Intrusion detection analyst jobs near me - 79 jobs
Let us run your job search
Sit back and relax while we apply to 100s of jobs for you - $25
Senior Cyber Security Risk & Controls Analyst
First Citizens 4.8
Remote intrusion detection analyst job
This remote position supports cybersecurity governance by performing risk and control self-assessments (RCSAs), evaluating cybersecurity controls, and supporting key risk management processes. The role helps identify risk and control gaps, assess cyber risks, and recommends improvements to strengthen the organizations cyber posture. The position provides risk analysis, documentation, and control development support across cybersecurity teams, acting as a resource for process owners and contributing to continuous improvement initiatives.
Responsibilities
Execute cybersecurity process level RCSAs in partnership with business function owners and stakeholders
Document risk and controls assessment results, risk ratings, and supporting evidence in accordance with Enterprise Risk Standards
Draft, update, and refine control risk and control statements to ensure clarity, effectiveness, and alignment with cybersecurity processes
Review existing risks and controls for design effectiveness, identifying gaps, inconsistencies, or opportunities for improvements
Partner with business function owners to periodically update inherent and residual risk ratings for process level risks
Assist cybersecurity teams with updating control effectiveness and control environment ratings on a regular cadence
Evaluate cybersecurity risks and controls against Enterprise Policies and Standards, regulatory requirements, and industry standards
Support remediation planning by documenting gaps, improvement recommendations, and target-state control enhancements
Participate in projects, assessments, or escalated tasks requiring risk and control expertise
Qualifications
Bachelor's Degree and 8 years of experience in Information security, cybersecurity, risk management, or a related field OR High School Diploma or GED and 12 years of experience in Information security, cybersecurity, risk management, or a related field
Experience performing risk assessments, RCSAs, or controls testing
Working knowledge of cybersecurity processes, controls and risk concepts
Familiarity with frameworks such as NIST CSF, NIST SP 800-53
Ability to write clear, actionable control statements and assessment findings
Strong analytical, documentation, and communications skills
Ability to work collaboratively with technical and non-technical stakeholders
Preferred
4-7 years of experience in Information or cyber security risk or control assessment
Experience supporting cybersecurity programs within a financial institution or regulated environment
Certifications such as Security+, SSCP, CISA, CISM, CISSP, CRISC
Understanding of threat landscapes, IT processes, and common control frameworks
Experience supporting process improvements, control rationalization, or evidence evaluation
The base pay for this position is generally between $120,000 and $180,000. Actual starting base pay will be determined based on skills, experience, location, and other non-discriminatory factors permitted by law. For some roles, total compensation may also include variable incentives, bonuses, benefits, and/or other awards as outlined in the offer of employment.
This job posting is expected to remain active for 45 days from the initial posting date listed above. If it is necessary to extend this deadline, the posting will remain active as appropriate. Job postings may come down early due to business need or a high volume of applicants
Benefits are an integral part of total rewards and First Citizens Bank is committed to providing a competitive, thoughtfully designed and quality benefits program to meet the needs of our associates. More information can be found at ****************************************
#J-18808-Ljbffr
$120k-180k yearly 17h ago
Looking for a job?
Let Zippia find it for you.
Epic Cadence & Security Analyst
Onpoint Search Consultants 4.2
Remote intrusion detection analyst job
What you will find ...
100% REMOTE
exceptional benefits (pension plan options)
top ranked hospital in the U.S.
What you will do ...
design & build Epic Cadence
build Epic Security
break-fix & support Epic Cadence & Security
optimize Decision Tree for scheduling
liaison with operational stakeholders
Wish list ...
5+ years Epic Cadence & Security build
REQUIRED Epic Cadence Certification
REQUIRED Epic Security Certification
recent Epic Security work
Decision Tree a plus
$80k-116k yearly est. 4d ago
Threat Detection and Response Analyst
Tucows 4.2
Remote intrusion detection analyst job
Wavelo is a SaaS business on a mission to make telecoms a breeze. We provide flexible software that modernizes how communication service providers (CSPs) do business, helping them drive more value, focus on customer experience, and scale their operations faster.
As part of Tucows (NASDAQ:TCX, TSX:TC)-one of the world's largest Internet services companies-Wavelo is backed by outstanding resources and talent. We embrace a people-first philosophy that is rooted in respect, trust, and flexibility. We believe that whatever works for our employees is what works best for us. It's also why the majority of our roles are remote-first, meaning you can work from anywhere you can connect to the Internet!
The work we do genuinely changes lives. If this sounds exciting, we'd love to hear from you!
About the Opportunity
As a Threat Detection and Response Analyst, your primary focus will be to proactively identify, investigate, and mitigate advanced threats within Tucows' environment. You will be part of the larger Information Security team, playing a key role in detecting and responding to sophisticated adversaries that evade traditional security controls across our complex environments.
You will collaborate with cross-functional teams to strengthen our defenses, enhance detection capabilities, and ensure compliance with established security frameworks and policies. This role requires participation in our 24/7 on-call rotation for incident response.
You'll thrive in this role if you enjoy deep technical investigation, pattern recognition, and staying ahead of evolving cyber threats.
This is a remote position for applicants based in Canada or USA.
Job Duties
* Perform cybersecurity threat detection, analysis, and mitigation as part of a global, around-the-clock security team.
* Perform proactive threat hunting across Tucows' systems, networks, and cloud environments to detect hidden or emerging adversarial activity.
* Investigate potential security incidents using a wide range of tools, logs, and techniques across cloud and on-premise environments.
* Collaborate with other Security Analysts and Security Engineering personnel to triage, contain, and remediate identified threats.
