Post job

Information Security Analyst jobs at Veolia Water Tech

- 107 jobs
  • Cloud Security Engineer III - Lead

    Randstad USA 4.6company rating

    Boston, MA jobs

    App & Cloud Security Engineer - Lead Start: 2-3 weeks from date of offer *Background Check Required* *No VISA Sponsorship* Hospital based in Boston, MA is building out a unified security team that will encompass both App and Cloud. This team will manage security across the full application lifecycle- from inception and code review to deployment and underlying infrastructure maintenance. This position is the 1st hire for this department will be instrumental in the build out. Growth plans are to be a team of 8 over the next 3 years. The Role: Lead Engineer (First Hire) Position: High-level Individual Contributor (Engineer III) acting as the "founding member" and leader of this new function. Key Responsibilities: Define the strategy and build the program from the ground up. Serve as the Product Owner for Wiz and Snyk. Collaborate closely with separate Cloud Engineering and Security Remediation teams. Ideal Candidate Profile: Someone with a background in Cloud Incident Response is highly desired. The client values the unique perspective this brings to defining a risk-prioritized approach to remediation. Career Trajectory: Opportunity to evolve into a Principal IC (Engineer IV) or pivot into leadership (Manager/Sr. Manager) as the team grows. Environment: Predominately Azure with some AWS as well. GCP is being sun-setted. Qualifications Bachelor's degree in Information Security, Computer Science, or related field; advanced degrees or equivalent professional experience preferred. Minimum of 5+ years of progressive experience in application security, cloud security, or related cybersecurity roles. Relevant industry certifications preferred (CISSP, CCSP, CSSLP, AWS/Azure Security Specialty, GIAC certifications). Skills for Success Expert-level knowledge and practical experience in secure software development methodologies, OWASP Top 10, and application security testing tools (SAST, DAST, IAST). A comprehensive understanding of secure coding principles, with the ability to guide development teams in adhering to these best practices. Hands-on experience with static and dynamic application security testing tools is preferred. Proven expertise in securing major cloud platforms (AWS, Azure, GCP), including experience with Cloud Security Posture Management tools, cloud-native security services, and infrastructure-as-code security. Deep understanding of modern software architectures, microservices, APIs, and container security best practices (e.g., Docker, Kubernetes). Ability to think strategically, creatively, and innovatively to design and implement robust security controls. Demonstrated leadership skills with strong project management capabilities, able to effectively communicate complex technical security issues clearly to technical and non-technical stakeholders. Proven track record of delivering and managing successful security projects and continuous improvement initiatives. Strong ability to apply documented processes, playbooks, and frameworks (e.g., OWASP, NIST CSF, etc.) to effectively address and resolve a wide variety of application security challenges. Knowledge of established security frameworks, including NIST Cybersecurity Framework (CSF), NIST 800-53 with a focus on their application in securing software and application environments. Preferred certifications include: Offensive Security Certified Professional (OSCP), Offensive Security Certified Expert (OSCE), GIAC Penetration Tester Certification (GPEN), GIAC Experienced Penetration Tester (GX-PT), GIAC Certified Red Team Professional (GRTP), GIAC Security Operations Certified (GSOC), GIAC Security Expert (GSE), etc. Must know how to use common M365 Office Suite of products.
    $103k-138k yearly est. 4d ago
  • Cyber Security Analyst (ACAS Data Analysis) - 26280

    Huntington Ingalls Industries, Inc. 4.3company rating

    Virginia Beach, VA jobs

    Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $115,642.00 - $130,000.00 Security Clearance: Secret Level of Experience: Senior This opportunity resides with Global Security (GS). Mission Technologies' Global Security (GS) group comprises live, virtual, constructive (LVC) solutions; fleet sustainment; nuclear and environmental; and Australia business. As a trusted partner to our military customers, HII designs, develops and operates the largest LVC enterprise that prepares warfighters for cross-domain battle. With advanced technologies to enable mission readiness, HII understands that preparation requires full coordination-not readiness in piece-parts. For more than 40 years, the U.S. Navy has entrusted HII to maintain and modernize the vast majority of its fleet. With a holistic approach to life-cycle maritime defense systems-from small watercraft to submarines, surface combatants and aircraft carriers-HII ensures a high state of readiness. HII supports the Department of Energy's national security mission through the management and operation of its sites, as well as the safe cleanup of legacy waste across the country. HII meets clients' toughest nuclear and environmental challenges. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you. To learn more about Mission Technologies, click here for a short video: *************************** Summary HII Mission Technologies is seeking a highly skilled Cyber Security Analyst IV to provide technical cybersecurity support to the Navy Enterprise Tactical Training Network (NETTN) with a focus on ACAS data analysis. Impact This role has a direct impact on safeguarding Navy training systems by identifying vulnerabilities, strengthening defenses, and ensuring compliance with DoD cybersecurity standards. You will serve as a subject matter expert, advising government stakeholders and supporting mission readiness through proactive risk management. Work Environment 100% onsite Flexibility required to work non‑standard hours and weeks exceeding 40 hours to meet mission and contractual requirements. Duties may be adjusted to meet evolving business and customer needs. What you will do Analyze ACAS data and conduct security testing/evaluation of servers, workstations, databases, and network devices; develop customized scanning configurations and PowerShell scripts to automate data collection, analysis, and reporting. Map identified findings (manual, automated, CVE‑based) to NIST SP 800‑53 controls, DoD policies, and technical standards; interpret and apply directives such as CTOs, FRAG/TASK/OPORDs, IAVMs, PKI guidance, and STIG requirements. Evaluate security toolsets to identify gaps and recommend improvements; serve as SME on vulnerabilities, exploitation methods, mitigation strategies, and operational impacts. Review A&A documentation for RMF compliance, perform risk analyses, and recommend mitigating controls; draft, update, and maintain cybersecurity policies, procedures, and technical guidance. Provide written and oral analysis of security architecture and vulnerability assessments; support creation, management, and tracking of POA&Ms, ensuring accurate reporting and compliance. Advise government stakeholders on cybersecurity and RMF; track and report compliance status in VRAM and other vulnerability platforms; conduct independent verification of configurations, STIG findings, and POA&M entries. Demonstrate ability to work independently with minimal oversight as well as collaboratively in a team environment. What you must have Education & Experience Bachelor's degree in a related field and 9 years of relevant experience, OR Master's degree in a related field and 7 years of relevant experience, OR PhD in a related field and 4 years of relevant experience, OR High School Diploma (or equivalent) and 13 years of relevant experience. Technical Skills / Knowledge Experience using DISA ACAS with demonstrated ability to analyze ACAS data. Advanced knowledge of Microsoft Excel for data manipulation and analysis. Proficiency with PowerShell scripting. Ability to interpret and apply DoD cybersecurity directives, policies, and standards. Credentials U.S. Citizenship required. Current or active U.S. Secret security clearance required. Must hold a DoD 8570 IAT‑II level certification, in compliance with DoD Cyber IT/CSWF Program requirements (DoD 8570.1‑M and SECNAV M‑5239.2). Acceptable certifications include: CompTIA Security+ CE, GSEC, CCNA Security, CySA+, or equivalent. Preferred Requirements Current DISA ACAS Administrator Training certificate. Prior experience supporting Navy or DoD cybersecurity programs. Familiarity with Risk Management Framework (RMF) processes and documentation. Experience with VRAM or similar vulnerability tracking platforms. Strong communication skills for briefing leadership and writing technical reports. Physical Requirements May require working in an office, industrial, shipboard, or laboratory environment. Capable of climbing ladders and tolerating confined spaces and extreme temperature variances. HII is more than a job - it's an opportunity to build a new future. We offer competitive benefits such as best-in-class medical, dental and vision plan choices; wellness resources; employee assistance programs; Savings Plan Options (401(k)); financial planning tools, life insurance; employee discounts; paid holidays and paid time off; tuition reimbursement; as well as early childhood and post-secondary education scholarships. Bonus/other non-recurrent compensation is occasionally offered for qualified positions, and if applicable to this role will be addressed by the recruiter at the screening phase of application. Why HII We build the world's most powerful, survivable naval ships and defense technology solutions that safeguard our seas, sky, land, space and cyber. Our workforce includes skilled tradespeople; artificial intelligence, machine learning (AI/ML) experts; engineers; technologists; scientists; logistics experts; and business administration professionals. Recognized as one of America's top large company employers, we are a values and ethics driven organization that puts people's safety and well-being first. Regardless of your role or where you serve, at HII, you'll find a supportive and welcoming environment, competitive benefits, and valuable educational and training programs for continual career growth at every stage of your career. Together we are working to ensure a future where everyone can be free and thrive. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law. Do You Need Assistance? If you need a reasonable accommodation for any part of the employment process, please send an e-mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
    $115.6k-130k yearly 4d ago
  • Cyber Security Analyst (ACAS Data Analysis) - 26280

