Information Security Analyst
Information security analyst job in Chandler, AZ
STRATEGIC STAFFING SOLUTIONS HAS AN OPENING!
This is a Contract Opportunity with our company that MUST be worked on a W2 Only. No C2C eligibility for this position. Visa Sponsorship is Available! The details are below.
“Beware of scams. S3 never asks for money during its onboarding process.”
Job Title: Information Security Analyst
Location: Chandler, AZ 85286
Onsite Work
Contract Length: 6+ Months
Pay: 45-48 an hr on W2
Overview
We are seeking an Information Security Analysts to support a Central Access Provisioning team during a transition from a manual to an automated Identity and Access Management (IAM) environment. These roles will also provide flexible support across IAM Operations teams to address capacity needs resulting from workforce attrition and evolving operational demands.
The ideal candidates will have hands-on experience with IAM tools, strong foundational knowledge of authentication standards, and the ability to operate effectively in a regulated, security-focused environment.
Key Responsibilities
Support Identity and Access Management (IAM) operations, including access provisioning and related security processes.
Participate in low- to moderately complex information security initiatives and identify opportunities for process improvement.
Review, analyze, and resolve basic to intermediate information security assignments requiring research, evaluation, and selection of appropriate solutions.
Assist with low- to medium-risk deliverables in alignment with established policies, procedures, and compliance requirements.
Develop and present recommendations to address security-related issues, exercising independent judgment within defined guidelines.
Provide timely and accurate information to internal stakeholders and client personnel related to information security analysis.
Collaborate with cross-functional teams and interact effectively with multiple levels of leadership.
Manage priorities, meet deadlines, and deliver high-quality results in a fast-paced environment.
Required Qualifications
Minimum of 2 years of experience in Information Security Analysis or a related field, or equivalent experience demonstrated through a combination of work experience, consulting, training, military service, or education.
Hands-on experience with IAM tools, such as:
SailPoint
Okta
CyberArk
Ping
Microsoft Entra ID (Azure AD)
Working knowledge of authentication and identity standards, including:
LDAP
SAML
OAuth
OpenID
SCIM
Familiarity with security and compliance frameworks, such as ISO, NIST, SOX, and PCI.
Strong organizational skills with the ability to multitask and prioritize competing requests.
Customer-service mindset with a demonstrated ability to respond to requests in a timely and professional manner.
Proficiency in Microsoft Office applications, including Word, Excel, Outlook, PowerPoint, Access, and Project.
Information Security Analyst
Information security analyst job in Chandler, AZ
Our client is currently seeking a Information Security Engineer 3
***W2 only, No corp to corp - No 1099 - No 3rd party***
Information Security Engineer 3
Schedule: Friday-Monday, 10:30am-8:30pm AZT
Contract with potential to convert to full-time
Pay: $53-$57 HR
Role Overview
This role supports the Cyber Threat Fusion Center, specifically covering weekend operations. The consultant will work closely with threat analysts, incident responders, and engineering teams to monitor, investigate, and respond to security events across the enterprise.
There is potential for:
Full‑time conversion, and
Transition to the weekday team if a position opens due to promotion or movement.
Core Technical Skills (Required)
Splunk - SIEM monitoring, alert triage, dashboarding, log analysis
CrowdStrike Falcon - EDR investigation, threat hunting, incident response
Nice-to-Have Skills
FireEye - Malware and threat analysis
Palo Alto XSOAR - Case management and automation workflows
NetWitness - Network traffic analysis and packet investigation
Experience Requirements
2-3 years working in a Security Operations Center (SOC) or Cyber Threat Fusion Center
Hands-on experience with incident response, threat detection, and security monitoring
Additional Notes
Candidates must be willing to work the Friday-Monday schedule
Information Security Engineer 3 - Contingent
Information security analyst job in Chandler, AZ
This candidate will provide tuning support for Security AI for structured and unstructured scanning to executes data classification efficacy validation strategy.
This position will require that the candidate apply accurate feedback and prevent cascading misclassifications across thousands of columns.
Monitor tuning impact and ensure compliance alignment.
Maintain governance integrity and audit readiness.
Without this role, misclassifications could propagate unchecked, leading to compliance risks and poor data quality.
Key skills include data classification and semantic similarity of enterprise data, analytics and governance and platform technical awareness.
In this contingent resource assignment, candidate may:
Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute to large-scale planning related to Information Security Engineering deliverables.
