Information Security Engineer jobs at Zyston - 148 jobs
Cyber Security Analyst - Incident Response
Manpowergroup 4.7
Baltimore, MD jobs
Our client, a leading organization in the energy industry, is seeking a Cyber Security Analyst - Incident Response to join their team. As a Cyber Security Analyst - Incident Response, you will be part of the Cyber Defense team supporting enterprise-wide security operations. The ideal candidate will demonstrate analytical thinking, resilience, and collaborative skills, which will align successfully in the organization.
**Job Title:** Cyber Security Analyst - Incident Response
**Location:** Remote
**Pay Range: $65-68/hr**
**What's the Job?**
+ Support the identification, containment, eradication, and recovery of sophisticated level 2/3 cyber incidents.
+ Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve security incidents.
+ Analyze log files from various sources to identify potential threats and vulnerabilities.
+ Perform cyber defense incident triage, including scope determination and impact assessment, and recommend remediation strategies.
+ Track and document cyber defense incidents from initial detection through resolution, ensuring comprehensive reporting and artifact collection.
**What's Needed?**
+ 8+ years of experience in a cyber defense role or 4+ years with a relevant bachelor's degree.
+ Proficiency with EDR tools, Splunk, and experience with ESAs, sandboxing, and malware analysis tools.
+ Strong understanding of network principles and the cyber incident lifecycle.
+ Experience supporting incident response processes and coordinating with third-party vendors and internal teams.
+ Preferred certifications include GCIH, GSEC, GCIA, GCFE, or capture the flag experience.
**What's in it for me?**
+ Opportunity to work with a Fortune 200 company in a dynamic and impactful role.
+ Remote work flexibility to support work-life balance.
+ Engagement in cutting-edge cyber defense techniques and trend analysis.
+ Collaborative environment fostering professional growth and development.
+ Contributing to the security of critical energy infrastructure.
**Upon completion of waiting period consultants are eligible for:**
+ Medical and Prescription Drug Plans
+ Dental Plan
+ Vision Plan
+ Health Savings Account
+ Health Flexible Spending Account
+ Dependent Care Flexible Spending Account
+ Supplemental Life Insurance
+ Short Term and Long Term Disability Insurance
+ Business Travel Insurance
+ 401(k), Plus Match
+ Weekly Pay
If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!
**About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.**
_ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _- creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent._
ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
$65-68 hourly 36d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Analyst II
Cybersheath 3.7
Reston, VA jobs
Job Description
CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team!
CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.
Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory.
Job Overview
The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments.
Key Responsibilities
Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments
Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel
Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations
Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket)
Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns
Analyze federation security including ADFS token-based attacks and SAML token manipulation
Configure and tune WAF/firewall rule sets and investigate related security incidents
Develop network segmentation strategies and identify lateral movement attempts
Develop and maintain incident response playbooks for various attack scenarios
Coordinate incident response activities with cross-functional teams
Required Qualifications
3-5 years in cybersecurity with 2+ years SOC experience
Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD)
Experience with SIEM platforms and security monitoring tools
Scripting proficiency (PowerShell, Python)
Strong analytical and communication skills
Microsoft Certified: Security Operations Analyst (SC-200)
One additional security certification: EC-Council CSA, CompTIA Security+, or similar
Preferred Qualifications
Microsoft Certified: Azure SecurityEngineer (AZ-500)
Microsoft Certified: Identity and Access Administrator (SC-300)
CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification
CISSP, SSCP, CCSP
Skills & Expertise
Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps)
Azure Sentinel KQL query development and alert configuration
Azure AD/Entra ID security configuration and attack path analysis
Active Directory security assessment including GPOs, trust relationships, and delegation
Email security and phishing detection/response
Cloud security posture management
Incident handling and digital forensics
Threat intelligence analysis and implementation
Work Environment
CyberSheath is a fully remote organization, and this will be a work-from-home position
The schedule for this role is:
Week One: Friday - Sunday 8:00 AM - 8:00 PM
Week Two: Friday - Monday 8:00 AM - 8:00 PM
Travel requirements: 0-5% yearly.
Please note that this role will be part of our SOC on-call rotation
CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability.
Budgeted Pay Range$70,000-$100,000 USD
$70k-100k yearly 21d ago
Junior Cyber Security Analyst
Kavaliro 4.2
Norcross, GA jobs
Junior Cybersecurity Analyst (Remote) About the Role Our client is seeking a motivated Junior Cybersecurity Analyst to join our InformationSecurity team. This is a remote opportunity for an early-career cybersecurity professional who wants hands-on experience protecting sensitive financial systems and member data in a highly regulated environment.
This role is ideal for someone who is curious, highly trainable, and eager to grow within cybersecurity while working alongside experienced security professionals.
Key Responsibilities
Monitor and analyze security alerts through SIEM, EDR, and endpoint protection tools
Investigate and escalate potential security incidents
Assist with vulnerability scanning and remediation tracking
Support phishing detection and security awareness initiatives
Help maintain and update security policies, procedures, and documentation
Assist with access reviews and identity management processes
Support audits and compliance efforts for regulatory frameworks (NCUA, FFIEC, SOC, etc.)
Required Qualifications
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience)
1-2 years of experience in cybersecurity, IT security, or related technical roles
Understanding of:
Network security fundamentals
Malware, ransomware, and phishing threats
Windows and Linux operating systems
Strong analytical, problem-solving, and communication skills
Willingness to learn, be trained, and grow within a structured security environment
Preferred Qualifications
Experience in banking, credit unions, healthcare, or other highly regulated industries strongly preferred
Industry certifications highly preferred:
CompTIA Security+
CISSP (or in progress)
Other relevant cybersecurity certifications
Familiarity with:
GRC (Governance, Risk, and Compliance) platforms
Rapid7 vulnerability management tools
Qualys (assumed “Quantitate”) or similar platforms
Microsoft Defender security tools
Experience working with SIEM, EDR, or vulnerability scanning tools
Kavaliro provides Equal Employment Opportunities to all employees and applicants. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Kavaliro is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Kavaliro will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please respond to this posting to connect with a company representative.