    Huntington Ingalls Industries 4.3company rating

    Virginia Beach, VA jobs

    Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $115,642.00 - $130,000.00 Security Clearance: Secret Level of Experience: Senior This opportunity resides with Global Security (GS). Mission Technologies' Global Security (GS) group comprises live, virtual, constructive (LVC) solutions; fleet sustainment; nuclear and environmental; and Australia business. As a trusted partner to our military customers, HII designs, develops and operates the largest LVC enterprise that prepares warfighters for cross-domain battle. With advanced technologies to enable mission readiness, HII understands that preparation requires full coordination-not readiness in piece-parts. For more than 40 years, the U.S. Navy has entrusted HII to maintain and modernize the vast majority of its fleet. With a holistic approach to life-cycle maritime defense systems-from small watercraft to submarines, surface combatants and aircraft carriers-HII ensures a high state of readiness. HII supports the Department of Energy's national security mission through the management and operation of its sites, as well as the safe cleanup of legacy waste across the country. HII meets clients' toughest nuclear and environmental challenges. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you. To learn more about Mission Technologies, click here for a short video: *************************** Summary HII Mission Technologies is seeking a highly skilled Cyber Security Analyst IV to provide technical cybersecurity support to the Navy Enterprise Tactical Training Network (NETTN) with a focus on ACAS data analysis. Impact This role has a direct impact on safeguarding Navy training systems by identifying vulnerabilities, strengthening defenses, and ensuring compliance with DoD cybersecurity standards. You will serve as a subject matter expert, advising government stakeholders and supporting mission readiness through proactive risk management. Work Environment + 100% onsite + Flexibility required to work non‑standard hours and weeks exceeding 40 hours to meet mission and contractual requirements. + Duties may be adjusted to meet evolving business and customer needs. What you will do + Analyze ACAS data and conduct security testing/evaluation of servers, workstations, databases, and network devices; develop customized scanning configurations and PowerShell scripts to automate data collection, analysis, and reporting. + Map identified findings (manual, automated, CVE‑based) to NIST SP 800‑53 controls, DoD policies, and technical standards; interpret and apply directives such as CTOs, FRAG/TASK/OPORDs, IAVMs, PKI guidance, and STIG requirements. + Evaluate security toolsets to identify gaps and recommend improvements; serve as SME on vulnerabilities, exploitation methods, mitigation strategies, and operational impacts. + Review A&A documentation for RMF compliance, perform risk analyses, and recommend mitigating controls; draft, update, and maintain cybersecurity policies, procedures, and technical guidance. + Provide written and oral analysis of security architecture and vulnerability assessments; support creation, management, and tracking of POA&Ms, ensuring accurate reporting and compliance. + Advise government stakeholders on cybersecurity and RMF; track and report compliance status in VRAM and other vulnerability platforms; conduct independent verification of configurations, STIG findings, and POA&M entries. + Demonstrate ability to work independently with minimal oversight as well as collaboratively in a team environment. What you must have Education & Experience + Bachelor's degree in a related field and 9 years of relevant experience, OR + Master's degree in a related field and 7 years of relevant experience, OR + PhD in a related field and 4 years of relevant experience, OR + High School Diploma (or equivalent) and 13 years of relevant experience. Technical Skills / Knowledge + Experience using DISA ACAS with demonstrated ability to analyze ACAS data. + Advanced knowledge of Microsoft Excel for data manipulation and analysis. + Proficiency with PowerShell scripting. + Ability to interpret and apply DoD cybersecurity directives, policies, and standards. Credentials + U.S. Citizenship required. + Current or active U.S. Secret security clearance required. + Must hold a DoD 8570 IAT‑II level certification, in compliance with DoD Cyber IT/CSWF Program requirements (DoD 8570.1‑M and SECNAV M‑5239.2). + Acceptable certifications include: CompTIA Security+ CE, GSEC, CCNA Security, CySA+, or equivalent. Preferred Requirements + Current DISA ACAS Administrator Training certificate. + Prior experience supporting Navy or DoD cybersecurity programs. + Familiarity with Risk Management Framework (RMF) processes and documentation. + Experience with VRAM or similar vulnerability tracking platforms. + Strong communication skills for briefing leadership and writing technical reports. Physical Requirements May require working in an office, industrial, shipboard, or laboratory environment. Capable of climbing ladders and tolerating confined spaces and extreme temperature variances. HII is more than a job - it's an opportunity to build a new future. We offer competitive benefits such as best-in-class medical, dental and vision plan choices; wellness resources; employee assistance programs; Savings Plan Options (401(k)); financial planning tools, life insurance; employee discounts; paid holidays and paid time off; tuition reimbursement; as well as early childhood and post-secondary education scholarships. Bonus/other non-recurrent compensation is occasionally offered for qualified positions, and if applicable to this role will be addressed by the recruiter at the screening phase of application. Why HII We build the world's most powerful, survivable naval ships and defense technology solutions that safeguard our seas, sky, land, space and cyber. Our workforce includes skilled tradespeople; artificial intelligence, machine learning (AI/ML) experts; engineers; technologists; scientists; logistics experts; and business administration professionals. Recognized as one of America's top large company employers, we are a values and ethics driven organization that puts people's safety and well-being first. Regardless of your role or where you serve, at HII, you'll find a supportive and welcoming environment, competitive benefits, and valuable educational and training programs for continual career growth at every stage of your career. Together we are working to ensure a future where everyone can be free and thrive. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law. Do You Need Assistance? If you need a reasonable accommodation for any part of the employment process, please send an e-mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
    $115.6k-130k yearly 4d ago
  • Cyber Security Analyst (ACAS Data Analysis) - 26280

    Huntington Ingalls Industries 4.3company rating

    Virginia Beach, VA jobs

    Company: HII's Mission Technologies division Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $115,642.00 - $130,000.00 Security Clearance: Secret Level of Experience: Senior This opportunity resides with Global Security (GS). Mission Technologies' Global Security (GS) group comprises live, virtual, constructive (LVC) solutions; fleet sustainment; nuclear and environmental; and Australia business. As a trusted partner to our military customers, HII designs, develops and operates the largest LVC enterprise that prepares warfighters for cross-domain battle. With advanced technologies to enable mission readiness, HII understands that preparation requires full coordination-not readiness in piece-parts. For more than 40 years, the U.S. Navy has entrusted HII to maintain and modernize the vast majority of its fleet. With a holistic approach to life-cycle maritime defense systems-from small watercraft to submarines, surface combatants and aircraft carriers-HII ensures a high state of readiness. HII supports the Department of Energy's national security mission through the management and operation of its sites, as well as the safe cleanup of legacy waste across the country. HII meets clients' toughest nuclear and environmental challenges. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you. To learn more about Mission Technologies, click here for a short video: *************************** Summary HII Mission Technologies is seeking a highly skilled Cyber Security Analyst IV to provide technical cybersecurity support to the Navy Enterprise Tactical Training Network (NETTN) with a focus on ACAS data analysis. Impact This role has a direct impact on safeguarding Navy training systems by identifying vulnerabilities, strengthening defenses, and ensuring compliance with DoD cybersecurity standards. You will serve as a subject matter expert, advising government stakeholders and supporting mission readiness through proactive risk management. Work Environment * 100% onsite * Flexibility required to work non‑standard hours and weeks exceeding 40 hours to meet mission and contractual requirements. * Duties may be adjusted to meet evolving business and customer needs. What you will do * Analyze ACAS data and conduct security testing/evaluation of servers, workstations, databases, and network devices; develop customized scanning configurations and PowerShell scripts to automate data collection, analysis, and reporting. * Map identified findings (manual, automated, CVE‑based) to NIST SP 800‑53 controls, DoD policies, and technical standards; interpret and apply directives such as CTOs, FRAG/TASK/OPORDs, IAVMs, PKI guidance, and STIG requirements. * Evaluate security toolsets to identify gaps and recommend improvements; serve as SME on vulnerabilities, exploitation methods, mitigation strategies, and operational impacts. * Review A&A documentation for RMF compliance, perform risk analyses, and recommend mitigating controls; draft, update, and maintain cybersecurity policies, procedures, and technical guidance. * Provide written and oral analysis of security architecture and vulnerability assessments; support creation, management, and tracking of POA&Ms, ensuring accurate reporting and compliance. * Advise government stakeholders on cybersecurity and RMF; track and report compliance status in VRAM and other vulnerability platforms; conduct independent verification of configurations, STIG findings, and POA&M entries. * Demonstrate ability to work independently with minimal oversight as well as collaboratively in a team environment. What you must have Education & Experience * Bachelor's degree in a related field and 9 years of relevant experience, OR * Master's degree in a related field and 7 years of relevant experience, OR * PhD in a related field and 4 years of relevant experience, OR * High School Diploma (or equivalent) and 13 years of relevant experience. Technical Skills / Knowledge * Experience using DISA ACAS with demonstrated ability to analyze ACAS data. * Advanced knowledge of Microsoft Excel for data manipulation and analysis. * Proficiency with PowerShell scripting. * Ability to interpret and apply DoD cybersecurity directives, policies, and standards. Credentials * U.S. Citizenship required. * Current or active U.S. Secret security clearance required. * Must hold a DoD 8570 IAT‑II level certification, in compliance with DoD Cyber IT/CSWF Program requirements (DoD 8570.1‑M and SECNAV M‑5239.2). * Acceptable certifications include: CompTIA Security+ CE, GSEC, CCNA Security, CySA+, or equivalent. Preferred Requirements * Current DISA ACAS Administrator Training certificate. * Prior experience supporting Navy or DoD cybersecurity programs. * Familiarity with Risk Management Framework (RMF) processes and documentation. * Experience with VRAM or similar vulnerability tracking platforms. * Strong communication skills for briefing leadership and writing technical reports. Physical Requirements May require working in an office, industrial, shipboard, or laboratory environment. Capable of climbing ladders and tolerating confined spaces and extreme temperature variances. HII is more than a job - it's an opportunity to build a new future. We offer competitive benefits such as best-in-class medical, dental and vision plan choices; wellness resources; employee assistance programs; Savings Plan Options (401(k)); financial planning tools, life insurance; employee discounts; paid holidays and paid time off; tuition reimbursement; as well as early childhood and post-secondary education scholarships. Bonus/other non-recurrent compensation is occasionally offered for qualified positions, and if applicable to this role will be addressed by the recruiter at the screening phase of application. Why HII We build the world's most powerful, survivable naval ships and defense technology solutions that safeguard our seas, sky, land, space and cyber. Our workforce includes skilled tradespeople; artificial intelligence, machine learning (AI/ML) experts; engineers; technologists; scientists; logistics experts; and business administration professionals. Recognized as one of America's top large company employers, we are a values and ethics driven organization that puts people's safety and well-being first. Regardless of your role or where you serve, at HII, you'll find a supportive and welcoming environment, competitive benefits, and valuable educational and training programs for continual career growth at every stage of your career. Together we are working to ensure a future where everyone can be free and thrive. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law. Do You Need Assistance? If you need a reasonable accommodation for any part of the employment process, please send an e-mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
    $115.6k-130k yearly 4d ago
  • Cyber Security Analyst

