Post job

Information security analyst jobs in Traverse City, MI

- 236 jobs
All
Information Security Analyst
Information Systems Security Officer
Cyber Security Engineer
Security System Engineer
Information Systems Security Manager
Senior Cyber Security Analyst
Security Architect
Information Technology Analyst
Cyber Security Analyst
Information Security Manager
  • Cyber Security Engineer

    Mars Solutions Group 4.7company rating

    Information security analyst job in Milwaukee, WI

    We're seeking a senior cybersecurity engineer to design, build, and operationalize enterprise grade data protection capabilities anchored in Microsoft E5. You will lead engineering for Microsoft Purview (Information Protection & DLP, eDiscovery/Audit), Sensitivity Labels, and related guardrails-integrating telemetry and enforcement through Zscaler, CrowdStrike, and Splunk. This role bridges secure-by-default platform engineering with pragmatic automation to protect regulated data (e.g., PHI/PII) at scale. Senior leadership has prioritized accelerating Copilot and E5 controls adoption, creating a high impact opportunity to shape how we protect data across SaaS and AI workloads. What You'll Do Engineer secure-by-default E5 data protection • Design and implement Microsoft Purview DLP policies (endpoint, Exchange, SharePoint, OneDrive, Teams) and Sensitivity Label taxonomy with automated enforcement paths. • Build policy-as-code pipelines (CI/CD) to version, test, and deploy DLP rules, label configs, and governance artifacts in multiple environments. Integrate Zscaler, CrowdStrike, and Splunk • Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics, dashboards, and detections that close visibility and enforcement loops. • Leverage CrowdStrike telemetry (e.g., Falcon/Shield) to correlate endpoint behaviors with data movement signals for insider risk and exfiltration use cases. Build automations & guardrails • Develop services and workflows (e.g., Azure Functions, Logic Apps, Graph API) to auto remediate mislabels, revoke risky shares, and notify data owners. • Implement secure-by-default configuration baselines and drift detection for E5 security controls (MCAS/Defender for Cloud Apps, Conditional Access, etc.). Operate and continuously improve • Own reliability for data protection pipelines: SLIs/SLOs, runbooks, and incident playbooks in partnership with Insider Risk team. • Create Splunk content (data models, dashboards, correlation searches) aligned to exfiltration, anomalous access, and label violations. • Partner with Privacy and Compliance for audit ready controls (eDiscovery/Audit), evidence, and exception processes. Collaborate across security & platform teams • Work with PSO, IAM, and Insider Risk to align label taxonomy and enforcement with business workflows and least privilege access. • Provide technical leadership and mentoring for engineers/analysts rolling out new E5 features and operational support. Required Qualifications • 5+ years engineering experience in enterprise security or platform engineering; hands-on with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). • Proven expertise building policy as code for DLP/labels (GitHub/Azure DevOps), and automating Graph/PowerShell administration. • Demonstrated ability to design secure-by-default guardrails and support rapid SaaS/AI adoption (including Copilot) without compromising compliance. Nice to Have • Strong background in data protection for regulated data (PII/PHI), insider risk detection, and evidence driven investigations. • Production experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (TA configs, CIM, correlation searches). • Experience migrating from legacy DLP (e.g., Forcepoint) to Microsoft DLP; building vendor neutral dictionaries and detection logic. • Familiarity with MCAS/Defender for Cloud Apps, conditional access policies, and SSPM evaluations. • Background in HIPAA/PHI audit support and exception governance workflows. Success Metrics (first 6-12 months) • DLP policy efficacy: reduction in unauthorized shares/exports; mean time to remediate violations. • Label coverage & accuracy: % of sensitive content labelled; false positive/negative rate trends. • Telemetry integration: end-to-end event flow (Purview → Zscaler/CrowdStrike → Splunk) with actionable detections. • Secure-by-default adoption: # of guardrails implemented; drift detected/resolved; Copilot controls baselined. • Audit readiness: evidence completeness for eDiscovery/Audit; exception closure rates. Tools & Technologies (primary) • Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk • Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) • Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps • Data flows: Exchange/SharePoint/OneDrive/Slack, endpoints, web proxies, CASB/SSE
    $96k-116k yearly est. 2d ago
  • Cyber Security Engineer

    Central Transport 4.7company rating

    Information security analyst job in Sterling Heights, MI

    We are seeking a skilled Cybersecurity Engineer to design, implement, and maintain robust security solutions to protect our organization's digital assets. The ideal candidate will have real-world experience with current firewall technologies, Threat detection, vulnerability management, endpoint and network security. Key Responsibilities: Configure, maintain, and manage security tools such as firewalls, SIEM, DLP, Email and endpoint protection. Plan and implement network segmentation policies to enhance security and optimize network performance. Conduct regular vulnerability assessments and recommend and implement remediation actions. Collaborate with IT teams to ensure secure network architecture and system hardening. Develop and maintain security policies, procedures, and documentation. Stay updated on emerging threats, vulnerabilities, and industry best practices. Provide guidance on security awareness and best practices. Implement and manage security controls for Microsoft 365 Technical Skills: Deep knowledge of network security principles, including firewalls, VPNs, IDS/IPS (Intrusion Detection/Prevention Systems), and network segmentation. Experience with cloud security (AWS, Azure, Google Cloud). Cryptography: Strong understanding of cryptographic principles, including encryption, hashing, and Public Key Infrastructure (PKI). Incident Response: Knowledge of incident response methodologies, digital forensics, and disaster recovery. Familiarity with email security solutions, threat prevention, and anti-phishing, anti-spam, and encryption tools. Preferred: 5+ years of experience in cybersecurity engineering or related roles. Relevant certifications preferred (e.g., CISSP, CEH, GIAC). Excellent analytical, problem-solving, and communication skills. Scripting or automation skills (Python, PowerShell). Benefits: Competitive compensation (based on experience). Health, dental, and vision benefits Paid time off 410k program Career growth opportunities and training in new technologies.
    $78k-99k yearly est. 3d ago
  • Information System Security Manager

    Insight Global

    Information security analyst job in Warren, MI

    Day to Day: Insight Global is looking for an ISSM to work for a DoD customer based out of Warren, MI. The ISSM will provide support in the following areas: Provide guidance to ISSOs, Information Technology team members, and the system owner regarding goals and objectives that will minimize the organizational risk present in the system Compose, distribute, and execute local policies and procedures that will ensure system compliance with DoD RMF controls. These policies include, but are not limited to: Vulnerability management POA&M management Personnel onboarding and offboarding Incident response Provide advisory to management regarding changes that may impact the security posture of the system Preparation and submission of system security plans to upstream accrediting organizations Must Haves: Previous experience working as an ISSM for 3+ years Strong Risk Management Framework (RMF) experience Excellent written and verbal communication skills Strong familiarity with NIST publications Understanding of common operating systems, network technologies, and security tools Secret Clearance
    $87k-119k yearly est. 1d ago
  • Senior Cyber Security Engineer - 4825

    Tier4 Group

    Information security analyst job in Milwaukee, WI

    About the Role Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale. Key Responsibilities Engineer Secure-by-Default E5 Data Protection Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams. Develop and maintain Sensitivity Label taxonomy with automated enforcement paths. Build Policy-as-Code Pipelines Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments. Integrate Security Telemetry Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection. Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios. Develop Automations & Guardrails Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners. Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.). Operate and Continuously Improve Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks. Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations. Collaborate Across Teams Partner with Privacy and Compliance for audit-ready controls and evidence processes. Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows. Provide technical leadership and mentorship for engineers and analysts implementing new E5 features. Required Qualifications 5+ years of experience in enterprise security or platform engineering. Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell. Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot. Preferred Qualifications Strong background in data protection for regulated data (PII/PHI) and insider-risk detection. Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches). Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies. Knowledge of HIPAA/PHI audit support and exception governance workflows. Success Metrics (First 6-12 Months) Improved DLP policy efficacy and reduced unauthorized data movement. Increased label coverage and accuracy for sensitive content. End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk. Secure-by-default adoption and Copilot controls baselined. Audit readiness with complete evidence and exception closure rates. Tools & Technologies Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
    $81k-110k yearly est. 22h ago
  • Senior Platform Cyber Security Engineer