$78k-107k yearly est. 27d ago
Security Engineer - Threat Detection & Disruption
Fragomen, Del Rey, Bernsen & Loewy 4.6
Remote
About the Role: Fragomen, an AmLaw 100 Firm and the leading global immigration services provider, is seeking a Cyber SecurityEngineer with strong operational and analytical experience in Threat Detection & Disruption to join our talented IS & Cyber Security team..
Our industry-leading, immigration specific technology and infrastructure is undergoing tremendous transformation and security is on the critical path to success in that endeavor. We seek a professional who is passionate about security, capable of effecting change, and eager to advance threat detection and response capabilities using traditional and emerging technologies. You will be joining a team of Cyber SecurityEngineers who make security a distinguishing factor in our technological offerings. The successful candidate will help engineer solutions to focus our defensive and response efforts throughout our environment.
How will you make a difference as a SecurityEngineer - Threat Detection and Disruption at Fragomen?
Refine, validate and exercise our Threat Detection and Disruption program.
Develop detection techniques to protect our evolving environment and technical offerings.
Architect, deploy and maintain our network and endpoint detection tools to reduce our time to alert, triage and mitigation from potential threats.
Deploy, mature and maintain our future logging tier, security event incident management (SIEM) system and alert, triage and response pipeline.
Lead in the evolution of our protection, detection and mitigation capabilities based on experience, evolving threat environment and findings from cyber security incidents.
Participate in a cross-functional response to cyber security incidents.
Develop and maintain strong relationships with key partners to create our detection and threat disruption program.
Participate in threat hunting efforts.
Leverage your valuable skills and experience to make an impact at Fragomen:
2 - 5 years or more years of practical Threat Detection and Disruption experience.
A passionate team player who builds knowledge and solves complex problems.
Demonstrated knowledge of detection tools with the ability to write signatures (Snort, Suricata, Yara, etc.).
Proficiency in a modern high-level language (Python, Ruby, Node, Go, etc.).
Experience in establishing and maintaining a SIEM (Splunk, ArcSight, QRadar, ELK, etc.).
Proven experience in developing intrusion detection techniques and operational responses.
Experience in architecting and deploying logging technology (Syslog, Logstash, etc.).
Strong, professional communication skills that maintain under pressure.
A Bachelor's degree in a related field or a combination of related experience.
Experience in developing highly automated detection and triage tools.
Knowledge of detection, forensic, security event and incident management, and orchestration tools.
The following are preferred but not required: Technical certifications that demonstrate technical prowess in DFIR to include GIAC (GCIH, GCFA, GCIA), Offensive Security (OSCP, OSCE, OSEE), and/or Vendor specific (Splunk, QRadar, ELK, etc.).
Benefits:
At Fragomen, we know that great people make a great organization. We value our people and offer employees a broad range of benefits which includes:
22 PTO days + Federal holidays
Medical, Dental, and Vision plans + FSA & HSA Plans
401K plan
Learn More About Fragomen:
Please take time to read
About Us
, explore the
Meaningful and Impactful Work
we do for our clients, and review the standard
Benefits
we offer. You can find all the material to the right of this page.
All offers and/or employment contracts are contingent upon the successful completion of the Firm's pre-employment screening process. This process may include verifying the candidate's identity, confirming legal authorization to work in the offered position's location, and conducting a comprehensive background check, where permitted by local regulations.
$90k-117k yearly est. Auto-Apply 20d ago
Senior Cloud Security Engineer
Open 3.9
New York, NY jobs
Alloy is where you belong!
Alloy helps solve the identity risk problem for companies that offer financial products by enabling them to outpace fraud and confidently serve more people around the world. Over 600 of the world's largest financial institutions and fintechs turn to Alloy to take control of fraud, credit, and compliance risk, and grow with the clearest picture of their customers.
Through our values: Be Bold, Get Scrappy, Collaborate, and Celebrate Our Differences, we are creating a workplace where you can grow, thrive, and belong. See how we've been continuously recognized and named one of Inc. Magazine's Best Workplaces, Forbes America's Best Startup Employers, Best Fintech to Work for by American Banker, year after year.
Check out our investors and read more about us here.
What you'll be doing
Serve as a cloud security subject matter expert, advise on and implementing best practices
Respond to security incidents and provide timely and appropriate solutions
Conduct cloud security risk assessments and audits
Conduct investigations into security incidents and potential threats
Take part in on call rotations for incident response and remediation
Assist with policy management, security audits, and due diligence for cloud security concerns
Advise on, configuring, and managing a variety of security tools
Keep informed about and respond to emerging security threats and vulnerabilities
Assist with cloud security reviews of potential vendors
Who we're looking for
5+ years of experience working in a similar role with a focus on cloud security in AWS.
Experience provisioning infrastructure in AWS using Terraform, CloudFormation, CDK, or similar tools
Experience configuring VPCs, route tables, NACLs, Security Groups, iptables, Web Application Firewall, Config, GuardDuty, Inspector, KMS, IAM, etc.
In depth knowledge of AWS security best practices around systems hardening, monitoring, and incident response
Experience taking part in an on-call rotation
You are passionate about securing infrastructure, reducing risk, and protecting data!
You are a subject matter expert on cloud security in AWS
You have a solid understanding of network architecture and protocols
You can advise on cloud security policies and procedures
We're a lean team, so your impact will be felt immediately, and opportunities will grow as the company scales up. If this all sounds like a good fit for you, why not join us?
Alloy is committed to fair and equitable compensation practices. Below is the anticipated starting base compensation range for this role; however, pay may vary depending on job-related knowledge, in-demand skills, relevant experience, and/or geography. In addition to a competitive base salary, this position is also eligible for equity awards in the form of stock options (ISOs) as well as a competitive total benefits package. Your recruiter will be happy to walk you through the details and what compensation could look like for you specifically!