Review and analyze moderately complex Information Security Engineering challenges that require an in-depth evaluation of variable factors.
Contribute to the resolution of moderately complex issues and consult with others to meet Information Security Engineering deliverables while leveraging solid understanding of the function, policies, procedures, and compliance requirements.
Collaborate with client personnel in Information Security Engineering.
Required Qualifications:
4 plus years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education.
Pay Range: $55-60$
The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
Information Security Engineer
Information security analyst job in Chandler, AZ
Role: Information Security Engineer
Contract: 12 months
Key Responsibilities)
Provide tuning and optimization support for Securiti AI data discovery and classification (structured & unstructured data).
Execute data classification efficacy validation strategies to ensure high accuracy and consistency.
Apply precise feedback mechanisms to prevent cascading misclassifications across thousands of columns and datasets.
Monitor and analyze tuning impact on classification results and ensure ongoing compliance alignment.
Maintain data governance integrity and support audit readiness.
Perform internal data scanning across servers and virtual machines.
Scan and analyze large-scale datasets (up to 100+ TB) across enterprise platforms.
Work with cloud-based data sources, primarily on AWS.
Collaborate with analytics, governance, security, and platform teams to align classification outcomes.
Support regulatory compliance efforts related to GDPR, SOX, and other data protection frameworks.
Utilize SQL or other database technologies to analyze, validate, and troubleshoot classification results.
Develop scripts and automation to support scanning, tuning, and reporting activities.
Required Skills & Qualifications
4-6 years of experience in data classification, data governance, or data analytics roles.
Hands-on experience with Securiti AI or similar data discovery and classification platforms.
Strong understanding of data classification techniques and semantic similarity across enterprise data.
Experience scanning structured and unstructured data at scale.
Proficiency in SQL and experience with relational or enterprise databases.
Experience working with cloud platforms, preferably AWS.
Knowledge of GDPR, SOX, or other data privacy and compliance regulations.
Strong problem-solving and analytical skills.
Experience with scripting (Python, Shell, or similar) for automation and analysis.
Ability to scan data from servers and virtual machines.
Nice-to-Have Skills
Experience with data governance frameworks and tools.
Familiarity with metadata management, data catalogs, and audit reporting.
Exposure to AI/ML-driven classification or NLP-based data discovery.
Prior experience in large-scale enterprise data environments.
“Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
Information Security Engineer
Information security analyst job in Phoenix, AZ
We're looking for an Information Security Engineer to join our team and help strengthen our endpoint, access, and compliance security posture across the organization. If you thrive in a fast-paced environment and enjoy solving complex security challenges, we'd love to connect.
🔐 Key Responsibilities
Support endpoint and access security across Windows and mac OS environments.
Review and validate privileged access requests using least-privilege principles.
Assist in developing and implementing security policies, elevation rules, and device configurations.
Troubleshoot security-related issues, including elevation failures and policy conflicts, using tools like BeyondTrust EPM.
Participate in compliance and governance initiatives, including secure analytics and data protection efforts.
Prepare clear documentation, meeting updates, and stakeholder communications.
Contribute to continuous improvements in cyber engineering and endpoint security.
💡 Ideal Candidate
Experience with endpoint security tools (e.g., BeyondTrust, EDR, MDM).
Strong understanding of access control, least-privilege frameworks, and security best practices.
Ability to collaborate with cross-functional teams and communicate effectively.
Curious, proactive, and ready to solve complex security problems.
Sr. Security Engineer
Information security analyst job in Scottsdale, AZ
My client seeking a Security Engineer with deep experience in Azure cloud environments and Fortinet security technologies. This role is responsible for strengthening the organization's cloud security posture, supporting defensive and offensive security initiatives, and ensuring ongoing compliance with SOC2 and GDPR requirements.
The ideal candidate has a strong foundation in Azure security architecture, hands-on experience deploying and managing FortiGate solutions in cloud environments, and a practical understanding of both blue-team and red-team methodologies.
This is a highly collaborative position in a fast-moving, multi-tenant environment, requiring strong technical judgment, attention to detail, and the ability to design secure solutions at scale.
Details:
$120k - $130k
Full-Time, Permanent Position
Scottsdale, AZ | 5 Days On-Site
Key Responsibilities:
Design, implement, and maintain security controls across Azure workloads, identities, networks, and data services.