    The Panther Group 3.9company rating

    Information security analyst job in Sterling Heights, MI

    The Panther Group is hiring a W2 Contract To Hire Senior Platform Cyber Security Engineer with one of our partners supporting the Department of Defense. This role requires an Active Security Clearance. This role is onsite in Sterling Heights, MI. Job Summary The function of this position is to support the Cyber and Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) section with responsibility for Cyber architecture, technology, evaluation, testing and compliance across the US market and support the delivery of products and services to Ground Combat Platforms. This is an engineering management position to broadly execute guidance from platform Chief Engineer, Systems Engineering Manager, and functional management. This position will require a US security clearance. Responsibilities to Anticipate/Expect: Exercise authority and responsibility for Cyber and tasks to help integrate cross-functional technical scope within schedule and other constraints. Help project team to ensure a balanced, integrated, and compliant Cyber design across the vehicle system. Manage/support the identification, development and implementation of platform cyber-physical design best practices, tools and education across the entire engineering enterprise. This will be done with a cross functional team of engineering and program disciplines and form the basis for developing a cyber security culture within the engineering organization. Develop and manage System requirements and interface allocations including Performance and Space, weight and Power-Cooling, Reliability and Maintenance SWaP-CRaM), and enforce across the design team; develop system specification requirements compliance documentation Manage and coordinate requirements, architectures and system designs and any changes, conditions, inputs and final resolution for requirements, trades, and alternatives Manage, develop, support and conduct trade studies/structured decisions for system and subsystem design including system-level impacts to include balance of space, weight, power, cost, reliability, and performance across a Cyber vehicle suite Oversee/support development of verification plans and manage their execution including test and production and field site shakedown and verification Participate in and lead design and integration troubleshooting/Root Cause Corrective Action (RCCA) and problem report/test incident resolution for production, development, test, or modification projects Develop and evaluate checkpoint and design milestone artifacts and Contract Data Requirements List (CDRLs) and review to ensure technical accuracy and compliance with contract requirements Coordinate with platform Design Integrated Product Teams (IPTs) where interface is required, such as in threat analysis, interface development and requirements decomposition and compliance Evaluate new Cyber and C5ISR technologies for potential use on products Manage and participate in peer reviews Position Requirements: (Candidates will be considered on the aggregate of the position requirements, it is not required that candidates possess experience in all categories):Bachelor of Science in Engineering, related science or equivalent (Relevant cyber technical certificates and management credentials will be considered) Minimum of 7+ years' experience Experience with engineering and/or military projects Experience with Cameo Systems Modeler and modeling languages such as SysML Experience with embedded system engineering Cyber space. Experience with Threat Analysis and Risk Assessment (TARA) Experience with Cyber Tabletop Exercise (CTTX) drills Ensure compliance with federal regulations and standards, including NIST SP 800-37 and NIST SP 800-53, RMF. Prepare and maintain System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and other required documentation. Experience leading teams in technical development projects Experience in military vehicle development and integration Experience in interpreting higher level customer requirements and flowing them down to technology areas Experience in developing and managing system level cyber requirements Familiarity with various electrical line replaceable units and the development and troubleshooting of electronic hardware Experience with cyber warfare, offensive and/or defensive Experience with embedded systems, automotive and military related Experience with software and computer science principles Familiarity with cyber physical system security requirements Familiarity with Microsoft Office software (Word, Excel, PowerPoint, Visio, Project) Ability to travel (mostly domestic, some international) up to 15% This position will require a US security clearance. This position may require the candidate to be able to climb on/off, work in, and work around military vehicles is desired. Must be able to pass ASR test (Anthropometric Size Requirement for confined space)
    $82k-113k yearly est. 4d ago
  • Information Technology Analyst

    DRS It Solutions Inc. 4.6company rating

    Information security analyst job in Lansing, MI

    Candidate must be a US Citizen, local to Michigan Candidate must be willing to work in our W2/1099 - No C2C/ Vendor referrals Need: The position is responsible for providing ongoing maintenance and support for VERA and other vital records MDHHS applications supported within our department. VERA is a Tier 1 critical system that processes the statewide birth, marriage, divorce, paternity, and death information and certification. The resource is integral to supporting and improving MDHHS automated processes, streamlining critical business processes, data integrity, SEM/SUITE compliance, and securing the applications. As a lead, the resource participates in a variety of assignments that provides for the enhancement, integration, maintenance, and implementation of projects. The resource also provides application oversight to business analysts in the team that support other applications including VERA. Not having a resource on staff will lead to unfulfillment of MDHS projects for the fiscal year 2026. Summary: • Write high level functional requirement documents • Perform business requirements analysis conduct gap analysis and develop well defined detailed functional requirements • Execute full software development life cycle (SDLC) including experience in gathering requirements and writing functional/technical specifications for complex projects. • Develop functional design documents and work with stakeholders for review and approval. • Develop user stories and task breakdowns for agile development projects • Experience developing, prototypes, mockup for users review and approval. • Exposure to flowcharts, screen layouts and documentation to ensure logical flow of the system requirements • Experience working on large agile projects. • Develop test reports with metrics and coordinate with business users • Assist with Enterprise Architecture Solution Assessment (EASA), Hosting document and Firewall Rules. • Assist with design and documenting IT solutions that are State of Michigan standard technology. • Draft Local Change Board documents. • Develop training content and user manuals. • Design, develop, and implement test plans for applications or subsystems. • Create or collect test data and execute approved tests to determine the accuracy of program logic to produce desired results. • Assist with UAT Testing, Test cases, Post Implementation testing • Assist in differentiating between defects and new requirements. • Provide defect tracking log entry information. • Assist with implementation of RFCs (application changes, infrastructure changes, etc.) • Maintain/update system documentation as a result of system upgrades. • Monitors applications during peak production times. • Assist with User issues via calls, discussions and testing Skills: • 8+ years of business analysis experience for complex computer systems. • 8+ years of developing functional requirements for development projects. • 8+ years of developing, and implementing test plans and test cases. • Over 5+ years implemented Agile development processes including test driven development. • Over 8+ years of creating, updating and maintaining systems documentation. • Over 8+ years of creating training plans and materials. • Experience with Azure DevOps or a similar requirements and test case tracking application. • Experience working with HIPAA Data. Best Regards, Nisha Miriam George, DRS IT Solutions, Inc 28175 Haggerty Road, Novi, MI 48377 (C) ************ EXT -3
    $75k-103k yearly est. 2d ago
  • Information Security Analyst

