Post job

Information Security Engineer jobs at Sharp Decisions - 838 jobs

  • Senior Information Technology Security Analyst

    Us Tech Solutions 4.4company rating

    New York, NY jobs

    Story Behind the Need • Business group: Global Risk Management team investigates global risk concerning the bank's cyber security. • Project: This project will be to assist the 2nd line engagement and challenge of remediation activities. The Cyber Security IT & Risk Control Remediation Review & Challenge lead is a subject matter expertise to assist each Issue Owner through the end-to-end Issue Management/MRA lifecycle. This role is an integral part of the Review & Challenge tollgate panels at both the workstream (horizontal & vertical) and full MRA/Issue concern level, ensuring effective remediation, leading to successful Internal Audit validation. This role engages with stakeholders to provide ongoing support as well as receive feedback on risk and control coordinator team efforts. Candidate Value Proposition: The successful candidate will have the opportunity to gain exposure to a wide array of areas within Cybersecurity and the IT department within bank. Typical Day in Role: •Execution of the cyber security and IT risk management 2nd line Review, Challenge, Methodology & Testing of Issues. •Partner with domain experts in the1st line understand the design and implementation of the remediation actions that address the MRA/Issue concerns. •Works closely with Issue owners to provide challenge for remediation; including feedback on control remediation opportunities (such as control automation) •Liaises with 1st and 3rd line to get alignment on remediation actions •Participates in the Review and Challenge tollgate panels •Engages with key stakeholders to provide ongoing support and feedback of team efforts •Partner with the 1st in the design and implementation of the remediation actions that address the MRA concerns Candidate Requirements/Must Have Skills: 1) 8+ years as an IT Security Analyst 2) 5+ years experience creating management reports 3) 5+ years' experience working in an Issues Management capacity 4) Strong proficiency with Excel and PPT Nice-To-Have Skills: 1) CISSP Certified (Cyber Security) 2) Service Now Certified 3) CCSP Certified (Cloud Security) 4) Experience with GRC tooling or Service Now Soft Skills Required: -Strong written communication skills -work well within a fast-paced environment Education: Bachelor's degree in a related field. Best VS. Average Candidate: Best vs Average: the ideal candidate would have a strong background in Cyber Security, having worked either a 1B or 2A role in terms of lines of defense. Candidate Review & Selection 2 rounds 1st round - HM - 45 mins - in - person @ 250 Vesey Street (meet on 23rd floor at reception desk) 2nd round - HM + Director - in-person @ 250 Vesey Street (meet on 23rd floor at reception desk)
    $102k-134k yearly est. 5d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • senior security specialist-Akamai

    Vbeyond Corporation 4.1company rating

    Morristown, NJ jobs

    Akamai- Senior Security Specialist Must have skills • SOC/SIEM, Threat Hunting, Incident Response, Endpoint Security - EDR/XDR • WAF/DDoS implementation and configuration using Cloudflare/Akamai platforms • Client management skills 10+ yrs exp Job Description: As a Senior Security Specialist, you will play a critical role in safeguarding our organization's information assets and infrastructure. Your expertise in Cybersecurity, EPP, EDR, XDR, AI Security, threat hunting, network security, WAF, cloud security, threat detection, incident response, malware analysis, data and log analysis, and timeline forensics will be instrumental in identifying and mitigating security risks. You will work collaboratively with cross-functional teams, security analysts, IT professionals, and management to ensure the protection of our systems, networks, and data. Key Responsibilities: Design, develop and implement security solutions and tools like Aurora, Palo Alto Cortex to improve security posture and protect organizations infrastructure and data. Review and validate policy configurations and utilize security tools including EPP, EDR, XDR, cloud security configurations, network security technologies to improve and fine-tuning. Work with MFX and clients for endpoint security related report review and provide technical details. Proven security engineering and administration experience with EPP, EDR, XDR technologies preferably Aurora, Cortex etc. Research the latest security best practices and technologies, staying abreast of new threats and vulnerabilities and helping disseminate this information within the groups at the company. Develop and implement cybersecurity strategies, policies, and procedures. Lead and coordinate incident response activities, including containment, eradication, and recovery. Conduct post-incident analysis to identify lessons learned and recommend improvements. Work closely with internal and external stakeholders to manage and mitigate security incidents. Provide guidance and support to junior security team members during incident response activities. Perform analysis of suspicious files and malware samples. Identify malware behavior, capabilities, and potential impact. Develop and maintain a malware analysis lab and related tools. Provide recommendations for mitigation and response to malware incidents. Stay updated with emerging malware trends and techniques. Familiarity with Cyber Kill chain and MITRE ATT&CK framework. Establish, execute, communicate, and oversee project management for MFX and clients. Education / Work Experience: Minimum 10+ years of experience in cybersecurity, network security, cloud security, threat hunting including a minimum of 5+ years of experience in Endpoint Security technologies. Work experience with securing cloud infrastructure in Azure/AWS. Experience in WAF, DDoS configurations and incident handling skills. Preferred Certifications: GIAC, CISM, CCSP, CISSP, or equivalent certification, work experience, or skills. Strong knowledge of cybersecurity principles, best practices, and industry frameworks (e.g., NIST, ISO 27001). Good to have digital forensic investigations, including timeline analysis. Knowledge / skills: Advanced knowledge and understanding in various disciplines such as security engineering, system and network security, authentication and security protocols, cryptography, and application security. Experience using endpoint security technologies like Aurora, Cortex, or similar. Strong technical experience in cloud security services - network and storage encryption, network security groups, web security and identity and access management. Administering and improving industry standard security controls using security tools like EPP, EDR, XDR etc. and driving operational excellence. Experience with multiple Operating systems (Linux, Unix, Windows) Understanding of forensic principles and methodologies, including timeline forensics (Good to have) Excellent customer relationship and strong communication (i.e., written and verbal), presentation, teamwork skills and resourcefulness.
    $89k-135k yearly est. 2d ago
  • Network Security Engineer

