
* Independently apply security best practices to enhance and optimize cyber threat management, ensuring robust protection and efficiency, while beginning to understand and align security measures with business objectives.
* Partner with peers and internal teams to drive security initiatives, contribute to cross-functional projects, and at times co-lead efforts to strengthen security posture and cyber threat management.
* Analyze and resolve security challenges by adapting standard cyber threat management processes and exploring alternative approaches to address complex threats.
* Influence the quality, efficiency, and effectiveness of the team through informed decision-making, with a potential impact on other teams.
* Collaborate with key partners to gather and incorporate feedback, driving continuous improvements in cyber threat management.
Minimum Qualifications:
* Minimum of 5 years of relevant work experience and a Bachelor's degree or equivalent experience.
Preferred Qualification:
Your day to day:
This role will be focused primarily on the security in AWS and GCP cloud environments at PayPal. This will include the security aspects of infrastructure, build pipelines, application design, cloud native service and tool design patterns, stakeholder communications, consulting and advisement of peer security teams, and solution review and approval. Daily tasks will include but not limited to:
* Onboarding Cloud accounts (such as Azure, AWS & GCP) - this includes access grant, enabling policies, configuring baselines, configuring agents (if applicable), verifying health status
* Administer CSPM solution - this includes managing user roles, audit logs, manage API access
* Discover cloud assets - this includes gaining visibility and manage cloud assets
* Manage Security policies and Benchmarks - this includes configuring CSPs specific security policies, industry specific compliance policies (such as PCI), benchmarks standards (such as CIS, NIST, etc.)
* Respond to alerts - this includes monitor, investigate and triage incidents based on actionable alerts
* Manage OS hardening - this includes administer operating system baseline and hardening
* Integration with 3rd party systems - this includes manage changes, requests on integration with other systems (such as ITSM and CI/CD Tools)
* Remediation guidance - this includes providing recommendations to the stakeholders to fix the potential threats, applying configurations on the systems to maintain IT security regulatory compliance and standards
* Manage reports - this includes providing reports to the business and IT stakeholders
What do you need to bring:
* 5+ years' experience in Cloud Security, CSPM
* Collaborate with the team to design and deliver scalable back-end services that enhance our leading CSPM platform
* Develop user-friendly command-line utilities that interact with our web services
* Excellent communication and documentation skills
* Provide integration support and documentation for various teams, including UX/UI and Sensors
* Configure and monitor uptime alerts related to the services you manage
* Continuously improve architecture, models, user experience, performance, and stability through rapid prototyping and agile decision-making
* Innovate and refine methods to utilize data for automating global-scale cyber threat intelligence
* Contribute to building a platform that secures the entire lifecycle of cloud workloads for our customers
* Proficiency in at least one object-oriented programming language with strong typing
* Experience in developing and using RESTful API web services
* Familiarity with cloud provider APIs and CLI tools for AWS, Azure, and GCP
* Experience with infrastructure-as-code tools like CloudFormation, Terraform, and Azure Templates
* Hands-on experience with Docker containers in Kubernetes environments
* Experience with message queues including defining messages, estimating sizes and rates, and monitoring lag
* Experience with RDBMS databases and SQL, such as Postgres
Preferred certifications:
* Cloud Security related certifications (AWS, GCP)
* Bachelors / Master's Degree in Computer Science / Cybersecurity or related field
Bonus Points:
* Industry experience or certifications related to CNAPP, CSPM, or Cloud Security
* Experience with application observability tools such as Splunk and PagerDuty
* Experience managing production environments with Postgres, Kubernetes etc.
* Familiarity with graph structures, data, and graph databases
* Compliance knowledge/experience
* Automation
Subsidiary:
PayPal
Travel Percent:
0
* PayPal is committed to fair and equitable compensation practices.
Actual Compensation is based on various factors including but not limited to work location, and relevant skills and experience.
The total compensation for this practice may include an annual performance bonus (or other incentive compensation, as applicable), equity, and medical, dental, vision, and other benefits. For more information, visit *******************************
The US national annual pay range for this role is $111,500 to $191,950
PayPal does not charge candidates any fees for courses, applications, resume reviews, interviews, background checks, or onboarding. Any such request is a red flag and likely part of a scam. To learn more about how to identify and avoid recruitment fraud please visit ************************************
For the majority of employees, PayPal's balanced hybrid work model offers 3 days in the office for effective in-person collaboration and 2 days at your choice of either the PayPal office or your home workspace, ensuring that you equally have the benefits and conveniences of both locations.