    Southern Company 4.5company rating

    Atlanta, GA jobs

    A Southern Company Security Analyst participates in monitoring, hunting and responding to cyber security events. He or She, provides a front-line role during cyber security incidents, identifying the extent of the threat, business impacts and advising or sometimes performing the most suitable course of action to contain, eradicate and remediate an incident. A Southern Company Security Analyst maintains a good knowledge of the threat landscape, helps enhance visibility and response capabilities by identifying new methods of detecting threats. A Southern Company Security Analyst is proactive and seeks out adversaries determined to negatively impact Southern Companies reputation, financial interest or threatens the safety of our employees and customers. Candidates are expected to discuss and demonstrate they meet required qualifications for applicable roles. Responsibilities Take action on security events presented to Analyst via SIEM, user submissions, dashboards, etc. Self-initiate hunting initiatives to discover potential breaches or undiscovered cyber threats Remain abreast of emerging threat patterns and provide recommendations to detect threats Assists with patching recommendations and workarounds for zero-day threats. Coordinate mitigation or remediations task with stakeholders or supporting teams Communicates with management on incident updates. Monitors SIEM and analyzes security events to determine appropriate actions Monitors emails containing links/attachments associated with potential phishing attempts to determine appropriate actions Identify and tune false positives associated with current security events Document analytical steps and findings associated with security event investigations Qualifications Required for Cyber Security Analyst 2 years IT security experience Minimum 2 years of experience in performing analysis on Windows and LINUX/UNIX systems Minimum 2 years of experience and/or familiarity in the following areas: Network/Endpoint: analysis tools Scripting languages Windows/Unix command line utilities Reputation analysis associated with IP's, Domains, Email Addresses Ticketing Systems Required to submit to a background examination. Experience operating within a security application such as Kali, Metasploit, and etc. Familiar with and have worked within Cyber Security Frameworks such as: NIST 800 - 61 Attack Life Cycle SANS Security Controls MITRE SANS Security 500 Series or other industry standard equivalent Experience with PCAP analysis Experience investigating endpoint and network security events Experience investigating user reported Phishing events (specifically investigating suspicious links and attachments) Experience analyzing security events utilizing sandbox technology Experience operating within a security application such as Kali, Metasploit, and etc. Oral and written communication skills Experience taking ownership of incidents from acknowledgement to resolution Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies Experience initiating security event investigations Preferred capabilities: Oral and written communication skills Ability to take ownership of incidents from acknowledgement to resolution Ability to initiate security event investigations Ability to comprehend and articulate business impact associated with security events Interacting with vendors to support proof of concepts Proficient in Microsoft Office products: Excel, Word, Outlook and etc. Exposure, experience and/or knowledge of cloud technology Familiar with NIST 800-61 and SANS Critical Security Controls Ability to identify and mitigate security events by recommending and/or implementing defensive/preventive strategies Desired certifications: GIAC Security Essentials (GCIH) GIAC Certified Intrusion Analyst (GCIA) Security+ Other certifications within IT Security Characteristics of an Southern Company Cyber Analyst Self-Motivated - Cyber Analysts do not only act when security tools trigger alerts, we are suspicious by nature and can generate security events based on self-initiated task. Perseverance - Cyber Analysts identify resources that allow us to move through or around barriers as we analyze cyber security events. Dependable - Cyber Analysts work within a team environment and thus, we rely on one another for knowledge-sharing and dependence. Integrity - As Cyber Analysts, our reputation is our code of ethics. We are not perfect. We admit our mistakes. We do the right thing. Sense of Humor - Although this may vary, just have one; I promise we can work with it. We have a lot of fun in what we do, so you will need a sense of humor to keep up. This position falls under the company's Insider Threat Program and will have access to, and control over sensitive data, systems or assets. Enhanced personnel screening, which includes a background review, drug screen and psychological assessment, will be required if you are selected for this position
    $95k-118k yearly est. Auto-Apply 60d+ ago
  • Cyber Hunt Analyst - 25922

    Huntington Ingalls Industries, Inc. 4.3company rating

    Columbia, SC jobs

    Enlighten, honored as a Top Workplace from USA Today, is a leader in big data solution development and deployment, with expertise in cloud-based services, software and systems engineering, cyber capabilities, and data science. Enlighten provides continued innovation and proactivity in meeting our customers' greatest challenges. Why Enlighten? At Enlighten, our team's unwavering work ethic, top talent and celebration of innovative ideas have helped us thrive. We know that our employees are essential to our company's success, so we seek to take care of you as much as you take care of us. Here are a few highlights of our benefits package: • 100% paid employee premium for healthcare, vision and dental plans. • 10% 401k benefit. • Generous PTO + 10 paid holidays. • Education/training allowances. Anticipated Salary Range: $114,236.00 - $160,000.00. The salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, Enlighten takes a variety of factors into consideration which include, but are not limited to, the role's function, internal equity and a candidate's education or training, work experience, certifications and key skills. Occasionally positions/roles may include additional non-recurrent compensation and will be addressed by the recruiter during the interview process. Job Description Enlighten is looking for a Cyber Hunt Analyst with Data Science experience to apply strong cyber security, Defensive Cyber Operations (DCO), and networking domain knowledge to support cyber analytics product development, threat analysis, statistical analysis, model development, and direct customer mission support. Regular cyber hunt activities consist of hunting for threats, reporting on findings, and converting tools, techniques, and processes into automated capabilities for the current cyber platform. Regular data science activities consist of operational research, statistical analysis, hypothesis testing, model building/testing, and communicating results using visualizations. Will also be responsible for collecting customer Cyber Operations requirements, generating use cases, providing Cyber SME support, and system training to end users. #LI-DW2 #Mid-Senior Level Essential Job Responsibilities Conduct threat hunt operations on assigned Big Data Platform(s) - BDP. Present threat hunt findings through live - interactive remote conference sessions. Perform data analytics across disparate data sets. Assist customer(s) with their threat hunting operations. Perform quality assurance checks on data that is resident on the BDP. Evaluate and analyze new data feeds to determine relevance and usability of data. Support BDP analytic requests (data search, visualizations, dashboards..etc). Provide real time customer support during normal working hours (BDP support chat room). Maintain situational awareness of emerging cyber threats for possible action and notification to an impacted customer(s). Support BDP demonstration requests to showcase various capabilities of the platform. Support BDP training events either in person or virtually. Provide advice on data enrichment and functions to enhance customer experience. Other duties as assigned Minimum Qualifications Security Clearance - A current Secret level U.S. Government Security Clearance is required with the ability to obtain a TS/SCI level clearance; U.S. Citizenship required. 5+ years of experience in cyber security operations related fields and a Bachelors in related field or 3 years experience with Masters; or High School Diploma and 9 years experience. Experience with supporting DoD customers, ideally supporting US Cyber Command, DISA, or DCDC. Cyber Hunt methodologies and techniques. SIEMs - (e.g., Splunk, Q-Radar, ELK). SOARs (e.g., Sentinel, CORTEX, X-SOAR). Developing and deploying threat detection signatures and detecting host and network-based intrusions. Collecting data from a variety of cyber defense resources. (e.g., CVE, OSINT). Recognizing and categorizing types of vulnerabilities and associated attacks. Reading and interpreting signatures (e.g., SNORT, SIGMA, Yara, YAML). Cyber defense and vulnerability assessment tools and their capabilities. Network traffic analysis methods (e.g.,TCP-DUMP, Wireshark, Bro/Zeek). Familiar with cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks), and incident response and handling methodologies. (e.g., MITRE ATT&CK, LM Killchain). Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. Excellent customer service, public speaking, and presentation skills. Ability to complete technical tasks without supervision. Ability to foster and support a collaborative working environment. Must have Data+, Security+, CySA+, GCIH, GNFA, GCFA or other industry recognized Cybersecurity Certification. Travel as needed to support all duties listed above. Must be able to work on customer site on average 4 days a week in either Columbia or Ft. Meade, MD. Flexibility is essential to adapt to schedule changes as needed. Preferred Requirements TS/SCI level clearance is preferred. DoD SOC experience is a plus We have many more additional great benefits/perks that you can find on our website at **************** [eitccorp.com].
    $114.2k-160k yearly 9d ago
  • Cloud Security Specialist Information Security Engineering

    Con Edison 4.9company rating

    New York, NY jobs

    The Cloud Security Specialist is a senior technical and leadership position responsible for implementing, managing, and continuously improving cloud security across multi cloud environments including AWS, Azure, Google Cloud, and Oracle Cloud Infrastructure (OCI).This role combines hands on technical execution with team leadership. The successful candidate will lead a team of cloud security engineers, develop secure architectures, and manage enterprise grade cloud security solutions such as Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Container Security, API Security, and AI Security Posture Management (AISPM).The individual will partner with cloud service, DevOps, and application teams to design secure deployments, enforce policies, and integrate automation for vulnerability remediation, threat detection, and compliance. They will also implement secure private connectivity between cloud and on premise networks using technologies such as AWS PrivateLink and Azure ExpressRoute. Required Education/Experience Master's Degree and with 3 years of relevant experience IT or Information security or Bachelor's Degree and with 5 years of relevant experience IT or Information security or Associate's Degree and with 6 years of relevant experience IT or Information security or High School Diploma/GED and with 8 years of relevant experience IT or Information security. Preferred Education/Experience Master's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 3 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute). Bachelor's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 5 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute). Relevant Work Experience Handson experience with at least two major cloud providers (AWS, Azure, GCP, or OCI), required. Implementation and management experience with CSPM, CWP, AISPM, and API security platforms, required. Knowledge of IAM, rolebased access control, and policy enforcement, required. Experience integrating cloud telemetry and logs with SIEM tools, required. Understanding of hybrid connectivity and private link technologies (PrivateLink, ExpressRoute), required. Experience with scripting (Python, PowerShell, Bash) and automation, required. Experience with WAF and cloud API gateway configurations, required. Strong understanding of cloud network fundamentals and background in cloud network security, and secure architecture design, required. Experience collaborating with cloud service teams for planning and remediation, required. Experience implementing application security best practices and training engineering teams, required. Familiarity with CDN operations, certificates, and brand monitoring preferred, required. Experience with SIEM integration, telemetry collection, and event analysis, preferred. Demonstrated experience leading technical teams or project groups, preferred. Experience with Container Security, preferred. Experience securing API endpoints and implementing advanced cloud application protections, preferred. Knowledge of AI/ML data protection and secure model deployment practices, preferred. Experience integrating security automation into DevSecOps workflows using Terraform or Ansible, preferred. Experience developing and delivering cloud security training and awareness programs, preferred. Skills and Abilities Effective leadership skills Demonstrated problem solving skills Demonstrated problem solving skills Strong written and verbal communication skills Ability to drive multiple projects to successful completion Proactively approaches responsibilities Licenses and Certifications Driver's License Required Other: CISSP, CCNP Security, GSEC, GCIH, CEH, or equivalent certifications. Preferred Other: CCSP, AWS Certified Security, Azure Security Engineer Associate, GCP Professional Cloud Security Engineer, or OCI Security Professional. Preferred Physical Demands Ability to push, pull, and lift up to 25 pounds Sit or stand to use a keyboard, mouse, and computer for the duration of the workday Additional Physical Demands The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays. The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays. Core Responsibilities Lead and mentor a team of cloud security engineers, fostering technical excellence and professional growth. Architect and maintain secure multi-cloud environments across AWS, Azure, GCP, and OCI in partnership with Enterprise Architecture. Deploy and manage CSPM platforms to drive continuous visibility, compliance, and risk posture improvement. Implement CWP solutions to protect cloud workloads, prevent threats, and manage vulnerabilities effectively. Define and enforce IAM policies and least-privilege principles to strengthen identity security across all platforms. Design and secure private and hybrid connectivity using technologies such as AWS PrivateLink, Azure ExpressRoute, and Google Cloud Interconnect. Integrate cloud telemetry and security events with SIEM systems to enhance incident detection and response capabilities. Automate provisioning, configuration, and remediation workflows using IaC tools like Terraform and Ansible, supported by Python or PowerShell scripting. Implement and manage WAF policies and API gateways to safeguard cloud applications and services. Partner with DevOps and engineering teams to embed security within CI/CD pipelines and promote secure development practices. Collaborate with risk and architecture teams to assess emerging technologies and align them with enterprise security strategy. Stay informed on evolving threats, regulatory frameworks, and AI security trends to continuously improve cloud security posture.
    $84k-108k yearly est. Auto-Apply 20d ago
  • Cloud Security Specialist Information Security Engineering

