Assurance Security Engineer-QA
Information security analyst job at TEKsystems
The Security Assurance Engineer will be part of an elite team of Cyber Security specialists whose mission is to proactively test enterprise information security controls for effectiveness and to coordinate manual or automated remediation of weaknesses and gaps in the detection, prevention and response to cyber attacks.
Top Skills' Details
Quality assurance experience
IT automation and scripting
Understanding/experience in security
This member of the Security Assurance team is responsible for identifying and cataloging all security controls within the global AmTrust environment, working with key stakeholders to determine what defines "effectiveness" for each control, and then designing and implementing automated testing of those controls.
Responsibilities
Vet, select and/or design and implement an automated security control testing platform
Work with key stakeholders to define seurity control requirements
Design and implement security control tests
Design and implement a security control defect management system
Work closely with the Security Operations Center to improve their response and alerting services
Work closely with the Security Engineering team to improve controls based on emerging threats, control testing results
Work with other Security Assurance team members to automate security control testing
Qualifications
Required:
Bachelor's Degree in IT, CyberSecurity or Equivalent Experience
10+ Years Cyber Security Experience
5+ Years Programming or Non-Trivial Scripting Experience
Preferred:
Data Forensics Experience
Software Quality Assurance Experience
CISSP Certification
Technical Skills:
Extensive experience with one or more IT Automation frameworks (Ansible, Terraform, etc)
Extensive experience with one or more Security Information and Event Management Systems (Splunk ES, IBM QRadar, etc)
Deep familiarity with one or more offensive security platforms (Metasploit, for example)
Software Development and Scripting Experience
Familiarity with the MITRE ATT&CK and DEFEND Frameworks
An extensive understanding of modern security controls
Job Type & Location
This is a Permanent position based out of Cleveland, OH.
Pay and Benefits
The pay range for this position is $100000.00 - $120000.00/yr.
AmTrust offers a comprehensive benefits package for employees working 30+ hours per week. Coverage begins the first of the month after hire or on January 1 during open enrollment. Medical plans include multiple Anthem options and Kaiser (for California), with preventive care covered 100% and HSA contributions up to $1,000. Dental and vision plans provide strong coverage, including orthodontics for children and generous frame/contact allowances. Employees can also access various FSAs, disability insurance, life insurance, voluntary benefits, and a 401(k) plan with a 3% match and 3-year cliff vesting. Additional perks include an EAP, wellbeing rewards, and paid volunteer time.
Workplace Type
This is a fully remote position.
Application Deadline
This position is anticipated to close on Dec 6, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Cyber Security Analyst
Houston, TX jobs
SUMMARY: The Cybersecurity Analyst is responsible for monitoring, documenting, and supporting the cybersecurity posture of the organizations's information technology systems. This role involves reviewing alerts, assisting in the maintenance of cybersecurity configurations, assessing weaknesses, vulnerabilities and escalating potential vulnerabilities or incidents to senior team members. The Cybersecurity Analyst also contributes to the documentation of cybersecurity events and helps ensure compliance with established cybersecurity policies and procedures. This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purpose of mitigating threats.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
Provide timely detection, identification, and alerting on potential attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
Aid in the protection of the company's network and sensitive information using cyber defense tools for continual monitoring and analysis of systems to identify malicious activity including:
Identifying cyber threat tactics and methods
Identifying and correcting gaps in the company's cybersecurity posture
Testing information systems for vulnerabilities
Documenting and escalating incidents
Analyzing network alerts from various sources within the enterprise and determining possible causes of such alerts
Identifying and analyzing anomalies in network traffic or log data
Monitoring risks and implementing cybersecurity systems to prevent attacks or breaches
Responding to urgent cybersecurity events and incidents
Reviewing events and incidents to understand root causes
Monitoring reputation for hostile content directed towards organizational or partner interests
Recommend procedures and/or changes to procedures necessary for good cyber hygiene
Improve the overall cybersecurity posture of the organization's systems
Determine the operational and safety impacts of cybersecurity lapses
Prepare threat and target briefings and situational updates
Monitor threat activities and prepare threat activity reports
Manage and report on adversarial activities
EDUCATION AND REQUIRED EXPERIENCE:
A degree in business or technology is preferred (associate's or bachelors)
3-5 years of experience in IT security
Experience with SIEM, intrusion detection (IDS) and intrusion prevention (IPS) systems preferred
Basic scripting (Python, PowerShell, Bash)
Experience with vulnerability management
Experience with network packet analysis
Experience with log analysis and log management
Experience with Cloud Security Management interfaces
Experience with enterprise authentication systems, such as directory services or identity management platforms
Experience with Incident handling and response preferred
Working knowledge or core cybersecurity concepts such as the CIA triad, encryption algorithms, and risk management processes
Working knowledge of computer networking protocols including how traffic flows within a network
Working knowledge of cybersecurity laws and regulations
Working knowledge of cybersecurity threats, threat characteristics, and vulnerabilities, and threat hunting
Ability to prioritize security requests according to urgency and established criteria
Ability to organize information and alerts from multiple sources to create a holistic picture of cybersecurity threats
General understanding of security frameworks (NIST, MITRE Attack) preferred
Familiarity with the variations, similarities, and differences between IT and OT network environments
Experience working on project teams and project management is preferred
Intermediate understanding of Threat Intelligence research and methodologies
Familiarity with adversarial TTPs
SKILLS, QUALIFICATIONS, AND OTHER REQUIREMENTS:
Demonstrate excellent communication (written, verbal and listening) and interpersonal skills
Superior organizational skills and attention to detail
Must possess a proven ability to deliver high-quality customer service
Ability to triage and prioritize security related data quickly
Ability to respond to work after hours and weekends as needed
PHYSICAL DEMANDS:
Requires sufficient personal mobility and physical reflexes, to permit the employee to function in a general office environment and accomplish tasks and duties as outlined above.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually quiet.
