106 Cybersecurity Analyst jobs in Ohio
Cybersecurity Analyst
Posted 7 days ago
Job Viewed
Job Description
TechSolve is a non-profit organization that is dedicated to empowering manufacturers across Southwest Ohio and beyond. As a proud sub-recipient of the Ohio Manufacturing Extension Partnership program, administered through the Ohio Department of Development and the National Institute of Standards and Technology (NIST), TechSolve provides invaluable support and resources to our industrial manufacturing community and community partners.
At TechSolve, our mission goes far beyond offering consultancy and advisory services. We are dedicated to equipping manufacturers with the tools, knowledge, and support they need to not only survive but thrive in today's rapidly evolving industrial landscape. For more information about TechSolve and our impactful mission, visit our website at
The Cybersecurity Analyst is primarily responsible for providing cybersecurity compliance and security guidance to TechSolve's clients. This role supports national defense and regional manufacturing resilience. The Cybersecurity Analyst will perform risk analyses, cybersecurity assessments, and technical writing. Secondary responsibilities include client training, personal training to maintain current cybersecurity and regulatory guidance skills, and administrative IT tasks. The Cybersecurity Analyst will be able to work independently but be directed by the Director of Cybersecurity.
Clearance: U.S. Citizenship required; ability to obtain a DoD security clearance preferred
Essential Functions
• Conduct cybersecurity assessments and assist in remediation planning for TechSolve customers, ensuring projects are completed within the established timeframes and budgets.
• Assess and recommend secure network solutions and cybersecurity tools to ensure compliance with regulatory requirements.
• Complete technical writing assignments supporting assessment tasks in line with regulatory requirements and cybersecurity frameworks.
• Draft and edit documents related to cybersecurity frameworks, such as policies, system security plans, and plans of action and milestones.
• Assist in editing templates related to these documents.
• Utilize cybersecurity tools to perform assessments.
Secondary Functions
• Assist with the development of training materials and conduct training for TechSolve customers related to cybersecurity awareness.
• Follow a professional development plan to improve cybersecurity and regulatory assessment skills.
• Perform and/or assist with administrative IT tasks, including serving as a point of contact for TechSolve's IT MSP.
Requirements
Education/Experience:
• Bachelor's degree in Cybersecurity, Networking, Computer Science, Engineering, or a related discipline.
• 3-6 years of combined experience as a cybersecurity analyst, network engineer, systems administrator, or at a Managed Security Services Provider or in-house SOC.
Required Skills/Competencies:
• Understand NIST SP 800-171, NIST SP 800-53, CMMC, NIST Cybersecurity Framework (CSF) and/or other industry-recognized cybersecurity frameworks.
• Write technical documentation related to assessment reports, system security plans, plans of action and milestones (POaMs), policies, and other security-related documentation.
• Manage project schedules and complete projects to meet required deadlines.
• CompTIA Security+ Certification or equivalent.
Preferred Skills:
• System Administration in Microsoft environments including Active Directory, Domain Controllers, etc. Experience with PowerShell scripting a plus.
• Network engineering experience with researching and troubleshooting server infrastructure and network issues.
• Experience with researching and troubleshooting endpoint issues and concerns such as would be required of helpdesk support.
• Penetration Testing experience and certification is a plus.
Communication Skills:
Excellent oral and written communication skills with the ability to communicate clearly, professionally, and effectively in English (written and spoken) with client personnel and employees at all organizational levels and in a variety of environments. Must be able to develop effective working relationships with staff and a network of technical resources.
Reasoning Ability:
Individual must be a team player with the ability to exercise independent, sound judgment and discretion; independently solve problems and multi-task; work well under pressure; take initiative; and be flexible and cooperative.
Physical Demands:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit and operate a computer keyboard and monitor. The employee is frequently required to talk or hear, including the ability to communicate verbally both in person and on the telephone. The employee is required to walk, stand, bend, and reach with hands and arms. The employee must occasionally lift and/or move items weighing up to 10 pounds. Specific vision abilities required by this job include close vision, peripheral vision, depth perception, and ability to adjust focus.
What is in it for you
TechSolve offers competitive compensation and a comprehensive benefits package that includes medical, dental, and vision. TechSolve pays 100% of group life, short-term and long-term disability. We provide a generous time-off benefit, including company paid holidays.