    Motion Recruitment 4.5company rating

    Irving, TX jobs

    Outstanding long-term contract opportunity! A well-known Financial Services Company is looking for a Network Security Engineer Local Candidates are preferred Contract Duration: 12 Months to start (Strong chance of FTE) w-2 only Required Skills & Experience Experience with Palo Alto, Fortinet, and Check Point firewalls. 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education. What You Will Be Doing: Firewall Management: Configure, maintain, and troubleshoot Palo Alto, Fortinet, and Check Point firewalls to secure the organizations network. Policy Development: Design and implement firewall rules, access control policies, and NAT configurations to ensure compliance with security standards and business requirements. Monitoring & Optimization: Conduct regular performance monitoring, rule base reviews, and policy cleanups to enhance efficiency and eliminate redundancies. Network Architecture: Collaborate with network architects to design scalable, secure, and highly available network solutions. Automation & Reporting: Develop scripts and tools to automate firewall policy updates and generate detailed security reports. Scripting, automation and development using Ansible and Perl
    $79k-115k yearly est. 5d ago
  • Cyber Security Analyst II

    Cybersheath 3.7company rating

    Reston, VA jobs

    Job Description CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position The schedule for this role is: Week One: Friday - Sunday 8:00 AM - 8:00 PM Week Two: Friday - Monday 8:00 AM - 8:00 PM Travel requirements: 0-5% yearly. Please note that this role will be part of our SOC on-call rotation CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000-$100,000 USD
    $70k-100k yearly 26d ago
  • Cyber Threat Analyst