Chief Information Security Officer
Washington, DC jobs
Chief Information Security Officer (CISO)
The Chief Information Security Officer is a senior executive responsible for defining and overseeing the enterprise-wide vision, strategy, and execution of information security programs that safeguard all organizational data and technology. Reporting directly to the CEO and/or Board of Directors, the CISO plays a pivotal role in managing security risk across both the Academic/Research and Clinical/Patient Care operations of the integrated university and hospital system.
Position Details
Salary: $250-2750k
Type: Full-time, direct hire
Location: Washington DC, onsite 3 days a week
Strategic Direction & Executive Leadership
Build and execute a long-term cybersecurity vision that supports the institution's academic initiatives, research priorities, and clinical mission.
Lead and develop the security department, offering coaching, structure, and direction to cybersecurity personnel and partner teams.
Establish the organization's security policies, governance models, and standards to ensure consistent risk management practices.
Oversee financial planning for cybersecurity, including technology investments, service contracts, and budget management.
Risk Oversight & Regulatory Alignment
Supervise all risk assessments, compliance reviews, and internal/external audits, ensuring timely closure of any identified risks.
Maintain adherence to all regulatory requirements applicable to both sectors:
Hospital/Clinical: HIPAA/HITECH, CMS guidelines, and relevant state-level data protection rules.
University/Research: FERPA, NIST SP 800-171 for research compliance, and PCI DSS for payment and donation processing.
Direct the institution's incident management program-coordinating preparation, testing, and response efforts during cybersecurity events affecting either environment.
Operational Security Management
Lead the selection, deployment, and ongoing support of cybersecurity technologies (e.g., SIEM tools, firewalls, intrusion detection systems, endpoint protection).
Oversee vulnerability assessments, penetration testing initiatives, and continuous monitoring activities.
Work closely with IT, engineering, research teams, and clinical technology leaders to incorporate secure design principles into all systems and projects.
Communication, Influence & Education
Act as the organization's primary authority on cybersecurity matters for executives, trustees, faculty, students, clinicians, and administrative teams.
Create and oversee training and awareness programs tailored to the specific needs of academic users, researchers handling sensitive data, and clinical professionals.
Provide routine briefings to senior leadership and the Board on emerging risks, ongoing initiatives, and the overall security posture.
Required Qualifications
Education:
Bachelor's degree in Computer Science, Information Systems, or a related technical field (Master's preferred).
Professional Background:
At least 10 years of progressive cybersecurity experience.
Minimum 5 years serving in a senior leadership capacity (e.g., CISO, Security Executive, VP of Cybersecurity).
Dual-sector experience: Strong understanding of both healthcare and higher-education cybersecurity and regulatory environments.
Certifications: One or more required-CISSP, CISM, or equivalent.
Key Skills & Core Competencies
Advanced knowledge of enterprise security design, network and cloud protection strategies, and modern risk evaluation techniques.
Strong familiarity with frameworks such as NIST Cybersecurity Framework, ISO 27001, and the MITRE ATT&CK model.
Outstanding leadership presence with the ability to collaborate, influence, and guide diverse groups across a complex institution.
Demonstrated success in leading security incident response efforts and handling high-pressure situations.
Proven ability to implement practical, scalable security practices in environments balancing open research culture with rigorous patient data protection requirements.
Security Analyst 247790
Bridgeton, NJ jobs
The Information Security Engineer is responsible for ensuring the secure operation of systems, applications, and networks. This role involves implementing and supporting security solutions, maintaining policies and standards, conducting vulnerability audits, and collaborating with SOC teams on remediation and risk reduction.
Key Responsibilities:
Implement and support security tools and projects.
Partner with the SOC for incident response and remediation.
Serve as a handoff point between projects and ongoing operations.
Support and mentor Level 1 security analysts.
Conduct risk assessments and vulnerability audits.
Maintain and enhance security policies, standards, and procedures.
Qualifications:
Bachelor's degree or equivalent experience (technical certification + 10 years IT experience).
5+ years of experience in Information Security.
Hands-on experience with enterprise firewall technologies and infrastructure communication analysis.
Familiarity with scripting, APIs, and automation.
Experience with HIPAA, PCI, and NIST CSF frameworks.
Experience with SIEM tools, DLP, and user behavior analysis.
Certifications such as CompTIA Security+, CEH, or CISSP required.
