Post job

Information security analyst jobs in Spring Hill, TN - 344 jobs

All
Information Security Analyst
Cyber Security Analyst
Information Technology Analyst
Information Systems Security Officer
Cyber Security Engineer
Certified Information Systems Security Professional
Information Assurance Engineer
Senior Information Security Engineer
Security Engineer
Security Architect
Securities Analyst
Data Security Analyst
Senior Information Assurance Analyst
Information Security Manager
  • Senior Information System Security Officer

    Mantech 4.5company rating

    Information security analyst job in Huntsville, AL

    MANTECH seeks a motivated, career and customer-oriented Senior Information System Security Officer (ISSO) to join our team in Huntsville, Alabama. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Provide liaison support between the system owner and other IS security personnel Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR; Working knowledge of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and ATO processes Minimum Qualifications: Must meet one of the following levels of experience: A high school diploma/GED and 7 years' experience, a bachelor's degree in computer science cybersecurity or a related discipline and five years' experience, or a master's degree in computer science cybersecurity or a related discipline and 3 years' experience. Hold at least one of the following Information Assurance Management (IAM) Level III certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or equivalent certifications Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top Secret security clearance with eligibility to obtain SCI prior to starting this position. Selected candidate must be willing to undergo a Polygraph. Physical Requirements: Must be able to remain in a stationary position 50% Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer Often positions self to maintain computers in the lab, including under the desks and in the server closet Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $53k-71k yearly est. 4d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • IT Portfolio Analyst

    Dollar General 4.4company rating

    Information security analyst job in Nashville, TN

    **This role is not approved for Sponsorship** Plans, governs, and measures IT success-using flexibility, transparency, and value conversations to shape the business demand to optimize and transform Dollar General. Instrumental in the support of the CIO including, but not limited to program management, coordination, communication, and oversight. Duties & Responsibilities: Strategic Financial Management Develop and produce complex financial analytics to support Strategic Solutions Coordinate and provide funding request management, reporting and tracking Establishes enterprise wide accounting and budgeting policies and processes, as well as necessary forms and templates to support them Facilitate the budget/forecasting process, including distribution of assumptions, gathering of inputs, validation, and reporting of results across the enterprise Govern & Measure Ensures appropriate compliance & governance controls are in place for policy and protection of any sensitive data Facilitates change management, governance processes, champion organizational change, and enforces compliance to changes throughout the enterprise Guarantee IT maintains business partnership and service oriented view, ensuring IT and business strategies alignment Tracking, analyzing, benchmarking, and consolidating reports for key performance indicators Consolidate project/initiatives and portfolio performance metrics from across the organization into varying views Develop and produce executive enterprise and IT leadership level strategic reporting and presentation materials Develop, produce, and coordinate written materials and presentations executive and board-level reporting Portfolio Management Gain insight across and provide varying views and analysis into IT project/initiatives portfolio (health checks, scorecards, at-a-glance, retrospectives) Support project change management providing basic tools, templates, and structures intended to keep any change effort monitored and transparent. Develop and produce roadmaps for the portfolios across IT and the consolidation of overlapping teams and projects/initiatives Team Development IT coordination & representation for companywide committees, action teams, professional networks, and resource groups and programs Knowledge, Skills, & Abilities: Demonstrate leadership skills with the ability to manage through consulting, advising, and influencing all levels of the organization. Strong interpersonal skills with ability to effectively listen and communicate efficiently both verbally and in written form Knowledge of and/or experience with development methodology and/or Infrastructure management Ability to organize, prioritize, delegate and follow-up, with emphasis on adherence to deadlines Ability to proactively identify financial risks, issues, action items, and facilitate the identification and implementation of alternate solutions Resolve conflicts and create lasting productive partnerships enterprise wide Comfort dealing with ambiguity and the ability to work independently in a fast-paced environment Strong analytical, problem solving, and decision-making skills Creative ability to access information from different sources and compile for analyses and presentations Detail oriented - must be able to detect errors, identify trends, and make recommendations for improvements Ability to thoroughly understand how decisions impact other areas of the enterprise (Big Picture Perspective) Extensive knowledge of the MS Office Suite with expertise in excel formulas and functions High proficiency with financial modeling and techniques Work Experience &/or Education: Two to four years experience in IT required Three to four years experience in Business Financial Analysis and Corporate Accounting required Certified Scrum Master preferred Bachelor's degree preferred Retail experience preferred CAPM preferred or willingness to obtain
    $58k-72k yearly est. 1d ago
  • Cyber Security Engineer

    Patriot Talent Solutions

    Information security analyst job in Knoxville, TN

    Knoxville, TN | Cybersecurity Engineer | Full-time We are actively recruiting a Cybersecurity Engineer for our client in Knoxville, TN. This is a hybrid direct placement opportunity that will require some onsite work in Knoxville. The successful candidate will be responsible for the design, implementation, and ongoing management of advanced cybersecurity measures to protect sensitive data, systems, and networks. This role involves hands-on work with a wide range of security technologies, development and enforcement of security protocols, and proactive risk mitigation. The engineer collaborates with cross-functional IT teams to integrate security solutions into enterprise projects and ensure compliance with applicable regulatory requirements, including HIPAA. Must have a minimum of five years' experience in cybersecurity engineering, with a proven track record in designing and implementing security solutions within an enterprise environment. Due to client request, candidates must be eligible to work in the United States without sponsorship. Equal Opportunity Employer/Veterans/Disabled
    $69k-94k yearly est. 3d ago
  • Cyber Security Engineer