This position has a salary range of $180,000 - $210,000.
Benefits and Perks
Unlimited PTO and flexible work policy
Employee stock options
Medical, dental, vision plans with HSA (monthly employer contribution) and FSA options
401k with 100% match up to 4% of annual employee compensation
Eligible new parents receive 16 weeks of paid parental leave
Home office stipend for new employees
Annual Learning & Development annual stipend
Well-being benefits include access to ClassPass, OneMedical, and Spring Health
Hybrid work environment: our employees local to NYC are expected to work Tuesdays and Thursdays from our HQ in Union Square, Manhattan. Tasty lunches catered from a variety of local restaurants and frequent employee-organized cultural events contribute to our positive office energy. On Monday/Wednesday/Friday most employees Zoom into work from home while some take advantage of the quieter office
How to apply
Apply right here! You've found the application!
Alloy is proud to be an equal-opportunity workplace and employer. We're committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status. We are committed to an inclusive interview experience and provide reasonable accommodations to applicants with visible and invisible disabilities. We encourage applicants to share needed accommodations with their recruiter.
All Alloy jobs are listed on our careers page. Any communication during the recruitment process, including interview requests or job offers, will come directly from a recruiting team member with an alloy.com email address. We do not use outside applications or automated text messaging in our recruiting process. We will not ask for any sensitive financial or identification information during the recruiting process. If you're ever unsure, please contact us directly via our website before sharing personal information.
$180k-210k yearly Auto-Apply 60d+ ago
Security Engineer | Fully remote
Two95 International 3.9
Remote
Requirements
Qualifications
Education/Experience: Bachelor's degree in related field or equivalent experience
5+ years' experience in IT security
5+ years of experience in IT systems administration
Experience maintaining systems and access control in a multi-cloud environment (AWS and Azure)
Significant experience with Akamai based security solutions.
Fundamental understanding of security requirements of containerized applications
Working knowledge of WAF (web application firewalls), IDS, and FIM platforms
Experience with ELK, Splunk, and at least one SIEM platform
Experience maintaining a vulnerability management program leveraging tools such as Nessus, OpenVAS, Qualys, Tenable, etc.
Familiar with CloudWatch, CloudTrail, CloudSOC, or similar tools
Knowledge of at least one scripting language (Python, Ruby, etc.)
Strong ethics and understanding of ethics in business and informationsecurity
Solid background in Windows desktop and server OS hardening and protection
Solid background in Linux
Working knowledge of PCI and SOX control and reporting requirements
CISSP (or equivalent) security certification preferred
Benefits
Note: If interested please send your updated resume to **************************** and include your rate requirement along with your contact details with a suitable time when we can reach you. If you know of anyone in your sphere of contacts, who would be a perfect match for this job then, we would appreciate if you can forward this posting to them with a copy to us.
$92k-132k yearly est. Auto-Apply 60d+ ago
Cloud Security Engineer, AWS (Work Remotely Anywhere in the U.S.)
Businessolver 3.8
Denver, CO jobs
Since 1998, Businessolver has delivered market-changing benefits technology and services supported by an intrinsic responsiveness to client needs. The company creates client programs that maximize benefits program investment, minimize risk exposure, and engage employees with easy-to-use solutions and communication tools to assist them in making wise and cost-efficient benefits selections. Founded by HR professionals, Businessolver's unwavering service-oriented culture and secure SaaS platform provide measurable success in its mission to provide complete client delight.
Cloud SecurityEngineer
We are currently seeking an Cloud SecurityEngineer with experience with Windows or Linux System Administration and designing, building, installing, configuring and supporting IT Security tools. This is a unique opportunity to contribute extensively to the success of a rapidly growing technology company.
The Gig:
Build, maintain and manage a central security policy for our cloud infrastructure
Build a continuous audit solution to validate systems against policy
Develop general techniques and frameworks that will enable development teams to find flaws before they are introduced into production
Oversee and develop security standards based on security best practices
Respond to security incidents, assist with troubleshooting and provide on-call support as needed
Creative thinking and proposing solutions to grow our business by delighting our clients.
Provides guidance and work leadership to less-experienced technical staff members
What you need to make the cut:
4+ years of experience in securing cloud infrastructures in AWS
5+ years of security monitoring experience and incident response activities
Experience with Linux and serverless environments
Experience with AWS Security principles and services, AWS Config, IAM, WAF, GuardDuty, CloudFormation, and AWS networking from a security perspective
Experience with software application security best practices (e.g. OWASP, CWE/SANS)
Understanding of Automation tools such as Ansible, Puppet, Chef, Terraform or similar
Understanding of infrastructure-as-code
Proficient in a modern scripting language
Familiarity with CI/CD platforms, Version Control Systems
Familiarity with Container security and Kubernetes
Development experience in Java or Python a plus
BS in Computer Science, CIS, Software Engineering or related degree.
Highly motivated, Innovative, self-directed thinker with an eagerness to stay up to date with current trends and a desire to impress
Excellent written and verbal communication skills
The pay range for this position is 84K to 132K per year (pay to be determined by the applicant's education, experience, knowledge, skills, and abilities, as well as internal equity and alignment with market data).
Other Compensation: If this position is full-time or part-time benefit eligible, you will receive a comprehensive benefits package which can be viewed here: ************************************************************************************
Dear Applicant.
At Businessolver, we take our responsibility to protect our clients, employees, and company seriously and that begins with the hiring process.
Our approach is thoughtful and thorough. We've built a multi-layered screening process designed to identify top talent and ensure the integrity of every hire. This includes quickly filtering out individuals who may attempt to misrepresent themselves or act in bad faith.
We also partner with trusted, best-in-class providers to conduct background checks, verify identities, and confirm references. These steps aren't just about compliance, they're about ensuring fairness, safety, and trust for everyone involved.