* Develop and tune custom detection rules, scripts, and playbooks to improve threat visibility and response effectiveness.
* Design, build, and maintain scalable detection logic across SIEM and EDR platforms.
* Conduct proactive threat hunting to detect potential adversary activity within the environment.
* Design, test, and improve security detections, playbooks, and automation workflows to enhance response capabilities and reduce detection gaps.
* Review and triage alerts and logs, escalating significant incidents.
* Monitor external service providers for suspicious activity or potential security events.
* Perform continuous analysis of threat intelligence, tactics, techniques, and procedures (TTPs) to anticipate attacker behavior.
* Utilize Cyber Threat Intelligence sources and workflows to augment detection and response.
* Document and communicate findings with clear technical and business context, recommending long-term preventive actions.
* Contribute to purple team exercises, attack simulations, and post-incident reviews to enhance defense-in-depth capabilities.
* Mentor junior analysts and foster a culture of curiosity, learning, and shared security ownership.
Knowledge, Skills, and Abilities
* Deep understanding of adversary tradecraft, the MITRE ATT&CK framework, and modern threat landscapes.
* Experience with SIEM, EDR, and cloud-native detection tools (e.g., CrowdStrike, Alienvault, AWS GuardDuty, Azure Defender, Elastic, etc.).
* Strong analytical and investigative mindset with the ability to connect technical indicators to strategic insights.
* Familiarity with scripting languages (Python, PowerShell, etc.) for automating hunts and data analysis.
* Knowledge of network protocols, operating system internals, and log analysis.
* Excellent written and verbal communication skills with the ability to translate complex findings into clear risk narratives.
* Demonstrated ability to work both independently and collaboratively in a fast-moving environment.
Qualifications Required
* Bachelor's degree in Cybersecurity, Computer Science, or a related field (or equivalent experience).
* 5-8 years of experience in cybersecurity, including 3+ years focused on threat hunting, detection engineering, or incident response.
* Relevant certifications are a plus (e.g., GCFA, GCTI, GNFA, OSCP, or equivalent).
The base salary range for this position is $114,300 - $127,000 USD for US residents OR $118,260 - $131,2400 CAD for Canadian residents. Other countries will differ. Range may vary on a number of factors including, but not limited to: location, experience and qualifications. Tucows believes in a total rewards offering that includes fair compensation and generous benefits. Learn more about Tucows Benefits.
Want to know more about what we stand for? At Wavelo and Tucows we care about protecting the open Internet, narrowing the digital divide, and supporting fairness and equality.
We also know that diversity drives innovation. We are committed to inclusion across race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status or disability status. We celebrate multiple approaches and diverse points of view.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request an accommodation.
Tucows and its subsidiaries participate in the E-verify program for all US employees.
Learn more about Tucows, our businesses, culture and employee benefits on our site here.
Senior Cyber Security Ops Analyst
Applicants Need To Know
6+ Month Contract
Work Status: USC, GC
Sponsorship: No, Sponsorship provided.
Office Type: Remote
Hourly Rate: $75 to $85 W2 Only
No Corp-to-Corp
Please note that only candidates who are authorized to work in the United States without sponsorship will be considered for this position.
We seek a Senior Cyber Security Ops Analyst for our client. This is a contract position lasting 6+ months. The role is remote and requires availability in the Eastern or Central time zones.
As a Sr Cyber Security Ops Analyst, you will be responsible for security monitoring and incident response for both internal and external threats. You will collaborate with internal IT teams and MSSP to ensure effective security monitoring and response. Additionally, you will implement advanced security monitoring techniques to identify malicious behavior and develop automation response scripts to remediate commodity threats. Your role will also involve performing threat analysis utilizing industry standard frameworks and conducting threat research to improve detection and response capabilities. You will have the opportunity to propose and review security plans and policies to enhance the overall security environment.
The Work:
Conduct investigations and respond to internal and external security threats.
Oversee, respond to, and remediate DLP (data loss prevention) and SIEM events from on-premise and cloud systems.
Implement advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints.
Manage, administer, and improve security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry-standard security technologies.
Develop automation response scripts to remediate commodity threats.
Perform threat hunting activities to identify compromised resources.
Understand and perform threat analysis utilizing industry-standard frameworks (kill chain and diamond model).
Perform threat research and intelligence gathering to improve detection and response capabilities.
Propose and review security plans and policies to improve the security environment.
Maintain operational playbooks, process diagrams, and documentation for security monitoring and response.
Review proposed Security deployments to ensure security monitoring requirements are met.
Provide off-hour support as needed for security monitoring and response activities.
Work closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external.
Review compromised systems to identify the root cause of security incidents.