    Us Government Other Agencies and Independent Organizations 4.2company rating

    Washington, DC jobs

    Central Intelligence Agency Print Share * * * * Save * This job is open to * Requirements * How you will be evaluated * Required documents * How to apply Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. Summary Cyber Threat Analysts conduct all-source analysis of foreign Cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. Overview Help Accepting applications Open & closing dates 10/01/2025 to 09/30/2026 Salary $63,307 to - $156,755 per year Pay scale & grade GS 8 - 15 Location Many vacancies in the following location: Washington, DC Remote job No Telework eligible No Travel Required Occasional travel - You may be expected to travel for this position. Relocation expenses reimbursed Yes-You may qualify for reimbursement of relocation expenses in accordance with agency policy. Appointment type Permanent Work schedule Full-time Service Excepted Promotion potential None Job family (Series) * 0132 Intelligence Supervisory status No Security clearance Sensitive Compartmented Information Drug test Yes Financial disclosure Yes Bargaining unit status No Announcement number 23-11942190-6868/AHD Control number 722102800 This job is open to Help The public U.S. Citizens, Nationals or those who owe allegiance to the U.S. Federal employees - Competitive service Current federal employees whose agencies follow the U.S. Office of Personnel Management's hiring rules and pay scales. Federal employees - Excepted service Current federal employees whose agencies have their own hiring rules, pay scales and evaluation criteria. Videos Duties Help As a Cyber Threat Analyst at CIA, you will conduct all-source analysis of foreign cyber intentions and capabilities in support of U.S. Government efforts to counter threats to U.S. national security interests. In particular, you will help identify, monitor, and counter threats posed by foreign cyber actors against US information systems, critical infrastructure, and other cyber-related interests. Analysts will apply their foreign affairs, scientific and/or technical knowledge to solve complex intelligence problems, produce short-term and long-term written assignments, and brief U.S. policymakers and others in the U.S. cyber defense community. You will have the opportunity to maintain and broaden your professional ties throughout your career through academic study, collaboration with Intelligence Community peers, and attendance at professional meetings. Opportunities exist for foreign and domestic travel, language training, and analytic tradecraft and management training. You will have an opportunity to develop deep substantive expertise and participate in broadening assignments with other offices in the Agency and across the U.S. Government. Requirements Help Conditions of employment * You must be physically in the United States or one of its territories when you submit your resume via MyLINK. * You must be registered for the Selective Service, if applicable. * You must be a U.S. citizen and at least 18 years of age (dual-national US citizens are eligible). * You must be willing to move to the Washington, DC area. * You must successfully complete a thorough medical and psychological exam, a polygraph interview, and a comprehensive background investigation. * For further information, please visit: **************************************** Qualifications Minimum Qualifications Interested candidates should be passionate about the ideals of our American republic, committed to upholding the rule of law and the U.S. Constitution, and committed to improving the efficiency of the Federal government. Hiring decisions will not be based on race, sex, color, religion, or national origin. A mix of international and technical studies, to include a bachelor's or master's degree in the following fields: * International Relations, Foreign Affairs, or Security Studies * Cyber Security * Computer Science * Digital Forensics * Telecommunications * Information Assurances * Interest in international affairs * Awareness of U.S. national security interests * At lease a 3.0 GPA on a 4-point scale is preferred * Ability to work under tight deadlines * Excellent analytic abilities and relevant experience * Strong critical thinking, problem solving skills, and ability to think creatively * Ability to meet the minimum requirements for joining CIA, including U.S. citizenship and a background investigation Desired Qualifications * Foreign language proficiency * Strong verbal presentation skills * Demonstrated ability to write clear, concise text * Research experience in international affairs * Ability to work in a team environment * Interest in a career that requires regular writing assignments Education * Bachelor's or master's degree in one of the following fields: * Computer Science * Computer Engineering * Digital Forensics * Cyber Security * Telecommunications * Information Assurances * Security Studies * A mix of international and technical studies * At least a 3.0 GPA on a 4-point scale is preferred Additional information Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution. Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. How you will be evaluated You will be evaluated for this job based on how well you meet the qualifications above. For further information about this position, please visit: ***************************** Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. Required documents Required Documents Help For further information about this position, please visit: ***************************** If you are relying on your education to meet qualification requirements: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education. Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating. How to Apply Help This post is for viewing purposes only. To get started, please visit ***************************** where you can read more about this position and express your interest in up to four jobs. Upon expressing your interest, you will be taken to MyLINK, which allows you to submit your resume and job rankings and provide basic information about yourself. Agency contact information Central Intelligence Agency Website *********************** Next steps After you express interest for up to four positions on cia.gov/careers, a CIA recruiter may contact you for further discussion if your qualifications meet our needs. See the MyLINK FAQs on our website for more information. Fair and transparent The Federal hiring process is set up to be fair and transparent. Please read the following guidance. Criminal history inquiries Equal Employment Opportunity (EEO) Policy Financial suitability New employee probationary period Privacy Act Reasonable accommodation policy Selective Service Signature and false statements Social security number request Required Documents Help For further information about this position, please visit: ***************************** If you are relying on your education to meet qualification requirements: Education must be accredited by an accrediting institution recognized by the U.S. Department of Education in order for it to be credited towards qualifications. Therefore, provide only the attendance and/or degrees from schools accredited by accrediting institutions recognized by the U.S. Department of Education. Failure to provide all of the required information as stated in this vacancy announcement may result in an ineligible rating or may affect the overall rating.
    $63.3k-156.8k yearly 14d ago
  • Cyber Security Analyst | ED&F Man | Houston or Miami