    Con Edison, Inc. 4.9company rating

    New York, NY jobs

    The Cloud Security Specialist is a senior technical and leadership position responsible for implementing, managing, and continuously improving cloud security across multi cloud environments including AWS, Azure, Google Cloud, and Oracle Cloud Infrastructure (OCI).This role combines hands on technical execution with team leadership. The successful candidate will lead a team of cloud security engineers, develop secure architectures, and manage enterprise grade cloud security solutions such as Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Container Security, API Security, and AI Security Posture Management (AISPM).The individual will partner with cloud service, DevOps, and application teams to design secure deployments, enforce policies, and integrate automation for vulnerability remediation, threat detection, and compliance. They will also implement secure private connectivity between cloud and on premise networks using technologies such as AWS PrivateLink and Azure ExpressRoute. Required Education/Experience * Master's Degree and with 3 years of relevant experience IT or Information security or * Bachelor's Degree and with 5 years of relevant experience IT or Information security or * Associate's Degree and with 6 years of relevant experience IT or Information security or * High School Diploma/GED and with 8 years of relevant experience IT or Information security. Preferred Education/Experience * Master's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 3 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute). * Bachelor's Degree in Cybersecurity, Computer Engineering, Computer Science, Information Systems Security, Information Technology. and 5 years in Information security, Cloud Security or Cloud Architect in a senior technical role. With certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate, or GCP Cloud Security Engineer. Experience in cloud security or cloud architecture. Experience with CSPM, CWP, AISPM, and API security implementations. Handson work with identity management, hybrid connectivity (PrivateLink, ExpressRoute). Relevant Work Experience * Handson experience with at least two major cloud providers (AWS, Azure, GCP, or OCI), required. * Implementation and management experience with CSPM, CWP, AISPM, and API security platforms, required. * Knowledge of IAM, rolebased access control, and policy enforcement, required. * Experience integrating cloud telemetry and logs with SIEM tools, required. * Understanding of hybrid connectivity and private link technologies (PrivateLink, ExpressRoute), required. * Experience with scripting (Python, PowerShell, Bash) and automation, required. * Experience with WAF and cloud API gateway configurations, required. * Strong understanding of cloud network fundamentals and background in cloud network security, and secure architecture design, required. * Experience collaborating with cloud service teams for planning and remediation, required. * Experience implementing application security best practices and training engineering teams, required. * Familiarity with CDN operations, certificates, and brand monitoring preferred, required. * Experience with SIEM integration, telemetry collection, and event analysis, preferred. * Demonstrated experience leading technical teams or project groups, preferred. * Experience with Container Security, preferred. * Experience securing API endpoints and implementing advanced cloud application protections, preferred. * Knowledge of AI/ML data protection and secure model deployment practices, preferred. * Experience integrating security automation into DevSecOps workflows using Terraform or Ansible, preferred. * Experience developing and delivering cloud security training and awareness programs, preferred. Skills and Abilities * Effective leadership skills * Demonstrated problem solving skills * Demonstrated problem solving skills * Strong written and verbal communication skills * Ability to drive multiple projects to successful completion * Proactively approaches responsibilities Licenses and Certifications * Driver's License Required * Other: CISSP, CCNP Security, GSEC, GCIH, CEH, or equivalent certifications. Preferred * Other: CCSP, AWS Certified Security, Azure Security Engineer Associate, GCP Professional Cloud Security Engineer, or OCI Security Professional. Preferred Physical Demands * Ability to push, pull, and lift up to 25 pounds * Sit or stand to use a keyboard, mouse, and computer for the duration of the workday Additional Physical Demands * The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays. * The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays. Core Responsibilities * Lead and mentor a team of cloud security engineers, fostering technical excellence and professional growth. * Architect and maintain secure multi-cloud environments across AWS, Azure, GCP, and OCI in partnership with Enterprise Architecture. * Deploy and manage CSPM platforms to drive continuous visibility, compliance, and risk posture improvement. * Implement CWP solutions to protect cloud workloads, prevent threats, and manage vulnerabilities effectively. * Define and enforce IAM policies and least-privilege principles to strengthen identity security across all platforms. * Design and secure private and hybrid connectivity using technologies such as AWS PrivateLink, Azure ExpressRoute, and Google Cloud Interconnect. * Integrate cloud telemetry and security events with SIEM systems to enhance incident detection and response capabilities. * Automate provisioning, configuration, and remediation workflows using IaC tools like Terraform and Ansible, supported by Python or PowerShell scripting. * Implement and manage WAF policies and API gateways to safeguard cloud applications and services. * Partner with DevOps and engineering teams to embed security within CI/CD pipelines and promote secure development practices. * Collaborate with risk and architecture teams to assess emerging technologies and align them with enterprise security strategy. * Stay informed on evolving threats, regulatory frameworks, and AI security trends to continuously improve cloud security posture.
    $84k-108k yearly est. 20d ago
  • Cyber Security Analyst II

    Chesapeake Utilities Corporation 4.2company rating

    Newark, DE jobs

    What makes us great At the heart of our Company is a dedication to delivering energy that drives progress. We put people first, work to keep them safe and build trusting relationships. Your role in our success: This position will be responsible for protecting the corporation's critical information and assets by integrating cybersecurity risk management best practices throughout the enterprise. This position will be responsible for detection and analysis of opportunistic and persistent threats, deploying counter measures and conducting risk and vulnerability assessments across the enterprise (including cloud). As a specialist on the Cyber security team, you will participate in detection and response of cyber incidents, assist in recovery of operations and assist in formulating, updating, and communicating short- and long-term organizational cybersecurity strategies and policies. In addition, you will provide technical support to others on adjacent technical teams and the greater organization. The ideal candidate will have a thorough understanding of incident response protocol and have an understanding of nation state threat actors and their TTPs. What you'll be working on: * Monitor and analyze security intel generated by company security controls. Lead triage, containment and eradication. * Participate in threat hunting activities and "deep dive" analysis to maintain a high degree of awareness on the current threat landscape. * Participate in simulated "adversary emulation" exercises and have working knowledge of Red Team tools such as Atomic Red Team and Caldera. * Provide effective incident response, by correlating intelligence from IPS systems, endpoints and third parties. * Administer security awareness training and enterprise vulnerability management solutions, as required. * Administer and maintain leading enterprise commercial endpoint and network based security solutions * Develop and produce reports on all activities and incidents to help maintain day to day status, * Develop and report on trends, and provide focus and situational awareness on all issues. * Maintain documentation for all systems and create user guides and standard operating procedures. * Adhere to enterprise change management procedures and corporate security policies, including SLAs for responding to cyber related incidents. * Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management. * Maintain system baselines and configuration management items, including security event monitoring "policies" in a manner determined and agreed to by management. * Ensure changes are made using an approval process agreed to in advance. * Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible. Additional Responsibilities * Maintain knowledge of the current threat landscape via OSINT. * Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training. * Interface to third party vendors as necessary for external audits. * Manage investigations involving Cyber Security, including the use of specialized software. * Create system performance metrics and trending for capacity planning * Meet availability and update requirements * Ability to travel 10% Who you are: * Bachelor's Degree in computer engineering, computer science, or other closely related IT discipline OR 5 years of relevant work experience. * Must hold one of the following certifications: Security+, CEH, GCIH, GREM or CISSP * 3 years specialized experience providing technical and end-user assistance on computer hardware and application software support. * 2 years of progressively responsible experience in cyber security analysis, incident response, or related experience. * Working knowledge of MITRE ATT&CK and Lockheed Martin's Cyber Killchain * Working knowledge of memory analysis tools and DFIR best practices * Experience administering enterprise vulnerability management and security awareness solutions * Experience designing and implementing controls to protect OT environments. * Experience administering multi-factor authentication systems * Experience managing enterprise security appliances and/or security monitoring software (IPSs, firewalls etc.) * Experience with enterprise change management and test procedures. * Demonstrated experience dealing with customers and organizational skills are required. * Demonstrated strength in providing strong customer service support. * Strong analytical and problem solving skills. * Good interpersonal, organizational, written and verbal communication skills. * Experience working in a highly regulated environment. * Maintain composure and professional approach when dealing with employees and vendors. * Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form. * Ability to make decisions logically. * Capable of focusing on details with regards to procedures and workflow. * Ability to lift up to 40 pounds. Benefits/what's in it for you? * Flexible work arrangement * Competitive base salary * Fantastic opportunities for career growth * Cooperative, supportive and empowered team atmosphere * Annual bonus and salary increase opportunities * Monthly recognition events * Endless wellness initiatives and community events * Robust and customizable benefit packages-choose what works best with your life. Options include generous 401k, medical, dental and life insurance, tuition reimbursement, compensated volunteer hours and MORE! * Paid time off, holidays and a separate bank of sick time! Chesapeake Utilities Corporation is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Applicants with a disability that need assistance applying for a position may email ****************.
    $83k-99k yearly est. 6d ago
  • Systems Security Engineer