Put simply: we will always confirm that you are who you say you are. It's just one of the many ways we uphold the standards that matter most, to you, to us, and to the people we serve.
With heart,
The Businessolver Recruiting Team
Businessolver is committed to maintaining an environment that protects client data. We train our employees to maintain leading class security practices and expect all employees to adhere to policy, procedures and controls.
(Applicable to all roles at an AVP, DIR, VP, Head Of or SVP and above level):
Serve as a security contact for the business unit. Responsible for driving adoption and compliance with informationsecurity and privacy practices. Serve as a liaison with the informationsecurity team on security and privacy matters.
Equal Opportunity at Businessolver:
Businessolver is an Affirmative Action and Equal Opportunity Employer and is proud to offer equal employment opportunity to everyone regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, veteran status, and more. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements.
#LI-Remote
$79k-104k yearly est. Auto-Apply 60d+ ago
Cloud Security Engineer, AWS (Work Remotely Anywhere in the U.S.)
Businessolver 3.8
Denver, CO jobs
Cloud SecurityEngineer We are currently seeking an Cloud SecurityEngineer with experience with Windows or Linux System Administration and designing, building, installing, configuring and supporting IT Security tools. This is a unique opportunity to contribute extensively to the success of a rapidly growing technology company.
The Gig:
* Build, maintain and manage a central security policy for our cloud infrastructure
* Build a continuous audit solution to validate systems against policy
* Develop general techniques and frameworks that will enable development teams to find flaws before they are introduced into production
* Oversee and develop security standards based on security best practices
* Respond to security incidents, assist with troubleshooting and provide on-call support as needed
* Creative thinking and proposing solutions to grow our business by delighting our clients.
* Provides guidance and work leadership to less-experienced technical staff members
What you need to make the cut:
* 4+ years of experience in securing cloud infrastructures in AWS
* 5+ years of security monitoring experience and incident response activities
* Experience with Linux and serverless environments
* Experience with AWS Security principles and services, AWS Config, IAM, WAF, GuardDuty, CloudFormation, and AWS networking from a security perspective
* Experience with software application security best practices (e.g. OWASP, CWE/SANS)
* Understanding of Automation tools such as Ansible, Puppet, Chef, Terraform or similar
* Understanding of infrastructure-as-code
* Proficient in a modern scripting language
* Familiarity with CI/CD platforms, Version Control Systems
* Familiarity with Container security and Kubernetes
* Development experience in Java or Python a plus
* BS in Computer Science, CIS, Software Engineering or related degree.
* Highly motivated, Innovative, self-directed thinker with an eagerness to stay up to date with current trends and a desire to impress
* Excellent written and verbal communication skills
The pay range for this position is 84K to 132K per year (pay to be determined by the applicant's education, experience, knowledge, skills, and abilities, as well as internal equity and alignment with market data).
$79k-104k yearly est. Auto-Apply 17d ago
Physical Security Systems Analyst
Motion Recruitment Partners 4.5
Phoenix, AZ jobs
Phoenix, Arizona **100% Remote** Contract $50/hr - $55/hr **Security Systems Implementation Analyst** **Duration:** 12 Months + (Contract to Hire) We are looking for Physical Security Systems Implementation and Configuration Analyst with commercial security (Access Control & IP Video) design, installation, and programming experience. The right resource will have extensive Physical Controls and Security experience in large enterprise corporate, facility, campus, environments. Lenel Certification or one or more of the following Access Control Manufacturers: SW House, Genetec, S2, AMAG, or Prowatch.
**Primary Responsibilities:**
+ Assist in the implementation of Lenel and Milestone Physical Security solutions within construction projects at different facilities across the United States.
+ Responsible for infield device configuration to enable connectivity of cameras, access control, controller boards, etc.
+ Will perform a combination of startup/commissioning and programming at small and large healthcare facilities nationally.
+ Responsible for integrations, conversions, and upgrades to new systems.
**Required Experience:**
+ Previous experience working for a security integrator (Convergint, Siemens, Johnson Controls, etc.).
+ Proficiency in understanding Lenel, Milestone, or similar security applications.
+ Previous experience with software package deployments.
+ Previous experience and/or understanding of low voltage requirements.
+ Previous experience and/or understanding of Network configuration needs.
+ Familiar with ISO Model Standards Related to Networking.
+ Previous experience working as an onsite security system technician (preferred).
+ Lenel Certification (Preferred) or one or more of the following Access Control Manufacturers: SW House, Genetec, S2, AMAG, or Prowatch.
+ Strong communication and customer service focus.
**Additional Role Details:**
+ Virtual Panel interview with behavioral and technical driven questions.
+ 100% Remote Role (No Travel Required).
+ Contract to Hire potential.
**You will receive the following benefits:**
+ Medical Insurance - Four medical plans to choose from for you and your family
+ Dental & Orthodontia Benefits
+ Vision Benefits
+ Health Savings Account (HSA)
+ Health and Dependent Care Flexible Spending Accounts
+ Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
+ Hospital Indemnity Insurance
+ 401(k) including match with pre and post-tax options
+ Paid Sick Time Leave
+ Legal and Identity Protection Plans
+ Pre-tax Commuter Benefit
+ 529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
**Posted by:** Justin Harless
**Specialization:**
+ Security Operations
$50 hourly 60d+ ago
Cloud Security Engineer
Cybersheath 3.7
Remote
CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cloud SecurityEngineer to our Security Operations team!
CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.
Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory.
Job Overview
The Cloud SecurityEngineer provides support for the implementation, troubleshooting, and maintenance of informationsecurity infrastructure and any process related to these systems in a Security Operations / IT Infrastructure environment. They will have a detailed understanding of cloud platforms, such as Microsoft Office 365 and Azure, On-premises infrastructure for policy maintenance, software/hardware security implementation and best practices, as well as scripting and relevant development skills to be able to leverage automation and create custom connectors and analytics rules in a Microsoft Sentinel Environment.