    Ed&F Man Holdings Ltd. 3.3company rating

    Houston, TX jobs

    We are looking for a Cyber Security Analyst to join our global security team. This role will suit a technically capable individual with experience in security operations who is looking to broaden their exposure across security monitoring, engineering, and incident response within a dynamic environment. The role provides hands-on involvement in triaging and investigating security alerts, acting as an escalation point for the outsourced Security Operations Centre (SOC), supporting major incident response activities. The successful candidate will work closely with infrastructure and network teams to manage and optimise endpoint, email, identity, and vulnerability management platforms, while contributing to continuous improvement of the organisation's security posture. This role offers the opportunity to evaluate and transition between security tools, maintain policy continuity and develop a broad, practical skillset across enterprise cyber security functions. Business Overview Established in 1783, ED&F Man is an employee-owned agricultural commodities merchant with 2,800 people in 43 countries and annual revenue in excess of $8bn. We trade sugar, coffee, molasses, animal feed and fish oils. Corporate responsibility is ingrained in our culture. We are passionate about sustainable production, take care to limit the environmental impact of our operations and actively support the communities in which we work. Key Accountabilities * Act as the escalation point for the outsourced SOC, receiving and triaging alerts that require deeper investigation. * Conduct thorough investigations to produce high-quality, actionable insights for incident resolution. * Participate actively in major security incidents, contributing to containment, eradication and recovery efforts * Document incident timelines and contribute to post-incident reviews and lessons learned. * Respond to detections, triage alerts and update SOC tickets with investigation findings * Maintain and update policies in line with vendor best practice and internal Change Advisory Board protocols. * Monitor agent health, audit version compliance and remediate orphaned or non-compliant clients. * Attend monthly vendor meetings to review support cases and incorporate best practice guidance. * Design and refine SOC playbooks and response actions, evaluating new security technologies through structured proof-of-concept trials and creating scoring matrices to compare vendors. * Manage block and safe listings to maintain email hygiene, troubleshooting false positives and tune detection rules. * Perform email investigations as required in response to phishing or BEC attempts, producing monthly vulnerability reports and prioritising remediation efforts based on risk. * Work with infrastructure and application teams to test patches and drive vulnerability counts down. * Attend monthly TAM meetings to review support cases and best practices. * Maintain agility to substitute security products as business requirements evolve, ensuring policy continuity throughout transitions. Skills and Experience * 5+ years' experience in a Cyber Security Analyst or similar role, with strong incident response and major incident handling expertise. * Hands-on experience with EDR (alert triage, policy management, sensor deployment), preferably CrowdStrike Falcon. * Experience developing SOC playbooks, response actions, and running proof-of-concept evaluations and vendor comparisons. * Confident, proactive communicator able to engage senior stakeholders, clearly explain complex security issues, and recommend actions. * Collaborative and approachable, building trust with technical peers and supporting service desk and front-line teams. * Calm, effective, and resilient under pressure, particularly during security incidents in a front-facing role. * Formal qualifications not essential; proven hands-on experience and delivery record valued. Technical Capabilities: * Experience with SIEM platforms (e.g. Rapid7), Email Security and Data Security/DLP solutions (e.g. Varonis). * Strong knowledge of Entra ID security features including Conditional Access and PIM, plus familiarity with PAM tools including BeyondTrust, Osirium and Okta. * Solid networking fundamentals (TCP/IP, DNS, firewalls, proxies, SSL/TLS) and vulnerability management experience (Qualys/Rapid7 preferred). * Cloud security experience across Azure and/or AWS. * Scripting skills in Python and/or AutoIT for automation and tooling. * Desirable certifications include CompTIA Security+, Network+, CySA+, PenTest+, CASP+, CEH, CISSP, and relevant vendor certifications (e.g., CrowdStrike, Qualys, Palo Alto). We recognise that talent comes in many forms, and we value potential just as much as experience. If this role excites you but you don't meet every requirement, we still encourage you to apply. Our Offer We provide a fast-paced, stimulating and truly global environment, which will stretch your abilities and channel your talents. We also offer competitive salary and benefits combined with outstanding career development opportunities in one of the global leaders in soft commodity trading. Our Values Respect, Integrity, Meritocracy, Client Focus, Entrepreneurship Our values define who we are. They are the fundamental beliefs that determine our actions and guide our behaviour. They influence the way we communicate and collaborate, and define the way we engage with our clients, partners, and communities. Our values are underpinned by a set of essential behaviours, which form part of our performance management approach. Delivering on our objectives is very much about 'what' we do, but these essential behaviours also provide a guide and measure for 'how' we do things. Our performance essentials are Take Initiative, Self‐Management, Deliver Results and Collaboration. Our Commitment We are committed to creating and sustaining an inclusive and diverse work environment where all employees are treated with dignity and respect. We are committed to promoting equal opportunities in employment and are focussed on actively building and developing diverse teams. All qualified applicants will receive equal treatment without regard to race, colour, sex, gender, age, religion or belief, ethnic or national origin, marital or civil partner status, physical or mental disability, military or veteran status, sexual orientation, gender reassignment (identity, gender expression), genetic information or any characteristic protected by local law. We are willing to make any reasonable adjustments throughout our recruitment process.
    $74k-105k yearly est. 11d ago
  • Mid-Level EAD Cyber Threat Analyst - KOREAN

    Lis Solutions 3.7company rating

    Herndon, VA jobs

    LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements. Job Description LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues. In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better. Responsibilities: • Direct and conduct all-source analysis and targeting to identify, monitor, and assess • Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings • Apply demonstrated subject matter expertise • Apply knowledge of regional topics • Analyze and report on trends and activity Qualifications Qualifications: • Korean Language proficiency at ILR-3 level • Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments • Possess a good understanding of Intelligence Community (IC) guidelines and directives • Experience conducting all-source analysis of cyber topics • Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and Terminology Management Databases • Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work. Requirements: • U.S. Citizenship • Active Government Investigation Additional Information Benefits • Medical, Vision, Dental • Employee Assistance Program (EAP) • Evacuation • Long Term Disability • Term Life All your information will be kept confidential according to EEO guidelines.
    $74k-101k yearly est. 16h ago
  • Mid-Level EAD Cyber Threat Analyst - KOREAN