Manage Azure security posture using Microsoft Defender for Cloud, Azure Policy, and associated tooling.
Ensure proper network segmentation, firewall enforcement, and secure connectivity across cloud environments.
Deploy, configure, and manage Fortinet technologies within Azure, including FortiGate firewalls and related services.
Optimize firewall rules, routing, logging, and monitoring to enhance threat visibility and reduce attack surface.
Support offensive-focused initiatives by identifying misconfigurations, modeling potential attack paths, and validating risks.
Support SOC2 control implementation, evidence collection, access reviews, and continuous compliance efforts.
Contribute to the development, documentation, and enforcement of security policies and procedures.
Support secure deployment pipelines, identity governance practices, and operational security improvements.
Participate in security architecture reviews for new systems and integrations.
Required Qualifications
5-7 years of experience in cloud security or cloud engineering roles.
5+ years of Azure experience, including networking, identity, governance, and security services
5+ years of experience with Fortinet, ideally FortiGate firewalls deployed in Azure.
Practical understanding of both defensive (blue team) and offensive (red team) security concepts.
Experience working within or supporting SOC2 programs.
Proficiency with scripting/automation (PowerShell or C#)
Good-to-Haves:
Exposure to DevSecOps practices, CI/CD pipeline hardening, or IaC security scanning.
Certifications such as AZ-500, SC-200, SC-300, Fortinet NSE certifications, or similar.
Exposure to GDBR
Oscar Associates Limited (US) is acting as an Employment Agency in relation to this vacancy.
Information Security Analyst 2
Information security analyst job in Chandler, AZ
This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices.
Essential Functions:
* Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration.
* Support data and asset risk.
* Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats.
* Address various security problems across a disperse set of assets.
* Other duties as assigned.
Qualifications:
* Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree
* 2+ years of progressive cybersecurity experience
* Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
Principal Security Information Analyst
Information security analyst job in Tempe, AZ
Principal Information Security Analyst (Tier 2)
As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization.
The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams.
In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance.
Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend.
Key Responsibilities:
Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity
Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms
Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools
Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency
Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements
Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities
Support the execution of incident response playbooks
Qualification and Work Experience:
3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis
Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis
Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks)
Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry)
Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation
Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies
Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP)
Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows
Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration
Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning
Effective communication and documentation skills in English, both written and verbal
Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects
Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred
Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage
#LI-AS1
Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds.
We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency.
To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
Auto-ApplyInformation Assurance Engineer
Information security analyst job in Scottsdale, AZ
Basic Qualifications
Requires a Bachelor's degree in Engineering, or a related Science, Technology or Mathematics field. Also requires 5+ years of job-related experience, or a Master's degree plus 3 years of job-related experience.
CLEARANCE REQUIREMENTS: Ability to obtain a Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
Responsibilities for this Position
General Dynamics Mission Systems has an immediate need for an Information Assurance Engineer in Scottsdale, AZ.
Knowledge, Skills and Abilities:
Strong security mindset and comfortable questioning system behavior that is inconsistent with key security principles
Self-directed/ self-starting ability
Skilled at executing complex tasks
Excellent ability in communicating issues, impacts, and corrective actions
Cybersecurity System Engineering, Risk Management Framework, Defense in Depth
Active cybersecurity certifications such as ISC2 CISSP (preferred), Security+, CEH
Ground to Satellite communication knowledge
Ground operations experience
Performs requirements analysis, requirements definition, requirements management, functional analysis, performance analysis, system design, detail trade studies under leadership of lead Cybersecurity System Engineer.
Performs customer requirements analysis, develops system requirements and defines allocations to lower levels (elements and components)
Performs detailed technical analyses for a subsystem or system elements
Develops and evaluates systems, networks and information systems to ensure designs meet applicable governmental security specifications
Secure Software Factory / Secure DevSecOps
System accreditation/certification evaluation and test support to ensure all technical security features (e.g., identification, authentication, access control, labeling, and auditing) of the system are considered and function properly
Contributes to the completion of major programs and projects
Plans and executes project tasks for activities described above
Demonstrates good judgment in selecting methods and techniques for obtaining solutions
Designs a complete and complex framework, system or product
Multi-level security domain expertise (and cross-domain)
Quickly (with a more agile light-weight approach) decomposing requirements to a level that can avoid requirements bloat (and communicate/track impacts)
People that may have a working relationship with related people from Iridium, SDA, Northrup, York, and Lockheed
People with agile program experience
Must be able to obtain a DoD Secret Clearance
#LI-Hybrid
Salary Note This estimate represents the typical salary range for this position based on experience and other factors (geographic location, etc.). Actual pay may vary. This job posting will remain open until the position is filled. Combined Salary Range USD $110,175.00 - USD $122,225.00 /Yr. Company Overview
General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 12,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high-performance team!