A successful candidate will also be well versed in security threats, exploits, and vulnerabilities which impact systems, networks, and assets and will utilize their abilities and experience to protect client environments. Thorough experience with Security Hardening across multiple products (Azure, O365, Active Directory), Endpoint Detection and Response technologies and understanding the implementation and support for those technologies is imperative to the success in this role.
Essential Responsibilities (include but are not limited to):
Architect, establish and maintain best practices of implementation for our products/services.
Configure, implement, and support all production security tools and technologies
Maintain excellent documentation (SOPs) for all security tooling implementation, support, troubleshooting, etc.
Troubleshoot issues with security toolsets within client environments
Execute projects related to client onboarding - portal configuration, agent deployment, best practices configuration, systems auditing.
Actively work with other team members on security events that require urgent response, containment and remediation
Provide ongoing recommendations on toolset tuning and best practices.
Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach
Triage incoming support tickets and requests related to security tools managed by CyberSheath
Take part in daily shift changeover meetings at bthe eginning and end of shifts
Provide support for cloud-based SIEM, EDR, and Anti-Spam/Phishing products
Provide support for additional security tools such as, but not limited to: SOAR, MFA, Encryption, and Vulnerability Management platforms.
Assist with triage of alerts as necessary
Required Education, Experience, & Skills
Minimum of 5 years' experience with successful implementation of security products, security best practices, security device policies for small and large enterprises.
Minimum of 3 years' experience in Security Administration, and a deep understanding of how security interfaces/impacts with other IT teams/business objectives.
Deep understanding of Office 365 / Azure AD security tooling, policies and implementation, Azure AD / O365 reporting.
Networking understanding / working experience (TCP/IP, Routing, VPN)
Must be a U.S. Citizen and reside within the United States or its Territories
Exceptional analytical and problem-solving skills
Excellent communication skills to communicate with support personnel, customers, and managers
Ability to work independently, remotely, and as part of a team
Preferred Education, Experience, & Skills
Thorough working experience with the following products/technologies: KnowBe4, CrowdStrike, SAML/SSO, Okta, Intune, Cisco Umbrella, Rapid7, Defender for Endpoint, Defender for Office 365, Abnormal Security, Avanan.
Understanding of CIS (Center for Internet Security) benchmarks and implementation.
Working experience with DLP technologies/software (Office 365 native or third-party) is a plus.
Experience with Business Intelligence software for reporting (Power BI, BrightGauge, etc.)
Software development, coding, and/or advanced scripting experience is a plus
Working expertise with Microsoft Sentinel, Google Chronicle, or Splunk
Certifications related to Microsoft Azure and Microsoft Security products
Work Environment
Remote
Please note that this role will be part of our SOC on-call rotation
CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability.
Budgeted Pay Range$85,000-$100,000 USD
$85k-100k yearly Auto-Apply 22d ago
Information Security Analyst
Anexinet 4.2
Blue Bell, PA jobs
At Anexinet you will be part of a team who from strategy through execution, delivers award-winning digital applications and the infrastructure to run them on, engaging front-end design, rapid development and a rock-solid back-end, all informed by data-driven insights and powered by partnerships with top tech vendors. Plus, we keep it all running with our managed services and DevOps teams.
Recognized for 10 consecutive years with a Best Place to Work award from the Philadelphia Business Journal, our people come and stay at Blue Bell, PA based Anexinet because we are a technology focused, team oriented with a culture that is second to none.
Job Description
For twenty years Anexinet, based in Blue Bell, PA has specialized in helping businesses transform in the digital world. We empower our clients to grow their customer base and improve workforce efficiency by envisioning, developing, delivering and operating next generation technology solutions. Our core expertise is in digital applications, analytics, managed operations and hybrid IT, enabling businesses to rapidly transform. Clients partner with Anexinet to support the full lifecycle of their next generation digital business.
We are looking to add several Security Operations Center (SOC) Analysts to our Managed Operations team. Initially work can be performed remotely however, qualified candidates should be able to work out of our SOC in Blue Bell, PA eventually and from time to time.
Job Qualifications:
· This position requires 1-3 years of Security Operations Center (SOC) experience or equivalent schooling with a focus in Cybersecurity/Information Assurance.
· The following certifications are strongly desired:
· GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA)
·
or GIAC Security Certifications including GSEC, GPPA, CMON, GCED.
· Cisco CCNA Cyber Ops, CompTIA Network+, Security+, and/or Linux+
· Fundamental understanding of TCP/IP component layers to identify normal and abnormal traffic
· Basic working knowledge of Wireshark, tshark, tcpdump or other informationsecurity tools
· Some on-call and afterhours work may be required
· Must be US Citizen
·
Position
Responsibilities:
· Provide first and second level technical resolution for security alerts and SOC service requests.
· Use open-source traffic analysis tools to identify signs of an intrusion.
· Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
· Monitors and analyzes SecurityInformation and Event Management (SIEM) to identify security issues for remediation.
· Knowledge of creating SecurityInformation Event Management (SIEM) tool rules.
· Analyze network traffic, log analysis, prioritize and differentiate between potential intrusion attempts and false alarms.
· Keep current with the threat landscape, identify vulnerabilities, and risk while supporting real-time security monitoring operations.
· Proactively monitor and look for potential flaws in client infrastructure pertaining to the services provided and make recommendations to reduce the risk/impact of similar future problems.
· Manage, escalate and drive satisfactory resolution of customer's technical support, service and infrastructure teams to address issues.
· Demonstrate problem solving skills that contribute towards the resolution of any issues that arise.
· Document solutions, process, or procedures and present in written document, verbally on the phone, or in person.
·
Ideal Candidates will have:
· Associate's degree or Certification in Computer Science, Cybersecurity, Communications, Psychology, or other tech-related discipline.