Our Benefits:
At PayPal, we're committed to building an equitable and inclusive global economy. And we can't do this without our most important asset-you. That's why we offer benefits to help you thrive in every stage of life. We champion your financial, physical, and mental health by offering valuable benefits and resources to help you care for the whole you.
We have great benefits including a flexible work environment, employee shares options, health and life insurance and more. To learn more about our benefits please visit *******************************
Who We Are:
Click Here to learn more about our culture and community.
Commitment to Diversity and Inclusion
PayPal provides equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, pregnancy, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state, or local law. In addition, PayPal will provide reasonable accommodations for qualified individuals with disabilities. If you are unable to submit an application because of incompatible assistive technology or a disability, please contact us at ****************************************.
Belonging at PayPal:
Our employees are central to advancing our mission, and we strive to create an environment where everyone can do their best work with a sense of purpose and belonging. Belonging at PayPal means creating a workplace with a sense of acceptance and security where all employees feel included and valued. We are proud to have a diverse workforce reflective of the merchants, consumers, and communities that we serve, and we continue to take tangible actions to cultivate inclusivity and belonging at PayPal.
Any general requests for consideration of your skills, please Join our Talent Community.
We know the confidence gap and imposter syndrome can get in the way of meeting spectacular candidates. Please don't hesitate to apply.
Principal Security Information Analyst
Information security analyst job in Tempe, AZ
Principal Information Security Analyst (Tier 2)
As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization.
The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams.
In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance.
Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend.
Key Responsibilities:
Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity
Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms
Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools
Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency
Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements
Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities
Support the execution of incident response playbooks
Qualification and Work Experience:
3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis
Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis
Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks)
Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry)
Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation
Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies
Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP)
Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows
Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration
Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning
Effective communication and documentation skills in English, both written and verbal
Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects
Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred
Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage
#LI-AS1
Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds.
We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency.
To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
Auto-ApplyPrincipal Security Information Analyst
Information security analyst job in Tempe, AZ
Principal Information Security Analyst (Tier 2)
As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization.
The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams.
In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance.
Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend.
Key Responsibilities:
Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity
Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms
Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools
Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency
Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements
Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities
Support the execution of incident response playbooks
Qualification and Work Experience:
3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis
Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis
Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks)
Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry)
Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation
Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies
Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP)
Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows
Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration
Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning
Effective communication and documentation skills in English, both written and verbal
Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects
Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred
Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage
#LI-AS1
Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds.
We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency.
To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
Auto-ApplySenior IT Security Analyst
Information security analyst job in Phoenix, AZ
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplySenior Security Analyst (L2)
Information security analyst job in Scottsdale, AZ
L2 Security Analyst
Full-Time, Exempt
We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Auto-ApplyCyber Resilience Specialist
Information security analyst job in Phoenix, AZ
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery.
What You'll Do
* Lead and facilitate Business Impact Assessments (BIAs) across business units
* Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems
* Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience
* Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles
* Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews
* Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations
* Support program governance, metrics, training, and awareness efforts
What You'll Bring
* 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting
* Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning
* Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms)
* Experience supporting risk assessments and regulatory audits
* Excellent facilitation and stakeholder management skills
* Strong writing skills to produce clear, client-ready plans and reports
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
#LI-MS12
Easy ApplyInformation System Security Officer
Information security analyst job in Scottsdale, AZ
Job Description
Senior Information Systems Security Officer (ISSO) Clearance Requirement: U.S. Citizen, active DoD Secret clearance or higher Job Type: Full-Time
SASSI is seeking an experienced Senior Information Systems Security Officer (ISSO) to support a DoD customer in Scottsdale, AZ. This role plays a critical part in securing systems across on-prem and commercial cloud environments, supporting initial system delivery, authorization, and ongoing cybersecurity efforts.
The ideal candidate holds a CISSP or CISM certification and brings 5-10 years of relevant cybersecurity or IT experience. You'll work closely with the ISSM, System Owner, and Authorizing Officials, contributing to the development and maintenance of authorization documentation and ongoing security posture.