    Provisions Group 4.4company rating

    Information security analyst job in Knoxville, TN

    The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations. Technical Implementation: Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools. Implement and support security controls for network infrastructure such as routers, switches, and wireless access points. Configure, administer, and secure Active Directory and Azure AD environments. Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions. Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection. Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture. Security Operations: Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation. Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts. Lead technical response efforts during security incidents or breaches in coordination with the incident response team. Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access. Conduct routine vulnerability assessments and threat analysis to support continual improvement. Perform digital forensics and incident response activities as needed. Compliance: Ensure adherence to HIPAA and all applicable regulatory and security standards. Design and implement technical safeguards that protect sensitive information and support organizational objectives. Collaboration: Partner with IT and business teams to embed security controls into systems, applications, and workflows. Educate and support staff on cybersecurity awareness, best practices, and evolving threats. Documentation: Create and maintain accurate documentation for security configurations, procedures, and incident activity. Remain informed on current cybersecurity trends and recommend enhancements to existing controls. Security Audits: Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards. Security Standards and Policies: Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements. Security Infrastructure Maintenance and Monitoring: Configure, troubleshoot, and maintain security-related hardware and software. Implement and manage monitoring tools to detect intrusions and potential security breaches. Security Strategy Development: Support the planning, execution, and ongoing refinement of the organization's information security strategy. Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives. Perform additional duties as assigned. Minimum Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required. Minimum Experience: Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment. Certifications: Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
    $65k-87k yearly est. 4d ago
  • IT Analyst

    Visionaire Partners 4.1company rating

    Information security analyst job in Shelbyville, TN

    This is a 3 month contract opportunity with a leading global organization based in Atlanta, GA. There is potential to extend. Candidates have the opportunity to work from home 2 days per week! Successful candidates have a high level of initiative and thrive in a fast paced, enterprise environment. REQUIRED SKILLS: Associate's or Bachelor's degree in Information Technology, Business Administration, Supply Chain Management, or a related field. 1-3 years of experience (internships or part-time roles acceptable) in IT operations, procurement, inventory control, or asset lifecycle management. Basic understanding of IT hardware and software lifecycles, including procurement, deployment, maintenance, and retirement. PREFERRED SKILLS: CompTIA A+ or IT Fundamentals+ (for hardware/software foundations). ITIL Foundation certification. ServiceNow Certified System Administrator (CSA) or basic platform training. SAM/HAM practitioner courses from IAITAM (CHAMP, CSAM) or equivalent. Must be authorized to work in the US. Sponsorships are not available. Details
    $66k-90k yearly est. 2d ago
  • Cyber Security Analyst

    Bellatrix HRM

    Information security analyst job in Huntsville, AL

    Bellatrix-Latin for "Female Warrior" Owned and operated in a HUBZone, with over 25 years in the HR, Talent Acquisition and Government Contracting. Like the Bellatrix Star in the Orion Constellation, our Team Members are the Brilliance of the company, and are all shareholders, leading the company to success. Bellatrix prides itself on being a Small Woman Owned HUBZone company. We believe big does not equal best. By staying small, we can focus on agility, efficiency, and our people. At Bellatrix we believe in advancement from within through training, mentorship, innovation and truly being a family. Bellatrix believes in excellence in customer service, and catering to the customer's needs. We realize not everyone fits into a box, and we think outside of the box to ensure, affordable and outstanding services. Human Resources, Retention and Recruiting, and Medical Coding/Billing are the HRM of Bellatrix. Come and join our team, where you are a team member and shareholder, working together for growth. Bellatrix has the current position open as a direct W2, Fulltime position for one of our top clients in the Huntsville, AL Market. This position requires a Secret Clearance and is on location with the Missile Defense Agency Title: Cyber Security Analyst Location: Onsite-Huntsville, AL Program: MDA, C3BM and C2BMC Number of Openings: 2 Immediate Direct Hire Clearance: Secret Travel: 25% Salary Range: $150,000-165,000, DOE General Overview: Command, Control, Communications, and Battle Management (C3BM) cyber engineering efforts include engaging in Command, Control, Battle Management, and Communications (C2BMC) technical engineering and integration, future concepts, new functionality, and multi-national exchange designs. Cyber engineering tasking includes participation in reviews and assessments of C2BMC cyber security and documentation. Collaboration with MDS stakeholders is required to prepare C2BMC cyber products as part of the engineering objectives documentation and analysis processes as related to Defense Of Guam (DoG).Other activities include participation in engineering meetings, presenting engineering product development updates, providing analysis and failure review summaries. Responsibilities: Understand cybersecurity aspects of systems engineering development, as well as DoD cybersecurity requirements, and be capable of recommending changes to the Government about the contractor's system engineering development process. Perform cybersecurity risk assessment reviews to include changes, modifications, and/or updates of software and/or hardware to individual information systems and/or enterprise environment. Familiarity with Configuration Management to include oversight and engineering assessments of Cybersecurity fixes, patch development, and pre-release testing in support of DoG. Performing cybersecurity risk assessment describing the posture of an individual information systems through an enterprise architecture in support of DoG. Will directly support the Software Assurance program for C2BMC. Includes ability for assessments of code reviews and approvals/disapprovals of software products for use on Mission, Training and Test/Development C2BMC systems is support of DoG Requirements: Bachelor's degree in STEM program: Computer Science, Information Technology, Network Engineering or other similar program 5+ years of Related Experience Secret Clearance Familiarity with MDS cyber capabilities and policy Familiarity with Missile Defense Agency, Ballistic Missile Defense System, and/or C3BM Program Office work efforts Security +, CE with a preferred certification level of CISSP Ability to work independently within a dynamic environment Apply cyber engineering and solutions to support real-world test, integration, and operations Work within a collaborative environment composed of Government, prime contractor, sub-contractor and supporting contractor personnel in a badge-less contractor environment Bellatrix is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
    $150k-165k yearly 60d+ ago
  • Analyst, Information Security