    Lis Solutions 3.7company rating

    Herndon, VA jobs

    LIS' mission is to provide our customers with strategic, dynamic and Innovative solutions. Versatility, Agility and Scalability are the Defining principles that drive our company to deliver“ Effective Strategies for Successful Solutions” for both our government and Industry partners. LIS, a Woman Owned Small Business, was founded in 1994 as an advanced innovative language service provider. Since then We have organically expanded into Cyber Security, Intelligence and Information Technology to support our customers with their rapidly Evolving global enterprise-wide requirements. Job Description LIS is currently looking for individuals to provide targeting and analytic support on East Asian and Korean cyber issues. In support of a U.S. Government customer, ATS needs mid-level East Asia analyst with Korean language to provide a range of targeting, analytical, support services. Targeter will produce and develop targeting leads and finished intelligence products on EAD regional topics. Korean language skill is required at ILR-3 or better. Responsibilities: • Direct and conduct all-source analysis and targeting to identify, monitor, and assess • Apply expertise to solve complex intelligence problems, produce short-term and long-term written assessments, and conduct briefings • Apply demonstrated subject matter expertise • Apply knowledge of regional topics • Analyze and report on trends and activity Qualifications Qualifications: • Korean Language proficiency at ILR-3 level • Minimum of 4 years all-source analysis experience with national intelligence agencies or DoD components providing analytic support to aid in foreign threat assessments • Possess a good understanding of Intelligence Community (IC) guidelines and directives • Experience conducting all-source analysis of cyber topics • Be proficient in MS Office programs (Word, Excel, PowerPoint), IC tools and software applications and Terminology Management Databases • Any additional experience within the IC and/or dealing with cyber threat issues would certainly be valued, as would experience with translation work. Requirements: • U.S. Citizenship • Active Government Investigation Additional Information Benefits • Medical, Vision, Dental • Employee Assistance Program (EAP) • Evacuation • Long Term Disability • Term Life All your information will be kept confidential according to EEO guidelines.
    $74k-101k yearly est. 60d+ ago
  • Network Security Analyst

    Skadden 4.9company rating

    White Plains, NY jobs

    We invite you to review our current business services professionals openings to learn about the opportunities available across the firm. About Us Skadden, Arps, Slate, Meagher & Flom LLP has forged a reputation as one of the most prestigious law firms in the world. Relying on innovation, intellect, teamwork and tenacity, our lawyers deliver the highest quality advice and novel solutions to our clients' legal issues. We are known for handling the most complex transactions, litigation/controversy issues, and regulatory matters, as well as for the strong partnerships we build with clients and each other. Our attorneys, who reflect a broad range of experiences and perspectives, work together seamlessly across 50-plus practices and 21 offices in the world's major financial centers. The Opportunity We are seeking two Network Security Analysts to join our Firm. These positions will be based in our White Plains office (hybrid), and please note the roles have different shift times, listed below. The Network Security Analysts are responsible for implementing and supporting network security solutions for the Firm and, implementing and enforcing practical solutions to secure the Firm's internal and external network infrastructure. Available Shift Times (EST- Hybrid) 1.) Saturday - Sunday: 7:00 a.m. - 8:00 p.m. EST & Monday 7:00 a.m. - 7:00 p.m. 2.) Monday - Friday: 2:00 p.m. - 10:00 p.m. Note: The scheduled hours listed may be flexible and will be discussed during the interview process. Responsibilities Performs daily review of automated security reports and escalate as necessary. Responds to system generated security alerts and coordinate responses. Assists with internal audits, vulnerability scans and risk assessments. Assists with annual penetration testing, review of findings and tracking issue resolution. Participates in evaluating new technologies or new versions of existing products. Works with project teams to implement secure network connectivity solutions. Writes and maintains technical documentation including procedures and troubleshooting guides. Demonstrates effective interpersonal, written and verbal communication skills to facilitate effective work relationships with others. Manages Firm resources responsibly. Complies with and understands Firm operation, policies and procedures. Performs other related duties as assigned. Qualifications Knowledge of relevant firm computer software programs (e.g., Outlook, Excel, PowerPoint), with the ability to learn new software and operating systems Proficient with Access, Project and Visio Thorough knowledge of network management and security technologies and approaches Thorough knowledge of security techniques, latest protocols and defenses Proficient with Microsoft Active Directory and Operating Systems Basic ability to program scripts and batch files Demonstrates effective interpersonal and communication skills, both verbally and in writing Demonstrates close attention to detail Excellent analytical, troubleshooting, organizational, and planning skills Ability to handle multiple projects and shifting priorities Ability to handle sensitive matters and maintain confidentiality Ability to organize and prioritize work Ability to work well in a demanding and fast-paced environment Ability to work well independently as well as effectively within a team Ability to use discretion and exercise independent and sound judgment Flexibility to adjust hours and work the hours necessary to meet operating and business needs Education/Experience Bachelor's degree or equivalent Minimum of two years' experience in multi-national enterprise IT Culture & Life at Skadden What makes Skadden special is our people and the culture, community and spirit of collaboration we have created. We believe in teamwork and inspiring each other to be our best in an atmosphere that promotes professionalism and excellence in all that we do. We know that inclusion and drawing on the strength of a wide spectrum of talent only make us better and is vital to the firm's success. Our goal is for everyone at the firm to enjoy a challenging career with opportunities for development and growth and to support the well-being of our attorneys and business services professionals. Benefits The overall well-being of our team is important to us. We offer generous benefits to help you achieve wellness in all areas of your life. Competitive salaries and year-end discretionary bonuses. Comprehensive health care (medical, dental, vision), savings plan/401(k) and voluntary benefits. Generous paid time off. Paid leave options, including parental. In-classroom, remote, and on-demand learning and professional development opportunities. Robust well-being classes and programs. Opportunities to give back and make an impact in local communities. For further details, please visit: ******************************************************* Skadden is an Equal Opportunity Employer (Disability/Vet/other protected categories). For more information, please visit Skadden.com/careers. The starting base salary for this position is expected to be within the range listed under Salary Details. Actual salary will be determined based on skills, experience (to the extent relevant) and other-job related factors, consistent with applicable law. Salary Details $125,000 -$140,000 EEO Statement Skadden is an Equal Opportunity Employer. It does not discriminate against applicants or employees based on any legally impermissible factor including, but not limited to, race, color, religion, creed, sex, national origin, ancestry, age, alienage or citizenship status, marital or familial status, domestic partnership status, caregiver status, sexual orientation, gender, gender identity or expression, change of sex or transgender status, genetic information, medical condition, pregnancy, childbirth or related medical conditions, sexual and reproductive health decisions, disability, any protected military or veteran status, or status as a victim of domestic or dating violence, sexual assault or offense, or stalking. Applicants who require an accommodation during the application process should contact Alex Taylor at **************. Skadden Equal Employment Opportunity Policy Skadden Equal Employment Opportunity Policy Applicants Have Rights Under Federal Employment Law Applicants Have Rights Under Federal Employment Law In accordance with the Transparency in Coverage Rule, click here to review machine-readable files made available by UnitedHealthcare: Transparency in Coverage
    $125k-140k yearly Auto-Apply 42d ago
  • Security Analyst-Cyber Intelligence