    Rolls-Royce 4.8company rating

    Indianapolis, IN jobs

    Job Title: Systems Security Engineer Working Pattern: Full-Time Working Location: Indianapolis, IN We're looking for a Systems Security Engineer for cyber-physical embedded systems to join our growing team. In this role, your focus will be on helping to secure a range of Roll-Royce Defense products against an increasingly diverse and complex range of threats. You'll be part of a multi-disciplinary team, working together to tackle technical challenges in a stimulating and collaborative environment. Why Rolls-Royce? Rolls-Royce is one of the most enduring and iconic brands in the world and has been at the forefront of innovation for over a century. We design, build and service systems that provide critical power to customers where safety and reliability are paramount. We are proud to be a force for progress, powering, protecting and connecting people everywhere. We want to ensure that the excellence and ingenuity that has shaped our history continues into our future, and we need people like you to come and join us on this journey. Rolls-Royce has been recognized as the top employer in the Engineering & Manufacturing category on the prestigious Forbes Top Employers for Engineers list for 2025. This ranking highlights our commitment to innovation, employee development, and fostering a collaborative environment where engineers can thrive. Be part of a team that sets the industry standard and drives groundbreaking solutions. At Rolls-Royce, we are committed to creating a workplace where all employees feel respected, supported, and empowered to do their best work. We foster a welcoming and innovative work environment that invests in you, giving you access to an incredible breadth and depth of opportunities where you can grow your career and make a difference. Rolls-Royce is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to any protected characteristics. What you will be doing With this attractive opportunity you will get a chance to: Work with the core systems security and LibertyWorks teams to help determine the technology and processes required to meet customer requirements for system security and resiliency Learn secure cyber resilient engineering (SCRE), apply technical knowledge as required throughout the product lifecycle: requirements, design, build, test, production, operations, and support Collaborate with government, customers, suppliers, and industry experts to understand and meet system requirements Create digital models and use digital tools such as model-based systems engineering (MBSE) to meet program expectations Develop and update systems security and resilience good practice and help ensure the techniques, policies, procedures, and knowledge to enable us to implement this good practice across the business Who we're looking for: At Rolls-Royce we put safety first, do the right thing, keep it simple and make a difference. These principles form the behaviours that guide us and are an essential component of our assessment process. They are the fundamental qualities that we seek for all roles. Basic Requirements: Bachelor's degree in STEM Science, Technology, Engineering, Mathematics and 1+ years of experience OR Master's degree in STEM Science, Engineering, Science, Mathematics and no experience OR PhD in STEM Science, Technology, Engineering, Mathematics and no experience In order to be considered for this role, must be a U.S. citizen with the ability to obtain and maintain a high-level security clearance Preferred Requirements: Active security clearance Desire to learn and apply systems security policies and standards in engineering cyber-physical systems such as the Risk Management Framework (RMF), NIST SP 800-160, DO-326, and DoDI 5000.8 Experience or interest in cybersecurity and cyber threats (e.g., designing secure products, systems, and applications; intrusion detection; digital forensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.) Excellent technical and soft skills including systems thinking aptitude, communications, time management, and collaboration across multi-disciplinary teams Aspire to actively learn and dynamically respond to evolving objectives and emerging opportunities What we offer We offer excellent development opportunities, a competitive salary, and exceptional benefits. These include bonus, employee support assistance and employee discounts. Your needs are as unique as you are. Hybrid working is a way in which our people can balance their time between the office, home, or another remote location. It's a locally managed and flexed informal discretionary arrangement. As a minimum we're all expected to attend the workplace for collaboration and other specific reasons, on average three days per week. For fully remote roles, employees can live in any state except Idaho, Nebraska, Nevada, Vermont, and Wyoming. Relocation assistance will be provided if applicable. Closing date: December 31st 2025 Job CategorySoftware Systems Job Posting Date10 Dec 2025; 00:12 Pay Range$70,629 - $105,943-Annually Location: Indianapolis, IN Benefits Rolls-Royce provides a comprehensive and competitive Total Rewards package that includes base pay and a discretionary bonus plan. Eligible employees may have the opportunity to enroll in other benefits, including health, dental, vision, disability, life and accidental death & dismemberment insurance; a flexible spending account; a health savings account; a 401(k) retirement savings plan with a company match; Employee Assistance Program; Paid Time Off; certain paid holidays; paid parental and family care leave; tuition reimbursement; and a long-term incentive plan. The options available to an employee may vary depending on eligibility factors such as date of hire, employment type, and the applicability of collective bargaining agreements.
    $70.6k-105.9k yearly Auto-Apply 5d ago
  • Systems Security Engineer

    Rolls Royce 4.8company rating

    Indianapolis, IN jobs

    Job Title: Systems Security Engineer Working Pattern: Full-Time We're looking for a Systems Security Engineer for cyber-physical embedded systems to join our growing team. In this role, your focus will be on helping to secure a range of Roll-Royce Defense products against an increasingly diverse and complex range of threats. You'll be part of a multi-disciplinary team, working together to tackle technical challenges in a stimulating and collaborative environment. Why Rolls-Royce? Rolls-Royce is one of the most enduring and iconic brands in the world and has been at the forefront of innovation for over a century. We design, build and service systems that provide critical power to customers where safety and reliability are paramount. We are proud to be a force for progress, powering, protecting and connecting people everywhere. We want to ensure that the excellence and ingenuity that has shaped our history continues into our future, and we need people like you to come and join us on this journey. Rolls-Royce has been recognized as the top employer in the Engineering & Manufacturing category on the prestigious Forbes Top Employers for Engineers list for 2025. This ranking highlights our commitment to innovation, employee development, and fostering a collaborative environment where engineers can thrive. Be part of a team that sets the industry standard and drives groundbreaking solutions. At Rolls-Royce, we are committed to creating a workplace where all employees feel respected, supported, and empowered to do their best work. We foster a welcoming and innovative work environment that invests in you, giving you access to an incredible breadth and depth of opportunities where you can grow your career and make a difference. Rolls-Royce is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to any protected characteristics. What you will be doing With this attractive opportunity you will get a chance to: * Work with the core systems security and LibertyWorks teams to help determine the technology and processes required to meet customer requirements for system security and resiliency * Learn secure cyber resilient engineering (SCRE), apply technical knowledge as required throughout the product lifecycle: requirements, design, build, test, production, operations, and support * Collaborate with government, customers, suppliers, and industry experts to understand and meet system requirements * Create digital models and use digital tools such as model-based systems engineering (MBSE) to meet program expectations * Develop and update systems security and resilience good practice and help ensure the techniques, policies, procedures, and knowledge to enable us to implement this good practice across the business Who we're looking for: At Rolls-Royce we put safety first, do the right thing, keep it simple and make a difference. These principles form the behaviours that guide us and are an essential component of our assessment process. They are the fundamental qualities that we seek for all roles. Basic Requirements: * Bachelor's degree in STEM Science, Technology, Engineering, Mathematics and 1+ years of experience OR * Master's degree in STEM Science, Engineering, Science, Mathematics and no experience OR * PhD in STEM Science, Technology, Engineering, Mathematics and no experience * In order to be considered for this role, must be a U.S. citizen with the ability to obtain and maintain a high-level security clearance Preferred Requirements: * Active security clearance * Desire to learn and apply systems security policies and standards in engineering cyber-physical systems such as the Risk Management Framework (RMF), NIST SP 800-160, DO-326, and DoDI 5000.8 * Experience or interest in cybersecurity and cyber threats (e.g., designing secure products, systems, and applications; intrusion detection; digital forensics; system recovery; risk assessment tools and methods; security solutions, policies, standards, and procedures, etc.) * Excellent technical and soft skills including systems thinking aptitude, communications, time management, and collaboration across multi-disciplinary teams * Aspire to actively learn and dynamically respond to evolving objectives and emerging opportunities What we offer We offer excellent development opportunities, a competitive salary, and exceptional benefits. These include bonus, employee support assistance and employee discounts. Your needs are as unique as you are. Hybrid working is a way in which our people can balance their time between the office, home, or another remote location. It's a locally managed and flexed informal discretionary arrangement. As a minimum we're all expected to attend the workplace for collaboration and other specific reasons, on average three days per week. For fully remote roles, employees can live in any state except Idaho, Nebraska, Nevada, Vermont, and Wyoming. Relocation assistance will be provided if applicable. Closing date: December 31st 2025 Job Category Software Systems Job Posting Date 10 Dec 2025; 00:12 Pay Range $70,629 - $105,943-Annually Location: Indianapolis, IN Benefits Rolls-Royce provides a comprehensive and competitive Total Rewards package that includes base pay and a discretionary bonus plan. Eligible employees may have the opportunity to enroll in other benefits, including health, dental, vision, disability, life and accidental death & dismemberment insurance; a flexible spending account; a health savings account; a 401(k) retirement savings plan with a company match; Employee Assistance Program; Paid Time Off; certain paid holidays; paid parental and family care leave; tuition reimbursement; and a long-term incentive plan. The options available to an employee may vary depending on eligibility factors such as date of hire, employment type, and the applicability of collective bargaining agreements.
    $70.6k-105.9k yearly Auto-Apply 4d ago
  • Cyber Security Analyst II