Qualifications:
Minimum of 5 years of experience in security monitoring and incident response
Strong knowledge of DLP (data loss prevention) and SIEM events
Experience with advanced security monitoring techniques on SaaS, cloud systems, network, servers, and endpoints
Proficiency in managing and administering security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry standard security technologies
Ability to develop automation response scripts for commodity threats
Familiarity with threat hunting activities to identify compromised resources
Understanding of threat analysis utilizing industry standard frameworks (kill chain and diamond model)
Experience in threat research and intelligence gathering to improve detection and response capabilities
Knowledge of reviewing security plans and policies to enhance the security environment
Strong documentation skills for operational playbooks, process diagrams, and security monitoring/response documentation
Ability to review proposed Security deployments to ensure compliance with security monitoring requirements
Willingness to provide off-hour support for security monitoring and response activities
Nice to Have:
Experience with cloud security technologies such as CASB, Cloud Access Security Brokers
Knowledge of scripting languages such as Python or PowerShell
Familiarity with industry compliance standards (e.g., PCI DSS, HIPAA, GDPR)
Certifications in relevant areas such as CISSP, CISM, or CEH
Experience working with incident response tools and processes
#CyberSecurity #SecurityOps #IncidentResponse #ThreatAnalysis #SecurityMonitoring #DataLossPrevention #SIEMEvents #CloudSecurity #EndpointSecurity #ITSecurity
$75-85 hourly 60d+ ago
Cyber Security Analyst
Military, Veterans and Diverse Job Seekers
Remote intrusion detection analyst job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
$74k-100k yearly est. 60d+ ago
Cyber Analyst, Digital Forensics Incident Response
Bay 4.7
Remote intrusion detection analyst job
Why you should join our At-Bay Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
The Role:
Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via:
Forensically sound collection, transmission, and storage of digital evidence
Analysis of digital evidence to identify indicators of compromise and adversary activity
Development of incident timelines and theories of compromise
Identification of incident root causes
Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.)
Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary
Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary
Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds
Development and delivery of incident response training and simulations for targeted insureds
Key skills:
Previous digital forensics and incident response experience
Strong oral and written communication skills
Previous hands-on experience performing digital forensics and incident response, including several of the following:
Business Email Compromise
Ransomware
Digital evidence collection and analysis
Development and analysis of cyber threat intelligence
Leadership of or participation in investigations involving digital evidence
Intrusiondetection / cyber threat hunting
Malware analysis
Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc.
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements:
Bachelor's degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline
Willingness to travel as needed to perform job functions
Preferred requirements:
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Previous background in law enforcement or government/military with experience leading complex technical investigations
Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
Experience in a top-10 cyber consulting firm or leading DFIR provider preferred
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location:
USA, Nationwide
Fully Remote
Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
$80k-115k yearly Auto-Apply 60d+ ago
Global Cyber Wordings Analyst
Liberty Mutual 4.5
Remote intrusion detection analyst job
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
$76k-99k yearly est. Auto-Apply 8d ago
Cyber Security Analyst/Implementation Specialist
Tectammina
Intrusion detection analyst job in Columbus, OH
Responsibility for information cyber security analysis & response with the mission of protecting the firm from internet attacks / threat actors. Lead initiatives and the implementation of capabilities in order to advance the Cyber Threat program Enhance and distribute security incident response and escalation procedures to ensure timely and effective handling of security events and alerts
Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements.
A solid understanding of Penetration Testing, Vulnerability Management, Threat Vector Analysis, IntrusionDetection and Prevention, Incident Management and Response, Web Application Security, Risk Assessment and Mitigation methodologies, and Counter Threat Operations.
Qualifications
Cyber Security Analyst/Implementation Specialist - need someone that has broad cyber security knowledge that can not only recommend solutions, but more importantly also has experience implementing/managing those solutions.
MUST HAVE JAVA DEVELOPMENT BACKGROUND
Need solid remediation experience - how to remediate vulnerabilities in a web application
CISSP certification is nice to have, not mandatory
Additional Information
Job Status: Contract to Hire
Eligibility: EAD Green Card/ Green Card/ US Citizens
Share the Profiles to *********************
Contact:
************
Keep the subject line with Job Title and Location
$72k-99k yearly est. Easy Apply 2d ago
Cyber Security Analyst
Ohiox, Inc.
Intrusion detection analyst job in Columbus, OH
The Columbus Regional Airport Authority manages and operates passenger-focused John Glenn Columbus International Airport (CMH), cargo-focused Rickenbacker International Airport (LCK), and general aviation airport Bolton Field (TZR).
We are a diverse group of committed and talented professionals who show up every day to take CRAA to new heights. Although our roles are as diverse as we are - from Custodial Services to Customer Service, from Accounting to Airport Police, from HVAC to Human Resources - we have one common goal: connect Ohio with the world.
Our organization is in constant motion, moving people and cargo 365 days a year. With our core values of Accountability, Innovation and Respect guiding us, we each do our part to contribute to our organization, the aviation industry, local businesses, and the economy. We create experiences for passengers, we create opportunities for businesses, and we create economic growth for Columbus.
Trust and respect are the foundation of our culture. We invite new ideas. We encourage innovation. We are inclusive and welcoming. We are empowered to enact positive change.
Your “Take Off” will be successful by doing the following with excellence:
Must be able to report in-person to the office daily, with one day from home.
Assists in monitoring and analyzing security events and incidents using various security tools and technologies.
Collaborates with the Security Operations Center in the assessment, triage, and response to potential cyber security incidents.
Partners with the Service Delivery team in the assessment and remediation of software patching and security configuration baseline deviations across the desktop and infrastructure estate.
Assists in the performance of regular security audits and assessments. This may involve evaluating technical controls, processes, and documentation.
Conducts initial investigations and assessments of potential security threats to critical infrastructure assets and systems. Utilizes frameworks such as NIST Risk Management Framework (RMF) to assess risk posture.
Assists in the implementation and configuration of security controls to meet regulatory requirements and industry best practices. This may include network segmentation, encryption, access controls, and intrusiondetection/prevention systems.
Participates in the development and delivery of cyber security awareness training programs to educate employees about their roles and responsibilities in protecting critical infrastructure assets and sensitive information.
Participates in projects and identifies solutions to support improvement and growth.
Performs related work as required.