· 24x7 SOC experience and/or experience working with or for a MSSP.
· Programming/shell scripting experience highly desirable (PERL, Python, Java, shell scripts, PowerShell, etc.)
· Deep packet and log analysis, cyber threat, intelligence gathering and analysis
· Prior computer forensics experience strongly and Malware Analysis strongly desired
· Prior experience in either system or network administrator role
· Knowledge of Windows, Linux and Cisco operating systems and informationsecurity
· Knowledge of Intrusion Detection Systems (IDS) and SIEM technologies; SumoLogic, Snort, McAfee ePO, Carbon Black, Splunk, Endpoint AntiVirus (Symantec, McAfee, SentinelOne, AMP), Firewalls, open source security tools preferred
· Strong analytical, problem solving skills, good organization, decision making, verbal and written communication skills
· Ability to work with little direct supervision and think outside of the box when the need arises
· Industry-adopted security certifications such as, but not limited to: Offensive Security Certified Professional (OSCP), EC-ECIH, EC-CEH, Cisco CCNA/CCNP Security or any of the GIAC Security Certifications including GSEC, GCIH, GCIA, GPPA, CMON, GCED, Microsoft MCSE
Additional Information
All your information will be kept confidential according to EEO guidelines.
$80k-105k yearly est. 6h ago
Cyber Security Analyst/ISSO
Peerless Technologies 4.3
Dayton, OH jobs
Job Description
Peerless is searching for candidates that perform Information Systems Security Manager/Information Systems Security Officer (ISSM/ISSO) functions necessary to maintain mission effectiveness within the Systems Technology Office (STO), located at Wright-Patterson AFB, OH. The work includes developing and maintain security and accreditation packages for standalone systems, classified networks; implementing information system security requirements, system security plans, and ensure all auditing requirements are completed; ensuring all system security procedures are followed including updates to system security software (patches), using tools like SPLUNK and ACAS, updates to antivirus definition files, and ensuring audit files are maintained and reviewed; researching, advising on, and generating documentation as required for requesting permission to waive any cybersecurity requirements that are determined by the government customer to inhibit the foreign materiel exploitation mission to an unacceptable level.
Key Responsibilities:
Must be able to maintain accredited ATO/ATC packages for various networks/standalone systems
Monitor and report auditing of computers/networks using tools such as SPLUNK, Windows Security Logs
Complete and maintain required user documentation for various computer accounts, and roles
Maintain and enforce policy such as controls, standards, and directives for assets
Skills:
Positive customer service and communication skills
Excel at Microsoft applications (excel, word, etc)
Attention to detail
Experience with SAP environments
Understanding with various tools such as SPLUNK, ACAS
Qualifications:
DoD 8140 Qualification (Security + or higher IAM/IAT level)
5+ years of Cyber security experience
Cyber Palo Alto Networks Security Operations Senior Consultant Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
* Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
* Integrate diverse log and telemetry sources, ensuring data quality and normalization.
* Develop and optimize automated response workflows for incident containment and remediation.
* Advise clients on advanced use cases, threat detection, and automation strategies.
* Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
* Present technical findings and recommendations to stakeholders.
Required Qualifications
* BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
* 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
* 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
* 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
* 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
* 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
* 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
* 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
* Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
* Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
* Limited immigration sponsorship may be available
Preferred Qualifications
* Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
* Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
* Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
* Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
* Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
* Previous consulting or "Big 4" experience
* Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Recruiting tips
From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits
At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more.
Professional development
From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Qualified applicants with criminal histories, including arrest or conviction records, will be considered for employment in accordance with the requirements of applicable state and local laws, including the Los Angeles County Fair Chance Ordinance for Employers, City of Los Angeles's Fair Chance Initiative for Hiring Ordinance, San Francisco Fair Chance Ordinance, and the California Fair Chance Act. See notices of various fair chance hiring and ban-the-box laws where available. Fair Chance Hiring and Ban-the-Box Notices | Deloitte US Careers
Requisition code: 314097
Job ID 314097
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
+ Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
+ Integrate diverse log and telemetry sources, ensuring data quality and normalization.
+ Develop and optimize automated response workflows for incident containment and remediation.
+ Advise clients on advanced use cases, threat detection, and automation strategies.
+ Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
+ Present technical findings and recommendations to stakeholders.
Required Qualifications
+ BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
+ 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
+ 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
+ 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
+ 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
+ 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
+ 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
+ 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
+ Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
+ Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
+ Limited immigration sponsorship may be available
Preferred Qualifications
+ Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
+ Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
+ Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
+ Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
+ Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
+ Previous consulting or "Big 4" experience
+ Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Cyber Palo Alto Networks Security Operations Senior Consultant Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
* Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
* Integrate diverse log and telemetry sources, ensuring data quality and normalization.
* Develop and optimize automated response workflows for incident containment and remediation.
* Advise clients on advanced use cases, threat detection, and automation strategies.
* Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
* Present technical findings and recommendations to stakeholders.
Required Qualifications
* BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
* 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
* 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
* 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
* 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
* 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
* 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
* 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
* Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
* Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
* Limited immigration sponsorship may be available
Preferred Qualifications
* Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
* Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
* Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
* Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
* Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
* Previous consulting or "Big 4" experience
* Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Recruiting tips
From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits
At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more.
Professional development
From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Qualified applicants with criminal histories, including arrest or conviction records, will be considered for employment in accordance with the requirements of applicable state and local laws, including the Los Angeles County Fair Chance Ordinance for Employers, City of Los Angeles's Fair Chance Initiative for Hiring Ordinance, San Francisco Fair Chance Ordinance, and the California Fair Chance Act. See notices of various fair chance hiring and ban-the-box laws where available. Fair Chance Hiring and Ban-the-Box Notices | Deloitte US Careers
Requisition code: 314097
Job ID 314097
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
+ Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
+ Integrate diverse log and telemetry sources, ensuring data quality and normalization.
+ Develop and optimize automated response workflows for incident containment and remediation.