    Chesapeake Utilities Corporation 4.2company rating

    Dover, DE jobs

    What makes us great At the heart of our Company is a dedication to delivering energy that drives progress. We put people first, work to keep them safe and build trusting relationships. Your role in our success: This position will be responsible for protecting the corporation's critical information and assets by integrating cybersecurity risk management best practices throughout the enterprise. This position will be responsible for detection and analysis of opportunistic and persistent threats, deploying counter measures and conducting risk and vulnerability assessments across the enterprise (including cloud). As a specialist on the Cyber security team, you will participate in detection and response of cyber incidents, assist in recovery of operations and assist in formulating, updating, and communicating short- and long-term organizational cybersecurity strategies and policies. In addition, you will provide technical support to others on adjacent technical teams and the greater organization. The ideal candidate will have a thorough understanding of incident response protocol and have an understanding of nation state threat actors and their TTPs. What you'll be working on: * Monitor and analyze security intel generated by company security controls. Lead triage, containment and eradication. * Participate in threat hunting activities and "deep dive" analysis to maintain a high degree of awareness on the current threat landscape. * Participate in simulated "adversary emulation" exercises and have working knowledge of Red Team tools such as Atomic Red Team and Caldera. * Provide effective incident response, by correlating intelligence from IPS systems, endpoints and third parties. * Administer security awareness training and enterprise vulnerability management solutions, as required. * Administer and maintain leading enterprise commercial endpoint and network based security solutions * Develop and produce reports on all activities and incidents to help maintain day to day status, * Develop and report on trends, and provide focus and situational awareness on all issues. * Maintain documentation for all systems and create user guides and standard operating procedures. * Adhere to enterprise change management procedures and corporate security policies, including SLAs for responding to cyber related incidents. * Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management. * Maintain system baselines and configuration management items, including security event monitoring "policies" in a manner determined and agreed to by management. * Ensure changes are made using an approval process agreed to in advance. * Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible. Additional Responsibilities * Maintain knowledge of the current threat landscape via OSINT. * Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training. * Interface to third party vendors as necessary for external audits. * Manage investigations involving Cyber Security, including the use of specialized software. * Create system performance metrics and trending for capacity planning * Meet availability and update requirements * Ability to travel 10% Who you are: * Bachelor's Degree in computer engineering, computer science, or other closely related IT discipline OR 5 years of relevant work experience. * Must hold one of the following certifications: Security+, CEH, GCIH, GREM or CISSP * 3 years specialized experience providing technical and end-user assistance on computer hardware and application software support. * 2 years of progressively responsible experience in cyber security analysis, incident response, or related experience. * Working knowledge of MITRE ATT&CK and Lockheed Martin's Cyber Killchain * Working knowledge of memory analysis tools and DFIR best practices * Experience administering enterprise vulnerability management and security awareness solutions * Experience designing and implementing controls to protect OT environments. * Experience administering multi-factor authentication systems * Experience managing enterprise security appliances and/or security monitoring software (IPSs, firewalls etc.) * Experience with enterprise change management and test procedures. * Demonstrated experience dealing with customers and organizational skills are required. * Demonstrated strength in providing strong customer service support. * Strong analytical and problem solving skills. * Good interpersonal, organizational, written and verbal communication skills. * Experience working in a highly regulated environment. * Maintain composure and professional approach when dealing with employees and vendors. * Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form. * Ability to make decisions logically. * Capable of focusing on details with regards to procedures and workflow. * Ability to lift up to 40 pounds. Benefits/what's in it for you? * Flexible work arrangement * Competitive base salary * Fantastic opportunities for career growth * Cooperative, supportive and empowered team atmosphere * Annual bonus and salary increase opportunities * Monthly recognition events * Endless wellness initiatives and community events * Robust and customizable benefit packages-choose what works best with your life. Options include generous 401k, medical, dental and life insurance, tuition reimbursement, compensated volunteer hours and MORE! * Paid time off, holidays and a separate bank of sick time! Chesapeake Utilities Corporation is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Applicants with a disability that need assistance applying for a position may email ****************.
    $83k-99k yearly est. 6d ago
  • Cyber Security Analyst

    Talen Energy 4.9company rating

    Berwick, PA jobs

    Primary Responsibilities Work with and takes direction from the Cyber Security Program Owner Perform Cyber assessments as required by the cyber security program Support the implementation of plans required to ensure nuclear site adheres to the 10CFR73.54 cyber security regulations and ensure the sites meet the regulatory requirements. Plans and reviews periodic assessments, benchmarks and tabletops of the Cyber Security Program. Supports external parties in the audit and inspection of the Cyber Security Program. Provides input and commentary to the development and revision of procedures and policies relevant to the Cyber Security Program. Reviews the analysis of incident response policies, takes an active role in cyber incident response and recovery, the identification of vulnerabilities in the network, and the performance of risk assessments on new and existing computer systems and equipment. Maintains a thorough knowledge of 10 CFR 73.54, NEI 08-09, site Cyber Security Plan, cyber security implementing procedures, and the cyber security defense‑in‑depth protective strategy. Industry participation in NITSL, NEI telecoms and conferences, some travel is required for conference attendance. Builds relationships that will facilitate knowledge transfer, cross functional knowledge of related work groups, and ability to present work products effectively. Basic Qualifications BS Degree in Engineering, Computer Science, Cyber Security, related fields, or equivalent experience Individual must meet nuclear requirements for Unescorted Plant Access. Preferred Qualifications Working knowledge of 10 CFR 73.54, NEI 08-09 Knowledge of Digital components comprised of industrial network and control systems Supervisory Control and Data Acquisition (SCADA) Systems Distributed Control Systems (DCS) Safety Instrumented Systems (SIS) a plus Access DB development Note: You will have an opportunity to add attachments to your application. Please use this opportunity to upload your resume, cover letter, and any relevant documents .
    $81k-98k yearly est. Auto-Apply 46d ago
  • Cyber Security Analyst

    Talen Energy 4.9company rating

    Berwick, PA jobs

    **Primary Responsibilities** + Work with and takes direction from the Cyber Security Program Owner + Perform Cyber assessments as required by the cyber security program + Support the implementation of plans required to ensure nuclear site adheres to the 10CFR73.54 cyber security regulations and ensure the sites meet the regulatory requirements. + Plans and reviews periodic assessments, benchmarks and tabletops of the Cyber Security Program. Supports external parties in the audit and inspection of the Cyber Security Program. + Provides input and commentary to the development and revision of procedures and policies relevant to the Cyber Security Program. + Reviews the analysis of incident response policies, takes an active role in cyber incident response and recovery, the identification of vulnerabilities in the network, and the performance of risk assessments on new and existing computer systems and equipment. + Maintains a thorough knowledge of 10 CFR 73.54, NEI 08-09, site Cyber Security Plan, cyber security implementing procedures, and the cyber security defense‑in‑depth protective strategy. + Industry participation in NITSL, NEI telecoms and conferences, some travel is required for conference attendance. + Builds relationships that will facilitate knowledge transfer, cross functional knowledge of related work groups, and ability to present work products effectively. **Basic Qualifications** + BS Degree in Engineering, Computer Science, Cyber Security, related fields, or equivalent experience + Individual must meet nuclear requirements for Unescorted Plant Access. **Preferred Qualifications** + Working knowledge of 10 CFR 73.54, NEI 08-09 + Knowledge of + Digital components comprised of industrial network and control systems + Supervisory Control and Data Acquisition (SCADA) Systems + Distributed Control Systems (DCS) + Safety Instrumented Systems (SIS) a plus + Access DB development **Note:** You will have an opportunity to add attachments to your application. Please use this opportunity to upload your resume, cover letter, and any relevant documents . Talen is a leading independent power producer and energy infrastructure company dedicated to powering the future. We own and operate approximately 10.7 GW of power infrastructure in the United States, including 2.2 gigawatts of nuclear power and a significant dispatchable fossil fleet. We produce and sell electricity, capacity, and ancillary services into wholesale power markets in the United States, with our generation fleet principally located in the Mid-Atlantic and Montana. Our team is committed to generating power safely and reliably and delivering the most value per megawatt produced. Talen is also powering the digital infrastructure revolution. We are well-positioned to capture this significant opportunity, as data centers serving artificial intelligence increasingly demand more reliable, clean power. We have an inclusive, diverse, respectful, and collaborative workplace, and a strong commitment to innovation, teamwork, and integrity. Talen is headquartered in Houston, Texas. Talen Energy is an equal opportunity employer dedicated to diversity and the strength it brings to the workplace. All qualified applicants will receive consideration for employment without regard to race, color, age, sex, religion, national origin, veteran status, sexual orientation, genetic information, gender identity, disability, perceived disability, or any other protected characteristic as may be defined by applicable law. For more information visit ******************* . If you need assistance with the application process, please email us at ***********************
    $81k-98k yearly est. 46d ago
  • Cyber Security Operations Analyst

    Explorer Pipeline 4.1company rating

    Tulsa, OK jobs

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS · Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities · Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. · Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. · Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. · Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. · Knowledge of TSA security requirements and regulations. · Knowledge of identity management processes and procedures. · Skill in project management. · Ability to manage, track and analyze information. · Ability to effectively work and cooperate with supervisors, co-workers, and vendors. · Ability to follow corporate policies and the directions of supervisors. · Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 12d ago
  • Cyber Security Operations Analyst

    Explorer Pipeline Corporation 4.1company rating

    Tulsa, OK jobs

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS * Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities * Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. * Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. * Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. * Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. * Knowledge of TSA security requirements and regulations. * Knowledge of identity management processes and procedures. * Skill in project management. * Ability to manage, track and analyze information. * Ability to effectively work and cooperate with supervisors, co-workers, and vendors. * Ability to follow corporate policies and the directions of supervisors. * Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 13d ago
  • Cyber Security System Analyst - IT Information Security

    Con Edison, Inc. 4.9company rating

    New York, NY jobs

    System Analyst is responsible for utilizing cyber security monitoring tools to provide day-to-day operational support and monitoring of the IT computing infrastructure. This is Shift Work. The Analyst will be expected to provide timely response, troubleshooting and escalation of alerts and coordinate incident response efforts with Cyber Security Operations Center (CSOC) within the Information Security Group. Required Education/Experience * Bachelor's Degree in computer science or related field and 2 years of work experience in Cyber or in an IT related field. or * Associate's Degree in computer science or related field and 4 years of relevant work experience, with at least 2 years of work experience in an IT field or * High School Diploma/GED and 5 years of relevant work experience, with at least 3 years of work experience in an IT field. Relevant Work Experience * Previous IT experience is required. * Previous Cyber Experience is required * Scripting experience preferred * Knowledge of security tools is preferred * Good understanding of industry standard policy, processes and procedures covering incident, problem and change management is preferred Skills and Abilities * Strong written and verbal communication skills * Ability to work within tight timeframes and meet strict deadlines * Must be proficient in Microsoft Office including Word, Excel, Outlook and PowerPoint, etc. Licenses and Certifications * Driver's License Required * Other: Technical certifications Security+, CYSA+ or equivalent, CISSP, etc. Preferred Physical Demands * Sit or stand to answer a phone for the duration of the workday * Sit or stand to use a keyboard, mouse, and computer for the duration of the workday * Ability to read small print and symbols * Work rotating shifts, including nights, midnights, weekends and holidays Additional Physical Demands * The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays. * Must be available 24/7, on call, and/or participate in off-hour emergency response activities as required. * Must be able and willing to travel within Company service territory, as needed. Core Responsibilities * Monitor, troubleshoot and support intrusion prevention, endpoint protection, data loss prevention, and access control technologies. * 1st Level triage, analysis, and processing of alerts. * Respond swiftly to all alerts; perform initial risk/impact assessments or escalating issues as appropriate. * Open and track incidents through to resolution. * Facilitate communications to both internal and external parties. * Support Corporate Security through forensics analysis of systems, malware, or network. * This is a rotating position with a shift differential that covers holidays, weekends, and nights. * Must be available 24/7, on call, and/or participate in off-hour emergency response activities as required. * Enforce change management controls and guidelines. * Provide real time and near real time responses to end users, technical support groups and IT management. * Perform other related tasks and assignments as required. * Respond to and participate in any incident response efforts. * 1st level threat intelligence processing. * Metric collection. * Perform other related tasks and assignments as required.
    $86k-108k yearly est. 31d ago
  • Cyber Security System Analyst - IT Information Security