    Trustage

    Information security analyst job in Madison, WI

    At TruStage, we're on a mission to make a brighter financial future accessible to everyone. We put people first, and work hand in hand with employees and customers to create a diverse and inclusive environment. Passionate about building insurance and financial services solutions, we push the boundaries of what's possible. We need you to help us shape what's next. You'll be encouraged to share your experiences, ideas and skills to help others take control of their financial future. Join a team that has received numerous awards for being a top place to work: TruStage awards and recognition Job Summary Under the guidance of Information Security leadership, the Information Security Analyst supports TruStage's cybersecurity program by delivering integrated threat intelligence and digital forensic services. This hands-on role is responsible for reviewing and analyzing incoming threat intelligence to assess risk and potential impact to the organization, applying best practices to inform proactive defense strategies. The analyst plays a critical role in the incident response lifecycle by investigating escalated threats-such as malware infections, phishing attempts, or unauthorized access-through structured processes that include detection, containment, eradication, recovery, and root cause analysis. Responsibilities also include conducting forensic investigations, performing advanced data collections, and executing eDiscovery requests. The analyst may be called upon to support investigations led by Legal, Human Resources, or other internal stakeholders, ensuring evidence integrity and alignment with regulatory and organizational standards. The ideal candidate will have experience using tools such as Magnet Forensics Axiom Cyber, Splunk, Microsoft Defender, and the MITRE ATT&CK framework to detect, investigate, and respond to complex security incidents. This role requires a strong analytical mindset, attention to detail, and the ability to work collaboratively across teams to enhance the organization's security posture. Excellent verbal and written communication skills are essential, as the analyst will be expected to clearly document findings, articulate technical concepts to non-technical stakeholders, and contribute to incident reports, threat briefings, and cross-functional discussions. Job Responsibilities: * Support Information Security Leadership regarding all aspects of the information security program, with minimal supervision. Responsibilities include facilitating the identification of risks throughout the organization, developing, reporting and monitoring formats on risk management issues and developing methodologies for the assessment of risks throughout the organization. * Continuously monitor the internal and external landscape for relevant events, risks, and threats related to malicious code, vulnerabilities, and potential attacks. * Coordinate and ensure cybersecurity related alerts and incidents are prioritized and responded to at all hours of the day. * Remain current with emerging threats and share knowledge with colleagues to improve incident response processes. * Participate in the creation and execution of tabletop exercises designed to identify gaps, improve skills, enhance communication and engage with key stakeholders. * Review reports from tabletop exercises, vulnerability scans and penetration testing to identify weaknesses or gaps in existing security controls and provide recommendations where appropriate. * Lead coordination, consultation, and assessment efforts to track and remediate events and alerts, directs response to related incidents, internal or external audits, and / or control assessments. * Identify, report, and assist in resolving privacy, compliance or security violations and control gaps. * Lead feedback with other IT teams to protect data from compliance, privacy or security compromise. * Contribute to the strategic direction of the Information Security team to develop new capabilities, process efficiencies and goals. * Participate in the development, review, ongoing maintenance and development of security policies, standards, processes, procedures and requirements to facilitate the establishment of common administrative controls for the delivery of security capabilities. * Security Awareness: Develop content for organization wide and targeted security awareness training. Present relevant information security topics through a variety of forums depending on the audience. * The above statement of duties is not intended to be all inclusive and other duties will be assigned from time to time. The above statement of duties is not intended to be all inclusive and other duties will be assigned from time to time. Job Requirements: * Bachelor's degree in computer science, information systems or related field, or equivalent combination of education and/or related professional work experience. * 5 or more years of demonstrated proficiency with an information security audit, assessment, engineering or architecture focus or comparable, professional experience. * Proven ability to clearly and effectively communicate business and technical information, both verbally and in writing. * Aptitude for speaking or communicating to varied groups of business and technical professionals. * Experience in presenting technical material to a nontechnical audience and to senior management. * Established skills and experience in the development of security policies, standards or other governance practices. * Demonstrated relationship management and consulting skills, including ability to effectively influence and negotiate. * Proven ability to provide high quality customer service. * Financial Services industry experience strongly preferred. * Experience with law enforcement preferred * Experience with forensics preferred #LI-SW If you're ready to help make a difference, apply today. A resume is required to apply. TruStage may process applicant information using an Artificial Intelligence (AI) tool. This tool automatically generates a screening score based on how well applicant information matches the requirements and qualifications for the position. TruStage recruiters use the screening score as a guide to further evaluate candidates; the score is one component of an application review and does not automatically determine whether a candidate moves forward. Candidates may choose to opt out of this process. Compensation may vary based on the job level, your geographic work location, position incentive plan and exemption status. Base Salary Range: $97,800.00 - $146,800.00 At TruStage, we believe a sound, inclusive benefits program is of vital importance, along with a flexible workplace that allows for work-life balance, career growth and retirement assistance. In addition to your base pay, your position may be eligible for an annual incentive (bonus) plan. Additional benefits available to eligible employees include medical, dental, vision, employee assistance program, life insurance, disability plans, parental leave, paid time off, 401k, and tuition reimbursement, just to name a few. Beyond pay and benefits, we also recognize that flexibility, including working in a place you prefer, is essential to caring for our employees. We will continue to strive to offer flexibility and invest in technology and other tools that will make hybrid working normal rather than an exception, so that when "life happens," you can focus on what's most important. Accommodation request TruStage is a place where everyone can bring their best self and thrive. If you need application or interview process accommodations, please contact the accessibility department.
    $97.8k-146.8k yearly Auto-Apply 22h ago
  • Information System Epic Security Analyst

    CWI Landholdings 3.0company rating

    Information security analyst job in Milwaukee, WI

    At Children's Wisconsin, we believe kids deserve the best. Children's Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country. We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today. Please follow this link for a closer look at what it's like to work at Children's Wisconsin: *********************************** Children's Wisconsin is seeking a Senior Information Epic Security Analyst- to join our team! Location: Remote but must be local to Milwaukee What you will do: The IS Security Analyst-Epic will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required. Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations. ESSENTIAL FUNCTIONS: Demonstrates behaviors outlined in the Core Competencies the Blue Kids Way to provide service excellence as a committed partner to children, families and co-workers. Recommends and maintains policies and procedures related to information security. Monitors the organization's overall security fabric. Assesses security needs and capabilities of the organization. Makes regular reports to management concerning security measures. Makes recommendations for improvement as required. Identifies and provides information security awareness training as appropriate. Identifies appropriate courses to enhance security capabilities and competencies of the organization. Works with management to perform and maintain risk assessments. Ensures organization compliance with the security sections of Federal and State statutes, including HIPAA, as well as regulatory requirements. Coordinates investigations into potential security infractions. Determines and designs appropriate tests for all aspects of information security. Activities may include attempted “cracking” of system security, review of audit trails and attempted theft of devices. Evaluates system effectiveness and makes change recommendations as necessary. Coordinates periodic reviews of system security by outside consultants, including vulnerability assessments, penetration tests, HIPAA reviews and PCI compliance. Works with IS teams to implement recommendations as appropriate. Monitors, evaluates and makes recommendations regarding perimeter security including prevention against attack, viruses, and other forms of malicious software. Monitors, evaluates and makes recommendations regarding email and Internet content filtering. Evaluates and makes recommendations regarding requested changes to perimeter security. Recommends policies and procedures for controlling remote access by employees, non-employees and vendors. Reviews and makes recommendations regarding security oriented software applications and workstation security, including patch management, user rights management, and operating system configuration. Keeps current on security issues through seminars, publications and self-education on an on-going basis. MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED: Requires bachelor's degree in computer science or related technology field. Master's degree preferred. Requires 7 years of relevant computer systems experience, preferably in a hospital or healthcare setting. Significant experience in IS security administration including compliance, audit, and information security management. Epic Security certification is a requirement. Professional certification (e.g. CISA, CISM or CISSP) preferred. Thorough understanding of risk analysis, disaster recovery and audit tracking. Familiarity with current common paradigms for violating system integrity. Must have excellent interpersonal skills to effectively communicate with all levels of hospital personnel, vendors and IS personnel. Must possess the ability to deliver clear, concise communications and presentations. Must be able to train others on key IS security concepts. Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law. Certifications/Licenses:
    $74k-107k yearly est. Auto-Apply 60d+ ago
  • Information Security Engineering & Operations Analyst