    Mindlance 4.6company rating

    San Francisco, CA jobs

    Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at ************************* Hope you are doing fine, Please have a look at the job description and if you are comfortable with the role and responsibilities please revert with your updated resume. Job title:- Threat Intelligence Analyst/Security Analyst Location:- San Francisco CA Duration:- 6- 12 Months Contract Responsibilities: • Differentiate, collect, and evaluate technical and open source data to produce threat intelligence products; • Identify credible, new intelligence and subject matter resources relative to current/emerging threats; • Analyze reports to understand threat campaign techniques and lateral movements and extract indicators of compromise (IOCs). • Manage and maintain threat intelligence platforms and feeds • Conduct research on emerging products, services, protocols, and standards relative to the information security arena Required Qualifications: • 3-5 year's experience performing threat i management operational activities, including threat intelligence gathering and analysis, and threat metrics development and reporting • Experience working with large/multi-national organizations • Demonstrated use of analytic tools and platforms • In-depth knowledge of information security threats Windows and Unix/Linux platforms • The demonstrated ability to work effectively in a collaborative team environment as an individual contributor. • The ability to provide support after normal business hours, as needed. Preferred Qualifications: • Direct experience with Threat intelligence Platform tools • Experience with developing threat intelligence briefings Additional Information Thanks & Regards, Vikrant Thakur ************
    $82k-110k yearly est. 60d+ ago
  • Network Security Analyst

    Integrated Resources 4.5company rating

    Newark, NJ jobs

    A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing. Job Description: Network Security Analyst 6 months CTH • 3+ years of designing, implementing and supporting CISCO ISE is required Responsibilities: Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions. • Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect • Perform Cisco ISE Authentication and Authorization • Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE • Deploy Cisco ISE Profiling and client provisioning services • Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE • Provide Reports, Monitoring, Troubleshooting, and Security Work with vendor on problem resolution Create policies and reports to meet the business requirements Participate in Planning, Design, and Tests Perform security audits, scan and monitor servers Investigate and report on security alerts and perform security incident reporting Requirements: Expert-level knowledge and experience with design, implementation and support of Cisco ISE 3-5 year of experience working with Network Security applications Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus) Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption Knowledge of Directory Services including Active Directory, LDAP, and TDS Knowledge of F5 load balancers Knowledge of IT security principles, HIPAA, SOX and PCI regulations Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus) Business Analysis skills and ability to translate business requirements into technical requirements Excellent oral/written communication and organizational skills Security certification a plus such as CISSP, CEH or CISA Qualifications Bachelor's Degree in Computer Science, Programming, or IT required Additional Information Contact- 732-549-2030 ext 242 Harshad
    $92k-125k yearly est. 60d+ ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Washington, DC jobs

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Job Description: Essential Job Functions: • Monitor Security Events from IDS, SIEM, etc. • Log tickets to the Ticketing System • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members • Perform triage on alerts from all sources including Monitored Email Distribution Lists • Participate in rotating weekly shift supporting off hours and weekend activity (24x7) • Produce ad hoc reports and other ad hoc tasks Qualifications Required Skills/Abilities: • Monitoring skills related to IDS and SIEM • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts • Understanding of Windows Registry, File system, etc. • Hands-on knowledge of Network Packet Analysis using tools • Ability to work with team members with varying levels of technical skills and diverse international backgrounds • Strong understanding of Networking and Operating systems concepts • Ability to adapt to and function in a project environment with multiple timetables and changing priorities • Ability to learn new concepts and approaches in Analyzing Security Incidents. • Good communication skills (Verbal and Written) Educational Qualifications and Experience: • Education: Bachelor's degree in Computer Science or Information Systems • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling • Experience with Firewalls and information security technologies • Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact Experience Matrix for Levels: • Level I - 2+ years of experience • Level II - 5+ years of experience • Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview Additional Information For more information, Please contact Siva Kumar ************
    $89k-123k yearly est. 16h ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Washington, DC jobs