Tech Stack:
Defender for Endpoint (EDR)
Proofpoint (email security)
Palo Alto firewalls
Tenable / BigFix
Managed SOC tools (log correlation, alerts)
Microsoft 365, Active Directory
Preferred Skills:
Experience with EDR, risk scoring, and vulnerability prioritization.
Experience coordinating across SOC and infrastructure teams.
Familiarity with Proofpoint, BigFix, or Tenable.
MFA implementation experience.
Cyber Security Engineer
Knoxville, TN jobs
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's information security strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
IT Helpdesk Analyst
Smyrna, GA jobs
Addison Group is working with an engineering company in search for a temporary IT Helpdesk Analyst. This is a short term 12-14 week opportunity and onsite 5 days a week in Smyrna GA.
We're seeking a Tier 1 Helpdesk Contractor to support hardware setup, device deployment, and day-to-day troubleshooting for end users in our Smyrna corporate office. This role is ideal for someone organized, personable, and customer-focused, who enjoys providing hands-on IT support and working with internal technicians and staff.
Key Responsibilities
Set up and configure new and replacement devices for new hires (Windows laptops, iPhones, iPads).
Prepare and program devices using company software such as WatchDog, Azure, Intune, and Company Portal.
Oversee automated device deployments in Intune; monitor and complete basic configuration steps as needed.
Track and manage equipment inventory, maintaining accurate records (serial numbers, local inventory spreadsheet, and system updates).
Support M365 (Microsoft 365) applications, including assisting with PowerPoint and device connectivity issues.
Respond to end-user calls and emails, resolving Tier 1 issues including:
Password resets
VPN access and connectivity
Hardware troubleshooting
Assist with onboarding and device setup for new hires and replacement staff.
Collaborate closely with team members to ensure smooth IT operations and customer satisfaction.
Benefits: Medical, Dental, Vision, 401(k)
Application Security Architect
Charlotte, NC jobs
Outstanding long-term contract opportunity! A well-known Financial Services Company is looking for an Application Security Architect
Local Candidates are preferred
Contract Duration: 12 Months to start (Strong chance of FTE)
w-2 only
Successful candidate will:
Engage and collaborate with application, service, and platform teams to derive a deep, detailed, and accurate description of their application architectures and the services and platforms they consume.
Model the architectures in our threat modeling tool.
Apply our threat modeling methodology to identify and prioritize threats to those applications and to apply mitigating controls.
Review evidence (designs, configurations, and/or source code) of mitigations to threats.
Propose solutions to mitigate threats.
Publish and present threat modeling results.
Collaborate with Cybersecurity Architecture in the creation of new mitigating controls where a sufficient mitigation does not previously exist for a threat.
Required Qualifications:
4+ years of Systems Architecture and/or Systems Development experience
3+ years of Cybersecurity experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education, Cybersecurity certifications.
1+ years of engineering experience with Azure, GCP, or AWS.
1+ years of experience in Python programming.
Proficient in at least one Threat Modeling methodology, such as STRIDE, PASTA, OCTAVE, LINDDUN, or VAST
Experience using Threat Modeler, Microsoft Threat Modeling tool, or OWASP Threat Dragon to develop threat models
Understanding of OWASP Top 10, CAPEC, MITRE ATT&CK and Secure Design principles
The ability to juggle multiple threat models actively in the work-in-progress state, working with a sense of urgency, delivering with short cycle times and a high throughput without sacrificing quality.
Strong collaboration and communication skills, and the ability to work effectively with cross-functional teams.
Information Technology Analyst
New York, NY jobs
Job Title: Information Technology Analyst I
Duration: 3 Months assignment with possible extension
Schedule: 7a-3p - 5 days/week (including weekends). Hours if resource works Saturday &/or Sunday will be 9a-5p regardless of shift they are booked for.
Pay Range: $25 - $28/Hour
Requirements:
Bachelors or equivalent exp (R).
Degree in computer science (P).
1-2 yr exp (P).
Excellent analytical, problem solving , written and verbal communication skills, strong customer service skills. (R).
Ability to work within a team environment (R).
“Pride Health offers eligible employee's comprehensive healthcare coverage (medical, dental, and vision plans), supplemental coverage (accident insurance, critical illness insurance and hospital indemnity), 401(k)-retirement savings, life & disability insurance, an employee assistance program, legal support, auto, home insurance, pet insurance, and employee discounts with preferred vendors”
Cyber Security Architect
Dallas, TX jobs
Privileged Access Management (PAM) Architect
Westlake, TX
Responsibilities:
10+ years of experience in defining and delivering cybersecurity architecture, strategies and solutions with demonstrated experience in the financial services industry or other highly regulated sectors.
Bachelor's degree in Information Security, Computer Science, or a related field; a Master's degree is preferred.
Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise.
Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk.
Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR.
Expertise with build vs. buy solution options.
Working knowledge and experience with Cloud Architectures and the ability to address the security considerations of secure cloud computing including IAM with enterprise services, SSDLC, data protection, cryptography and key management.
Demonstrate leadership and consensus building skills with which you influence decisions and engage across Fidelity and at all levels of the organization
Exceptional communication and interpersonal skills, with the ability to effectively communicate complex technical concepts to non-technical stakeholders.
Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) are highly desirable.
They need a minimum of 10 years of Architecture experience, and someone who has recent experience working with Secrets Management (Hashi Vault)
Looking for a true Architect, someone who can look at problem, how they can address the problem, and map it out. Someone is an Agent of Change and Patience.
They'll be dealing with some high level info within Fidelity, so someone who is open minded, and non emotional when debating thoughts and opinions is key.
Security Engineer
Irvine, CA jobs
At Balance Staffing, we're obsessed with your success!
The Workstation Security Engineer I is an individual contributor who will participate in and manage all aspects of information and network security, including intrusion detection, incident response, vulnerability assessment, application security, and compliance with the corporate information security policy for all Client Device endpoints. This person Will primarily be responsible for designing, implementing, administrating, operating, and improving security technologies, including but not limited to Client device endpoints, Azure Microsoft Defender, Al Security tools, Network Access Control, End Point Protection, Two Factor Authentication, and their procedures and processes.
ESSENTIAL FUNCTIONS
Workstations Security Engineering -
Design, build, test and deploy new security technologies, which include the development of the operational manual and run books
Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement
Investigates, recommends, evaluates, deploys and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure
Participate in technical risk assessments and security exposure analyses of systems, networks and business applications
Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost effectiveness
Responsible for conducting vulnerability assessments and penetration testing, analyzing vulnerability data and prioritizing remediation efforts, and developing vulnerability policies and procedures with the collaboration of GRC.
Oversees the installation, configuration, and supportive processes of security technologies
Participate in or lead the Incident Response activities
Interacts With internal and external clients on security operations requirements, identifies security process and develops strategies/solutions to security issues
Keeps fully abreast of trends and changing technologies as they relate to IT and Network
Engineering and Information Security fields
Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders
Security Operations / Administration -
Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow-up of complete remediation of infected systems
Implement changes to our security technologies/infrastructure in accordance with standard and change control policies/procedures
Evaluate, implement, tune, and operate security solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc
Monitor and recommend improvements of security technologies and their various reports
Risk Management / Security Audit/Assessment Support / Ad-hoc support -
Support security audit/assessment related activities and compliance reviews
Performs other tasks, duties and projects as assigned
Provide Ad-hoc support as required
REQUIREMENTS
Bachelor's Degree in Computer Science, Information Systems or related field, or equivalent experience
Minimum 3 years of IT relevant experience or equivalent combination of experience plus at least
1 year of experience performing Security Engineering / Planning / Operations
Experience in medium to complex computing environments, with advanced knowledge in security technologies and services
Hands-on experience with at least two or more of the following Enterprise Security Technologies:
Network Intrusion Prevention / Detection
Virtual private Networks; SSL, IPSec and Site-to-Site
Enterprise Class Stateful Inspection Firewalls
Network Access Controls in context to Identity management
Windows server OS & Desktop OS
Network Packet Inspection
Directory Services including LDAP, AD and Secure Authentication Technologies
Experience in implementing Information Security technologies and/or processes required.
Experience in defining Information Security strategies and frameworks
Experience integrating security technologies into corporate operations frameworks.
Ability to communicate effectively with client staff at all levels, from technical to executive
Multi-task oriented in a team environment
Demonstrated ability to pay close attention to detail
Knowledge of Information security risk assessment methodologies and standards
Experience developing technical documentation, including reports, proposals, statements of work, and whitepapers
Ability to work independently, undertaking and completing project tasks on schedule with minimal supervision
Balance Staffing is proud to be an equal-opportunity workplace. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, Veteran status, or any other characteristic protected by federal or state law.
Security Engineer
Chicago, IL jobs
Our client is seeking a Security Engineer to join their team! This position is located in Chicago, Illinois.
Evaluate proposed systems, networks, and software designs for security risks
Recommend mitigations and resolve integration issues to ensure secure implementation within existing infrastructure
Develop, manage, and communicate a comprehensive enterprise-wide security strategy, aligning with organizational goals and stakeholder expectations
Lead cybersecurity risk assessments, drive mitigation efforts, manage incident response planning, and collaborate with cross-functional teams to support secure design decisions across the organization
Desired Skills/Experience:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field
7+ years of experience in information and cloud security, with a focus on designing and implementing secure cloud computing solutions
Deep expertise in Azure cloud security, including hands-on experience with tools like Azure Security Center and Microsoft Defender for Cloud
In-depth knowledge of API security such as: OAuth, OpenID, REST, SOAP, GraphQL with the ability to define secure API design patterns and advocate for best practices
Proficiency in at least one scripting language such as Python, PowerShell, or Bash
Benefits:
Medical, Dental, & Vision Insurance Plans
Employee-Owned Profit Sharing (ESOP)
401K offered
The approximate pay range for this position starting at $160,000 - 180,000+. Please note that the pay range provided is a good faith estimate. Final compensation may vary based on factors including but not limited to background, knowledge, skills, and location. We comply with local wage minimums.
Accounting Information Systems & Applications
Buffalo, NY jobs
If you have experience with accounting information systems, a problem-solving mindset, and enjoy working with complex data sets and delivering solutions, then we want to talk with you!