    Standard Aero 4.1company rating

    Information security analyst job in Maryville, TN

    Build an Aviation Career You're Proud Of At StandardAero, we use our ingenuity and know-how to find solutions for the simple to the most complex challenges in aviation. Together, we get the job done and done well. Our stability, resources, and respectful culture supports you in building a solid career with a great team you can count on day in and day out for the long term. Summary: As an IT Security Analyst position is a critical role in protecting StandardAero's business and technology operations. In this role you will be accountable in securing the enterprise technology and operations against an ever evolving and growing threat landscape. The role is an integral position in supporting StandardAero's global cyber-security defenses, providing tactical cyber security objectives and implementing the security strategy across the organization. What you'll do: Conduct risk and security assessments through vulnerability analysis and reporting Perform mitigation support for both internal and external security audits Investigate, analyze and document security incidents to identify and document the root cause Provides incident response support including mitigating actions to contain activity and facilitating forensics analysis when necessary Partner with IT Operation teams to remediate system vulnerabilities Participates in the production of documentation and management reporting Research security enhancements and make recommendations for improved policy and process Analyze IT requirements and provide objective advice on the use of new IT security offerings Stay up-to-date on information technology and cybersecurity trends and standards Other IT Security-related duties as required Capable of identifying, evaluating and mitigating significant risks within an enterprise. Strong working experience with Microsoft Office Suite. Strong oral and written communication skills and the ability to work well with people from many different disciplines with varying degrees of technical experience. Possess strong analytical skills attention to detail. Ability to prioritize assignments while working on multiple projects Ability to work independently and proactively to meet assigned objectives Flexible with the ability to multi-task, effectively prioritize and work under pressure Basic project management Design, implement, administer, support and maintain cybersecurity technology systems (Endpoint Protection, IDS/IPS, Web and Email Security, SIEM, Multi-Factor Authentication, Network Access Controls, DLP, etc.) Analyze, report and respond to security alerts within the various IT technologies and global locations Proactively remediate information technology security threats as a member of the security team Assist in the designing, documenting, architecting and implementing IT security measures and controls Provide support through ‘Threat Hunting' against anomalous behavior within the enterprise. Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources Threat mitigation; malicious code detection, response and prevention; operating system security oversight Minimum Qualifications: Bachelor's degree in Information Security, Computer Science, or a related field; equivalent experience may be considered. 5+ years of progressive experience in cybersecurity and IT, including hands-on security operations, threat detection, or engineering. 5+ years of experience in SIEM Administration, endpoint protection, vulnerability management tools, and security automation. 5+ years of experience of network and application security, threat actor tactics (MITRE ATT&CK), and incident response frameworks. 5+ years of experience working in regulated environments or with industry frameworks (e.g., NIST, ISO 27001, CIS, or CMMC). Preferred Qualifications: IT Security Certification, specifically GSEC, CEH, CISSO, CISA or CISSP, GCIA, OSCP and ITIL SDLC, and understand application security. Containerization and Development Security Operations Benefits that make life better: Comprehensive Healthcare 401(k) with 100% company match; up to 5% vested Paid Time Off starting on day one Bonus opportunities Health- & Dependent Care Flexible Spending Accounts Short- & Long-Term Disability Life & AD&D Insurance Learning & Training opportunities Raising the Standard of Excellence since 1911 With over a century of proven excellence, StandardAero has become an industry leader in MRO services and customized solutions in the aerospace field. Our shared values and learning-based culture inspire our team to exceed their potential and power our customers' missions worldwide. With on-the-job training, advancement opportunities, and excellent benefits, StandardAero invites you to experience a fulfilling and meaningful career with us. Inclusivity Is Our Standard It is StandardAero's policy to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Our supportive environment celebrates diversity with no room for harassment or discrimination of any kind. We invite you to bring your authentic self to our team and experience our welcoming culture.
    $73k-103k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Vulnerability Analyst

    ITR 4.2company rating

    Information security analyst job in Oak Ridge, TN

    Job DescriptionEast Tennessee company is seeking a Cyber Security Vulnerability Analyst to perform defensive cyber operational tasks, respond to reported incidents, and track remediation of client system vulnerabilities to include industrial control systems. The ideal candidate will be an experienced analyst with a strong background in addressing network vulnerabilities and conducting incident response activities. This is a full-time, hybrid position that will work onsite in Oak Ridge, TN 2-3 days each week. Job Responsibilities: • Join the Defensive Cyber Operations Group's multi-disciplinary team in responding to advanced Cyber threats from targeted phishing to network-based threats, ransomware, and APT-level activity in a Tier 2 role. • Mentor the DCO's junior staff, developing their technical and incident resolution skills. • Participate in incident response activities involving multiple teams and functions. • Serve as primary coordinator for ORNL response to federal Binding Operational Directives and data calls. • Leverage internal and external vulnerability scanning scan data to maintain a comprehensive view of ORNL's threat profile and risk status. • Automate key DCO functions using Tines technology • Partner with Emerging Threat team to remediate extant vulnerabilities identified by their intelligence activities. • Maintain strong collaborative and data sharing relationships with DOE headquarters Cyber units, other DOE laboratories, and external entities. • Leverage EDR, SIEM, IDS, and PCAP tools to identify and investigate cyber threats. • Assist users with the creation, monitoring, and evaluation of policy and device exceptions. • Assist in training and awareness activities to ensure ORNL staff are aware of Cyber Security responsibilities and requirements. • Partner with Cyber Industrial Control System Engineers to monitor the lab's ICS enclaves for operational and security issues Candidates must be able to obtain a federal security clearance so US citizenship is required.
    $69k-95k yearly est. 9d ago
  • Cyber Threat Emulation Analyst