Cybersecurity Analyst

Posted today
Job Viewed
Job Description
The Leidos Digital Modernization sector is seeking talented and cleared Cyber Security Analysts to join our dynamic team supporting the DISA GSM-O II program. We are continuously building our team and invite qualified candidates to apply. Our recruiting team will reach out to applicants as positions become available.
**About the Role:**
As a Cyber Security Analyst, you'll be on the front lines, defending Department of Defense networks from evolving cyber threats. You will be a key member of our 24x7 security operations team, responsible for:
+ Analyzing real-time cyber threat intelligence to stay ahead of emerging threats.
+ Correlating security events to identify and prioritize potential incidents.
+ Conducting in-depth network traffic analysis using raw packet data to uncover malicious activity.
+ Collaborating with incident response teams to contain and eradicate threats.
**Shift Opportunities:**
We offer flexible shift options to accommodate your needs. The primary available shifts are: 7:00 AM - 3:00 PM, 3:00 PM - 11:00 PM, & 11:00 PM - 7:00 AM. Shift assignments will be based on program requirements and your preference, but some flexibility may be required.
**Locations:**
Team members can be based out of one of the following locations depending on position availability: Hill AFB, UT, Scott AFB, IL, and Columbus, OH.
**Primary Responsibilities:**
+ Investigate alerts generated from endpoints, IDS/IPS, NetFlow data, and custom sensors to detect compromises on customer networks.
+ Analyze extensive log files, pivot between diverse datasets, and correlate evidence to support incident investigations, creating detailed technical reports outlining your findings.
+ Triage security alerts to rapidly identify malicious actors targeting customer networks.
+ Monitor and analyze DoD and open-source intelligence feeds to identify Indicators of Compromise (IOCs) and integrate them into security sensors and SIEMs.
+ Report security incidents to customers and USCYBERCOM, ensuring timely communication and coordinated response.
**Required Qualifications:**
+ Minimum active DoD Secret clearance with the ability to obtain TS/SCI.
+ Current DoD 8570 IAT Level II certification (or higher), such as CompTIA Security+ CE, ISC2 SSCP, or SANS GSEC (or equivalent).
+ Ability to obtain DoD 8570 CSSP-A Level Certification (e.g., CEH, CySA+, GCIA, or equivalent) within 180 days of hire.
+ Strong foundation in networking, including packet analysis, common ports and protocols, and traffic flow. Knowledge of the OSI model, defense-in-depth security principles, and common security elements for effective threat detection, analysis, and mitigation as a SOC Security Analyst.
+ Education and experience requirements:
+ Level I: Bachelor's degree and 1+ years of relevant experience; equivalent work experience and/or military service may be considered in lieu of a degree.
+ Level II: Bachelor's degree and 3+ years of relevant experience; equivalent work experience and/or military service may be considered in lieu of a degree.
+ Proven ability to work effectively both independently and as a collaborative team member, demonstrating initiative and a strong work ethic in both settings.
+ Committed to continuous learning and self-improvement in the cybersecurity domain, as evidenced by ongoing pursuit of certifications, active participation in industry forums, and dedication to staying ahead of emerging threats and technologies.
+ Excellent problem-solving skills, including the ability to collaborate effectively with cross-functional teams to address complex security challenges in real-world scenarios. This includes the ability to communicate technical information clearly and concisely, build consensus, and drive solutions to completion.
+ Reliable and flexible, with a demonstrated willingness to work assigned shifts to support operational requirements and team objectives.
+ Located within a commutable distance (within 2 hours) or able to self-relocate to Hill AFB, UT; Scott AFB, IL; or Columbus, OH.
**Preferred Qualifications:**
+ Hands-on experience analyzing large volumes of logs, network data (e.g., Netflow, Full Packet Capture), and other attack artifacts during incident investigations.
+ In-depth experience using a SIEM/SOAR platform to analyze multiple log types and events across various data points, applying techniques such as behavioral analysis, statistical analysis, and machine learning to detect and respond to advanced threats.
+ Comprehensive understanding of the network threat lifecycle, attack vectors, and methods of exploitation, including intrusion set tactics, techniques, and procedures (TTPs).
+ Experience with Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, and Network Forensics tools.
+ Experience or knowledge in monitoring, defending, or administering cloud networks (e.g., AWS, Azure, GCP), including cloud-native security tools and strategies for protecting data in cloud environments. Experience identifying and mitigating cloud-specific attacks.