Hodgson Russ LLP, a regional law firm with two hundred plus attorneys in nine offices, is seeking a Accounting Systems & Applications Analyst to join our busy accounting team. This is a hybrid role. Some on-site work is required in Buffalo and/or Rochester. In this role, you will be responsible for maintaining and supporting the Accounting Department's information systems, including upgrade management, data maintenance and user support, implementation of new modules and features, and managing integrations with third party applications. This position is project management-oriented and includes the following key responsibilities:
Ownership of Elite 3E accounting software; expense management, collections management, and other accounting applications; overseeing design, system set ups, user accounts and permissions, customization, architecture, and nomenclature of each application.
Liaison between Accounting and IT.
Provide accounting software support as point-of-contact for problem-solving and/or escalating internally to IT or to vendor support channels as needed.
Contributing to the design of financial reports using PowerBI, SSRS, and AFS (Xcelerate).
Driving data consistency and integrity through record maintenance across all Accounting applications.
To succeed in this role, you will need excellent communication and project management skills, as well as the ability to prioritize and meet deadlines, identify and anticipate needs, and deliver highly accurate and reliable results. Strong computer skills, including proficiency in Microsoft Office and significant practical experience with enterprise accounting applications are required. A Bachelor's Degree in Information Technology & Management, Finance, or Accounting is preferred, with eight years' full-time experience in an accounting and/or information technology role preferably working within the business services sector.
Hodgson Russ offers competitive compensation and a comprehensive benefit package, including medical, dental, vision, life, long term disability, flexible spending, 401(k), Paid Time Off, pension plan, and more. At this time, the good faith estimate of the annual salary range for this position, if the successful applicant is based in Buffalo or Rochester is $87,043 to $107,130. Where a successful applicant is slotted within this range will vary based on legitimate criteria, such as experience and skill level.
Please apply by clicking through application. If your skills and experience match this position, a member of the human resources team will contact you directly. Thank you for your interest in Hodgson Russ.
Hodgson Russ LLP is an Equal Opportunity Employer. The Firm is committed to providing equal employment opportunities regardless of race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, age, disability, veteran status, familial status, or any other legally protected basis. *************************************************
Information Systems Security Analyst II
Farmington, CT jobs
Information Systems Security Analyst II DUTIES: Responsible for maintaining the security and integrity of data and systems for a large, complex site or network; leading the coordination effort with system and/or application administrators to remediate security alerts, address identified vulnerabilities and respond to information security related incidents; improving the overall security posture of the organization; evaluating, testing, and documenting security solutions and controls; establishing and recommending policies on application, system and services security; providing technical leadership on information systems security to system, application administrators, and others of equivalent seniority; implementing technical systems and monitoring for unusual and suspicious activity across a wide range of products; identifying security issues, risks, and developing approaches to mitigate vulnerabilities and recommend changes to system and system components as needed; responsible for recurring vulnerability scanning, penetration testing, protected information scanning; ensuring security deficiencies are mitigated, corrected or a risk acceptance has been obtained by senior management; participating in technical and non-technical projects requiring information security oversight and to ensure policies, procedures and standards are met; recommending baseline configuration changes to systems to optimize security including patching levels, hardening operating systems / applications and monitoring; performing on-going assessments on existing systems to identify new vulnerabilities and recommend hardening procedures; contributing in building security architecture; responsible for cross-system review of security logs and audit trails to meet regulatory compliance; standard operating procedures include but are not limited to daily review of access, backup and application logs; and documents and recommends activities needed to keep the system secure including submitting Requests for Change (RFC); participating and reporting on security audits and risk analysis; developing documentation to support ongoing security systems operations, maintenance, and specific problem resolution; developing technical solutions and automate repeatable tasks to help mitigate security vulnerabilities; conducting research on emerging security products and technologies to justify recommendations and to support purchasing efforts, and interacting and negotiating with vendors, outsourcers, and contractors to secure system-related products and services; recommending new security tools, improvements to policies and SOPs; recommending effective improvements to existing security controls that balance security and business innovation; participating in security compliance efforts including PCI DSS, HIPAA; conducting routine audits and reporting any deviations to senior management; recommending corrective actions to system, network and application administrators; maintaining vendor management standards, questionnaires and documentation to adhere to regulatory compliance; working within the computer security incident response team members work together with other team members to prepare for and provide rapid response to security threats such as virus attacks; developing procedural set of responses to security problems, including protocols for communication within the organization as well as any interaction with law enforcement agencies during computer security incidents; and functioning as a technical lead during security incident response.
RATE OF PAY: Between $113,006 and $141,138/year.
REQUIREMENTS: Bachelor's in Computer Information Systems or a related field, or an equivalent combination of education & experience (will accept bachelor's-degree equivalent combination of education & experience based upon equivalency evaluation by qualified credential evaluator). Requires 5 years of progressive experience in information systems administration, managed security engineering, or information security. All qualified candidates must have experience/skills performing & managing operating system administration including Linux, CentOS, SuSE, & Ubuntu; implementing encryption & digital certificates, networking components including IDS/IPS & Firewalls, & log management, syslog analysis, & TCP/IP analysis; carrying out vulnerability assessment for systems & web security including cross-site scripting, SQL injection, cross-site request forgery, HTTP response splintering, the OWASP Top 10 & SANS Top 20 & remediation techniques; performing system monitoring & reporting tools including SIEMs & FIM.