+ Advise clients on advanced use cases, threat detection, and automation strategies.
+ Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
+ Present technical findings and recommendations to stakeholders.
Required Qualifications
+ BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
+ 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
+ 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
+ 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
+ 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
+ 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
+ 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
+ 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
+ Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
+ Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
+ Limited immigration sponsorship may be available
Preferred Qualifications
+ Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
+ Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
+ Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
+ Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
+ Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
+ Previous consulting or "Big 4" experience
+ Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
$102.5k-188.9k yearly 60d+ ago
Security Systems Engineer
Centrus Energy 3.9
Piketon, OH jobs
At Centrus Energy, we take security seriously - and we need an engineer who can do the same while still having a little fun doing it. As a Security Systems Engineer, you'll be the technical mastermind behind the complex network of systems that safeguard one of America's most advanced energy facilities. You'll blend your expertise in access control, intrusion detection, and surveillance systems with creative problem-solving to keep our operations running securely and smoothly. Think of it as protecting the future of clean energy - one firewall, camera feed, and encrypted gate at a time.
What You Will Do:
You'll design, maintain, and troubleshoot our access control, intrusion detection, and video surveillance systems while keeping them aligned with NRC compliance and site security plans. You'll serve as a technical bridge between engineering, IT, and security - ensuring our systems are reliable, efficient, and ahead of potential vulnerabilities. Whether you're guiding maintenance crews, reviewing plant modifications, or helping Security Management make data-driven improvements, your work ensures that our defenses stay sharp and our systems stay operational.
We'd Love to Hear from People With:
* A Bachelor's degree in Engineering from an ABET-accredited institution or an equivalent combination of education and experience.
* 3-5 years of relevant engineering experience, ideally in physical or security systems.
* Strong communication skills and the ability to work effectively with cross-functional teams.
* Experience with access control, video surveillance, intrusion detection, and related plant security systems.
* Knowledge of operating systems, databases, and application software commonly used in security or control environments.
* Eligibility to obtain and maintain a "Q" level security clearance.
A Successful Candidate Brings:
* An active "Q" level security clearance.
* Experience supporting or leading Design Team Approval Matrix (DTAM) activities for physical security systems.
* Familiarity with NRC regulatory requirements and compliance processes.
* A passion for using technology to strengthen national security and protect high-value infrastructure.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
This position will require a pre-employment background check and a pre-employment drug test.
Centrus Energy and all subsidiaries shall abide by the applicable legal requirements. We prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin.
This position requires the successful candidate to obtain and maintain a Q security clearance. Candidates for positions requiring a security clearance are required to be tested for the absence of any illegal drug as defined in 10 CFR 707.4 prior to an offer of employment being made. In addition, once employe, employees will become part of a random drug testing program and may also be tested in the event of any incident causing injury or causing damage to property, or if it is determined that there is a reasonable suspicion the employee is under the influence of drugs or alcohol. This position will require preemployment background check on the part of the Company and in order to receive a Q security clearance, a background investigation by the Federal government. Subsequent Federal government reinvestigations may be required.
Centrus Energy Corp. is an Equal Opportunity Employer.
$71k-99k yearly est. Auto-Apply 43d ago
Information Security Analyst
Comresource 3.6
Cincinnati, OH jobs
Job Description
ComResource is looking for an InformationSecurity Analyst.
We need someone to assist in safeguarding sensitive data, neutralizing threats, and ensuring a strong cybersecurity posture through proactive monitoring, investigation, and governance.
Responsibilities:
Develop, implement, and enforce cybersecurity policies and procedures.
Conduct risk assessments, internal audits, and ensure compliance with frameworks like NIST and ISO 27001.
Lead threat detection, incident response, and vulnerability management initiatives.
Oversee security architecture, tools, and endpoint protection solutions.
Drive cybersecurity awareness and training across the organization.
Collaborate with IT, leadership, and cross-functional teams to improve the company's security posture.
Manage vendor and third-party security compliance.
Essentials:
Bachelor's degree in Cybersecurity, IT, or related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (NIST, ISO 27001).
Experience with SIEM, EDR, and vulnerability management tools.
Strong analytical, communication, and collaboration skills.
Experience supporting governance, risk, and compliance (GRC) functions.
Desired:
Experience with Artic Wolf, CMMC, and NIST compliance.
Familiarity with enterprise platforms such as ERP or CRM systems.
Calm, strategic approach to incident response and crisis management.
Req ID: RB8910701020
$71k-92k yearly est. 1d ago
Information Security Analyst
Bakerhostetler Career 4.8
Cleveland, OH jobs
This role is primarily responsible for executing the tactical and strategic initiatives of the InformationSecurity team to include programs such as risk and vulnerability management, incident response, security architecture, cloud security and third-party vendor management. Work is typically assigned by the InformationSecurity Manager, although the InformationSecurity Analyst is expected to operate with minimal oversight and be able to identify areas of opportunity to get involved with informationsecurity tasks and initiatives. The ideal candidate is comfortable working in a fast-paced environment, communicating to technical and non-technical staff, and capable of switching between tasks as situations and criticality arise and be passionate about learning and continuous education.
ESSENTIAL DUTIES AND RESPONSIBILITIES include the following. Other duties may be assigned.
Execute on security strategy as defined by the InformationSecurity Manager.
Participation in the Firm's Vulnerability Management Program, working with cross-functional teams to identify, manage and mitigate security vulnerabilities across the Firm.
Assist with the administration of the Firm's Vendor Risk Management process, including analyzing and responding to third-party risk assessments.
Monitor and respond to informationsecurity alerts and notifications (IDS/IPS, SIEM, AV/EDR, etc.).
Design, review and administer Azure cloud security controls and architecture, including auditing Azure cloud environments.
Utilize scripting languages such as PowerShell and Python to automate tasks and improve security operations.
Collaborate and advise on IT projects to ensure security issues are addressed throughout the project life cycle.