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Title: Information Security Operations Center - Incident Handler III Location: Washington, DC Duration: 12+ Months Job Description: Essential Job Functions: • Monitor Security Events from IDS, SIEM, etc. • Log tickets to the Ticketing System • Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members • Perform triage on alerts from all sources including Monitored Email Distribution Lists • Participate in rotating weekly shift supporting off hours and weekend activity (24x7) • Produce ad hoc reports and other ad hoc tasks Qualifications Required Skills/Abilities: • Monitoring skills related to IDS and SIEM • Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts • Understanding of Windows Registry, File system, etc. • Hands-on knowledge of Network Packet Analysis using tools • Ability to work with team members with varying levels of technical skills and diverse international backgrounds • Strong understanding of Networking and Operating systems concepts • Ability to adapt to and function in a project environment with multiple timetables and changing priorities • Ability to learn new concepts and approaches in Analyzing Security Incidents. • Good communication skills (Verbal and Written) Educational Qualifications and Experience: • Education: Bachelor's degree in Computer Science or Information Systems • Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling • Experience with Firewalls and information security technologies • Experience with CERT/CSIRT/CIRT/SOC Certification Requirements: Any two certifications would be a plus. CEH, Security +, CCNA Response activities, including containment, remediation, and root cause analysis Bachelor's degree and 5+ years of information security experience Experience in malware remediation and containments Hands on experience of Incident Response /Malware analysis Essential Job Functions: § Perform advanced Malware Analysis, along with Incident Response § Generate detailed Malware Analysis reports on PE and other common file structure samples § Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis § Assist OIS in Identifying zero-day/vulnerable applications and impact Experience Matrix for Levels: • Level I - 2+ years of experience • Level II - 5+ years of experience • Level III - 7+ years of experience Note: The specific shift he wants to get covered is the 12pm-8pm EST window Strong experience in SOC environment and great soft skills/customer service Required people who can come for an in-person interview Additional Information For more information, Please contact Siva Kumar ************
    $89k-123k yearly est. 60d+ ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Plano, TX jobs

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Description • Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus Qualifications MUST HAVES: • 2+ years of experience in technical role with notable exposure to security • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment. • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management This is a Bulk hiring position for our direct client. Additional Information For More Information, Please Contact Siva Kumar ************
    $90k-121k yearly est. 60d+ ago
  • Security Systems Analyst

    Artech Information System 4.8company rating

    Plano, TX jobs

    Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost. Job Description • Deploy and maintain a full suite of endpoint security products. • Responsible for ensuring high level of systems security compliance. • Maintain pertinent site location details to ensure proper incident management ticket routing. • Perform incident triage and handling by determining scope, urgency and potential impact • Provide support for vulnerability assessments tools across multiple vendors. • Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists. • Maintain and expand related information security metrics. Qualifications • 5+ years supporting workstation and server operating systems. • 1 year incident response and malware removal experience • 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc. • Basic knowledge of network and perimeter security methodologies and tools. Additional Information Looking only for W2, No C2C ( Referral and H1B Transfer will work )
    $90k-121k yearly est. 60d+ ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    Plano, TX jobs

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Description • Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus Qualifications MUST HAVES: • 2+ years of experience in technical role with notable exposure to security • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment. • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management This is a Bulk hiring position for our direct client. Additional Information For More Information, Please Contact Siva Kumar ************
    $90k-121k yearly est. 16h ago
  • Security Systems Analyst

    Artech Information System 4.8company rating

    Plano, TX jobs

    Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost. Job Description • Deploy and maintain a full suite of endpoint security products. • Responsible for ensuring high level of systems security compliance. • Maintain pertinent site location details to ensure proper incident management ticket routing. • Perform incident triage and handling by determining scope, urgency and potential impact • Provide support for vulnerability assessments tools across multiple vendors. • Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists. • Maintain and expand related information security metrics. Qualifications • 5+ years supporting workstation and server operating systems. • 1 year incident response and malware removal experience • 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc. • Basic knowledge of network and perimeter security methodologies and tools. Additional Information Looking only for W2, No C2C ( Referral and H1B Transfer will work )
    $90k-121k yearly est. 16h ago
  • Information Security Analyst