ADDRESS OF EMPLOYMENT: 10 Discovery Dr, Farmington, CT 06032. Telecommuting permitted (within U.S. only).
About JAX:
The Jackson Laboratory is an independent, nonprofit biomedical research institution with a National Cancer Institute-designated Cancer Center and nearly 3,000 employees in locations across the United States (Maine, Connecticut, California), Japan and China. Its mission is to discover precise genomic solutions for disease and empower the global biomedical community in the shared quest to improve human health.
Founded in 1929, JAX applies over nine decades of expertise in genetics to increase understanding of human disease, advancing treatments and cures for cancer, neurological and immune disorders, diabetes, aging and heart disease. It models and interprets genomic complexity, integrates basic research with clinical application, educates current and future scientists, and provides critical data, tools and services to the global biomedical community. For more information, please visit ************
EEO Statement:
The Jackson Laboratory provides equal employment opportunities to all employees and applicants for employment in all job classifications without regard to race, color, religion, age, mental disability, physical disability, medical condition, gender, sexual orientation, genetic information, ancestry, marital status, national origin, veteran status, and other classifications protected by applicable state and local non-discrimination laws.
Auto-ApplyInformation Security Analyst
Washington, DC jobs
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Title: Information Security Operations Center - Incident Handler III
Location: Washington, DC
Duration: 12+ Months
Job Description:
Essential Job Functions:
• Monitor Security Events from IDS, SIEM, etc.
• Log tickets to the Ticketing System
• Handle calls from the MSSP(Managed security service provider & users regarding incidents/events, perform triage, resolve problems, or escalate to team members
• Perform triage on alerts from all sources including Monitored Email Distribution Lists
• Participate in rotating weekly shift supporting off hours and weekend activity (24x7)
• Produce ad hoc reports and other ad hoc tasks
Qualifications
Required Skills/Abilities:
• Monitoring skills related to IDS and SIEM
• Understanding of TCP/IP, Ethernet, OSI model, layer 2 and layer 3 concepts
• Understanding of Windows Registry, File system, etc.
• Hands-on knowledge of Network Packet Analysis using tools
• Ability to work with team members with varying levels of technical skills and diverse international backgrounds
• Strong understanding of Networking and Operating systems concepts
• Ability to adapt to and function in a project environment with multiple timetables and changing priorities
• Ability to learn new concepts and approaches in Analyzing Security Incidents.
• Good communication skills (Verbal and Written)
Educational Qualifications and Experience:
• Education: Bachelor's degree in Computer Science or Information Systems
• Role Specific Experience: 2+ years of relevant experience in Information Security Incident Handling
• Experience with Firewalls and information security technologies
• Experience with CERT/CSIRT/CIRT/SOC
Certification Requirements:
Any two certifications would be a plus.
CEH, Security +, CCNA
Response activities, including containment, remediation, and root cause analysis
Bachelor's degree and 5+ years of information security experience
Experience in malware remediation and containments
Hands on experience of Incident Response /Malware analysis
Essential Job Functions:
§ Perform advanced Malware Analysis, along with Incident Response
§ Generate detailed Malware Analysis reports on PE and other common file structure samples
§ Provide actionable intelligence and suggestions for control updates based on the reverse engineering and malware analysis
§ Assist OIS in Identifying zero-day/vulnerable applications and impact
Experience Matrix for Levels:
• Level I - 2+ years of experience
• Level II - 5+ years of experience
• Level III - 7+ years of experience
Note:
The specific shift he wants to get covered is the 12pm-8pm EST window
Strong experience in SOC environment and great soft skills/customer service
Required people who can come for an in-person interview
Additional Information
For more information, Please contact
Siva Kumar
************
Information Security Analyst
Plano, TX jobs
Artech Information Systems is the #12 Largest IT Staffing Company in the U.S. and an employer of choice for over 7,000 consultants. We recruit world-class talent for IT, engineering, and other professional jobs at 70+ Fortune and Global 500 companies coast-to-coast across the U.S., India, and China. We are one of the fastest-growing companies in the US and we welcome you to search the thousands of jobs in our cutting-edge GEM system for employment opportunities that fit your qualifications.
At the forefront of the staffing industry, Artech is a minority and women-owned business enterprise (MWBE) committed to maximizing global workforce solutions on behalf of its clients. Artech's deep heritage, proven expertise and insightful market intelligence has secured long-term partnerships with Fortune 500 and government clients seeking world-class professional resources.