Your “Landing” will be smooth if you meet the following requirements:
Bachelor's Degree in Cyber Security or Forensic Analyst, or a related field, preferred,
Minimum of three (3) years of experience in a cyber security role. Or equivalent education and years of experience
Strong knowledge of security principles and technologies
Knowledge of security incident response procedures and tools such as SIEM's, VMS, Endpoint Security Management
Must possess and maintain a valid Ohio driver's license, in good standing
Salary range for this position is $80,000.00 - $90,000.00. The offered salary is evaluated using internal equity, job knowledge, skills, experience, and other key factors.
Able to pass a pre-employment drug test, which includes testing for marijuana (medical marijuana cards are not acceptable)
The Columbus Regional Airport Authority is an equal opportunity employer and does not discriminate in hiring or terms and conditions of employment because of an individual's race, color, religion, gender, age, national origin, veteran status, disability, and all other groups or classes protected by applicable federal, state or local laws. The Authority does not tolerate violence or drug use in the workplace.
$80k-90k yearly Auto-Apply 6d ago
Computer Network Defense(CND)Analyst
Apotheosis
Intrusion detection analyst job in Columbus, OH
Overall Assignment Description:
The CND Analyst will perform actions to protect, monitor, detect, analyze and respond to unauthorized activity within assigned information systems and computer networks. Duties include: Employs Cybersecurity capabilities and
deliberate actions to respond to a CND alert or emerging situational awareness/threat.
Serves as an expert on CND requirements and compliance to such requirements by using IA
tools and techniques to perform compliance analysis and correlation, tracking and remediation,
coordination and escalating CND non-compliance.
Provides technical analysis and sustainment support for the enterprise for IA tools and
applications, and assists with the application of Defense-In-Depth signatures and perimeter
defense controls to diminish network threats
Skills and Experience:
Required:
Must possess a current DOD Top Secret Clearance and be eligible for SCI and IT-1 access at
time of proposal submission
Five (5) years of relevant experience or related formal education
Two (2) years of experience performing root cause analysis of cybersecurity events and incidents
Two (2) years of experience analyzing network traffic and/or system logs
DOD Approved 8570/8140 Baseline Certification : Category IAT Level II
DOD Approved 8570/8140 CSSP Certification : CSSP-IR
Must possess written and verbal skills to appropriately document and brief Cybersecurity
Incidents
Working knowledge of at least two cybersecurity areas:
Firewall
IDS/IPS
Host based antivirus
Vulnerability Management
JETS RFQ SP4709-24-Q-0002
DLA Cyber Emergency Response Team (CERT) Cyber Security Service Provider (CSSP)
Support
Forensics
Malware Analysis
Device Hardening
Understanding of Defense-in-Depth
Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python
$61k-85k yearly est. 60d+ ago
Cyber Security & AI Risk Analyst
Insight Global
Intrusion detection analyst job in Worthington, OH
Conduct risk assessments for AI tools, GPTs, and automation use cases using NIST AI RMF-aligned evaluation frameworks. Review AI tool submissions for security, privacy, and compliance risks; escalate issues as needed. Support the development and maintenance of Worthington's AI Registry and related workflows.
Assist with OneTrust implementation, including configuring intake workflows, registry fields, risk scoring logic, and documentation capture.
Monitor open reviews and ensure timely follow-up with stakeholders (business leads, vendors, legal, cybersecurity, etc.).
Collaborate on creating and maintaining cybersecurity content within AI governance documentation, registry systems, playbooks, risk scoring models, and OneTrust survey templates.
Represent Cyber in AI governance meetings (e.g., Governance Group, Triage Team) as a contributing member (non-approving role).
Support importing and mapping third-party vendors in OneTrust and help manage third-party risk review processes.
Assist in building and maintaining the Third-Party Risk Management (TPRM) governance program, including policies, workflows, and response tracking.
Draft and maintain Cyber-owned components of AI risk assessments, playbooks, and frameworks in partnership with Cyber and Governance leads.
Pay Range: 55-70/hr
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- 3-10 years of experience in cybersecurity, risk management, compliance, or privacy.
- Familiarity with AI-related risk domains
- Knowledge of NIST frameworks
- Experience with OneTrust
$72k-98k yearly est. 6d ago
Cloud Security Analyst (Remote)
Knowbe4 4.4
Remote intrusion detection analyst job
Join the cybersecurity company that puts security first; literally and without compromise. At KnowBe4, our AI-driven Human Risk Management platform empowers over 70,000 organizations worldwide to strengthen their security culture and transform their workforce from their biggest vulnerability into their strongest security asset. As the undisputed industry standard with unusually high customer retention rates and recognition as a Leader by G2 and TrustRadius, we're not just providing security awareness training - we're redefining what it means to be a trusted security partner in an increasingly complex threat landscape.
Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4.
Remote positions open to the US only.
The Opportunity
Join our Information Security team as the person responsible for monitoring and protecting KnowBe4's cloud infrastructure. As Cloud Security Analyst, you'll be the first responder for security alerts across our AWS and Azure environments; triaging, investigating, and coordinating responses that protect both company and customer data. You'll own the day-to-day security operations that keep our cloud ecosystem secure: analyzing alerts, hunting threats, investigating incidents, and partnering with engineering teams to ensure vulnerabilities get fixed before they become problems. The successful candidate stays calm under pressure, stays curious about new attack vectors, builds tools to make their job easier, and is passionate about cybersecurity.
What You'll Do
Security Monitoring & Response: Continuously monitor and triage alerts from SIEM, CSPM, CWPP, and cloud security tools - identifying what's a real threat, what needs immediate action, and what requires deeper investigation.