    Johnson Financial Group 3.9company rating

    Information security analyst job in Racine, WI

    The JFG Information Security Engineering & Operations Analyst plays a key role in supporting JFG's Identity & Access Management (IAM), Cyber Threat Management, and Vulnerability Management services. This role helps support IAM services to provision, deprovision, and certify access to JFG systems. It also helps detect, analyze, hunt for, and report on cybersecurity events related to malware, network intrusion, and data loss protection and insider threat incidents. This role is also responsible for finding and reporting on internal and external vulnerabilities on JFG systems. This role will be supported by a Managed Detection & Response (MDR) services and Identity & Access Management Managed services. Occasional off-hour and weekend work will be expected. Very little (less than 5%) business travel is expected in this role. This role will be located in Racine, Wisconsin. Ability to come in-office would be required (working a hybrid schedule.) KEY RESPONSIBILITIES: * Detect, analyze, contain, and remediate threats and vulnerabilities across the JFG environment. * Operate and support vulnerability management, data loss protection, cybersecurity monitoring, cybersecurity incident response, intrusion analysis, root-cause-analysis (digital forensics), cyber-threat intelligence, and malware analysis technologies. * Lead and report on incidents involving malware, network intrusion, insider-threat, internal investigations and litigation support activities. * Incorporate Cyber Threat Intelligence into operational signal intelligence and reporting. * Proactively investigate JFG environment for threats based on Cyber Threat Intelligence and known threat methods and patterns (aka Threat Hunting). * Operate and support Identity Governance and Administration technologies to support timely on/off-boarding of people and regular access governance reviews to ensure appropriate access. * Support weekly/monthly/quarterly/annual operational metrics, reports and dashboards. * Assist with maintaining the Cybersecurity Incident Response Plan. * Collaborate on the continuous improvement of Information Security Operations processes, workflows, and procedures (e.g. RunBooks). * Automate repetitive tasks and drive efficiencies with measurable benchmarks to show progress. JOB REQUIREMENTS: * Associates degree in Information Security, Cybersecurity preferred * 0-2 years' experience * Types of certification preferred: Security+, CEH, SSCP * Experience with Python and PowerShell scripting languages for automation preferred * Good report writing and communication skills * Has a basic understanding of the Information Security platforms at JFG, common Information Security controls and frameworks, networking concepts and technologies, as well as Windows and Linux environments Come as you are. Johnson Financial Group supports and is committed to the principle of equal employment opportunity. We make all employment-related decisions without regard for an individual's race, color, religion, sex, sexual orientation, age, national origin, citizenship, disability, veteran status, or any other protected status as required by law.
    $71k-87k yearly est. Auto-Apply 28d ago
  • Cyber Security Analyst III

    United Wholesale Mortgage Corp.(DBA UWM 4.6company rating

    Information security analyst job in Pontiac, MI

    We are growing our Information Security Threat Intelligence and Compliance team here at UWM. This is a new position where you will be responsible for translating threat intelligence into actionable defensive measures, creating and maintaining procedural documentation and mentoring more junior analysts. Additionally, you will be detecting and analyzing suspicious or malicious events. This role will also actively participate on the Incident Response team. WHAT YOU WILL BE DOING * Review and analyze logs from a variety of sources * Monitor detection systems for signs of attack or unusual activity * Create documentation to assist with repeatable tasks and decision making * Actively participates in incident response * Monitors and analyzes threat intelligence sources and recommends appropriate actions * Use penetration testing tools and techniques * Works closely with other teams to understand the flow of sensitive data between systems and applications * Translate threat intelligence into actionable defensive measures * Mentor other Security Analysts * Ability to provide on-call support on a rotating basis WHAT WE NEED FROM YOU Required: * 5+ years of professional IT experience * 2+ years of information security experience * Subject matter expert in SIEM, forensics, malware analysis or incident handling * Understanding of network protocols (TCP, UDP, DNS, FTP, SMTP, DHCP, etc.) * Familiarity with industry regulations (eg. GLBA, NYCRR, etc.) * Microsoft Windows troubleshooting skills * GIAC or equivalent certification * On-site attendance * Computer related degree or equivalent * 100% onsite attendance THE PLACE & THE PERKS Ready to join thousands of talented team members who are making the dream of home ownership possible for more Americans? It's all happening on UWM's campus, where our award-winning workplace packs plenty of perks and amenities that keep the atmosphere buzzing with energy and excitement. It's no wonder that out of our six pillars, People Are Our Greatest Asset is number one. It's at the very heart of how we treat each other, our clients and our community. Whether it's providing elite client service or continuously striving to improve, our pillars provide a pathway to a more successful personal and professional life. From the team member that holds a door open to the one that helps guide your career, you'll feel the encouragement and support on day one. No matter your race, creed, gender, age, sexual orientation and ethnicity, you'll be welcomed here. Accepted here. And empowered to Be You Here. More reasons you'll love working here include: * Paid Time Off (PTO) after just 30 days * Additional parental and maternity leave benefits after 12 months * Adoption reimbursement program * Paid volunteer hours * Paid training and career development * Medical, dental, vision and life insurance * 401k with employer match * Mortgage discount and area business discounts * Free membership to our large, state-of-the-art fitness center, including exercise classes such as yoga and Zumba, various sports leagues and a full-size basketball court * Wellness area, including an in-house primary-care physician's office, full-time massage therapist and hair salon * Gourmet cafeteria featuring homemade breakfast and lunch * Convenience store featuring healthy grab-and-go snacks * In-house Starbucks and Dunkin * Indoor/outdoor café with Wi-Fi DISCLAIMER All the above duties and responsibilities are essential job functions subject to reasonable accommodation and change. All job requirements listed indicate the minimum level of knowledge, skills and/or ability deemed necessary to perform the job proficiently. Team members may be required to perform other or different job-related duties as requested by their team lead, subject to reasonable accommodation. This document does not create an employment contract, implied or otherwise. Employment with UWM is "at-will." UWM is an Equal Opportunity Employer. By selecting "Apply for this job online" you provide consent to UWM to record phone call conversations between you and UWM to be used for quality control purposes.
    $87k-105k yearly est. Auto-Apply 19d ago
  • Information Security Specialist

    The Shyft Group, Inc.

    Information security analyst job in Novi, MI

    Information Security Specialist | The Shyft Group, Inc. | Novi, MI Regular Employee | Salary Non-Exempt | $65,000.00 - 80,000.00 What you'll do: The IT Security Specialist is responsible for designing, implementing, and maintaining the organization's cybersecurity infrastructure across information technology, operational technology, and cloud environments. This position plays a vital role in safeguarding corporate systems, networks, and information by monitoring emerging threats and vulnerabilities. The individual in this role will work collaboratively with all departments across Aebi Schmidt Group to assess risk, coordinate vulnerability remediation, and develop defensible architectures to protect our assets. The IT Security Specialist will apply technical expertise to implement and manage security tools, automate key processes, and support incident response activities to minimize business impact and maintain continuity of operations. This position requires strong analytical and problem-solving skills, a comprehensive understanding of cybersecurity principles and technologies, and the ability to communicate effectively with both technical and non-technical stakeholders. Key responsibilities * Design, implement, and manage cybersecurity solutions across endpoints, networks, cloud, and identity management systems * Conduct vulnerability assessments and coordinate remediation efforts across IT and DevOps teams * Monitor, triage, and manage alerts from cybersecurity related tools and services * Leverage cybersecurity related tools and benchmarks to harden and build defensible IT systems and resources * Participate in incident response efforts including triage, containment, eradication, and post-incident efforts * Perform risk assessments on new technologies, vendors, and IT system changes * Automate repetitive tasks using Python, Bash, PowerShell, Terraform, or equivalent scripting languages What you need to be successful: * Bachelor's degree in computer science, information systems, cybersecurity, or related field * Relevant cybersecurity certifications such as CompTIA's Security+ * 5+ years of hands-on experience in cybersecurity or infrastructure security role * 3 - 5 years of experience in cloud technologies such as AWS and Azure * Strong understanding of networking and security protocols, firewalls, VPN's, SIEM, EDR/XDR, and vulnerability management * Knowledge of IAM concepts; idP, MFA, SSO, SAML/OAuth2, and the access policies that control them * Working knowledge of scripting or automation languages such as Python, PowerShell, or equivalent * Industry leading certifications such as CISSP, CEH, GICSP, or GSEC * Exposure to compliance standards such as ISO 27001, NIST, and PCI DSS * Experience with CI/CD pipelines or DevSecOps methodologies * Familiarity with the MITRE ATT&CK framework and threat hunting * Implement and manage OT cybersecurity controls across plant floor networks, control systems, and IT infrastructure * Data management and discovery tools such as Purview or other data loss prevention technologies Why The Shyft Group? Our people are our greatest asset, and your success is our success! That's why we provide comprehensive benefits that support your health, financial security, and work-life balance-so you can thrive both personally and professionally. * Health & Wellness: Medical, Dental, Vision, HSA/FSA, Wellness Plan * Financial Security: 401(k) with match, Disability, Life Insurance * Work/Life & Growth: Educational Reimbursement, EAP, Dependent Care At The Shyft Group, we don't just offer benefits-we invest in your well-being. Join us and experience the difference! Who we are: The Shyft Group is the North American leader in specialty vehicles, including last-mile delivery vans, work trucks, and motorhome chassis. Our 10 brands- Utilimaster, Blue Arc, Royal Truck Body, DuraMag, Magnum, Strobes-R-Us, Spartan RV Chassis, Red Diamond, Builtmore, and Independent Truck Upfitters- are powered by 3,000+ team members across the U.S. and Canada. Backed by 50 years of innovation and a supportive, entrepreneurial culture, we're leading the way in electrification and proudly ranked among Fortune's 100 Fastest Growing Companies. Equal Employment Opportunity (EEO) The Shyft Group is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, gender identity, age, genetic information, status as a protected veteran or status as a qualified individual with a disability, or any other characteristic protected by applicable federal, state, or local law. If you have a disability and would like to request an accommodation in order to apply, please email us at *************************. The Shyft Group is an E-Verify Employer Shyft uses E-Verify, which is an online system operated by the U.S. Department of Homeland Security in partnership with the Social Security Administration to verify employment eligibility and validate social security numbers. Through participation in the E-Verify program, information entered on Form I-9 will be provided and compared to information available at both of these agencies. See posters for more details. E-Verify Notice U.S. Right to Work Notice.
    $65k-80k yearly 4d ago
  • Information Security Analyst