    Con Edison 4.9company rating

    New York, NY jobs

    System Analyst is responsible for utilizing cyber security monitoring tools to provide day-to-day operational support and monitoring of the IT computing infrastructure. This is Shift Work. The Analyst will be expected to provide timely response, troubleshooting and escalation of alerts and coordinate incident response efforts with Cyber Security Operations Center (CSOC) within the Information Security Group. Required Education/Experience Bachelor's Degree in computer science or related field and 2 years of work experience in Cyber or in an IT related field. or Associate's Degree in computer science or related field and 4 years of relevant work experience, with at least 2 years of work experience in an IT field or High School Diploma/GED and 5 years of relevant work experience, with at least 3 years of work experience in an IT field. Relevant Work Experience Previous IT experience is required. Previous Cyber Experience is required Scripting experience preferred Knowledge of security tools is preferred Good understanding of industry standard policy, processes and procedures covering incident, problem and change management is preferred Skills and Abilities Strong written and verbal communication skills Ability to work within tight timeframes and meet strict deadlines Must be proficient in Microsoft Office including Word, Excel, Outlook and PowerPoint, etc. Licenses and Certifications Driver's License Required Other: Technical certifications Security+, CYSA+ or equivalent, CISSP, etc. Preferred Physical Demands Sit or stand to answer a phone for the duration of the workday Sit or stand to use a keyboard, mouse, and computer for the duration of the workday Ability to read small print and symbols Work rotating shifts, including nights, midnights, weekends and holidays Additional Physical Demands The selected candidate will be assigned a System Emergency Assignment (i.e., an emergency response role) and will be expected to work non-business hours during emergencies, which may include nights, weekends, and holidays. Must be available 24/7, on call, and/or participate in off-hour emergency response activities as required. Must be able and willing to travel within Company service territory, as needed. Core Responsibilities Monitor, troubleshoot and support intrusion prevention, endpoint protection, data loss prevention, and access control technologies. 1st Level triage, analysis, and processing of alerts. Respond swiftly to all alerts; perform initial risk/impact assessments or escalating issues as appropriate. Open and track incidents through to resolution. Facilitate communications to both internal and external parties. Support Corporate Security through forensics analysis of systems, malware, or network. This is a rotating position with a shift differential that covers holidays, weekends, and nights. Must be available 24/7, on call, and/or participate in off-hour emergency response activities as required. Enforce change management controls and guidelines. Provide real time and near real time responses to end users, technical support groups and IT management. Perform other related tasks and assignments as required. Respond to and participate in any incident response efforts. 1st level threat intelligence processing. Metric collection. Perform other related tasks and assignments as required.
    $86k-108k yearly est. Auto-Apply 32d ago
  • Network & Systems Security Analyst, Cisco Focus, Progression

    TECO Energy 4.8company rating

    Tampa, FL jobs

    Title: Network & Systems Security Analyst, Cisco Focus, Progression Company: Tampa Electric Company State and City: Florida - Tampa Shift: 8 Hr. X 5 Days Hiring Manager: David Cain Recruiter: Mark E Koener TITLE: Network & Systems Security Analyst Progression PERFORMANCE COACH: Mgr Network Engineering & Cyber Security Operations COMPANY: Tampa Electric DEPARTMENT: High Performance Computing & BP Support FOCUS Areas - Cisco Networking - Cisco Wireless - Cisco ISE - Networking Engineering Related Skills POSITION CONCEPT The Network & Systems Security Analyst is responsible for planning/designing, implementing, and supporting new and existing network, server, storage infrastructure. This role is also responsible for ensuring all network security controls (i.e., firewalls, web application firewalls [WAF], proxies, network segmentation, NAC, ACLs, etc.) are implemented and managed per corporate information security standards. Additionally, responsibilities include assessing enterprise assets and critical assets for secure configurations and maintaining and enforcing regulations and standards such as NERC Critical Infrastructure Protection (CIP), Sarbanes-Oxley (SOX), and Payment Card Industry (PCI). Responsible for the design, planning, operation, maintenance, and support of the TECO and NMGC network infrastructure. This includes primary accountability for network technologies such as route/switch, on-premise LAN/WAN, IPAM, Wi-Fi, ISP management, site-to-site VPNs, proxies (forward and reverse), perimeter firewall management, DNS, Azure cloud environments, automation, NAC/user access, hyperconverged infrastructure, and overall network security. Partners with the Telecommunication teams on establishing/upgrading existing circuits/communication links. Responsible for the NERC Cyber Infrastructure Protection and disaster recovery plans. Responsible for VoIP, SIP, DHCP, DNS, TCP/IP routing and routing protocols such as OSPF and BGP, binary mathematics, NAT, PAT, IPsec and SSL VPN technologies, GRE tunneling, route redistribution, traffic shaping, port-level filtering, SD-WAN, MPLS and other communications related technologies. Responsible for the installation, configuration, and maintenance of all WAN and LAN connectivity which includes core and campus switches, routers, firewalls, wireless access points, WAN scalers and load balancer technologies. Responsible for the design, installation, configuration, and maintenance of DNP over IP and serial SCADA communications between the primary and backup control centers, power plants, solar sites, and substations. Responsible for the configuration and maintenance of Smart GRID communication hardware switches and routers between the primary and backup control centers. NETWORK & SYSTEMS SECURITY ANALYST I (LEVEL 1) Monitors and troubleshoots server, network, and security controls related problems and failures; and installs and configures hardware/software. Works under direct supervision. PRIMARY DUTIES AND RESPONSIBILITIES 1. Plan, design, and implement network, server, and storage infrastructure based on project requirements, capacity plans, and system support. (20%) 2. Problem solving involves basic troubleshooting following the OSI (Open Systems Interconnection) model, making or calling for equipment repairs, and problem escalation. (20%) 3. Detection and correction of work stoppages and/or errors are accomplished by monitoring systems and changing configurations, as necessary. (20%) 4. Install and support network, server, and storage hardware and software. (10%) 5. Direct participation in the planning and designing, maintenance, testing and documentation of the company's disaster recovery plans are vital. (10%) 6. Provide and apply appropriate security consulting and support for IT infrastructure across multiple platforms (Firewalls, proxies, WAFs, ACLs, NAC, Operating Systems, NetScaler load balancers, DDoS protection, and other network devices). (10%) 7. Provide third-level technical support for security systems and authentication mechanisms on all operating system platforms. (10%) QUALIFICATIONS EDUCATION Required: High School Diploma or GED Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). LICENSES/CERTIFICATIONS Required: Has obtained at least one related network, system, operating system, or information security professional certification: (e.g., Microsoft Certified Solutions Associate (MCSA), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Certified Ethical Hacker (CEH), GIAC Certifications, Certified Information Systems Security Professional (CISSP). Preferred: ITIL v3, CCNA, MCSA, VCP, Security+, CISSP EXPERIENCE Required: Minimum four (4) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, or Cisco Networking. In lieu of some experience listed above, may consider three (3) years of related experience with an Associate's Degree or two (2) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). KNOWLEDGE/SKILLS/ABILITIES (KSA) • Working knowledge of network, server, and security controls infrastructure regardless of the complexity • Working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cyber security best practices, and networking/hardware installation and maintenance • Working knowledge with packet analysis and denial of service protection • Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written) • Ability to present issues and topics of a complex technical nature to non-technical audiences • Excellent interpersonal and organizational skills • Basic working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI WORKING CONDITIONS Normal working conditions with occasional extended hours during the week and weekends. PHYSICAL DEMANDS/REQUIREMENTS Normal physical demands related to an office and operational (Power Plant, Solar, Control Center) workplace environment. Must be able to lift 50-pound boxes and ascend/descend a ladder to service network access points. NETWORK & SYSTEMS SECURITY ANALYST II (LEVEL 2) In addition to the duties & responsibilities of the Level 1 Analyst, has increased responsibilities in consulting on small project design and plans. May serve as a project lead and mentor Level 1 Analyst. Works under general supervision. ADDITIONAL DUTIES AND RESPONSIBILITIES 1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (30%) 2. Installs and configures server and network related hardware/software which meet the company's security standards. (40%) 3. Design and planning required for small projects. (20%) 4. Project leadership, consulting, or cross-train peers. (10%) QUALIFICATIONS EDUCATION Required: High School Diploma or GED Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). LICENSES/CERTIFICATIONS Required: Has obtained at least two related network, system, operating system, or information security professional certification: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP). Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP EXPERIENCE Required: Minimum six (6) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider four (4) years of related experience with an Associate's Degree or three (3) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). QUALIFICATIONS EDUCATION Required: High School Diploma or GED Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). LICENSES/CERTIFICATIONS Required: Has obtained at least two related network, system, operating system, or information security professional certification: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP). Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP EXPERIENCE Required: Minimum six (6) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider four (4) years of related experience with an Associate's Degree or three (3) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). KNOWLEDGE/SKILLS/ABILITIES (KSA) • Intermediate knowledge of network, server, and security controls infrastructure regardless of the complexity • Good working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cyber security best practices, and networking/hardware installation and maintenance • Good working knowledge with packet analysis and denial of service protection • Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written) • Ability to present issues and topics of a complex technical nature to non-technical audiences • Excellent interpersonal and organizational skills • Good working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI NETWORK & SYSTEMS SECURITY ANALYST III (LEVEL 3) In addition to the duties & responsibilities of the Level 2 Analyst, has increased responsibilities in consulting on small project design and plans. May serve as a project lead, cross-train peers, and mentor Analysts. Works under general direction. ADDITIONAL DUTIES AND RESPONSIBILITIES 1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (20%) 2. Installs and configures server and network related hardware/software which meet the company's security standards. (20%) 3. Design and planning required for small projects. (40%) 4. Project leadership, consulting, or cross-train peers. (20%) QUALIFICATIONS EDUCATION Required: High School Diploma or GED Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (MIS). LICENSES/CERTIFICATIONS Required: Has obtained at least three or two, with the condition to obtain a third certification within one year of hire for this position, related network, system, operating system, or information security professional certifications: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP), Certified SCADA Security Architect (CSSA). Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP EXPERIENCE Required: Minimum eight (8) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider six (6) years of related experience with an Associate's Degree or four (4) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). KNOWLEDGE/SKILLS/ABILITIES (KSA) • Expert knowledge of network, server, and security controls infrastructure regardless of the complexity • Thorough working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cyber security best practices, and networking/hardware installation and maintenance • Thorough working knowledge with packet analysis and denial of service protection • Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written) • Ability to present issues and topics of a complex technical nature to non-technical audiences • Excellent interpersonal, mentoring, and organizational skills • Good working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI NETWORK & SYSTEMS SECURITY ARCHITECT (LEVEL 4) In addition to the duties & responsibilities of the Level 3 Analyst, has increased responsibilities in consulting on small project design and plans. May serve as a project lead on larger projects, cross-train peers, and mentor all levels of Analysts. Works under general direction. ADDITIONAL DUTIES AND RESPONSIBILITIES 1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (10%) 2. Installs and configures server and network related hardware/software which meet the company's security standards. (10%) 3. Design and planning required for small and large projects. (40%) 4. Project leadership, consulting, or cross-train peers. (40%) QUALIFICATIONS EDUCATION Required: High School Diploma or GED Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (MIS). LICENSES/CERTIFICATIONS Required: Has obtained at least three related network, system, operating system, or information security professional certifications: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP), Certified SCADA Security Architect (CSSA). Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP EXPERIENCE Required: Minimum ten (10) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider eight (8) years of related experience with an Associate's Degree or six (6) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). KNOWLEDGE/SKILLS/ABILITIES (KSA) • Expert knowledge of network, server, and security controls infrastructure regardless of the complexity • Thorough working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cyber security best practices, and networking/hardware installation and maintenance • Thorough working knowledge with packet analysis and denial of service protection • Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written) • Ability to present issues and topics of a complex technical nature to non-technical audiences • Excellent interpersonal, mentoring, consulting, and organizational skills • Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI LEAD NETWORK & SYSTEMS SECURITY ANALYST (PERFORMANCE COACH) In addition to the duties & responsibilities of the Level 3 Analyst, has increased responsibilities in leading and managing Level 1 through 3 Analyst. May serve as a project lead on larger projects, cross-train peers, and mentor all levels of Analyst. Works under general direction. ADDITIONAL DUTIES AND RESPONSIBILITIES 1. Monitors, troubleshoots, diagnoses, and remedies server, network, DDoS protection, NetScaler load balancers, and security controls related problems and failures. (10%) 2. Installs and configures server and network related hardware/software which meet the company's security standards. (10%) 3. Design and planning required for small and large projects. (25%) 4. Project leadership, consulting, or cross-train peers. (25%) 5. Lead and manage the network analyst (Level 1, 2, and 3) team (30%) QUALIFICATIONS LICENSES/CERTIFICATIONS Required: Has obtained at least three or two, with the condition to obtain a third certification within one year of hire for this position, related network, system, operating system, or information security professional certifications: (e.g., Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), VMware Certified Professional (VCP), Cisco Certified Network Associate (CCNA), Cisco Certified Network Professional (CCNP), Certified Ethical Hacker (CEH), GIAC Network Forensic Analyst (GNFA) or other GIAC Certifications, Certified Information Systems Security Professional (CISSP), Certified SCADA Security Architect (CSSA). Leadership/management certifications/certificates may be considered in lieu of professional certifications. Preferred: ITIL v3, CCNP, MCSE, VCP, GNFA, CISSP EDUCATION Required: High School Diploma or GED Preferred: Bachelor's degree in Computer Science, Engineering, Math, or equivalent IT discipline (MIS). EXPERIENCE Required: Minimum ten (10) years of related hands-on experience implementing and maintaining Windows, VMware, firewall support, DDoS protection, proxies, WAFs, NetScaler load balancers, Storage Area Networks, or Cisco Networking. In lieu of some experience listed above, may consider eight (8) years of related experience with an Associate's Degree or six (6) years of related experience with a Bachelor's Degree in Computer Science, Engineering, Math, or equivalent IT discipline (e.g., MIS). KNOWLEDGE/SKILLS/ABILITIES (KSA) • Expert knowledge of network, server, and security controls infrastructure regardless of the complexity • Thorough working knowledge for most of the following technologies and operational functions: switching, routing, DNS/DHCP, Windows Active Directory, VMware, Voice over IP, Storage Area Networking, firewall support, DDoS protection, proxy, WAF, NetScaler load balancing, network segmentation, NAC, IDS/IPS, antivirus support, cyber security best practices, and networking/hardware installation and maintenance • Thorough working knowledge with packet analysis and denial of service protection • Strong critical thinking, analytical, problem solving, and risk assessment skills as well as strong listening and communication skills (oral and written) • Ability to present issues and topics of a complex technical nature to non-technical audiences • Excellent interpersonal, mentoring, coaching, and organizational skills • Thorough working knowledge of the processes that ensure compliance with regulatory or industry requirements such as NERC CIP, SOX, and PCI #LI-SC1 TECO offers a competitive Benefits package!! Competitive Salary *401k Savings plan w/ company matching * Pension plan * Paid time off* Paid Holiday time * Medical, Prescription Drug, & Dental Coverage *Tuition Assistance Program * Employee Assistance Program * Wellness Programs * On-site Fitness Centers * Bonus Plan and more!
    $70k-91k yearly est. 32d ago
  • Director of Information Security