Incident Management: Serve as primary responder for cloud security incidents, leading investigation efforts from initial detection through containment, eradication, and recovery while keeping stakeholders informed throughout.
Threat Hunting & Analysis: Proactively hunt for threats across security log feeds, perform root cause analysis on vulnerabilities and incidents, and stay ahead of emerging attack patterns using frameworks like MITRE ATT&CK.
Alert Engineering: Build and refine security alerts and dashboards that catch the signals that matter - reducing noise while ensuring critical issues surface quickly and clearly.
Security Testing & Validation: Conduct security reviews and penetration testing across cloud infrastructure, identifying weaknesses before attackers do and validating that our defenses actually work.
Cross-Team Collaboration: Partner closely with IT, engineering, and development teams to ensure security findings are understood, prioritized appropriately, and remediated with solid engineering principles-not just quick fixes.
What You Bring
2+ years of hands-on experience in cloud security, information security operations, or similar roles where you've monitored alerts, investigated incidents, and worked within AWS and/or Azure environments.
Practical cloud security knowledge with demonstrated ability to navigate cloud environments, understand misconfigurations, and think like an attacker to anticipate where vulnerabilities hide.
Builder mindset with AI-assisted development skills - you actively leverage AI tools to write scripts, automate repetitive tasks, and solve your own problems rather than waiting for someone else to build solutions for you.
Security operations foundation - you understand how to triage alerts, distinguish true positives from noise, investigate incidents methodically, and communicate findings clearly to both technical and non-technical audiences.
Strong organizational skills and time management - you can juggle multiple security investigations simultaneously, prioritize what needs attention now versus what can wait, and keep track of incidents through resolution without dropping details.
Some experience with offensive security - you know your way around infosec testing tools, understand OWASP Top 10, can think through how attackers exploit cloud environments, and have some exposure to penetration testing concepts.
Comfort across technical domains - basic scripting ability, Linux command line navigation, understanding of application concepts (APIs, containers, databases), and some experience working with infrastructure-as-code tools like Terraform or CloudFormation.
Bonus points if you have:
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, or similar professional credentials that validate your expertise).
Bachelor's degree in information security, information systems, computer science, or related technical field.
Experience with MITRE ATT&CK Framework in practical incident response scenarios where you've mapped adversary techniques to actual alerts.
Background deploying security tooling as code - building alerts, automation, or security solutions using proper engineering principles that others can actually use and maintain.
Why You'll Love It Here
Builder-Friendly Culture: We encourage you to solve your own problems with good engineering principles; everything is deployed through Terraform, following the same standards as our development teams-you'll write solutions that scale, not just quick scripts.
Remote Flexibility: Fully remote position open across the US, giving you the autonomy to work where you're most effective while staying connected to a collaborative security team.
Continuous Learning: Budgets for certifications, conferences, and dedicated exploration time to research new tools and stay current
Transparency and Trust: Radical candor, low ego, high accountability
Global Scale: Your work will help protect users across 70,000+ organizations worldwide.
The base pay for this position ranges from $80,000 - $85,000, which will vary depending on how well an applicant's skills and experience align with the job description listed above.
We will accept applications until 1/30/2026.
Our Fantastic Benefits
We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, and certification completion bonuses - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit *********************************
Note: An applicant assessment and background check may be part of your hiring procedure.
Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit **********************************************
No recruitment agencies, please.
$80k-85k yearly Auto-Apply 14d ago
Senior Information Security Risk Specialist (GRC)
Unveiling Opportunities
Remote intrusion detection analyst job
About Us
At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible-leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats.
From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you.
What are we looking for?
We are looking for a highly motivated, collaborative and experienced Senior InfoSec Risk Specialist with a security-focused mindset who can balance risk, business drivers and timelines. This position will be responsible for understanding and supporting the design of SentinelOne's organizational, procedural and technological security controls within the context of the security frameworks applicable to SentinelOne. In addition, you will be responsible for identifying and testing appropriate controls to ensure they are designed, implemented, and operating effectively to mitigate risk. The selected employee will help implement, automate, document and maintain controls while supporting and responding to inquiries from internal and external stakeholders. This individual must be self-directed and be able to work independently and collaboratively.
What will you do?
Support the planning and performance of IT risk-based security audits and projects, risk assessments, execution of fieldwork and communication to stakeholders.
Help in evaluating relevant global standards, compliance frameworks and regulations to analyze existing controls; identify areas for improvement; and design control growth.
Collaborate with process and control owners through the audit lifecycle for process documentation updates, testing coordination, remediation of identified deficiencies and advising on internal control enhancements or process changes, as appropriate.
Proactively manage audit findings, tracking and documentation of status updates obtained via action owners, and timely execution of remediation activities.
Participate in internal security and compliance programs and track recurring controls, such as SSAE 18 SOC 2, ISO 27001/27002.
Provide control consultative support to the business to assist in redesign efforts to improve the control environment and identify opportunities for control improvements with the objective of mitigating risk and improving compliance and operational performance.
Help support internal/external audits and evidence collection via a GRC tool.
Document new and update existing policies, procedures, standards and resources
Participate in Security awareness program, train personnel on data security and privacy-related processes and responsibilities.
Help support customer security reviews, RFPs and external security and privacy inquiries.
Participate in defining, collecting and tracking various Security Metrics.
What skills and experience should you bring?
5+ years of experience working in information security, risk or compliance.
Experience working with Security Controls across at least some of the following domains: Access Management, Encryption, Risk Management, Network Security, Configuration Management, Patch Management, Change Management, Awareness and Training, BC/DRP, etc.