    Launchtech

    Information security analyst job in Huntsville, AL

    or Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10% LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics. What You'll Do As a Mid-Level Cyber Threat Emulation Analyst, you will: Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM) Perform cybersecurity duties on customer networks to improve enterprise-wide security posture Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation Measure defense-in-depth effectiveness against known vulnerabilities Generate vulnerability assessment reports and escalate findings for review Support enterprise Incident Response in accordance with DoD regulations and instructions Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs) Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices What You Bring Basic Requirements: Must have 6, or more, years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration tests in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on a Linux platform Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux) Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in a high-paced environment Be familiar with DoD Security Operations Centers (SOC/CSSP) Be familiar with DCO/CSSP-guiding security policies and procedures Have an active DoD Top Secret clearance Why LaunchTech? At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence. We offer competitive benefits, including: Medical, Dental, and Vision coverage 401(k) with company match Paid Time Off (PTO) Opportunities to make a meaningful impact while advancing your career And more Ready to Join the LaunchTech Crew? If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you. LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
    $64k-87k yearly est. Auto-Apply 41d ago
  • Mid-Level Cyber/Watch Floor Analyst

    Noetic Strategies Inc.

    Information security analyst job in Huntsville, AL

    Job DescriptionJob Title: Mid-Level Cybersecurity/Watch floor Analyst Clearance: MUST CURRENTLY POSSESS AND ACTIVE TOP SECRET CLEARANCE Noetic is currently seeking a motivated and detail-oriented Mid-Level Cybersecurity/Watch Floor Analyst to join our growing security team. In this junior-level role, you will play a key part in protecting our organization's digital assets by assisting in the detection, analysis, and response to cybersecurity threats and incidents. The ideal candidate will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk. BASIC QUALIFICATIONS: Minimum of 5 year of Splunk/SOC experience. Bachelor's in a computer science related field Active Top Secret Clearance Ability and willingness to do shift work MAIN RESPONSIBILITIES: Responsible for monitoring computer networks for security issues. Investigating security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including firewalls and data encryption programs. Must be capable of conducting analysis, confirming intrusion information and creating a forensically sound duplicate of the files. Decrypts data and provides technical summaries and input. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs). PREFERRED QUALIFICATIONS Microsoft Sentinel GIAC Continuous Monitoring Certification (GMON) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GNFA) Noetic Strategies Inc. offers a competitive salary, an extensive benefits package and a work environment that encourages excellence. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Noetic Strategies Inc. is an equal opportunity and affirmative action employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status. Noetic Strategies Inc. endeavors to make ************************ accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact noeticstrategies.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. Powered by JazzHR 6IxgcPuXI3
    $64k-87k yearly est. 27d ago
  • Cyber Security Analyst