    Capspecialty 4.0company rating

    Information security analyst job in Middleton, WI

    Job Description This is a hybrid position requiring 3 days in office at our Middleton, WI office location. #LI-Hybrid At CapSpecialty, we are a specialty underwriting company being driven by well-informed, entrepreneurial and proactive employees. Come join our exciting company where you can really make an impact, and each individual's unique skills and talents are recognized and valued. You will find an accessible leadership team that welcomes opinions and ideas. We owe much of our success to our collaborative environment and set of three guiding principles rooted in customer-centricity, employee excellence and corporate culture. We offer competitive compensation and benefits packages - including an innovative open vacation plan, generous paid sick and parental leave, fully vested matching 401k, company-paid group term life insurance and short- & long-term disability plans, professional and educational growth opportunities, flexible and casual work environment, and recognition for exceptional performance. Please see our full list of Total Rewards here. CapSpecialty is seeking an Information Security Analyst who will support our organization's cybersecurity operations. The analyst will assist in monitoring systems, investigating alerts, managing access controls, and supporting compliance efforts. This role includes exposure to Identity & Access Management (“IAM”) and other key areas of information security. Duties/Responsibilities: Conduct investigations into and properly document security incidents, including evaluating incident impact and recommending corrective actions to management. Collate security metrics and generate reports from the security systems as needed. Support managing accounts and permissions in IAM systems, including recommending improvements to identity governance where appropriate. Perform tasks as assigned to meet any audit requests. Help maintain IAM documentation and workflows. Help maintain and promote security policies, procedures, and training materials. Oversee assigned components of the security awareness programs, and track employee participation including following up on training completion. This may include reporting compliance metrics to leadership. Manage the physical security program, providing recommendations for updates as needed. Keep up to date and current on security trends. Other related duties and initiatives, as assigned. Supervisory Responsibilities: None. Core Competencies: Proven ability to deal well with ambiguity, prioritize tasks, resolve issues and deliver measurable results in an agile, fast-paced environment. Excellent oral and written communication skills. Ability to manage difficult customer situations, elicit customer feedback, analyze and resolve customer issues. Excellent analytical, problem solving, collaboration and time-management skills. A high level of integrity and commitment to confidentiality. Must be highly self-motivated requiring minimal direction. Have a passion for Information Security and a desire to advance personal growth through continuing professional education, self-study, and pursuit of technical certifications. Education and Experience: Associate's degree in computer science or equivalent. 1+ years of relevant experience in IT with exposure to cybersecurity practices, technologies, and methodologies is preferred. Basic understanding of security principles, threats, and controls is desirable. Familiarity with IAM concepts and tools (i.e. Active Directory, Okta, Azure AD) is a plus but not required. Familiarity with security controls and technologies desired (i.e. firewall, SIEM, DLP, WAF, and IPS.). Physical Demands Prolonged periods of sitting at a desk and working on a computer. May be required to lift up to 15 pounds at times. CapSpecialty is a leading provider of specialty insurance and bonds for small- to mid-sized businesses in the U.S., offering casualty, professional liability, surety and fidelity products in all 50 states and the District of Columbia. By working with select partners through a limited distribution model, CapSpecialty's creative, hard-working team provides personalized service and cultivates mutually successful partnerships to deliver positive results. CapSpecialty is an operating subsidiary of Berkshire Hathaway, and its carriers have an A ("Excellent") rating from A.M. Best, writing both admitted and non-admitted policies. For more information, please visit CapSpecialty.com. Apply today! Equal Employment Opportunity Employer Powered by ExactHire:184950
    $82k-110k yearly est. 18d ago
  • Senior Cyber Security Analyst

    Niterra North America

    Information security analyst job in Wixom, MI

    About Us: Niterra North America, Inc., established in 1936 and formerly known as NGK Spark Plugs(U.S.A.), Inc., is a global leader in spark plug and oxygen sensor technology and quality. With a legacy of innovation and excellence, Niterra is evolving its business portfolio, leveraging core ceramic technologies to venture beyond traditional domains. The company is committed to developing solutions that address social issues and promote sustainability. About the Role: The ideal candidate must possess an enthusiastic and growth minded personality which will enable them to thrive in a dynamic environment. The candidate must be passionate about Cyber Security and possess strong technical knowledge in Security Domain. The Sr. Cyber Security analyst will serve as subject matter expert in various functions within the SecOps team utilizing solutions such as SIEM, EDR, VM, Firewall, Email Security, etc. The team member must be a team player who is eager to contribute to company success and meeting objectives. Essential Duties: Adhere to all company policies and procedures, which include IATF, ISO, ISMS, QMS, TISAX and Safety related policies. Investigate security incidents and perform in-depth analysis to identify security threats and perform remediations. Deploy/implement security tools to protect company assets. Review logs to detect anomalies which may lead to security breaches. Serve as point of contact for assigned security vendors responsible for managed services and handle escalations. Subject matter expert on vulnerability management to identify vulnerabilities and performin remediation. Conduct/assist with performing penetration testing to identify security weaknesses and offer solutions to address identified gaps. Participate/lead global incident response activities. Subject matter experts on various security functions such as endpoint security, EDR, MDR, Firewall, Email Security, Spam filtering, PAM, etc. Leverage automation to streamline workflow to increase efficiency and productivity. Review, create or document standard operating procedures. Perform periodic user access reviews and governance. Assist with internal/external audits and implement security controls based on audit findings. Experience, Education and Certification: 5 plus years of experience in SecOps functions including but not limited to Incident response, EDR, MDR, Email security, Endpoint Security, IAM, Firewall, etc. Bachelor's degree in computer science or related field Industry standard information security certifications (CompTIA Security +, Network +, CASP+, CISSP, GCIA, Digital Forensic, Ethical hacking, etc.) are a plus. In-depth knowledge of TCP/IP networking, Routing, etc. Experienced in Security functions including Firewall, IDS/IPS, Email Security, Endpoint Security, SIEM, EDR, Vulnerability Scanning, etc. Experience with proactive threat hunting exercise. Experience in leading security investigation and incident response and capable of documenting/conducting RCA in support of investigations. Familiar with NIST CSF and other security controls/guidelines for incident response Knowledge of Malware, ransomware behaviors and techniques Ability to coordinate, gain trust of business stakeholders and maintain third party vendor relationships. Able to work under pressure in critical circumstances. Why Work for Niterra? Comprehensive Health Benefits: Medical, dental, vision, and life insurance Financial Security: Short-term and long-term disability coverage Retirement Savings: 401(k) plan with a generous company match of up to 6% Time Off: Generous paid time off, including vacation, sick leave, and holidays Work-Life Balance: Paid maternity and paternity leave
    $72k-97k yearly est. Auto-Apply 60d+ ago
  • Senior Cyber Security Analyst