Ability to perform internal audits with minimal direct supervision, exhibit professional audit judgment and have experience in a broad range of audit projects such as SSAE 16/18 SOC 2, ISO 27001/2, NIST.
Strong risk management experience, performing assessments and audits, designing controls, managing enterprise control frameworks, and prioritizing risk.
Strong project management skills and ability to manage a variety of projects simultaneously to completion within the agreed timelines.
Excellent collaboration and interpersonal skills. Must be able to communicate with all levels in the organization.
Ability to communicate effectively, in writing and verbally, to target audiences, including customers, partners, auditors, executive management, vendors, and peers.
Experience working with both technical and non-technical teams.
Ability and desire to understand the intent of requirements and provide effective recommendations.
Ability to prioritize in a highly dynamic work environment.
Our Preferred Qualifications:
Advanced degree in computer science, Information Technology, Information Security or related field.
Experience with, and strong understanding of common Security Compliance frameworks, controls, and best practices such as COSO, SOC 2, SOX ITGC, ISO 27001/27002, GDPR, PCI, NIST and other applicable regulatory compliance frameworks.
Relevant certifications (ISO 27001 LA/LI, CISA, CISM, CISSP, CRISC, etc.)
Ability to assess and pragmatically define scope and relevant controls.
Strong desire to learn and continuously develop and deepen technical skills.
Why us?
You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry.
Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry-leading gender-neutral parental leave
Paid Company Holidays
Paid Sick Time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events, including regular happy hours and team-building events
This U.S. role has a base pay range that will vary based on the location of the candidate. For some locations, a different pay range may apply. If so, this range will be provided to you during the recruiting process. You can also reach out to the recruiter with any questions.
Base Salary Range$104,000-$138,000 USD
SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
SentinelOne participates in the E-Verify Program for all U.S. based roles.
$104k-138k yearly Auto-Apply 55d ago
Senior Information Security Specialist-SECRET CLEARANCE REQUIRED
Latitude Inc.
Remote intrusion detection analyst job
Primary Responsibilities:
Execute and support the Risk Management Framework (RMF) lifecycle including system categorization, control selection, implementation, assessment, and authorization.
Develop, maintain, and validate System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, Contingency Plans (CPs), and related compliance documentation.
Conduct and lead vulnerability assessments, leveraging tools such as Nessus, ACAS, and Fortify to identify and prioritize remediation efforts.
Perform continuous monitoring of security controls and produce metrics, dashboards, and evidence in support of ATO renewals and sustainment.
Analyze and respond to security incidents, working with SOC personnel and SIEM tools to evaluate logs, investigate events, and contain potential threats.
Conduct internal audits and risk assessments to validate the effectiveness of implemented controls and identify compliance gaps.
Provide security guidance to engineering and development teams, ensuring adherence to cybersecurity standards in a DevSecOps environment.
Stay informed of evolving threats, vulnerabilities, and regulatory changes to proactively enhance security postures.
Coordinate with Security Control Assessors (SCAs), ISSOs, system owners, and federal stakeholders on audit readiness and policy compliance.
Draft and enforce cybersecurity policies, SOPs, and standards that support mission-critical systems across hybrid environments.
All other duties as assigned by management.
Qualifications
Bachelor's or Associate's degree in Computer Science, Math, Information Technology, Engineering, or related field. Five (5) years of directly relevant experience may substitute for two (2) years of formal education.
Minimum of five (5) years of experience in experience with vulnerability scanning tools and security assessment methodologies.
Minimum of five (5) years of experience with network security, firewall management, intrusiondetection/prevention systems (IDS/IPS).
Minimum of (5) years of experience with Security Information and Event Management (SIEM).
Minimum of five (5) years of experience in the risk management framework.
Basic knowledge of the following: Active Directory, UNIX, RHEL, Windows, Relational Databases.
Previous support of federal government enterprise systems or DHS/DOD programs is strongly preferred.
Must have an active DoD Secret Clearance.
$82k-116k yearly est. Auto-Apply 60d+ ago
IT Security Specialist 4/ITSS2 (39604)
Idealforce
Intrusion detection analyst job in Columbus, OH
IDEALFORCE has a CONTRACT position available immediately for a IT Security Specialist(ITSS2) to join our customer in Columbus, OH. This is an ONSITE position and require in person interview. Please find below additional details about this job.
Job Description
Security Consultant to help IT Augment the security staff until OIT can take over all Security related needs for the agency. This position will function as a highly skilled Security Consultant with specific responsibilities that include:
-Monitor network and information system activity.
-Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.) Uses creativity and innovation to automate and streamline processes and procedures.
-Understands customer support, likes to work with people and can ensure that the customer is satisfied.
-Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc.
-Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT
-Perform specialized security functions (e.g. forensics for incident response).
-Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services.
-Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc.
SPECIAL NOTE: Client is running a 24/7 operation. Consultant may need to come in during incident or emergency situations.
During the interview process with the ODPS staff, the resource consultant must demonstrate competence/experience in their specific area(s) of project assignment. The resource's experience must also be documented for review and verification. Offered resources not showing technical or functional competence/experience will be sufficient reason to reject the Offeror's proposal. It is the responsibility of the Offeror to pre-screen their candidates to ensure compliance. Resource will have a background check conducted by ODPS.
Qualifications
-1-2 Years SIEM (Q-Radar preferred)
-8 years customer service experience
-8 Years Troubleshooting experience
-8+ years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP.
-8 years' experience with Active Directory.
-4 Years experience with Web and Email Filtering and Security (Ironport)
-5+ Years experience with Imperva (DAM/WAF)
-1 years of Vulnerability scanning experience (Qualys)
-3 years A/V suite experience McAfee
-3 years IPS (IBM)
-Contributes to continuous process improvements to increase the efficiency of section.