+ Experience managing, defending, administering, or deploying mobile devices (iOS, Android) for enterprise, including mobile device management (MDM), mobile application management (MAM), and mobile threat defense (MTD). A strong understanding of mobile security best practices and mobile threat landscape is highly desired.
+ Scripting and programming skills.
Join our team and make a real difference in protecting our nation's critical infrastructure! Apply today!
At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now."
If you're already scheming step 20 while everyone else is still debating step 2. good. You'll fit right in.
**Original Posting:**
September 5, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
Pay Range $67,600.00 - $122,200.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R-
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
Senior Cybersecurity Analyst
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events to detect and respond to potential threats.
- Conduct vulnerability assessments and penetration tests to identify security weaknesses.
- Develop and implement security policies, standards, and procedures.
- Manage and maintain security infrastructure, including firewalls, IDS/IPS, and SIEM systems.
- Lead incident response efforts, including investigation, containment, eradication, and recovery.
- Perform threat hunting to proactively identify and neutralize advanced threats.
- Develop and deliver security awareness training programs for employees.
- Collaborate with IT teams to ensure security is integrated into all systems and applications.
- Stay up-to-date with the latest cybersecurity trends, threats, and technologies.
- Provide technical guidance and mentorship to junior security personnel.
FedRAMP Cybersecurity Analyst (Junior) US Remote
Posted 4 days ago
Job Viewed
Job Description
At Motorola Solutions, we believe that everything starts with our people. We're a global close-knit community, united by the relentless pursuit to help keep people safer everywhere. Our critical communications, video security and command center technologies support public safety agencies and enterprises alike, enabling the coordination that's critical for safer communities, safer schools, safer hospitals and safer businesses. Connect with a career that matters, and help us build a safer future.
Department OverviewAs one of the original FedRAMP-accredited 3PAOs, we remain one of the top companies who have helped Cloud Service Providers successfully navigate the FedRAMP process. With successful assessments of IaaS, PaaS, and SaaS clouds, our experience covers every type of cloud environment. We also specialize in helping organizations engineer secure clouds to meet FedRAMP's demanding requirements.Job DescriptionJoin our team as a Cybersecurity Analyst, where you'll play a critical role in assessing and analyzing cybersecurity documentation for client information systems. You'll apply your scripting skills to develop and improve automations that streamline our assessment processes. Your work will align with FISMA, NIST RMF for Federal Civilian Agencies, RMF for DoD IT, FedRAMP, and departmental standards, with a primary focus on FedRAMP.
Key Responsibilities:
Engage directly with clients through verbal communication to perform interviews for assessments, understand their needs, and provide effective solutions.
Conduct comprehensive assessments by analyzing cybersecurity documentation and performing evidence collection, interviews, and tests to evaluate compliance with relevant standards such as FISMA, NIST RMF, and FedRAMP.
Creating scripts and utilizing scripting skills to automate repetitive tasks and improve the efficiency of security assessments, reporting, and evidence collection.
Conduct system and network vulnerability scanning and analysis using tools such as Nessus/ACAS, SCC, and DISA STIGs/STIG Viewer.
Prepare clear and accurate reports and documentation, with an emphasis on creating scripts to automate analysis and report generation.
Work independently or as part of a client delivery team in a fast-paced, deadline-driven, remote environment.
Travel up to 25% for client engagements as required.
Required Skills and Qualifications:
Strong verbal communication skills with the ability to articulate ideas clearly and confidently in face-to-face and phone interactions with clients.
Basic knowledge of Cloud Computing, FedRAMP, FISMA, NIST/DoD RMF, and NIST SP 800-series publications.
Demonstrable scripting skills in at least one language (e.g., Python, PowerShell, Bash) for task automation.
Beginner knowledge of testing tools such as Nessus/ACAS, SCC, DISA STIGs/STIG Viewer.
Strong organizational, planning, and attention to detail skills.
Self-motivated with a strong technical aptitude.
Must obtain a FedRAMP required (A2LA R311) industry certification within 3 months.