    Niterra

    Information security analyst job in Wixom, MI

    About Us: Niterra North America, Inc., established in 1936 and formerly known as NGK Spark Plugs(U.S.A.), Inc., is a global leader in spark plug and oxygen sensor technology and quality. With a legacy of innovation and excellence, Niterra is evolving its business portfolio, leveraging core ceramic technologies to venture beyond traditional domains. The company is committed to developing solutions that address social issues and promote sustainability. About the Role: The ideal candidate must possess an enthusiastic and growth minded personality which will enable them to thrive in a dynamic environment. The candidate must be passionate about Cyber Security and possess strong technical knowledge in Security Domain. The Sr. Cyber Security analyst will serve as subject matter expert in various functions within the SecOps team utilizing solutions such as SIEM, EDR, VM, Firewall, Email Security, etc. The team member must be a team player who is eager to contribute to company success and meeting objectives. Essential Duties: * Adhere to all company policies and procedures, which include IATF, ISO, ISMS, QMS, TISAX and Safety related policies. * Investigate security incidents and perform in-depth analysis to identify security threats and perform remediations. * Deploy/implement security tools to protect company assets. * Review logs to detect anomalies which may lead to security breaches. * Serve as point of contact for assigned security vendors responsible for managed services and handle escalations. * Subject matter expert on vulnerability management to identify vulnerabilities and performin remediation. * Conduct/assist with performing penetration testing to identify security weaknesses and offer solutions to address identified gaps. * Participate/lead global incident response activities. * Subject matter experts on various security functions such as endpoint security, EDR, MDR, Firewall, Email Security, Spam filtering, PAM, etc. * Leverage automation to streamline workflow to increase efficiency and productivity. * Review, create or document standard operating procedures. * Perform periodic user access reviews and governance. * Assist with internal/external audits and implement security controls based on audit findings. Experience, Education and Certification: * 5 plus years of experience in SecOps functions including but not limited to Incident response, EDR, MDR, Email security, Endpoint Security, IAM, Firewall, etc. * Bachelor's degree in computer science or related field * Industry standard information security certifications (CompTIA Security +, Network +, CASP+, CISSP, GCIA, Digital Forensic, Ethical hacking, etc.) are a plus. * In-depth knowledge of TCP/IP networking, Routing, etc. * Experienced in Security functions including Firewall, IDS/IPS, Email Security, Endpoint Security, SIEM, EDR, Vulnerability Scanning, etc. * Experience with proactive threat hunting exercise. * Experience in leading security investigation and incident response and capable of documenting/conducting RCA in support of investigations. * Familiar with NIST CSF and other security controls/guidelines for incident response * Knowledge of Malware, ransomware behaviors and techniques * Ability to coordinate, gain trust of business stakeholders and maintain third party vendor relationships. * Able to work under pressure in critical circumstances. Why Work for Niterra? * Comprehensive Health Benefits: Medical, dental, vision, and life insurance * Financial Security: Short-term and long-term disability coverage * Retirement Savings: 401(k) plan with a generous company match of up to 6% * Time Off: Generous paid time off, including vacation, sick leave, and holidays * Work-Life Balance: Paid maternity and paternity leave
    $72k-97k yearly est. 21d ago
  • Information Systems Security Officer (ISSO)

    Contact Government Services

    Information security analyst job in Detroit, MI

    ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success: * Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. * Maintain responsibility for managing cybersecurity risk from an organizational perspective. * Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership. * Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies. * Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO). * Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes. * Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF. * Provide subject matter expertise for cyber security and trusted system technology. * Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems. * Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. * Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring. * Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications: * Bachelor's Degree. * A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc. * eMASS experience. * Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher. * Strong desktop publishing skills using Microsoft Word and Excel. * Experience with industry writing styles such as grammar, sentence form, and structure. * Ability to multi-task in a deadline-oriented environment. Ideally, you will also have: * CISSP, CASP, or a similar certificate is preferred. * Master's Degree in Cybersecurity or related field. * Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking. * Demonstrated ability to work well independently and as a part of a team. * Excellent work ethic and a high commitment to quality. Our Commitment: Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. Health, Dental, and Vision Life Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board: ************************************* For more information about CGS please visit: ************************** or contact: Email: [email protected] #CJ $92,213.33 - $125,146.66 a year We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $92.2k-125.1k yearly 60d+ ago
  • Information Security Manager

    Computech Corporation 4.3company rating

    Information security analyst job in Detroit, MI

    Computech Corporation provides IT and consulting services to various customers across the globe. We are a Minority Certified Company with over 15 years of industry experience. Our global delivery model and proven track record enable companies to realize improved business efficiency and increased profitability. Job Description As an Information Security Product Manager, you will work with highly skilled engineers, key business decision makers, and IT leadership. You will define the future direction for our technical security services and bring about the realization of that vision. You will work with vendors and the ecosystem, to help us stay abreast in new security technologies and to identify what capabilities to invest in. Qualifications Top 3 Skills required • Design, architecture, and implementation of centralized security technology solutions at large enterprises - 5 years • Operations experience in identity management, key management, or other security domains - 3 years • Leadership role in the development or delivery of information security services - 3 years Background Required • In depth knowledge of key information security domains, including authentication, authorization, access control, and encryption • Demonstrated experience in designing and implementing enterprise class security solutions • Familiarity with agile and waterfall development methodologies • Ability to translate the information security domain to IT and business domains, as well as communicate complex technologies in a clear and concise manner Preferences • Security operations experience, such as identity management or key management. • Previous leadership experience, either through leading teams and/or initiatives • Success in large corporate environments Role and Responsibilities • Internalize the team's mission and strategies, including key initiatives • Distill the technical vision for the team, including the future state for our centralized security technologies. This will span authentication, authorization, encryption, and other related services • Understand our customers; leverage feedback and learning to guide improvements to the information security customer experience • Gather, understand, and prioritize the business needs for centralized, shared security technology. This will be a comprehensive and ongoing exercise. • Build and maintain relationships with service customers and key stakeholders. This includes o representing the team with stakeholders, communicating on behalf of stakeholders within the team, and being the team's inbound/outbound point of contact o communicate evangelizing our mission and the value our services deliver o gather feedback from customers and stakeholders to ensure on-going suitability of service features o communicating regularly with senior IT leadership on key security metrics and service development successes • Facilitate and govern the full life-cycle of technical security service components, including o guiding the technical security control architecture o approving service life-cycle transitions • Prioritize and launch service development initiatives, o interfacing with business and technical stakeholders to define scope o establishing success criteria o estimating work efforts o securing funding • Seek new business opportunities that are enabled by our services • Identify potential areas for service improvements, including through o new technologies and vendor relationships. This also means Influencing selection of security technologies and managing relationships with vendor partners o partnering with information security research, service development, and security delivery teams • Assisting in planning for skill, methodology, technology, and facility needs for future services and capabilities Qualifications - Education and/or experience • Bachelors degree • Minimum 7 years of experience in information security architecture or engineering Qualifications - Other skills and abilities [soft skills] • Excellent verbal and written communication skills • Ability to influence and motivate people across a wide range of functional areas • Strong customer service skills • Capable in managing conflict and driving win-win outcomes • Highly organized; prepared to juggle multiple tasks while keeping focus on priorities • Comfortable switching from big picture to detail oriented activities • Passionate learner; able to rapidly digest, analyze, and apply new knowledge Additional Information All your information will be kept confidential according to EEO guidelines.
    $89k-121k yearly est. 1d ago
  • Associate Security Systems Engineer - Access Control & CCTV