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyPrincipal Security Information Analyst
Information security analyst job in Tempe, AZ
Principal Information Security Analyst (Tier 2) As a Principal Information Security Analyst within Gen Digital's global Security Operations Center (SOC), you will play a key role in strengthening threat detection and response across the organization. The role focuses on improving SOC monitoring and detection processes through technical expertise, continuous development, and close collaboration with other security teams.
In this position, you will serve as a senior specialist, leading automation and detection engineering efforts, mentoring junior analysts and contributing to projects that enhance security visibility and overall SOC performance.
Operating in a follow-the-sun model, the SOC ensures 24/7 global coverage, with regional teams working during their respective business hours and sharing on-call responsibilities for weekend.
Key Responsibilities:
* Monitor, analyze, and correlate security alerts and events across multiple platforms (SIEM, WAF, EDR, email, cloud, network, and threat intelligence tools) to identify and validate suspicious or malicious activity
* Continuously develop and fine-tune detection rules, correlation searches, security policies, and dashboards to improve visibility, reduce false positives, and increase alert accuracy across security platforms
* Support and mentor Tier 1 analysts in alert triage, escalation quality, and use of tools
* Collaborate with security engineers on automation and enrichment initiatives to streamline operational workflows and improve detection efficiency
* Maintain complete and up-to-date documentation for all detection use cases, workflows and process improvements
* Participate in security projects and collaborate with internal stakeholders (e.g., Incident Response, Security Engineering, Application Security, and IT) to enhance detection coverage, visibility, and response capabilities
* Support the execution of incident response playbooks
Qualification and Work Experience:
* 3-5 years of hands-on experience in SOC operations, cybersecurity monitoring, or related areas such as detection engineering or threat analysis
* Solid understanding of networking concepts (TCP/IP, DNS, HTTP/S) and how they apply to security monitoring and threat analysis
* Strong knowledge of cybersecurity principles, common attack techniques, and threat types (e.g., phishing, malware, brute force, web application attacks)
* Proven experience working with security logs, alerts, and structured data across multiple platforms (SIEM, EDR, WAF, cloud, and network telemetry)
* Hands-on experience with SIEM platforms - Splunk preferred - including detection content development, rule tuning, and dashboard creation
* Familiarity with Web Application Firewall (WAF) technologies and the ability to analyze or tune related alerts and policies
* Understanding of cloud security concepts and experience with monitoring tools for major providers (AWS, Azure, GCP)
* Working knowledge of scripting or automation (e.g., Python, PowerShell, or API-based integrations) to support analysis and enrichment workflows
* Experience using AI-based tools to support daily SOC operations, including data analysis, investigation, documentation, and collaboration
* Strong analytical and problem-solving skills with attention to detail and curiosity for continuous learning
* Effective communication and documentation skills in English, both written and verbal
* Experience collaborating across teams (e.g., Security Engineering, Incident Response, Application Security) on detection improvements or automation projects
* Prior experience in a Security Operations Center (SOC) or similar environment is highly preferred
* Familiarity with the fintech environment or experience supporting financial services infrastructure is considered a strong advantage
#LI-AS1
Gen is proud to be an equal-opportunity employer, committed to diversity and inclusivity. We base employment decisions on merit, experience, and business needs, without considering race, color, national origin, age, religion, sex, pregnancy, genetic information, disability, medical condition, marital status, sexual orientation, gender identity or expression, military or veteran status, or other unlawful factors. Gen prohibits discrimination based on these protected characteristics and recruits talented candidates from diverse backgrounds.
We consider individuals with arrest and conviction records and do not discriminate against employees for discussing their own pay or that of other employees or applicants. Learn more about pay transparency.
To conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.
Auto-ApplyCyber Security Analyst
Information security analyst job in Phoenix, AZ
Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's
technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites.
Essential Functions:
* Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc.
* Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts.
* Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls.
* Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
* Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
* Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies.
* User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures.
* Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment.
* Performs other job related duties as assigned.
Required Qualifications:
To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary.
* High School diploma or equivalent (G.E.D.) prior to being hired;
* Valid Arizona Department of Transportation Driver's License;
* Minimum of one year of experience in information security, network security, or a related technology field.
* Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services.
* Experience with security tools, including SIEM, antivirus software, and intrusion detection systems.
* Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card.
Preferred Qualifications:
It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position.
* Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise.
* Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP.
* Experience working in an educational or public sector environment.
* Knowledge of emerging security technologies and trends.
* Experience administering a Cisco Local and Wide area networking environment;
* Experience with border network security devices such as Email filters and Firewalls;
* Experience administering Windows Server and Active Directory.
* Experience with VMWare and Veeam (or other backup and recovery platform)
Knowledge and Skills Required:
To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Skills required, but not limited to, for this position include:
* Ability to work independently and collaboratively in a team environment.
* Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
* Familiarity with scripting languages like Python or PowerShell for automating security tasks.
* Knowledge of common security frameworks, such as NIST.
* Understanding of networking concepts, firewalls, and data encryption techniques.
* Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences.
* Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities.
* Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack.
Physical Requirements:
The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus.
Working Conditions:
The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels.
The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
CORP-Information Security Specialist
Information security analyst job in Tempe, AZ
The Information Security Specialist is responsible for providing leadership in securing university data and
systems. They will assist in developing policies and training programs to guide user activities; work
closely with the ITS Management team to develop recommendations for system controls and
monitoring to ensure the integrity and safety of university systems and data; and they will perform
regular audits to ensure alignment with departmental standards and university policies.
The Information Security Specialist works as a member of the Information Security Services OR
Infrastructure Services team and is charged to understand the goals/objectives of the university and ITS
division, and to provide collaborative leadership to university users to ensure that all members of the
user community understand their roles/responsibilities and are positioned for success in securing
institutional and student data.
Core Values:
Deliver Delight Every Time - We keep learner success at the center of every interaction to provide
exceptional service and a delightful student experience.
● Value each student and employee interaction.
● Provide the best service externally to students and internally to one another.
● Make decisions that reflect a commitment to students' welfare and success.
Continuously Improve - As lifelong learners, we intentionally find opportunities to grow and improve,
both as individuals and as an organization.
● Take time to develop and practice relevant skills and behaviors.
● Dig deeper into systems, data, and processes to understand problems and create impactful
solutions.
● Welcome challenges and feedback.
Win Together - We act with integrity, empathy, and transparency while assuming positive intent in each
other's communications and decisions.
● Seek understanding from one another first, over-responding.
● Recognize how words and actions impact our students, employees, and the organization as a
whole.
● Provide constructive feedback and avoid gossip.
Trust and Be Trusted - We take ownership of our responsibilities and actions to students and colleagues.
● Keep commitments and deliver results on time to teams.
● Comply with policies and procedures.
● Proactively find solutions to issues.
Own it - We navigate challenges and celebrate successes together as a diverse community.
● Collaborate to solve issues and build solutions in the best interest of the organization and our
stakeholders.
● Recognize roadblocks and celebrate achievements.
● Utilize a diversity of perspectives through sharing knowledge and resources.
Responsibilities:
Leadership
Provide cross-functional team leadership across all ITS teams in information security policies, standards,
and procedures.
Establish and conduct information security/data integrity training for all stakeholders of the university
community.
Demonstrate a positive attitude and set an example for direct reports and colleagues.
Information Security
Research and provide recommendations for the design, development, testing, implementation, and
management of security protocols, procedures, system measures, and audits to ensure physical and
logical security of network, data center, cloud and enterprise system architectures.
Document, distribute, and maintain security policies and procedures.
Monitor and analyze system security information to provide actionable data to ITS Leadership team.
Document and maintain incident response plans.
Document and maintain Disaster Recovery and Business Continuity plans.
Document and maintain Change Management policies, standards, and procedures and monitor
system/infrastructure management to ensure compliance.
Coordinate with the Infrastructure Services Team to monitor, analyze, and provide recommendations
for shaping network traffic.
Develop and maintain information security documentation in accordance with defined ITS standards
within 3 business days of any approved changes.
Monitor emerging information security threats and collaborate with ITS Leadership team to deploy
appropriate security measures in accordance with ITS Change Management process.