-Excellent communication skills both written and oral.
-Strong communication/ leadership skills.
-Strong influence, collaboration and negotiation experience.
-Ability to collaborate with supporting resources across business and/or functional lines.
-Have excellent oral and written skills/possess strong meeting and work session facilitation skills.
-Have the ability to work independently and as part of a team, the ability to manage time and resources to meet assigned deadlines.
-Have strong understanding of prioritization stemming from the elicitation of system and/or user requirements.
-Have excellent organizational skills, proven analytical, planning, problem solving, and decision-making skills.
-Must be knowledgeable in the English language/speak clearly and understandably use the English language.
Desired Skills
-Q-Radar
-Ironport Web and Email Security
-Imperva
-Certifications in Microsoft
-Powershell 3.0 scripting background.
-Qualys
-McAfee Enterprise solutions
-IPS
-Splunk
-Other security related tools.
-ITIL Knowledge and ITSM Tools.
Additional Information
Additional Information :
- "All your information will be kept confidential according to EEO guidelines".
- All candidates who are authorized to work in US are encouraged to apply.
- Candidates must clear the Background check prior to commencing the assignment.
THIRD PARTY CANDIDATES:
Email your candidate/s resume to joseph dot shelton at idealforce.com along with the following details: Rate, Current location and Availability.
Disclaimer :
The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
$71k-100k yearly est. 60d+ ago
Senior System Security / Cybersecurity Analyst
Teksynap
Intrusion detection analyst job in Columbus, OH
Responsibilities and Qualifications
RESPONSIBILITIES
Serve as a cybersecurity SME, providing support for ESS and EKC system assessments.
Fully versed in the general tenets of the DoD's authorization process, including relevant cybersecurity policies, procedures, and processes.
Support the DoD cybersecurity process by serving as a SME for ESS and/or EKC systems undergoing authorization.
Design, develop, and implement cybersecurity measures into systems, delivering comprehensive cybersecurity assessment documentation.
Understand and apply security controls identified in NIST 800-53 to the process of assessing and authorizing DLA ESS and EKC systems.
Determine the severity value of identified vulnerabilities and assess their potential impact on the system's current or future authorization status.
Perform key functions related to security control selection, implementation, and documentation.
Collaborate closely with the Information Systems Security Manager (ISSM) on complex system details.
Monitor and control communications at key internal boundaries among subsystems and provide system-wide common controls that meet or exceed the requirements of constituent subsystems.
Lead the development, integration, and testing processes to deliver and deploy production-ready systems that meet business requirements and project schedules.
Work closely with product management to translate business requirements into technical solutions, architecture design, level of effort, and project schedule.
Design architecture and establish best practices to produce efficient and effective system operations while minimizing refactoring and rework.
Provide support for the Security Technical Implementation Guides (STIGs) process and develop and submit cybersecurity documentation as required.
Ensure the implementation of DoD STIG compliance for ESS/EKC systems/applications and maintain compliance with required DoD STIGs.
Support reviews associated with STIGs, cyber assessments, and continuous monitoring activities.
REQUIRED QUALIFICATIONS
Experience:
Five (5) years of relevant C&A experience
MF and NIST C&A experience
DOD cybersecurity experience
Certifications: (One of the following)
CGRC/CAP
CASP+
CCSP
SSCP
Security+
GSEC
CISM
CISSO
FITSP-M
GCIA
GCSA
GCIH
GSLC
GICSP
CISSP-ISSMP
CISSP
Clearance:
Must possess a Secret security clearance or have a current National Agency Check with Local Agency Check and Credit Check (NACLC).
Overview
We are seeking a Senior System Security / Cybersecurity Analyst to join our team supporting DLA Integrated Electronic Security Systems (IESS) and Electronic Key Control (EKC).
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at *****************
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP". As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration.
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Location: Columbus, OH
Type of environment: On Site
Noise level: Medium
Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs.
Amount of Travel: Less than 10%
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
WORK AUTHORIZATION/SECURITY CLEARANCE
U.S. Citizen
Secret security clearance or have a current National Agency Check with Local Agency Check and Credit Check (NACLC).
OTHER INFORMATION
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as “protected status”). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance.
$71k-100k yearly est. Auto-Apply 60d+ ago
Staff Information Security Analyst
Playstation 4.8
Remote intrusion detection analyst job
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
Sony Interactive Entertainment LLC seeks a Staff Information Security Analyst in San Mateo, CA to define strategic GRC (Governance, Risk and Compliance) input in global initiatives, including Artificial Intelligence (AI) and Machine Learning (ML) adoption, cloud security, and enterprise wide policies, ensuring resilience while balancing business and regulatory needs. Requires a Master's degree in Cybersecurity, Information Security, or related field or equivalent, and four (4) years of experience conducting risk assessments on critical information systems to maintain and manage risk registers; facilitating the Security Risk Assessment methodology, policy, strategy and process; writing security assessment reports following security breaches and detailing the associated impact; monitoring and reviewing IT Security controls to identify operational effectiveness; mapping security controls to policies, standards, procedures and processes to ensure compliance with security measures; managing security remediation efforts and tracking status of security deficiencies; translating security risk mitigation plans into actionable items to mitigate risk in coordination with technical and business teams; developing and implementing policy frameworks for emerging technologies, including AI/ML and cloud security, with governance and legal stakeholders; applying industry standards including NIST, ISO 27001, and PCI DSS in support of organizational security objectives; supporting the evaluation of third-party vendor security through documentation review and risk assessment; contributing to the enhancement of vendor onboarding and compliance workflows; and, in executing duties, utilizing Archer GRC, ServiceNow, Splunk, JIRA, Confluence, SharePoint, Palo Alto Prisma Cloud and AWS. Telecommuting and/or working from home may be permissible pursuant to company policies. Sony is an EOE.