    Arkansas Oklahoma Gas Corp 3.6company rating

    Fort Smith, AR jobs

    Join our Growing Team and see why Summit Utilities, Inc was named as one of the Fastest Growing Denver Area Private Companies 2019 and 2020; Best Places to Work in Maine 2019, 2020, 2021, 2022 and 2023; and Best Places to Work in Arkansas 2020 and 2023, Oklahoma 2022 and 2023 and Missouri 2023. Summit was also recently named one of Forbes 2023 America's Best Small Employers. Summit is a growing natural gas utility providing safe, reliable and clean burning natural gas service to homes and businesses in Arkansas, Colorado, Maine, Missouri, Oklahoma, and Texas. Being part of the Summit team means embracing excellence and innovation, committing to safety each and every day, and doing all that we can to serve each other, our customers and the communities where we live. We aim to bring warmth and energy to everything we do. We have an exciting hybrid opportunity for a Director of Information Technology based in Fort Smith, Arkansas. POSITION SUMMARY The Director of Information Security is a trusted senior leader responsible for protecting Summit's digital and physical information assets while upholding the highest standards of integrity, financial discipline, and organizational trust. This role oversees cybersecurity governance, risk management, and business continuity for enterprise systems - including modern threats emerging from AI technologies and data automation. The Director will develop and execute a forward-looking security strategy that supports Summit's operational excellence, compliance obligations, and AI-driven transformation initiatives. This includes defining governance frameworks, managing enterprise risk, ensuring prudent budget oversight, and cultivating a strong security culture across all levels of the organization. This position requires a strategic thinker, a disciplined financial steward, and a leader of high character who models accountability, transparency, and ethical decision-making. PRIMARY DUTIES AND RESPONSIBILITIES Lead the design, implementation, and continuous improvement of Summit's enterprise information security program - covering cybersecurity, AI and data protection, risk management, and incident response. Ensure strong alignment between security strategy, business goals, and regulatory requirements, particularly in the context of emerging AI use cases, machine learning models, and data governance. Oversee the IT Business Continuity and Disaster Recovery (BCP/DR) programs, including Business Impact Analysis (BIA) and scenario-based recovery exercises. Develop and enforce comprehensive policies, standards, and procedures aligned with frameworks such as NIST CSF 2.0, C2M2, and ISO 27001. Partner with data, application, and operations leaders to ensure secure design, access control, and model integrity across AI and analytics systems. Direct risk assessments and audits to identify vulnerabilities, ensuring mitigation strategies are financially sound and proportionate to organizational risk appetite. Maintain strict adherence to financial controls - including vendor spend, contract review, and security-related procurement - demonstrating accountability for budget stewardship and cost transparency. Lead and mentor a high-performing information security team, fostering a culture of ethics, service, and continuous learning. Serve as the executive liaison for internal and external audits, compliance reviews, and regulatory reporting related to cybersecurity. Stay ahead of evolving threats, particularly those involving AI misuse, data poisoning, and adversarial attacks, and integrate defenses into enterprise security posture. Provide executive-level reporting on risk posture, incidents, and metrics that connect security outcomes to business and financial value. EDUCATION AND WORK EXPERIENCE Bachelor's or Master's degree in information security, Computer Science, Information Technology, or a related field. 10+ years of experience in information security, including at least 5 years in a senior leadership or management capacity. Advanced security certifications strongly preferred (CISSP, CISM, CISA, CRISC, CCISO, etc.). Demonstrated experience managing security for cloud and hybrid environments, and integrating controls for AI, analytics, and data platforms. Proven record of financial accountability, including budget ownership, cost optimization, and vendor governance. Experience implementing and auditing against leading security frameworks (NIST CSF, C2M2, ISO 27001, SOC 2) and regulatory standards (GDPR, HIPAA, PCI, etc.). KNOWLEDGE, SKILLS, ABILITIES Deep expertise in cybersecurity, risk management, and incident response, including threat intelligence, vulnerability management, and data protection. Strong knowledge of AI and data security principles, including model governance, data ethics, and emerging threats tied to generative AI. Uncompromising integrity and sound judgment in handling confidential and financial information. Strong grasp of financial concepts related to technology management: budgeting, forecasting, cost-benefit analysis, and vendor contract negotiation. Exceptional leadership and communication skills - able to translate complex security concepts into clear, actionable guidance for executives and teams. Ability to lead under pressure with discipline, humility, and transparency. Demonstrated track record of fostering a culture of trust, compliance, and ethical leadership. The above statements are intended to describe the general nature and level of work being performed by employees assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties and/or skills required of all personnel so classified. Summit offers competitive pay and medical/dental/vision and other benefits that provide flexibility, choice and support to our employees when they need it most. We understand that home and family are essential pieces of your life, and our benefits are designed to support you both at work and at home. Summit Utilities, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or protected veteran status and will not be discriminated against on the basis of disability or veteran status.
    $106k-134k yearly est. Auto-Apply 5d ago

Learn more about Veolia Water Tech jobs

View all jobs