Monitor system access procedures to ensure alignment with defined system governance standards that
protect the integrity and security of all university data.
Perform regular (at least quarterly) system access audits for all enterprise systems.
Consultancy
Work with ITS teams, project teams, and institutional leadership teams in problem analysis, solution
identification, implementation, and delivery activities.
Work closely with ITS teams and campus customers to understand project requirements and
recommend sustainable solutions that meet defined business and academic needs while accounting for
information security.
Serve as technical contact for information security analysis.
Respond to assigned user support requests within 1 business day.
Diagnose and resolve at least 90% of assigned Help Desk tickets within 3 business days.
Planning and Organizing
Coordinate with the Infrastructure Services team to develop network, data center, cloud and systems
design specs and diagrams to plan and illustrate sustainable technical solutions that account for
appropriate physical and logical security.
Work with ITS Leadership and teams to establish appropriate project timelines to deliver sustainable
solutions within approved time and budget parameters.
Independently manage assigned tasks and project components.
Plan and account for physical and logical security/integrity in all projects.
Demonstrate attention to detail.
Information Processing & Decision Making
Prioritize allocation of time and resources in accordance with defined university and departmental
priorities.
Actively look to maximize existing university investments and leverage existing systems to solve
identified business problems.
Work with ITS teams and customers to identify and understand functional requirements of network,
data center, and enterprise applications.
Actively look to automate repetitive manual processes.
Identify potential impacts of new systems/processes or changes to existing systems/processes and
provide technical expertise to ensure operational reliability and information security.
Coordinate with other ITS staff, functional users, and appropriate vendors to account for security
(physical and logical), sustainability, disaster recovery, and business continuity measures in all solutions.
Work with ITS teams, project teams, and institutional leadership teams in problem analysis, solution
identification, implementation, and delivery activities.
Work closely with ITS teams and campus customers to understand project requirements and
recommend sustainable solutions that meet defined business and academic needs.
Communication
Interpret meaning and importance of information. Determine appropriate need and method for
keeping team members, customers/stakeholders, and management informed.
Utilize plain language in all verbal and written communication.
Keep policy, project, communication, testing, and training documentation updated using defined
standards within 3 business days of approved changes.
Document systems and processes in accordance with defined standards within 3 business days of
approved changes.
Work with ITS Management and teams to develop polices and standards and ensure compliance.
Be engaged and participate in individual discussions, project and team meetings.
Problem Solving
Establish working partnerships with ITS teams and external partners to coordinate problem resolution
for operational issues, and analyze root cause issues to address underlying problems.
Work with the ITS User Support Services team to identify common issues and develop appropriate
documentation, training, and/or tip sheets for campus users.
Develop “as is” and “to be” diagrams to visually represent challenges, risks, and opportunities for
information security improvements.
*Other special projects, duties, and responsibilities as assigned.
Requirements:
Experience
& Skills
3-5 years of progressive experience with network and/or data center security.
3-5 years of progressive experience in systems deployment and associated security
measures.
1-3 years of progressive experience in FERPA, HIPAA, PCI and/or similar industry
security standards.
Education Bachelor's degree in computer science, or equivalent combination of education and
experience.
Advanced degree highly preferred.
IT Security certifications (CISA, CISM, CISSP, etc.) highly preferred.
Interpersonal
Skills
Excellent verbal and written communication skills
Excellent critical thinking and problem solving skills.
Positive attitude and solutions oriented thinking.
Ability to communicate technical concepts to both technical and non-technical
audiences.
Other Skills MS Word
MS Excel
Project management tools
Workflow diagramming tools
Physical Demands/Work Environment:
● Ability to work in a virtual environment using software technology including but not limited to
virtual meeting tools, such as Zoom, Instant Messaging, Canvas Learning Management System
(LMS).
● The ability to efficiently operate a computer and its peripheral equipment (keyboard, mouse,
etc.).
● Ability to sit or stand for six to eight hours.
● Ability to work at least 40 hours a week.
EEO and Accessibility Statement:
Bryan University is an equal-opportunity employer committed to providing a welcoming and inclusive
work environment for all. We do not discriminate based on race, color, religion, sex, national origin, age,
disability, or any other legally protected status. We are committed to building and developing a diverse
environment where a variety of ideas, cultures and perspectives can thrive. We provide reasonable
accommodations to individuals with disabilities and strive to ensure accessibility in our facilities,
products, and services.