    Kastle Systems International 3.6company rating

    Information security analyst job in Plymouth, MI

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. We are looking for a motivated and knowledgeable Jr. Security Engineer to join our team. The ideal candidate will have an understanding of standard Low voltage systems ideally in the Electronic Security technology space, to include Access Control Systems (ACS), Intrusion Detection Systems (IDS), Closed-Circuit Television (CCTV), and supporting equipment such as computer software/hardware, and networking infrastructure. This candidate will excel in critical thinking, have the ambition to learn and grow, and possess a strong desire to perform at the top of their abilities. Responsibilities Review architectural, electrical, telecommunication, and security engineering floor plans, riser drawings, device schedules, and detail drawings. Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. Review Field Site Survey documentation and provide technical assistance with RFI/RFP responses. Create solution design documentation, including drawings, Bills of Materials (BOMs), permitting packages and solution design summaries. Learn and Maintain familiarity with current and emerging electronic security technologies, such as access control, video surveillance, intrusion detection, biometrics, and industry-leading vendors On the job Training will be provided to increase skills in all key responsibilities listed above, including hands on field work with installation and integration teams to better understand design and implementation requirements. Qualifications Mechanical, Engineering, Plumbing Engineering degree or a minimum of 2 years of previous experience in the industry. An associate or bachelor's degree in a relevant field if no previous experience, a comparable amount of experience in the appropriate field may be substituted. Experience in the design and planning of MEP systems. Ability to make load calculations associated with power, data, conduit fill ratios and/or HVAC systems. Ability to manage time and multiple tasks without supervision. Strong organizational skills and attention to detail. Excellent analytical and problem-solving skills. Exceptional presentation, writing, verbal, and written customer communication skills. Experience with computer programs such as Microsoft Office, Excel, Adobe, etc. is preferred. Knowledge of Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus. Company Overview This is a Low Voltage Security Estimator career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws. #JuniorSecuritySystemsDesignEngineer #SecuritySystemDesign #AccessControlDesign #VideoSurveillanceDesign #IntrusionDetectionSystems #SecuritySystemsEngineering #SecuritySystemShopDrawings #SecuritySystemLayouts #SystemRiserDiagrams #EngineeringSpecifications #SecurityDesignDocumentation #SecurityProposalDesign #BidPreparation #SecuritySystemEstimation #SecuritySystemSubmittals #AutoCADSecurityDesign #RevitBIMSecurityDesign #SecuritySystemsIntegration #TechnicalSupportForSecurityDesign #SecuritySolutionsEngineering #PhysicalSecuritySystemDesign
    $101k-139k yearly est. Auto-Apply 60d+ ago
  • Information System Security Officer (Information Assurance)

    General Dynamics Land Systems Inc.

    Information security analyst job in Sterling Heights, MI

    Company Information: General Dynamics is a successful Fortune 100, global aerospace and defense company, with over 90,000 employees world-wide. General Dynamics Land Systems, a business unit of General Dynamics, has a strong foundation of delivering core engineering and manufacturing capabilities to our clients for military vehicles. Our team is focused on continuous process and productivity improvements that reduce product costs, while increasing troop safety and effectiveness. Land Systems continues to work with the US Armed Forces and its Allies to ensure these vehicles remain survivable, relevant, flexible, affordable and capable of addressing a dynamic threat environment. About the Role: As a member of the IT Security Team, you will be joining a dynamic group of Information Technology and Information Assurance professionals responsible for the operation, maintenance, and compliance of classified information systems, and its userbase, in support of a Next Generation Vehicle Program. The ISSO will participate in activities covering information assurance lifecycles and user account support. Due to the nature of the work, this role requires on-site presence up to 100%. What We Offer: Whether starting your career or are already an experience professional, we offer a Total Rewards package that is Impactful and built for you. * Healthcare including medical, dental, vision, HSA and Flex Spending * Competitive base pay and incentive pay that rewards individual and team performance, and comprehensive benefits. * 401k Match (6%) * Educational assistance * 9-80 Work Schedule (This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off) * Ongoing learning opportunities within a diverse, inclusive and rewarding work environment * Onsite cafeteria, fitness center, and outdoor fitness track Responsibilities to Anticipate/Expect: * Leads as IT Liaison between GDLS Users and United States Government personnel for Government Cloud Accounts * Generates, tracks and escalates IT Trouble Tickets to U.S. Government personnel for GDLS-cloud account / application issues * Issues, tracks, and enforces account training and compliance requirements to GDLS users of unclassified and classified systems * Designs account workflow and process streamlining with the Information System Security Manager (ISSM) * Coordinates with System Administrators to create, enable, or disable classified system accounts * Assists in the creation, implementation, and presentation of Cyber Awareness Campaigns * Participates in system accreditation documentation reviews in accordance with existing processes and procedures * Assists the ISSM and Program Protection Officer with need-to-know and verification processes * Participates in assessments, inspections, and continuous monitoring of classified systems and user compliance * Perform other duties as assigned Minimum Qualifications: * Must possess or be able to obtain and maintain a U.S. Government SECRET or higher clearance. * MUST be a United States citizen * 1-3 year minimum of experience in a government/industrial security career field. * 3-5 year minimum of experience in a compliance and/or account administration role. * Bachelor of Science degree majoring in Computer Science, Information Science and Technology, Information Assurance, Risk Management, or Cybersecurity required. Equivalent alternates considered. * Must have one of the following certifications (more advanced certificates considered): o Security+ CE o GIAC o CISA o CRISC Additional Information: * Must have very good written and verbal communication skills. * Must be detail-oriented, independent and organized. * Must have experience with Microsoft Office products: Word, Excel, and PowerPoint. * Must have experience with SCAP Compliance Checker, STIG Viewer, and IAVMs. * Preferred experience with certification/authorization/compliance requirements as outlined in the NISPOM and DAAPM/DAAG. * Limited travel may be required. GDLS considers factors such as, scope/responsibilities of the position, candidate experience and education/training background, in addition to local market comparable and business considerations when extending an offer. Headquartered in Reston, Virginia, General Dynamics is a global aerospace and defense company offering a broad portfolio of products and services in business aviation; ship construction and repair; land combat vehicles, weapons systems and munitions; and technology products and services. General Dynamics employs more than 100,000 people across 65 countries worldwide and in all 50 U.S. states, more information is available at *********** General Dynamics Land Systems, is a business unit of General Dynamics, and is an innovative leader of ground combat systems' equipment and software for our clients. Our performance-driven team partners with the U.S. Army, U.S. Marine Corp and other militaries across the Globe to ensure that next generation ground combat vehicles are ready to protect our fighting men and women in uniform. General Dynamics Lands Systems provides a competitive compensation package, site specific flexible work schedules, 401(k) with Company Match; Bonus Eligibility, Employee Development Opportunities, Tuition Reimbursement, On-site Amenities, and comprehensive Medical/Dental/Vision Insurance. As an Equal Opportunity Employer, General Dynamics Land Systems ("GDLS") provides all persons with equal opportunity and access to all aspects of employment process, without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, marital status, age, disability, status as a protected veteran, or membership in any group protected by federal, state, or local anti-discrimination laws. GDLS also is committed to providing reasonable accommodations to individuals with disabilities and disabled veterans.. If, due to a disability, you need an accommodation to search or apply for an opportunity with GDLS, please call ************ or send an e-mail to ***************** for assistance and let us know the nature of your request and your contact information. Share: mail Tweetshare to twitter Share on Facebookshare to facebook Share on LinkedInshare to linkedin Apply Now Similar Jobs Interested in working for Land Systems? Join our Talent Network Today! Join our Talent Network * Search Jobs * Saved Jobs * Careers Home facebook twitter linkedin youtube instagram 2025 General Dynamics US. All rights reserved.
    $62k-84k yearly est. 55d ago
  • Global Physical Security Systems Engineer

    Millerknoll, Inc.