Salary range: $185,639.00 - $261,000.00/year
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
$185.6k-261k yearly Auto-Apply 5d ago
Information Security Expert
Cyberthink 4.2
Intrusion detection analyst job in Columbus, OH
Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.
$62k-80k yearly est. 2d ago
Information Security Controls Analyst
United Community Bank 4.5
Remote intrusion detection analyst job
United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Conditions of Employment
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
$50k-77k yearly Auto-Apply 6d ago
Information Security & Systems Analyst
Friendship Village of Dublin 3.2
Intrusion detection analyst job in Dublin, OH
Join a team dedicated to making a real difference in the lives of our community. Our Mission at Friendship Village of Dublin is
“To care for, engage, and inspire our community to reimagine and maximize quality of life at every age”
.
At Friendship Village our Values Drive us to RISE to any Occasion
Values:
Respect
Integrity and Innovation
Stewardship
Excellence
We are seeking a Information Security & Systems Analyst to contribute to our mission by:
The Entry to Mid-Level System Analyst performs security, compliance and administration of systems and is responsible for the design, installation and management, configuration and reliable operation of security/compliance mechanisms, systems and policies that protect the computer network and information systems against cyber events. Participate in research and development to continuously improve and keep up with the IT business needs of the organization. Actively resolve problems and issues with computer and server systems to limit work disruptions within the company.
Essential Duties:
Design, install and manage security mechanisms that protect the computer network and information systems against threats including but not limited to hackers, breaches, viruses and spyware.
Educate and provide awareness to users regarding security policies and procedures as well as threats.
Develop and maintain security policies and guidelines around information classification, system integrity, incident response and user access.
Monitor, audit and review systems for and identify violations or attempted violations of security procedures, processes and access.
Plan and implement appropriate measures to safeguard data from accidental or unauthorized modification, destruction or disclosure.
Respond to incidents, investigate potential incidents and recommend enhancements to close potential security gaps and serve as a backup to other members of the Technology department.
Responsible for post breach/data loss activities including but not limited preservation of evidence, review of data to determine scope and support of legal and other processes.
Participate in supporting efforts, making sure all networks, systems, applications, servers, technology tools and related equipment problems are resolved in a timely manner with limited disruptions.
Monitor performance and maintain systems according to requirements.
Ensure security through access controls, backups and firewalls.
Recommend when to upgrade systems with new releases and models.
Timely completion of IT Projects.
All other duties as assigned.
Information Security & Systems Analyst Responsibilities:
Safeguard and help prevent cyber-attacks:
Implement industry best practices for cyber security.
Be up to date about the latest security trends and newest security technology.
Assist other technical support staff in identifying and implementing appropriate security safeguards, including patch applications and anti-malware strategies.
Operate, administer and monitor network and host-based intrusiondetection/prevention systems.
Ensure ongoing compliance with industry standards for information security:
Participating in risk assessments to identify potential security threats
Conducting employee training on security policies and responsibilities
Auditing IT systems to ensure compliance with regulations.
Reporting security breaches to management for prompt resolution.
Collaborating with vendors to ensure proper data handling security measures.
Monitoring compliance with state and federal data privacy and security regulations.
Developing policies and procedures for maintaining data security.
Monitor and report on devices and networks including:
Maintain, configure, secure and provide reliable operation of computers systems, network servers, and virtualization.
Network switch and firewall health
Internet traffic and usage metrics
Design and install network devices and systems (including maintaining current software versions on all network equipment) Demonstrates ability to independently troubleshoot and diagnose network, telephone, Internet, Wi-Fi, network.
Assists with work order requests:
Helps the IT Team meet service levels of quality and responsiveness:
Satisfaction goal of 90%
2-business-day response time (resolution time dependent on issue SLA)
Creates, updates and closes tickets in incident management system.
Qualifications:
• Bachelor's degree in computer science, programming, or a related field or equivalent industry experience.
• 2-4 Years of Security or Systems Analyst experience
REQUIRED NON TECHNICAL QUALIFICATIONS
• Must have the ability to work under pressure, without constant direction and to react in a positive and spontaneous manner to the needs of residents, staff, visitors, and vendors.
• Must be able to independently handle multiple simultaneous tasks, following specific instructions carefully and general instructions completely.
• Excellent communication skills
• Resourcefulness and problem-solving aptitude
• Self-starter mentality willing to make constant improvements in the technical support process.
• Takes pride and ownership of the support role.
• Excellent customer service and communication skills
• Ability to assess resident and staff complaints and resolve disputes in a friendly professional manner.
REQUIRED TECHNICAL QULAIFICATION
• Strong understanding of cybersecurity tools, concepts and best practices.
• Knowledge of information security frameworks (e.g.,HIPAA, NIST) and relevant regulations.
• Knowledge of Windows Operating Systems - Desktop (10 and 11) and Server (2016+)
• Windows desktop device configuration, management, and operation.
• IOS Device configuration, management, and operation.
• Networking Concepts and basic troubleshooting (DNS, DHCP, IP Addressing).
• Switching and Routing Concepts (basic troubleshooting and configuration).
• Meraki Network and Camera Equipment
• VOIP/PBX
• Demonstrated working in a helpdesk ticketing environment.