Auto-ApplySenior Security Analyst (L2)
Information security analyst job in Scottsdale, AZ
L2 Security Analyst
Full-Time, Exempt
We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Auto-ApplyCyber Resilience Specialist
Information security analyst job in Phoenix, AZ
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery.
What You'll Do
* Lead and facilitate Business Impact Assessments (BIAs) across business units
* Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems
* Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience
* Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles
* Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews
* Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations
* Support program governance, metrics, training, and awareness efforts
What You'll Bring
* 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting
* Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning
* Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms)
* Experience supporting risk assessments and regulatory audits
* Excellent facilitation and stakeholder management skills
* Strong writing skills to produce clear, client-ready plans and reports
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
#LI-MS12
Easy ApplySecurity Analyst
Information security analyst job in Phoenix, AZ
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
• Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
• Collabera listed in GS 100 - recognized for excellence and maturity
• Collabera named among the Top 500 Diversity Owned Businesses
• Collabera listed in GS 100 & ranked among top 10 service providers
• Collabera was ranked:
• 32 in the Top 100 Large Businesses in the U.S
• 18 in Top 500 Diversity Owned Businesses in the U.S
• 3 in the Top 100 Diversity Owned Businesses in New Jersey
• 3 in the Top 100 Privately-held Businesses in New Jersey
• 66th on FinTech 100
• 35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Position Details:
Job Title : Security Analyst
Work Location : 3202 W Behrend Dr., Phoenix, AZ - 85027
Duration : 12+ Months (Possible Extension)
Job Description:
• 2-3 years experience in direct development of Java or .NET web applications with a SQL database.
• Required to have 1-2 years hands-on experience performing real-world software vulnerability assessments using blackbox and whitebox tools.
• Must have implemented secure software development techniques.
• Completed software vulnerability training with blackbox/whitebox tool exposure.
• Strong understanding of "OWASP top 10" vulnerabilities and how to remediate them.
• Excellent verbal and written communication skills and ability to work with and provide guidance to software development teams.
• Experienced conducting vulnerability report debrief sessions with software development teams.
• Broad understanding of the IT systems, technologies, and solutions, and how security controls integrate with these systems.
• Expertise with security technologies such as various penetration testing frameworks, vulnerability scanners, and source code scanners.
• Experienced working with Eclipse IDE and/or .NET IDE.
• Experienced working with Source Management systems.
Additional Information
Hiring Manager is available to interview ASAP.
If you are interested with the Opportunity please reach me ************
Security Analyst
Information security analyst job in Scottsdale, AZ
Link Technologies is seeking a Software Development Architect for a well-established client in Scottsdale, AZ. Established in 2000, Link Technologies has provided professional services in the areas of Information Technology, Engineering, Business Support, Project Management, and Cyber Security/Information Assurance to some of America's top Corporations and Government Agencies at the Federal, State, and Local level. Seeking a Security Analyst for a 6-month contract to hire with a well-established client in the Scottsdale, AZ area
Job Description
Position Description:
The Security Analyst is a member of the security team and performs technical activities for delivering effective host, network, data and application security services. This position will have primary responsibility for security platforms in the production and test environments and will monitor and maintain network and computer security policies with a focus on managing vulnerabilities.
Major Areas of Responsibility:
·
Assists in planning, directing and coordinating activities, specifically relative to Information Security
·
Assists in developing and enforcing the organization's security policies, standards, and guidelines, security awareness, security information portion of the business continuity and disaster recovery plans, and all industry and government compliance issues
·
Assists in incorporating the design, deployment, management, control, and updating of platform and user-specific security policies on a diverse range of internal hardware platforms supporting various software and operating systems
·
Conducts risk management analysis to identify areas of risk and to develop security measures to prevent losses
·
Monitors use of data files and regulate access to safeguard information in computer files.