    Pmu Recruitment

    Information security analyst job in Alabama

    Cyber Security Analyst - (2400000X) Description AL-KHOBAR, KINGDOM OF SAUDI ARABIA Cyber Security Analyst Department Information Technology Institution Prince Mohammad bin Fahd University Reports to Manager - Cyber Security introduction The Cyber Security Analyst at Prince Mohammad bin Fahd University protects the university's digital assets, network, and data by identifying vulnerabilities, monitoring threats, and enforcing security measures. This role ensures compliance with security policies, supporting a safe environment for research and academic activities. Job Purpose The Cyber Security Analyst role is to safeguard the university's IT infrastructure by proactively monitoring, identifying, and addressing security threats. This position involves implementing security measures, responding to incidents, and ensuring compliance with security policies to protect data and maintain the integrity of university systems. The analyst plays a key role in supporting a secure environment for all digital and academic activities. Duties and Responsibilities Major Duties/ Responsibilities: · Monitor all networks and computer systems to prevent, detect, and investigate security breaches. · Perform penetration testing to ensure the company's networks are free of bugs that malware authors can take advantage of. · Design and implement multilevel security strategies to protect networks and data resources. · Plan computer and network security upgrades and test hardware and software related to the upgrade. · Stay up to date on new information technologies and apply those innovations in the company's security standards and best practices. · Lead analysis of current architecture, risk exposure and defining mitigation measures in order to develop suitable recommendations. · Highlight Cyber Security threats and prepare the official reports. · Lead assessments of company's security posture including benchmarking/maturity assessments. · Lead design of cyber security solutions and development of detailed technical specifications for the approved designs. · Lead implementation, integration and testing of approved security solutions. · Provide specialist technical support and address technical problems related to applications and production equipment to ensure any complex/escalated issues are handled with no or minimal downtime. · Oversee/perform preventive maintenance as per schedule to ensure relevant security systems/processes remain fit for purpose. · Provide subject matter expertise for cyber security related projects throughout its lifecycle to ensure delivery is as per plan/budget and client/TCC expectations. · Prepare and deliver technical presentations for successful project delivery · Lead cybersecurity evaluation and configuration review services · Anticipate future problem areas by monitoring workflows and network traffic patterns. · Prepare and perform cyber security awareness activities. · Prepare work papers documenting procedures performed and that fully support audit findings. · Assist IT operational audits in accordance with the annual audit plan. · Follows up the action plan progress (such as penetration tests, vulnerability scans) and ensures that recommendations are implemented in a timely manner · Assist staff members when they need help with security products and processes. Job-Specific Skills: · Working experience in a SOC or NOSC environment · Must have strong working knowledge of information technology, including applications, networks and systems. · Knowledge in performing IT Audit reports · Experience in performing Risk Assessments reports. · Experience in developing Business Continuity Plans and Disaster Recovery Plans · Knowledge in the usage of vulnerability assessment and penetration testing tools · Knowledge of security attacks techniques, familiar with MITRE ATT@CK framework · Experience in using MS Office, MS Visio, Project Management tool. · Experience in project management, problem-solving, training/coaching, presentation skills, and conflict resolution skills. · General knowledge of ISO 27001, ITIL or other control frameworks · Experience in writing SOP's - operation manuals · Independent, motivated, and ambitious personality Qualifications & Experience (Required) Bachelor's degree in computer science, technology or computer engineering 5 to 8 years of experience in progressively more complex and responsible operational roles within a dynamic Enterprise function Certified CompTIA Security+, CEH, CCNA, CCNP, CISSP (preferred) Experience in Cisco ASA, WatchGuard, Juniper, CheckPoint Firewall Knowledge of network and web protocols, and an in-depth knowledge of Linux/Unix tools and architecture Experience in Patch Management and vulnerably assessment. Knowledge and understanding of relevant legal and regulatory requirements. Knowledge of common information security management frameworks. Experience in Information Security and NCA controls implementation. Having experience in IT, Operational IT, Cybersecurity, incident detection, incident response, and forensics. Maintain quality service delivery by adhering to company standards and best practices. Strong attention to detail with an analytical mind and outstanding problem-solving skills. Familiarity with information technology concepts such as infrastructure, cyber security, and application controls. Great awareness of cybersecurity trends and hacking techniques. On-call network troubleshooting Knowledge, Skills and Abilities (Required) · Strong written and verbal communication skills · Strong focus on first time quality · Desire to grow technical skills and ability to learn new technologies swiftly · High attention to detail, self-starter, result driven · Ability to work in a cross-functional team · Professional, polite, and attentive while also being accurate · Always prepared and responsive, willing to meet each challenge directly · Teamwork · Problem solving, Leadership · Perseverance and motivation · Ability to work under pressure, Confidence · Managing ambiguity, Resilience · Analytical skills, IT skills Disclaimer PMU reserves the right to alter, amend and add responsibilities to this position in line with the institutional needs. Changes and amendments to this job description shall be within the academic framework and the general employment conditions. Primary Location: Al-KHOBARJob: AnalystOrganization: Information Technology DepartmentSchedule: Regular StandardJob Type: Full-time Job Posting: Feb 25, 2025, 9:10:34 AM
    $64k-87k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst 2

    Us Tech Solutions 4.4company rating

    Information security analyst job in Birmingham, AL

    + This position provides support to the Grid Operations and Planning Research area within client Company's Research & Development. + The engineer will support projects and in time lead efforts to deploy and evaluate the performance of emerging technologies in this arena. + The position is focused on cyber-physical security research for Transmission and Distribution. + The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches. + Data from various sources and analytics tools will be leveraged to develop models to characterize normal power system and cyber data to facilitate the identification of anomalous events. + Working knowledge of intrusion detection, risk assessment frameworks, databases, data structures, computer networking is required as well as an aptitude to apply engineering analysis to solve problems. **Description:** + This position supports the Schatz Grid Visualization and Analytics Center (SGVAC) within client Company's Research & Development department. + The SGVAC is an innovation center that facilitates the research, pre-operational development and assessment and demonstration of situational awareness technologies for Transmission and Distribution. + Areas of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform evaluation, data analytics as well as modeling and simulation including via a Real Time Digital Simulator (RTDS) with hardware-in-the-loop testing capability. **Qualification Requirements** + Experience in cybersecurity, including cyber security modeling and simulation + Experience with intrusion detection and risk assessment frameworks is required + Experience in power system modeling and simulation + Experience with data analytics including machine learning required + Experience with computer programming (Python, C#, SQL) desired **Job Responsibilities:** + Develop research plan to evaluate new technology + Manage multiple tasks at one time + Provide documentation of study assumptions and methods used to arrive at results + Provide informative reports and presentations on projects + Some overnight travel may be required but this is not extensive. **Other Knowledge, Skills & Abilities** + Must demonstrate good communication skills, both internal and external to the company + Must have excellent organizational skills + Must possess analytical skills as well as the ability to manage multiple projects simultaneously + Must work well in a team environment + Must have the ability to manage your own work schedule and work with limited direction + Must have strong initiative - a self-starter + Must be great at problem solving **Education:** + Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required + Advanced degree in EE, computer science or other related fields strongly preferred. **About US Tech Solutions:** US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit *********************** (*********************************** . US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $67k-89k yearly est. 60d+ ago
  • Data Security Analyst

    Exeter Government Servi 4.1company rating

    Information security analyst job in Fort Knox, KY

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies. Required Qualifications: Experience in administrative support & MS Office proficiency Bachelor's degree or 5 years of experience U.S. citizen and MUST possess a current active DoD Secret clearance Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $64k-88k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    OSC Global