    Artech Information System 4.8company rating

    McLean, VA jobs

    Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications. At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources. Job Description The position is within the Information Security Identity and Access Management (IAM) team. This position will be responsible for user provisioning of application & infrastructure access as well as application account management; working knowledge of platform provisioning (groups/roles/accounts/permissions), this includes understanding of platform or application meta-data, or fine grained entitlement details. They need to identify risks and work out possible solutions with the customer and inform management as necessary, while handling tasks assigned to them with little or no supervision. They are expected to identify task inefficiencies and provide ideas for solutions, including the ability to assist with the automation of manual and semi-manual processes via development and scripting. Qualifications Strong understanding of Identity and Access Management (IAM) concepts • Provisioning access to applications and infrastructure platforms within our SLA. • Handling of miscellaneous support requests. • 24/7 on call support on rotational basis. • Handle deployment related activities which is often after hours and/or weekends. • Incorporating process changes and updates into the Standard Operation Procedures. • Troubleshoot application/platform access issues and escalate to Tier 3 Support as necessary. • Training other staff on provisioning and daily tasks. • The gathering of requirements and testing for new application integration into Identity Management Solution. • 3 - 5 years of experience with business application or infrastructure support on the following platforms: Windows, UNIX (Solaris, Linux, AIX), Web Technologies (WebLogic, Web Methods, Apache, Tomcat, MQ, IIS, etc). • 3 - 5 years of collective experience with databases (Sybase, DB2, SQL Server, Oracle) and security (firewall, AD, TAM, LDAP, certificate). • Experience providing direct support to IT business application and related infrastructure teams in a complex multi-platform operating environment • 3 - 5 years of strong Java, J2EE development experience, including Java frameworks such as Spring MVC, JSF, Struts, etc. Basic Requirements: • Bachelor's degree in Engineering, Computer Science, Information Technology, related field or equivalent work experience. • Experience working in a fast paced team environment and managing priorities with minimal supervision • Strong organizational skills and the ability to multitask; can set priorities and follow a timeline • Excellent written and oral communications • Proficiency with Microsoft Excel skills, with strong excel analytical experience. • Strong familiarity / experience with MS Office tools, Visio and SharePoint • Strong interpersonal and communication skills, up to and including executive • Experience using analytical and problem solving skills • Experience negotiating effectively and facilitating conflict resolution Preferred Skills: • 3 - 5 years of application development or support coupled with infrastructure experience. • 3 - 5 years of prior working experience in automating manual and semi-automatic processes via scripting languages such as PowerShell, Perl or Python. • Strong IT systems troubleshooting analysis abilities • Experience with SailPoint IdentityIQ Suite • Experience with CyberArk Application Identity Manager or other Password Management utility. • CISSP certification a plus • J2EE certification a plus Additional Information If you are interested, Please contact Siva Kumar ************
    $89k-122k yearly est. 16h ago
  • Senior Information Assurance (IA) Lead Analyst

    Vor Technology 3.9company rating

    Arlington, VA jobs

    VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training. Job Description VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A). Responsibilities will include the following: Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise. Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies. Qualifications *All Candidates must have a TS/SCI clearance with a Full Scope Polygraph Must have a minimum ten (10) years experience with the following: • Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager • Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks • Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans • Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes • Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes • Leading FISMA reporting for DoD customers • Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences • Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects Additional Desired Qualifications: • DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA) • eMASS experience is a plus Additional Information Education Requirement: Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field) Clearance Requirement: Active TS/SCI with Full Scope clearance * US citizenship is required. EOE/M/F/D/V
    $72k-96k yearly est. 16h ago
  • Senior Information Assurance (IA) Lead Analyst

    VOR Technology 3.9company rating

    Arlington, VA jobs

    VOR Technology is a privately held, veteran owned small business that provides Cyber Intelligence Solutions to government, private industry and critical infrastructure. Our areas of expertise include Computer Network Defense (CND), Computer Network Exploitation (CNE) and Cyber Forensics. We aim to use our technical skill set in Signals Intelligence (SIGINT) and Information Assurance (IA) to support global Cyber operations and mission training. Job Description VOR Technology is seeking a senior Information Assurance (IA) Lead/Analyst with specific skills in Certification & Accreditation/Assessment & Authorization (C&A/A&A). Responsibilities will include the following: Provide DoD IA policy analysis, and risk-based security recommendations for integrating new systems/applications into the customer's networked enterprise. Provide mentorship, guidance and task management to junior team members. The candidate will have demonstrative experience supporting DoD/US Government organizations and agencies. Qualifications *All Candidates must have a TS/SCI clearance with a Full Scope Polygraph Must have a minimum ten (10) years experience with the following: • Managing and executing the full lifecycle of C&A/A&A processes within an IT risk management and compliance tool, such as eMASS and Xacta IA Manager • Executing C&A/A&A within DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and frameworks • Developing C&A/A&A documentation such as System Security Plans, Incident Response Plans and Change Management Plans • Developing local IA policy, continuous monitoring framework and SOPs and ensuring traceability to DoD and Chairman of the Joint Chiefs of Staff policy and instruction, as well as applicable federal regulations and statutes • Guiding customers through DoD 8500-based annual assessments, and Command Cyber Readiness Inspections (CCRI) processes • Leading FISMA reporting for DoD customers • Creating detailed reports on local security posture trends and providing metrics and recommended mitigations that are suitable for both senior leaders and technical audiences • Developing project plans with critical milestones and deliverables for ongoing C&A/A&A projects Additional Desired Qualifications: • DoD 8570 IAT/M-II or above professional certification (CISSP, CISM, GCIH, GCIA) • eMASS experience is a plus Additional Information Education Requirement: Bachelor's Degree (Computer science, Engineering, Mathematics, Business or related field) Clearance Requirement: Active TS/SCI with Full Scope clearance * US citizenship is required. EOE/M/F/D/V
    $72k-96k yearly est. 60d+ ago

Learn more about Sharp Decisions jobs

Most common jobs at Sharp Decisions