·
Works with business owners, IT managers, staff, and vendors in order to provide timely and efficient IT coordination of security services to meet the needs
·
Create reports on status of information security programs and projects, as required
·
Communicates with senior executives through oral and written reports and presentations, as required
·
Develops and implements IT system security plans, projects and initiatives
·
Plans, implements, manages, and coordinates security measures and controls for information systems to regulate access to computer data and prevent unauthorized modification, destruction, or disclosure of information
Qualifications
Requirements:
• Bachelor degree or equivalent experience in engineering, technology, or related field
• Minimum 2 years security experience
• Extensive background with Nessus Vulnerability Scanner
• Understanding of PEN testing performance and remediation
• Experience with Microsoft Advanced Threat Analytics
• Ability to create dashboards in Splunk Analytics
• Solid understanding of Cisco ASA
• Experience in identifying network security vulnerabilities
• Willingness to respond swiftly and effectively to network security events
• Must work well in a team environment
• Must be self-motivated and able to work independently
• Experience at working both independently and in a team-oriented, collaborative environment is essential
• Can conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities
• Reacts to project adjustments and alterations promptly and efficiently
Working Conditions:
• Expected work hours are Monday through Friday, regular business hours
• Some travel required; may be extensive depending on project
• Flexible during times of change
Additional Information:
• All candidates must be legally eligible to work for any employer in the United States without sponsorship or a third party employer
• This role is on-site; remote work is not an option unless otherwise specified
Additional Information
All your information will be kept confidential according to EEO guidelines.
Engineer, Information Security and Risk
Information security analyst job in Phoenix, AZ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Systems Engineer
Information security analyst job in Chandler, AZ
Discover your exciting role The Security Systems Engineer designs and implements security solutions to protect facilities, identifies vulnerabilities, and develops strategies to prevent unauthorized access, ensuring effective risk mitigation and compliance with security standards.
Explore your tasks and responsibilities
* Design and implement integrated security systems tailored for advanced technology and cleanroom environments.
* Identify and assess vulnerabilities specific to sensitive facility operations and controlled environments.
* Conduct comprehensive threat, risk, and vulnerability assessments for high-value assets and critical infrastructure.
* Specify and deploy appropriate security devices and controls that do not compromise cleanroom protocols.
* Consult with stakeholders on security requirements, best practices, and regulatory compliance.
* Develop strategies to prevent unauthorized access while maintaining operational continuity.
* Ensure all security solutions meet industry standards, facility-specific guidelines, and cleanroom requirements.
* Collaborate with internal teams, external vendors, and facility managers to deliver effective technical solutions.
* Support both large-scale and small-scale security projects, from design through commissioning and validation.
* Prepare and maintain detailed documentation for security system designs, installations, and compliance audits.
* Other duties as assigned
Show your expertise
Minimum Required
* Bachelor's degree in Engineering or a related field.
* 2-5 years of experience as a Security Systems Engineer or in a similar role, preferably in advanced technology or cleanroom facilities.
Preferred
* Relevant certifications (e.g., CISSP, PSP, or similar) are highly desirable.
* Prior experience as a consulting engineer preferred
* Prior experience with Advanced Technology
* Experience working within a team environment
* Experience in the quality control review process
* Experience contributing to continuous improvement processes
Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time.
Non-Solicitation: We are not currently accepting third-party agency candidates for this position. Any agency candidate submitted to any employee of Exyte may be contacted by Exyte without obligation to the third-party agency.
Exyte US, Inc. is proud to be an Affirmative Action and Equal Employment Opportunity employer that is committed to celebrating diversity and supporting an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance. We prohibit discrimination and harassment of any kind based on race, color, religion, age, sex (e.g., pregnancy, childbirth and related medical conditions, sexual orientation, gender identity or expression), national origin, disability status, genetic information, protected veteran status, or any other protected characteristic as outlined by federal, state, or local laws.
Contact:
You want to be part of the Exyte team? We look forward to receiving your application!
For further questions and information, please do not hesitate to contact Phillip Turner via E-Mail at ************************
Please note that we only consider applications submitted through our application portal. Applications sent via email will not be considered due to data protection regulations.
Easy ApplyInformation Security Analyst 2
Information security analyst job in Chandler, AZ
Summary: This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices.
Essential Functions: * Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration.
* Support data and asset risk.
* Use data collected from a variety of cyber defense tools (e.
g.
, Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats.
* Address various security problems across a disperse set of assets.
* Other duties as assigned.
Qualifications: * Bachelor's Degree in Computer Science, Computer Information Systems or related field.
May consider equivalent work experience in lieu of degree * 2+ years of progressive cybersecurity experience * Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets Full-Time
Senior Security Analyst (L2)
Information security analyst job in Scottsdale, AZ
Job Description
L2 Security Analyst
Full-Time, Exempt
We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Powered by JazzHR
6oXedfgOJk