    Information security analyst job in Radcliff, KY

    OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team. OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge. Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world. OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits. Position Overview The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks. Major Activities Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager. Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks. Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions. Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements. Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations Review and investigate security alerts and incidents from Microsoft 365 Defender Utilize eMASS to maintain and update POA&M status Review device compliance status from HBSS Work with other NEC Operations team members to remediate and mitigate security vulnerabilities. Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture. Perform other duties as appropriate and as assigned. Knowledge/Skills/Abilities Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months. Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management. Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills. Great analytical, critical thinking and problem-solving abilities. Superior presentation and negotiation skills. Strong management and organizational skills. Adaptable and capable of working in fast-paced environments. Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint Required Qualifications Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS Must possess appropriate DISA ESS certifications and experience. Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP) Must be US citizen Must possess active secret security clearance or higher Must be able to pass pre-employment background check Preferred Qualifications Bachelor's degree in IT, IM, or Cyber Security ACAS certification obtained within the last three (3) years, preferred HBSS Administrator certification obtained within the last three (3) years, preferred E-Verify: OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization. Reasonable Accommodation: OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
    $64k-88k yearly est. 22d ago
  • Cyber Assurance Analyst Senior Principal - Kwajalein Atoll -3801

    Range Generation Next LLC

    Information security analyst job in Huntsville, AL

    Ready to launch your career? RGNext operates, maintains, and sustains mission-critical systems to provide safe and effective launch, testing, and tracking of Department of Defense, civil, commercial and international space lift vehicles. We support ballistic missile, guided weapon and aeronautical tests and evaluations as well as support space situational awareness operations and experiments to defend the United States to ensure our nation's safety. Our employees serve on the forefront of global defense and space operations. We offer our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities. This position is located on Kwajalein Atoll, Republic of the Marshall Islands. Essential Functions Support the Reagan Test Site (RTS) Operations Center as Cyber Assurance Analyst Senior Principal in Kwajalein Atoll, Marshall Islands. Serve as the Senior Principal Cyber Assurance Analyst for the RETS Cybersecurity organization. Performs as the team lead for the Cyber Operations team located in both Kwajalein Atoll, Marshall Islands and Huntsville, AL. Directs strategic technical security compliance, leads all Cyber Operations functions, and communicates to RETS Cybersecurity leadership on RMF implementation and operational assurance across the RTS enterprise. Lead the investigatory efforts of all potential security violations, determining policy breaches, and directing the execution of the organization's Incident Response Plan to ensure timely and effective mitigation. Direct the Cyber Operation team's efforts in supporting, monitoring, assessing, validation, and verification of technical security compliance of all hardware and software security controls, ensuring resilience and continuous cybersecurity assurance of the network environment. Own, manage, and report technical compliance with applicable critical security notices from SMDC, NETCOM, C5ISR, and RETS Cybersecurity leadership. Provide direct technical leadership, mentorship, training, and workflow management for the Cyber Operations team, establishing best practices and ensuring consistent, high-quality execution of all defensive operations. Required Skills Exceptional coaching, mentorship, and team lead skills required to direct the Cyber Operations team and effectively articulate complex security risks to direct leadership. Direct information dissemination, task delegation, and workflow management for the Cyber Operations team. Expert ability to research, develop, and implement advanced technical security solutions for complex hardware and network infrastructures with high reliability and availability requirements. Proven technical writing proficiency in authoring high-level artifacts, including SOPs, technical reports, and essential RMF documentation. Highly proficient in the analysis, usage, remediation, and reporting of SIEM, IDS/IPS, and endpoint protection solutions (e.g., Trellix/Defender) for security effectiveness. Demonstrated expertise in the effective application and validation of DISA STIGs, STIG Checklists, and SRGs to establish and enforce security configuration baselines. Mastery in utilizing Tenable ACAS/Nessus for comprehensive vulnerability scanning, compliance reporting, and assessing cyber operations effectiveness. Comprehensive working knowledge of Army Regulation 25-1/2, DoD, DISA, and RMF requirements and guidance to ensure strategic program alignment and compliance. Required Experience Bachelor's Degree in Computer Science, Cybersecurity or related field. Ten (10) or more years related experience in Information Assurance, System Administration, or technical support of an Enterprise environment. Proven experience leading technical teams, including active mentorship and the ability to upskill staff through hands-on training and coaching. Proficient at communicating security concerns and issues to non-technical audiences. Must currently have and maintain one of the following DoD 8140, IAM Level III, certifications: Certified Chief Information Security Officer (C-CISO), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), or GIAC Security Leadership (GSLC). Additional Eligibility Qualifications Must be able to relocate to the United States Army Garrison, Kwajalein Atoll, Marshall Islands. Must be able to obtain and maintain a DoD Secret security clearance which requires U.S. Citizenship. Must be able to obtain and maintain a U.S. passport The flexibility to work occasional non-duty hours or on weekends to support specific project or mission requirements. Benefits of Working at RGNext RGNext offers our team of experienced, professional employees an environment of challenging, stimulating and personally and professionally rewarding career opportunities and growth. Employees enjoy a robust benefit package on day one, which includes medical, dental, vision, disability and life insurances, generous Paid Time Off and holiday pay, a retirement savings plan with a company match and vesting on day one! We are committed to providing employees a quality work/life balance in a productive, evolving environment. Note: This job description describes the general nature of the duties and requirements of the job. It is not intended to be an exhaustive list or to limit the supervisor's ability to modify work assignments as appropriate. RGNext is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, or any other applicable state or federal protected class.
    $74k-99k yearly est. Auto-Apply 21d ago
  • Advanced Acquisition Analyst/Cyber Security Analyst/CompTIA Certified

    Qed Analytics, Inc.