Job Description
• Respond to inbound phone and electronic requests for technical assistance from customers • Perform all tasks required per shift including reporting, monitoring, and turnover • Evaluate threats and determine impact to customer's environment • Assess incident severity and escalate to the next level as needed • Perform additional event/incident investigation and research as needed • Utilize internal guidelines for effective call processing and escalation and client service • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote • Manage customer accounts and confidently communicate technical information to Dell Services client base and internal technical team members • Maintain keen understanding of evolving Internet threats to ensure the security of Dell Services Client networks • Participate in knowledge sharing with other analysts and develop customer solutions efficiently • Coordinate or participate in individual or team projects to ensure quality support for our clients • Perform other essential duties as assigned Requirements • Working knowledge of analyzing events from SPLUNK SIEM. • Ability to work shift work in a 24/7/365 environment • 1+ years of experience in technical role with notable exposure to security (or have a Technical Degree) • Experience with Microsoft Windows and related security concepts • Experience with network connectivity and protocols such as TCP/IP, VPNs, VLAN, NAT, DHCP • Experience / Knowledge of variety of Intrusion Detection/Prevention platforms • Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management • Investigative and analytical problem solving skills • Understanding of security threats and attack countermeasures • Knowledge of current security events and a demonstrated passion to stay informed Preferences • Bachelor's Degree or equivalent in an IT/Technical field or equivalent work experience • 1+ years of experience in security role • Coding or scripting experience • Familiarity with Unix/Linux • Security+, GIAC, GCIA, GCIH, GCFW, GHTO, GSEC or similar certification • CISSP, CCNA, CCSP, CSPFA certifications a plus
Qualifications
MUST HAVES:
• 2+ years of experience in technical role with notable exposure to security
• Working knowledge of analyzing events from SPLUNK SIEM.
• Ability to work shift work in a 24/7/365 environment.
• Experience with/knowledge of IT security devices such as: Security Information & Event Management (SIEM) systems, firewalls, and/or antivirus management
This is a Bulk hiring position for our direct client.
Additional Information
For More Information, Please Contact
Siva Kumar
************
Security Systems Analyst
Plano, TX jobs
Artech is the 10th Largest IT Staffing Company in the US, according to Staffing Industry Analysts' 2012 annual report. Artech provides te chnical expertise to fill gaps in clients' immediate skill-sets availability, deliver emerging technology skill-sets, refresh existing skill base, allow for flexibility in project planning and execution phases, and provide budgeting/financial flexibility by offering contingent labor as a variable cost.
Job Description
• Deploy and maintain a full suite of endpoint security products.
• Responsible for ensuring high level of systems security compliance.
• Maintain pertinent site location details to ensure proper incident management ticket routing.
• Perform incident triage and handling by determining scope, urgency and potential impact
• Provide support for vulnerability assessments tools across multiple vendors.
• Coordinate with and act as subject matter expert to resolve incidents by working with other information security specialists.
• Maintain and expand related information security metrics.
Qualifications
• 5+ years supporting workstation and server operating systems.
• 1 year incident response and malware removal experience
• 1 to 2 years' experience supporting endpoint security tools, McAfee, Symantec, Trend Micro, etc.
• Basic knowledge of network and perimeter security methodologies and tools.
Additional Information
Looking only for W2, No C2C ( Referral and H1B Transfer will work )
Data Security analyst
Columbus, OH jobs
US Tech Solutions is a global staff augmentation firm providing a wide-range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit our website ************************
We are constantly on the lookout for professionals to fulfill the staffing needs of our clients, sets the correct expectation and thus becomes an accelerator in the mutual growth of the individual and the organization as well.
Keeping the same intent in mind, we would like you to consider the job opening with US Tech Solutions that fits your expertise and skillset.
Job Description
Scope/Responsibilities/Duties:
• 0-2 years general experience, bachelor' s degree or equivalent combo of education/experience;
• Some experience in desired tech area; position functions with high level of supervision;
• Assesses security and/or compliance of university systems; responsible for assessing, monitoring and analyzing data, identifying security, risk or compliance issues and/or events
• Leveraging job aids for common issues or incidents
• Demonstrated ability to work in a team, attention to detail, solid written communications and some technology experience
• To perform system based risk assessments.
• Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial.
Qualifications
• Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial.
Additional Information
Thanks & Regards,
Kushal Kumar
Talent Acquisition Specialist
Tel: ************
Data Security analyst
Columbus, OH jobs
US Tech Solutions is a global staff augmentation firm providing a wide-range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit our website ************************ We are constantly on the lookout for professionals to fulfill the staffing needs of our clients, sets the correct expectation and thus becomes an accelerator in the mutual growth of the individual and the organization as well.
Keeping the same intent in mind, we would like you to consider the job opening with US Tech Solutions that fits your expertise and skillset.
Job Description
Scope/Responsibilities/Duties:
• 0-2 years general experience, bachelor' s degree or equivalent combo of education/experience;
• Some experience in desired tech area; position functions with high level of supervision;
• Assesses security and/or compliance of university systems; responsible for assessing, monitoring and analyzing data, identifying security, risk or compliance issues and/or events
• Leveraging job aids for common issues or incidents
• Demonstrated ability to work in a team, attention to detail, solid written communications and some technology experience
• To perform system based risk assessments.
• Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial.
Qualifications
• Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial.
Additional Information
Thanks & Regards,
Kushal Kumar
Talent Acquisition Specialist
Tel: ************
Network Security Analyst
White Plains, NY jobs
We invite you to review our current business services professionals openings to learn about the opportunities available across the firm.