    Information security analyst job in Zeeland, MI

    Why join us? Our purpose is design for the good of humankind. It's the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone. GENERAL PURPOSE Responsible for supporting Physical Security Systems hardware and software technology throughout the enterprise. Independently conducts field work, oversees contractor labor, and troubleshoots service issues according to department guidelines utilizing Milestone, Lenel, Bosch and other systems. ESSENTIAL FUNCTIONS * Coordinates contract install/service labor and reviews work for commissioning. May lead small projects. * Advises and assists in annual security systems budgeting process. * Coordinates with external relationships to ensure the viability of all physical security systems, legacy and new, with the goal of minimal business disruption as the result of failed or improperly configured systems. * Ensures the coordination, installation, upgrade and conversion or servicing of alarm systems, access controls, video cameras, burglary, radio systems and all other types of physical security equipment. * Maintains an in-depth knowledge of the state-of-the-art security equipment standards and technology encompassing all physical security products. Suggests system solutions to specific security concerns identified through customer request and security audits. * Perform additional responsibilities as requested to achieve business objectives. * Performs annual audits for various access control systems. * Provides product research, feasibility studies, project planning, tracking and quality assurance and overall vendor communication and management. * Reviews physical security system standards, policies, required upgrades, maintenance and day-to-day management of all security systems through system integrators or internal resources. * With guidance, plans and recommends to management the physical security systems and service requirements for the company. * Identifies errors, troubleshoots, and determines corrective action in existing systems. * Creates scope of work and requests for proposal for installation projects. * Interprets CAD/technical blueprints for construction design. * Coordinates vendor/installer technicians for project installs and service calls. * Administers infrastructure upgrades, implementations and integrations. * Anticipates technology solutions to solve current and future business needs. * Independently programs access control, intrusion detection, and camera equipment. * Independently installs and wires security system components * Tests and commissions new security equipment installations. * Determines the appropriate physical security techniques in balance with MillerKnoll practices to accomplish objectives. * Suggests technology solutions aligned with corporate security strategy and budget guidelines. * Performs additional responsibilities as requested to achieve business objectives. QUALIFICATIONS To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Education/Experience * High school diploma or equivalent * Two years' experience hands-on with physical security systems and related software with basic DC electrical and networking experience or an equivalent combination of education, training and experience. * Electrician's Trade License or associate's degree in computer science related field and demonstrated relevant work experience, preferred. Licenses and Certifications * Lenel Certification or equivalent experience preferred * Milestone Certification or equivalent experience preferred * Bosch RPS Programming Experience Preferred * Basic knowledge of Network design and function * Ability to learn and integrate new technologies as business needs change. Skills and Abilities * Must be able to lift 50 lbs., bend, walk and twist. * Ability to travel up to 20% or as needed to achieve business objectives. * Strong problem solving, critical thinking, and interpersonal communication skills. * Strong customer focus. * Ability to effectively use office automation, communication, software and tools currently used in the HMI office environment. * Applies advanced problem-solving skills and executes solutions to complex problems independently * With guidance, plans and recommends to management the physical security systems and service requirements for the company. PHYSICAL DEMANDS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Must be able to perform all essential functions of the position with or without accommodations. Who We Hire? Simply put, we hire qualified applicants representing a wide range of backgrounds and abilities. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We're committed to equal opportunity employment, including veterans and people with disabilities. This organization participates in E-Verify Employment Eligibility Verification. In general, MillerKnoll positions are closed within 45 days and are open for applications for a minimum of 5 days. We encourage our prospective candidates to submit their application(s) expediently so as not to miss out on our opportunities. We frequently post new opportunities and encourage prospective candidates to check back often for new postings. MillerKnoll complies with applicable disability laws and makes reasonable accommodations for applicants and employees with disabilities. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact MillerKnoll Talent Acquisition at careers_********************.
    $80k-111k yearly est. Auto-Apply 20d ago
  • Vehicle Cyber Security Systems Engineer

    Ford Global

    Information security analyst job in Dearborn, MI

    We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves? As a key member of our Information Technology group, you'll play a critical part in shaping the future of mobility. If you're looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience and improve people's lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are! The Vehicle Cyber Security Systems Engineer will serve a key role in shaping the future of product development security for vehicles (e.g. Connected Vehicle, Autonomous Vehicle, Electric Vehicle, Ford Smart Mobility, and V2X Security). The engineer will work within cross functional team to do/support the following: You'll have... Bachelor's degree in Electrical Engineering, Computer Engineering, Software Engineering, Computer Science, or Cybersecurity OR a combination of education and experience 5+ years of experience with embedded and/or automotive systems 3+ years of experience with in-vehicle network architecture, modules, and protocols (CAN, etc.) Ability to develop and maintain engineering documentation including requirements, specifications, test plans, etc. Ability to work independently and collaboratively Strong communication and analytical skills Even better, you may have... Experience with Hardware Security Module (HSM) and Secure Hardware Extension (SHE) Experience with coding (i.e., C, C++, C# Python, Java, CAPL, JQL) Experience with JIRA and Kanban boards for project management Familiar with vehicle system (i.e., capabilities of ECUs on a vehicle) Familiar with automotive standards (i.e., ISO 14229-1, ISO 21434) Familiar with quality tools and methodologies (i.e., FMEA, DVP) Able to work following an agile methodology Knowledge of Ford's internal engineering systems and requirements Comfortable working in a fast-paced and innovative environment where problems are not always well-defined. Experience advocating and driving adoption of industry standard methodologies. Project management skills, including identifying and scheduling process steps, determining resources and staff required to successfully complete research projects. You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply! As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder…or all of the above? No matter what you choose, we offer a work life that works for you, including: • Immediate medical, dental, vision and prescription drug coverage • Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more • Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more • Vehicle discount program for employees and family members and management leases • Tuition assistance • Established and active employee resource groups • Paid time off for individual and team community service • A generous schedule of paid holidays, including the week between Christmas and New Year's Day • Paid time off and the option to purchase additional vacation time. For a detailed look at our benefits, click here: ******************************* This position is a range of salary grades 5-8. Visa sponsorship is not available for this position. Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire. We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************. #LI-Hybrid What you'll do... Perform product Cyber Security assessments on projects of multiple Ford product lines Compliance reviews on features, modules as defined in the Ford Cyber Security engineering process in compliance with ISO 21434, UNECE R155, UNECE WP.29 and any other required relevant global cyber security requirements, regulations. Using that understanding to standardize all business operations and establish clear, documented protocols. Have the ability to review technical documentation to assess compliance. Manage and apply cybersecurity requirements into product design and development life cycle from requirement to testing with required deliverables Work with feature and ECU owners to manage the progression of each feature / ECU through development to ensure security by design from inception Ensure features, components, systems are designed using robust engineering processes including threat analysis, risk assessment, adoption of security requirements, security audits, and vehicle ecosystem assessments Develop and utilize global supplier expertise to meet cyber security expectations Proficient in JIRA. Process, requirement improvement support, for future reference, particularly in the event of an audit by a regulatory agency. Provide presentations to management (program milestones, security governance board, etc.)
    $81k-113k yearly est. Auto-Apply 36d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Traverse City, MI?

The average information security analyst in Traverse City, MI earns between $60,000 and $119,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Traverse City, MI

$85,000
Job type you want
Full Time
Part Time
Internship
Temporary