    Information security analyst job in Redstone Arsenal, AL

    Support the Missile Defense Agency (MDA) with development and analysis of programmatic data for program management support, to include monitoring and reporting against the acquisition program baselines, and assistance with program oversight and execution briefings. Alternative responsibilities may encompass development and execution of acquisition strategies/plans, contract requirements packages (e.g., writing SOWs, CDRLs, special provisions, source selection evaluation plans) and supporting prime contract monitoring/management activities. CompTIA Certification Preferred. Certified Authorization Professional (CAP) certification (or ability to attain within 90 days after employment) Provide interpretation and execution of MDA Acquisition policy, directives, guidance, and instructions Provide program management support in developing, maintaining, and reporting against program baselines, gathering and analyzing programmatic data for internal Agency oversight reviews of programs (e.g., MDAR, DPR, PER, PMRs, internal reviews) Prepare briefings and correspondence in response to internal taskings and external RFIs (e.g., GAO/Congressional/DoDIG/DoD oversight organizations) Analyze acquisition requirements and provide recommendations during pre-solicitation phase through contract execution Support program and contract management processes through the preparation and/or review of acquisition and program management documentation, briefings, white papers, reports, metrics Provide support through all phases of the acquisition cycle with an emphasis on cybersecurity throughout the process Requirements Prior MDA experience preferred. Advanced level - Master's degree required and/or 15 years' experience Intermediate level - Bachelor's degree required and/or 10 years' relevant experience Knowledge and experience in acquisition, procurement, and contracting highly desirable Solid background in MS Office tools suite (e.g., Word, Excel, PowerPoint, Access) essential Must possess exceptionally strong communications and analytical skills, be a self-starter, detail oriented, work well with a team, interacts with multiple levels and functional areas and able to manage customer and contractor relationship SECRET or above Security Clearance required.
    $64k-87k yearly est. 60d+ ago
  • Information Systems and Analytics (Cybersecurity), Professional Practice-Track Faculty

    MTSU Jobs

    Information security analyst job in Murfreesboro, TN

    Job Title Information Systems and Analytics (Cybersecurity), Professional Practice-Track Faculty Department Information Systems and Analytics University Expectation MTSU seeks candidates committed to innovative teaching and meaningful service. We also seek to attract culturally and academically diverse faculty who value working with diverse students. Salary The salary is commensurate with education and experience. Job Summary/Basic Function The Department of Information Systems and Analytics at Middle Tennessee State University invites applicants for a full-time professional practice-track faculty position in cybersecurity at the rank of assistant or associate professor. The start date for the position is August 1, 2026. Required Education A master's degree in information systems, cybersecurity, computer science or a closely related field is required by the appointment date. Required Related Experience Ten (10) years of professional experience in information technology, that includes experience in cybersecurity disciplines such as network security, ethical hacking/penetration testing, cyber analytics, incident response, or cyber defense. Other Desirables Applicants with demonstrated expertise in data analytics and curriculum development will receive special consideration. Documents Needed to Apply To successfully apply, applicants must include a cover letter, curriculum vitae, and statement of teaching philosophy as separate attachments at the time of online application. Special Instruction to Applicants For more information about serving as a faculty member at Middle Tennessee State University, please visit our faculty recruitment webpage. If you need help applying, please contact Mitzi Dunkley, Faculty Recruitment Specialist, at **************. If you have position-specific questions, please contact Melinda Korzaan at ************************. MTSU offers a comprehensive benefits package, including but not limited to the following: Sick Leave Vacation Leave for Administrative/Classified Staff/12-month Faculty 13 paid University holidays Medical, dental, vision, and life insurance Retirement plans Optional 401K and 403B Deferred Compensation Plans Educational benefits for the employee and their spouse and dependents Click here for additional information. MTSU is an equal opportunity employer. All qualified individuals are encouraged to apply. Proof of U.S. citizenship or eligibility for U.S. employment is required before employment (Immigration Control Act of 1986). Clery Act crime statistics for MTSU are available at *********************************************** or by contacting MTSU Public Safety at **************. MTSU is a Tobacco & Drug-Free campus. This position requires a criminal background check. Therefore, you will be required to provide information about your criminal history to be considered. For individuals requiring reasonable accommodation to apply: In compliance with the Americans with Disabilities Act Amendments Act (ADAAA), if you have a disability and would like to request an accommodation to apply for a position with MTSU, please call ************ or email ************. Application Review Date: 11/03/2025
    $76k-102k yearly est. Easy Apply 60d+ ago
  • Manager, Information Security