About Us
Skadden, Arps, Slate, Meagher & Flom LLP has forged a reputation as one of the most prestigious law firms in the world. Relying on innovation, intellect, teamwork and tenacity, our lawyers deliver the highest quality advice and novel solutions to our clients' legal issues. We are known for handling the most complex transactions, litigation/controversy issues, and regulatory matters, as well as for the strong partnerships we build with clients and each other. Our attorneys, who reflect a broad range of experiences and perspectives, work together seamlessly across 50-plus practices and 21 offices in the world's major financial centers.
The Opportunity
We are seeking two Network Security Analysts to join our Firm. These positions will be based in our White Plains office (hybrid), and please note the roles have different shift times, listed below. The Network Security Analysts are responsible for implementing and supporting network security solutions for the Firm and, implementing and enforcing practical solutions to secure the Firm's internal and external network infrastructure.
Available Shift Times (EST- Hybrid)
1.) Saturday - Sunday: 7:00 a.m. - 8:00 p.m. EST & Monday 7:00 a.m. - 7:00 p.m.
2.) Monday - Friday: 2:00 p.m. - 10:00 p.m.
Note: The scheduled hours listed may be flexible and will be discussed during the interview process.
Responsibilities
Performs daily review of automated security reports and escalate as necessary.
Responds to system generated security alerts and coordinate responses.
Assists with internal audits, vulnerability scans and risk assessments.
Assists with annual penetration testing, review of findings and tracking issue resolution.
Participates in evaluating new technologies or new versions of existing products.
Works with project teams to implement secure network connectivity solutions.
Writes and maintains technical documentation including procedures and troubleshooting guides.
Demonstrates effective interpersonal, written and verbal communication skills to facilitate effective work relationships with others.
Manages Firm resources responsibly.
Complies with and understands Firm operation, policies and procedures.
Performs other related duties as assigned.
Qualifications
Knowledge of relevant firm computer software programs (e.g., Outlook, Excel, PowerPoint), with the ability to learn new software and operating systems
Proficient with Access, Project and Visio
Thorough knowledge of network management and security technologies and approaches
Thorough knowledge of security techniques, latest protocols and defenses
Proficient with Microsoft Active Directory and Operating Systems
Basic ability to program scripts and batch files
Demonstrates effective interpersonal and communication skills, both verbally and in writing
Demonstrates close attention to detail
Excellent analytical, troubleshooting, organizational, and planning skills
Ability to handle multiple projects and shifting priorities
Ability to handle sensitive matters and maintain confidentiality
Ability to organize and prioritize work
Ability to work well in a demanding and fast-paced environment
Ability to work well independently as well as effectively within a team
Ability to use discretion and exercise independent and sound judgment
Flexibility to adjust hours and work the hours necessary to meet operating and business needs
Education/Experience
Bachelor's degree or equivalent
Minimum of two years' experience in multi-national enterprise IT
Culture & Life at Skadden
What makes Skadden special is our people and the culture, community and spirit of collaboration we have created. We believe in teamwork and inspiring each other to be our best in an atmosphere that promotes professionalism and excellence in all that we do. We know that inclusion and drawing on the strength of a wide spectrum of talent only make us better and is vital to the firm's success. Our goal is for everyone at the firm to enjoy a challenging career with opportunities for development and growth and to support the well-being of our attorneys and business services professionals.
Benefits
The overall well-being of our team is important to us. We offer generous benefits to help you achieve wellness in all areas of your life.
Competitive salaries and year-end discretionary bonuses.
Comprehensive health care (medical, dental, vision), savings plan/401(k) and voluntary benefits.
Generous paid time off.
Paid leave options, including parental.
In-classroom, remote, and on-demand learning and professional development opportunities.
Robust well-being classes and programs.
Opportunities to give back and make an impact in local communities.
For further details, please visit: *******************************************************
Skadden is an Equal Opportunity Employer (Disability/Vet/other protected categories). For more information, please visit Skadden.com/careers.
The starting base salary for this position is expected to be within the range listed under Salary Details. Actual salary will be determined based on skills, experience (to the extent relevant) and other-job related factors, consistent with applicable law.
Salary Details
$125,000 -$140,000
EEO Statement
Skadden is an Equal Opportunity Employer. It does not discriminate against applicants or employees based on any legally impermissible factor including, but not limited to, race, color, religion, creed, sex, national origin, ancestry, age, alienage or citizenship status, marital or familial status, domestic partnership status, caregiver status, sexual orientation, gender, gender identity or expression, change of sex or transgender status, genetic information, medical condition, pregnancy, childbirth or related medical conditions, sexual and reproductive health decisions, disability, any protected military or veteran status, or status as a victim of domestic or dating violence, sexual assault or offense, or stalking.
Applicants who require an accommodation during the application process should contact Lara Bell at **************.
Skadden Equal Employment Opportunity Policy
Skadden Equal Employment Opportunity Policy
Applicants Have Rights Under Federal Employment Law
Applicants Have Rights Under Federal Employment Law
In accordance with the Transparency in Coverage Rule,
click here to review machine-readable files made available by UnitedHealthcare:
Transparency in Coverage
Auto-ApplyNetwork Security Analyst
Lehi, UT jobs
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional Information
Thanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************