The junior assessor must have at least one industry certification from the following list:
- Cisco Certified Network Associate Security (CCNA Security)
- Cisco Certified Network Associate Cyber Security Operations (CCNA Cyber Ops)
- Cybersecurity Analyst (CySA+)
- GIAC Certified Incident Handler (GCIH)
- GIAC Systems and Network Auditor (GSNA)
- GIAC Certified Intrusion Analyst (GCIA)
- Certified Information Systems Auditor (CISA)
- Certified Information System Security Professional or Associate (CISSP or Associate)
- Certified Secure Software Lifecycle Professional (CSSLP)
- Certified Information Systems Security Officer (CISSO)
- CyberSec First Responder (CFR)
- CompTIA Advanced Security Practitioner Continuing Education (CASP+) Continuing Education (CE)
- CompTIA Cloud+ (Cloud+)
- Global Industrial Cyber Security Professional (GICSP)
- Securing Cisco Networks with Threat Detection Analysis (SCYBER)
Preferred Qualifications:
1+ years of experience in performing or participating in FISMA-based security Assessment and Authorization (A&A) activities.
Experience in creating and maintaining scripts for cybersecurity tools and processes, such as vulnerability scanning or compliance checks.
Proficiency in performing technical assessments using standard industry tools such as Nessus, DB Protect, Acunetix, and ACAS (for DoD).
Ability to identify and mitigate cyber security risks through formal assessment activities.
Experience and technical knowledge in security engineering, secure architecture development, system and network security, authentication and security protocols, applied cryptography, and application security.
This position is subject to working in high security areas governed by the US Department of Justice's "Criminal Justice Information Services (CJIS) Security Policy" and therefore requires successfully passing a more stringent fingerprint background check administered by Motorola Solutions Inc. customers
Target Base Salary Range:$95,000 - $105,000
Consistent with Motorola Solutions values and applicable law, we provide the following information to promote pay transparency and equity. Pay within this range varies and depends on job-related knowledge, skills, and experience. The actual offer will be based on the individual candidate.
#LI-DB1
Basic Requirements-
Bachelor's Degree or higher.
Must be able to obtain background clearance as required by government customer
Must be a U.S. citizen with the ability to obtain necessary security clearance as required by government contract.
Legal authorization to work in the U.S. indefinitely is required. Employer work permit sponsorship is not available for this position.
Our U.S.Benefitsinclude:
- Incentive Bonus Plans
- Medical, Dental, Visionbenefits
- 401K
- 10 Paid Holidays
- GenerousPaidTime Off Packages
- Employee Stock Purchase Plan
- PaidParental & Family Leave
- and more!
EEO Statement
Motorola Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion or belief, sex, sexual orientation, gender identity, national origin, disability, veteran status or any other legally-protected characteristic.
We are proud of our people-first and community-focused culture, empowering every Motorolan to be their most authentic self and to do their best work to deliver on the promise of a safer world. If you'd like to join our team but feel that you don't quite meet all of the preferred skills, we'd still love to hear why you think you'd be a great addition to our team.
We're committed to providing an inclusive and accessible recruiting experience for candidates with disabilities, or other physical or mental health conditions. To request an accommodation, please complete thisReasonable Accommodations Formso we can assist you.
Cybersecurity Forensics Analyst - Expert

Posted today
Job Viewed
Job Description
Job Description
The Cybersecurity Operations Analyst, Expert will use Huntington's forensics tools to complete investigations and respond to Information Security incidents as appropriate. He/she will serve within the DFIR (Digital Forensics & Incident Response) team to perform forensic investigations and Computer Incident Response Team (CIRT) functions, working with other forensics analysts to ensure all incidents and investigations are promptly addressed. The role works closely with members of the Cybersecurity Operations Center (CSOC), Insider Threat team, Corporate Security, Human Resources, and Legal to conduct forensics analysis, process digital evidence in support of litigation, and respond to cybersecurity incidents.
ESSENTIAL RESPONSIBILITIES:
+ Serves as a leader for Forensics Investigations, managing the CIRT and forensic workload. Serves as a liaison for Legal, Corporate Security, Human Resources, and/or other areas requiring forensics support. Advises lawyers and investigators on the relevance of data to a case or investigation.
+ May testify in court, if required.
+ Investigates reports of suspicious activity, analyzing evidence to determine the "who, what, when, and how" aspects of the incident.
+ Maintains the chain of custody for evidence used in crimes and/or incidents, including computers, mobile devices, and/or digital storage media.
+ Tracks and reports on metrics pertinent to the forensics workload.
+ Reviews technical and procedural documentation for systems and solutions to ensure completeness and accuracy.
+ Maintains and updates Runbooks and other support documents as appropriate
+ Provides input to architecture and technology teams on tools, processes, and requirements for forensics investigations
+ Maintains current knowledge of hardware, software and network technology and recommends modifications as required
+ Comply with the organization's cybersecurity policies, procedures among colleagues, contractors, alliances, etc.