Assist other IT teams in developing and employing security solutions across various applications and product platforms.
Administer and utilize various endpoint and network security tools, such as CrowdStrike, SIEM tools, Fortinet or other comparable advanced detection and response tools.
Administer and utilize vulnerability scanning, packet analysis and exploitation tools such as Nessus, nmap, Wireshark, tcpdump, Metasploit or similar technologies.
Design, review and aid with implementation of secure networks and system architecture (ex. network topology reviews, firewall ruleset reviews, minimum security baselines, etc.).
Apply appropriate controls referenced in various security frameworks and standards, such as the NIST CSF 2.0 Framework, NIST 800-53, CIS Controls, etc.
Monitor and secure Microsoft client and server systems, along with Fortinet and Cisco (or comparable) network devices.
Assist with the management and maintenance of user security policy education, training and awareness programs.
Conduct security research to stay abreast of latest security issues, including laws and regulations which may affect the Firm.
Other duties as requested and assigned.
QUALIFICATION REQUIREMENTS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
EDUCATION/EXPERIENCE:
Bachelor's Degree in Computer Science, Management Information Systems or related field with a minimum of 5-7 years of experience in Information Technology, or equivalent combination of education and experience. This must include 3-5 years of experience in InformationSecurity with two or more of the following domains: Windows Systems Administration, UNIX/Linux Systems Administration, Networking, Access Control, Incident Response, and Information & Data Security.
Preferred Certifications:
Certified Information Systems Security Professional (CISSP)
GIAC GSEC, GCIH, GCIA, GCWN, or equivalent certification
CompTIA Security+, CySA+, Network+, CASP or equivalent certification
Microsoft Azure Security Certifications (i.e. AZ-500, SC-100 to SC-400)
TECHNICAL SKILLS:
Demonstrated proficiency in Microsoft Office Suite including Word, Outlook, Excel, and PowerPoint.
Proven aptitude to learn new software applications.
LANGUAGE SKILLS:
Very strong communication skills, both written and oral. Excellent interpersonal communication skills necessary to maintain effective relationships with staff, trusted third-party partners, attorneys and clients. Establish credibility with staff and attorney base through quality work and communications that bring to bear the right mix of confidence, tact, persistence and reliability. Written communications must be concise, professional and accurate.
MATHEMATICAL SKILLS:
Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.
REASONING ABILITY:
Ability to apply common sense understanding to carry out instructions furnished in written, oral, or diagram form.
Ability to deal with problems involving several concrete variables in standardized situations.
Ability to define problems, collect data, establish facts and draw valid conclusions.
Ability to interpret an extensive variety of instructions and deal with several abstract and concrete variables.
Exhibit independent thinking and decision making.
Ability to interpret an extensive variety of instructions in mathematical or diagram form and deal with several abstract and concrete variables.
Ability to think strategically, develop tactics and execute pragmatically.
OTHER SKILLS and ABILITIES:
Excellent organizational and planning skills with ability to prioritize multiple tasks and projects to meet deadlines.
Ability to work under pressure in a fast-paced environment with demanding individuals.
Strong analytical and organizational skills with a tolerance for uncertainty and an ability to prioritize and complete simultaneous projects with minimal supervision.
Outstanding creativity; flexibility and persistence; motivation and energy with the ability to work with little supervision and collaborate with other members of the team.
Ability to work overtime when needed. Work occasionally requires more than 40 hours per week to perform the essential duties of the position.
A tolerance for uncertainty and an ability to prioritize and complete simultaneous projects with minimal supervision.
Thorough understanding of technologies that can be applied to firm operations and enhance working efficiency.
Ability to exercise discretion with confidential and sensitive information.
PHYSICAL DEMANDS: The physical demands described here are representative of those that should be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel objects, documents, books, pen/pencil, paper, controls and manipulate a keyboard, and input data into a PC; and talk or hear. The employee is frequently required to walk.
The employee is occasionally required to use hands to prepare correspondence and reports on a personal computer.
The employee is occasionally required to stand and reach with hands and arms. And stoop, kneel, bend, crouch or crawl.
Ability to operate a variety of standard office equipment including a computer, copy and facsimile machines.
The employee must occasionally lift and/or move up to 25 pounds.
Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception and the ability to adjust focus.
WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually moderate.
The salary offered in any location will be determined by a wide range of factors, including, but not limited to, experience level, education/training, geographic region, and relevant skills. Associates also participate in a performance- and hours-based bonus program. The expected annual salary for this position ranges from $100,000- $115,000
Baker & Hostetler LLP is an Equal Opportunity Employer.
#LI-Remote
$100k-115k yearly 38d ago
Information Security Analyst
Comresource 3.6
Miamisburg, OH jobs
Job Description
ComResource is looking for an InformationSecurity Analyst.
We need someone to assist in safeguarding sensitive data, neutralizing threats, and ensuring a strong cybersecurity posture through proactive monitoring, investigation, and governance.
Responsibilities:
Develop, implement, and enforce cybersecurity policies and procedures.
Conduct risk assessments, internal audits, and ensure compliance with frameworks like NIST and ISO 27001.
Lead threat detection, incident response, and vulnerability management initiatives.
Oversee security architecture, tools, and endpoint protection solutions.
Drive cybersecurity awareness and training across the organization.
Collaborate with IT, leadership, and cross-functional teams to improve the company's security posture.
Manage vendor and third-party security compliance.
Essentials:
Bachelor's degree in Cybersecurity, IT, or related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (NIST, ISO 27001).
Experience with SIEM, EDR, and vulnerability management tools.
Strong analytical, communication, and collaboration skills.
Experience supporting governance, risk, and compliance (GRC) functions.
Desired:
Experience with Artic Wolf, CMMC, and NIST compliance.
Familiarity with enterprise platforms such as ERP or CRM systems.
Calm, strategic approach to incident response and crisis management.
Req ID: RB8910701020