Key Responsibilities:
Collaborate with the Information System Security Manager (ISSM), Information System Owner (ISO), and DoD Authorizing Official team.
Develop, update, and maintain system security documentation including the SSP, SCTM, and RMF Body of Evidence.
Ensure assigned systems maintain an appropriate security posture.
Prepare systems for RMF assessments in accordance with NIST SP 800-37, 800-53, and related guidance.
Identify security deficiencies and support resolution via POA&Ms and risk acceptance documentation.
Monitor systems continuously to ensure compliance with the authorization package.
Assist with system administration and the maintenance of cybersecurity tools (e.g., audit logs, vulnerability management, endpoint protection).
Support change management processes and evaluating the security impact of proposed changes.
Conduct regular audit log reviews (daily, weekly, monthly) and track findings.
Participate in engineering and integration efforts across the customer's production environment.
Communicate clearly and professionally with both government and contractor audiences, in writing and verbally.
Basic Qualifications:
U.S. Citizenship and active DoD Secret clearance (or higher)
DoD 8570.01-M / DoD 8140.01-compliant certification (IAT Level II, IAM Level II, or IASAE Level II)
Bachelor's degree in IT, Cybersecurity, Computer Science, Engineering, or related field with 4+ years of relevant experience
Strong working knowledge of RMF, ICD 503, NIST SP 800-53, and JSIG/DJSIG
Familiarity with DoD system authorization processes
Preferred Qualifications:
Experience with Windows, Linux, UNIX, Cloud platforms, Cisco, SQL/Oracle databases, and virtual environments
Proficiency in cybersecurity tools for vulnerability scanning, patching, audit management, and endpoint protection
Work Schedule:
8-hour shift, Monday-Friday
Onsite support required in Scottsdale, AZ
Security Analyst
Information security analyst job in Scottsdale, AZ
Link Technologies is seeking a Software Development Architect for a well-established client in Scottsdale, AZ. Established in 2000, Link Technologies has provided professional services in the areas of Information Technology, Engineering, Business Support, Project Management, and Cyber Security/Information Assurance to some of America's top Corporations and Government Agencies at the Federal, State, and Local level. Seeking a Security Analyst for a 6-month contract to hire with a well-established client in the Scottsdale, AZ area
Job Description
Position Description:
The Security Analyst is a member of the security team and performs technical activities for delivering effective host, network, data and application security services. This position will have primary responsibility for security platforms in the production and test environments and will monitor and maintain network and computer security policies with a focus on managing vulnerabilities.
Major Areas of Responsibility:
·
Assists in planning, directing and coordinating activities, specifically relative to Information Security
·
Assists in developing and enforcing the organization's security policies, standards, and guidelines, security awareness, security information portion of the business continuity and disaster recovery plans, and all industry and government compliance issues
·
Assists in incorporating the design, deployment, management, control, and updating of platform and user-specific security policies on a diverse range of internal hardware platforms supporting various software and operating systems
·
Conducts risk management analysis to identify areas of risk and to develop security measures to prevent losses
·
Monitors use of data files and regulate access to safeguard information in computer files.
·
Works with business owners, IT managers, staff, and vendors in order to provide timely and efficient IT coordination of security services to meet the needs
·
Create reports on status of information security programs and projects, as required
·
Communicates with senior executives through oral and written reports and presentations, as required
·
Develops and implements IT system security plans, projects and initiatives
·
Plans, implements, manages, and coordinates security measures and controls for information systems to regulate access to computer data and prevent unauthorized modification, destruction, or disclosure of information
Qualifications
Requirements:
• Bachelor degree or equivalent experience in engineering, technology, or related field
• Minimum 2 years security experience
• Extensive background with Nessus Vulnerability Scanner
• Understanding of PEN testing performance and remediation
• Experience with Microsoft Advanced Threat Analytics
• Ability to create dashboards in Splunk Analytics
• Solid understanding of Cisco ASA
• Experience in identifying network security vulnerabilities
• Willingness to respond swiftly and effectively to network security events
• Must work well in a team environment
• Must be self-motivated and able to work independently
• Experience at working both independently and in a team-oriented, collaborative environment is essential
• Can conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities
• Reacts to project adjustments and alterations promptly and efficiently
Working Conditions:
• Expected work hours are Monday through Friday, regular business hours
• Some travel required; may be extensive depending on project
• Flexible during times of change
Additional Information:
• All candidates must be legally eligible to work for any employer in the United States without sponsorship or a third party employer
• This role is on-site; remote work is not an option unless otherwise specified
Additional Information
All your information will be kept confidential according to EEO guidelines.