    Triton Health Systems

    Information security analyst job in Birmingham, AL

    Manager of Information Security Why VIVA HEALTH? VIVA HEALTH, part of the renowned University of Alabama at Birmingham (UAB) Health System, is a health maintenance organization providing quality, accessible health care. Our employees are a part of the communities they serve and proudly partner with members on their healthcare journeys. VIVA HEALTH has been recognized by Centers for Medicare & Medicaid Services (CMS) as a high-performing health plan and has been repeatedly ranked as one of the nation's Best Places to Work by Modern Healthcare. Benefits Comprehensive Health, Vision, and Dental Coverage 401(k) Savings Plan with company match and immediate vesting Paid Time Off (PTO) 9 Paid Holidays annually plus a Floating Holiday to use as you choose Tuition Assistance Flexible Spending Accounts Healthcare Reimbursement Account Paid Parental Leave Community Service Time Off Life Insurance and Disability Coverage Employee Wellness Program Training and Development Programs to develop new skills and reach career goals Employee Assistance Program See more about the benefits of working at Viva Health - ******************************************* Job Description The Manager of Information Security oversees and mentors a team of security engineers while remaining hands-on in designing, implementing, and monitoring security measures that safeguard the organization's digital assets. This individual will need a broad and strategic knowledge of principles, practices, and procedures in information security to plan, design, develop, execute, and support critical systems and projects. This role will lead the planning, design, enforcement, and audit of enterprise-wide security policies and procedures which safeguard the integrity of and access to enterprise systems, files, and data elements while actively engaging in tactical execution. This position will continuously assess, refine, and implement data security strategies proactively advising leadership with actionable risk assessments and security briefings. This individual evaluates and deploys emerging technologies, collaborates across IT Operations and Development, and strengthens organizational resilience by championing employee education, security culture, security best practice, and continuous improvement. This role drives value by balancing leadership responsibilities with direct technical contributions, ensuring scalable protection aligned with future business growth. Key Responsibilities Direct and actively contribute to day-to-day security operations. Perform hands on technical work in daily security operations while guiding team performance. Lead the development and enforcement of comprehensive, scalable security policies and frameworks. Recommend, implement, and optimize security protections across enterprise systems. Conduct and oversee vulnerability assessments, mitigation, and remediation strategies. Monitor and interpret threat intelligence using organizational tools. Research, identify, and deploy solutions that strengthen the organizations cyber defense posture. Detect, investigate, and resolve potential security breaches. Participate in the vetting and management of third-party vendors and business associates. Drive enterprise-wide risk assessments with quantifiable, business-aligned outcomes. REQUIRED QUALIFICATIONS: Bachelor's Degree in Information Systems or related field or equivalent work experience 7 years of I.T. environment experience with progressive responsibilities 3+ years management experience in I.T. Expertise in risk assessment tools, methodologies, and data-driven decision-making Proficiency of security platforms such as: endpoint detection and response (EDR), internet traffic for both onsite remote users, and intrusion prevention (IDS/IPS/DLP) Knowledge of databases (MSSQL/MongoDB/MySQL) Advanced skills in Azure cloud including Purview and Defender Hands on experience in penetration testing and vulnerability management Knowledge of firewall and intrusion detection/prevention protocols Proven ability to lead system administration and security across diverse environments (Windows, UNIX, Linux) Skilled in drafting, enforcing, and scaling security policies, standards, and procedures Strong communicator who can translate complex security risks into actionable business terms for executives Ability to read and use the results of mobile code, malicious code, and anti-virus software PREFERRED QUALIFICATIONS: CISSP, CISM, or equivalent advanced certifications Knowledge of disaster recovery, computer forensic tools, technologies, and methods Strong understanding of software development frameworks and code review Knowledge of virtualization technology
    $83k-121k yearly est. 11d ago
  • Temporary- Cyber Security Analyst

    Tennessee Board of Regents 4.0company rating

    Information security analyst job in Nashville, TN

    Title: Temporary - Cyber Security Analyst Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned. REQUIRED QUALIFICATIONS High School Diploma or GED One year of experience in information security and compliance regulations. Proficiency with Microsoft applications. PREFERRED QUALIFICATIONS Certificate in information security, i.e., Security+, Pen+, Ethical Hacker. Experience with SIEM (Microsoft Defender). Experience in phishing campaign/training. KNOWLEDGE, SKILLS AND ABILITIES Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels. Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures. Open Until Filled: Yes Rate of Pay: $20.00 per hour Work Hours: Up to 28 hours per week Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check. Nashville State offers flexible work arrangements for positions that qualify.
    $20 hourly 60d+ ago
  • Information Systems Security Officer (ISSO)

    DESE Research, Inc. 4.4company rating

    Information security analyst job in Huntsville, AL

    DESE Research, Inc. is excited for the opportunity to add an Information Systems Security Officer to our existing team. If you feel like you have the skills and qualifications for this position, please apply now! Job Details: The successful candidate will oversee day-to-day information system security operations including auditing hardware, software implementations, and risk assessments. The candidate will upkeep, monitor, analyze, and respond to network and security events. The candidate will ensure configuration management for security relevant IS software, hardware, and firmware are maintained and documented. The candidate will implement Risk Management Framework (RMF) security controls utilizing DISA Security Technical Implementation Guides (STIGs). Required Qualifications: * An active DOD Secret clearance * 5-10 years of experience in cyber security engineering/analysis, supply chain risk management, logistics, product management, program protection planning, or system security engineering * Experience with IS auditing and investigations * Knowledgeable of operating system security requirements * Hands-on experience with industry-standard Information Assurance tools * Security+ Certification * CompTIA CySA+ certification Required Education Qualifications: Bachelor's Degree in Cyber Security, an Engineering Discipline, Logistics, or Supply Chain Desired Qualifications: * Overall knowledge of Information Systems Security and ISSO duties * Working knowledge of system administration and network administration * Working knowledge of classified defense contracts * DoD 8570 IAM Level II Certification Why employee's love working for DESE: At DESE, we are committed to creating a company that is known for its respect and care for employee's. We understand that happy employees are what keeps our business going and we strive to provide the best opportunities for each individual working on our team! Here are a few reasons you will love working here: * Competitive salaries * Annual performance bonuses * Robust 401k profit sharing plan * Competitive health, dental & vision insurance with affordable premiums * Flexible work schedules * Two different flexible spending account options * Company paid life insurance & Accidental Death & Dismemberment * Education reimbursement program * Personal leave for approved philanthropic activities * Vacation, Sick & Holiday leave * Opportunities for internal promotions * Employee referral incentive program * Rewards and gifts for service anniversaries Disability Accommodation for Applicants - DESE Research, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following alternative email address or phone number to contact us about your interest in employment with us: ********************** or ************x123.
    $61k-81k yearly est. Easy Apply 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Spring Hill, TN?

The average information security analyst in Spring Hill, TN earns between $57,000 and $110,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Spring Hill, TN

$79,000
Job type you want
Full Time
Part Time
Internship
Temporary