Security Analyst
Information security analyst job in Phoenix, AZ
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
• Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
• Collabera listed in GS 100 - recognized for excellence and maturity
• Collabera named among the Top 500 Diversity Owned Businesses
• Collabera listed in GS 100 & ranked among top 10 service providers
• Collabera was ranked:
• 32 in the Top 100 Large Businesses in the U.S
• 18 in Top 500 Diversity Owned Businesses in the U.S
• 3 in the Top 100 Diversity Owned Businesses in New Jersey
• 3 in the Top 100 Privately-held Businesses in New Jersey
• 66th on FinTech 100
• 35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
• 2-3 years experience in direct development of Java or .NET web applications with a SQL database.
• Required to have 1-2 years hands-on experience performing real-world software vulnerability assessments using blackbox and whitebox tools.
• Must have implemented secure software development techniques.
• Completed software vulnerability training with blackbox/whitebox tool exposure.
• Strong understanding of "OWASP top 10" vulnerabilities and how to remediate them.
• Excellent verbal and written communication skills and ability to work with and provide guidance to software development teams.
• Experienced conducting vulnerability report debrief sessions with software development teams.
• Broad understanding of the IT systems, technologies, and solutions, and how security controls integrate with these systems.
• Expertise with security technologies such as various penetration testing frameworks, vulnerability scanners, and source code scanners.
• Experienced working with Eclipse IDE and/or .NET IDE.
• Experienced working with Source Management systems.
Additional Information
HM is available to interview ASAP.
If you are interested with the Opportunity please reach me ************
Engineer, Information Security and Risk
Information security analyst job in Phoenix, AZ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Bank Information Security Governance Senior
Information security analyst job in Glendale, AZ
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplySenior Security Analyst (L2)
Information security analyst job in Scottsdale, AZ
Job Description
L2 Security Analyst
Full-Time, Exempt
We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Powered by JazzHR
6oXedfgOJk
Security Analyst
Information security analyst job in Phoenix, AZ
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
• Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
• Collabera listed in GS 100 - recognized for excellence and maturity
• Collabera named among the Top 500 Diversity Owned Businesses
• Collabera listed in GS 100 & ranked among top 10 service providers
• Collabera was ranked:
• 32 in the Top 100 Large Businesses in the U.S
• 18 in Top 500 Diversity Owned Businesses in the U.S
• 3 in the Top 100 Diversity Owned Businesses in New Jersey
• 3 in the Top 100 Privately-held Businesses in New Jersey
• 66th on FinTech 100
• 35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Position Details:
Job Title : Security Analyst
Work Location : 3202 W Behrend Dr., Phoenix, AZ - 85027
Duration : 12+ Months (Possible Extension)
Job Description:
• 2-3 years experience in direct development of Java or .NET web applications with a SQL database.
• Required to have 1-2 years hands-on experience performing real-world software vulnerability assessments using blackbox and whitebox tools.
• Must have implemented secure software development techniques.
• Completed software vulnerability training with blackbox/whitebox tool exposure.
• Strong understanding of "OWASP top 10" vulnerabilities and how to remediate them.
• Excellent verbal and written communication skills and ability to work with and provide guidance to software development teams.
• Experienced conducting vulnerability report debrief sessions with software development teams.
• Broad understanding of the IT systems, technologies, and solutions, and how security controls integrate with these systems.
• Expertise with security technologies such as various penetration testing frameworks, vulnerability scanners, and source code scanners.
• Experienced working with Eclipse IDE and/or .NET IDE.
• Experienced working with Source Management systems.
Additional Information
Hiring Manager is available to interview ASAP.
If you are interested with the Opportunity please reach me ************
Engineer, Information Security and Risk
Information security analyst job in Phoenix, AZ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************