+ Assist with automation efforts to streamline incident response procedures and capabilities.
+ Works with vendors to understand product roadmaps and plan for upgrades
+ Provide after hours on-call forensic support on a recurring basis
BASIC QUALIFICATIONS:
+ 5 years in a Forensics and Incident Response roles
+ 2 Years Experience documenting and maintaining procedures/runbooks
+ Bachelor's degree in Information Systems, Computer Science or related field preferred
PREFERRED QUALIFICATIONS:
+ Experience working with Enterprise Forensics tools
+ Experience with OpenText Enterprise EnCase solution, Exterro Forensics Took Kit, or similar solutions in an enterprise-wide deployment a plus
+ Experience with mobile forensics tools such as Cellebrite, Oxygen, or XRY.
+ Experience with Python, PowerShell, or Kusto Query Language
+ Strong organizational skills
+ Excellent communication and customer service skills
+ SIEM/SOAR, EDR/XDR experience a plus
+ Ability to develop strong partnerships
+ Ability to work flexible hours
+ Strong troubleshooting and problem-solving skills
+ Forensics and Cybersecurity Certifications (GCFA, GCFE, GASF, GCFR, CFCE) or equivalent
#Hybrid
#LI-SG1
#LI-BM1
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Cybersecurity Forensics Analyst - Expert

Posted today
Job Viewed
Job Description
Job Description
The Cybersecurity Operations Analyst, Expert will use Huntington's forensics tools to complete investigations and respond to Information Security incidents as appropriate. He/she will serve within the DFIR (Digital Forensics & Incident Response) team to perform forensic investigations and Computer Incident Response Team (CIRT) functions, working with other forensics analysts to ensure all incidents and investigations are promptly addressed. The role works closely with members of the Cybersecurity Operations Center (CSOC), Insider Threat team, Corporate Security, Human Resources, and Legal to conduct forensics analysis, process digital evidence in support of litigation, and respond to cybersecurity incidents.
ESSENTIAL RESPONSIBILITIES:
+ Serves as a leader for Forensics Investigations, managing the CIRT and forensic workload. Serves as a liaison for Legal, Corporate Security, Human Resources, and/or other areas requiring forensics support. Advises lawyers and investigators on the relevance of data to a case or investigation.
+ May testify in court, if required.
+ Investigates reports of suspicious activity, analyzing evidence to determine the "who, what, when, and how" aspects of the incident.
+ Maintains the chain of custody for evidence used in crimes and/or incidents, including computers, mobile devices, and/or digital storage media.
+ Tracks and reports on metrics pertinent to the forensics workload.
+ Reviews technical and procedural documentation for systems and solutions to ensure completeness and accuracy.
+ Maintains and updates Runbooks and other support documents as appropriate
+ Provides input to architecture and technology teams on tools, processes, and requirements for forensics investigations
+ Maintains current knowledge of hardware, software and network technology and recommends modifications as required
+ Comply with the organization's cybersecurity policies, procedures among colleagues, contractors, alliances, etc.
+ Assist with automation efforts to streamline incident response procedures and capabilities.
+ Works with vendors to understand product roadmaps and plan for upgrades
+ Provide after hours on-call forensic support on a recurring basis
BASIC QUALIFICATIONS:
+ 5 years in a Forensics and Incident Response roles
+ 2 Years Experience documenting and maintaining procedures/runbooks
+ Bachelor's degree in Information Systems, Computer Science or related field preferred
PREFERRED QUALIFICATIONS:
+ Experience working with Enterprise Forensics tools
+ Experience with OpenText Enterprise EnCase solution, Exterro Forensics Took Kit, or similar solutions in an enterprise-wide deployment a plus
+ Experience with mobile forensics tools such as Cellebrite, Oxygen, or XRY.
+ Experience with Python, PowerShell, or Kusto Query Language
+ Strong organizational skills
+ Excellent communication and customer service skills
+ SIEM/SOAR, EDR/XDR experience a plus
+ Ability to develop strong partnerships
+ Ability to work flexible hours
+ Strong troubleshooting and problem-solving skills
+ Forensics and Cybersecurity Certifications (GCFA, GCFE, GASF, GCFR, CFCE) or equivalent
#Hybrid
#LI-SG1
#LI-BM1
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Cybersecurity Forensics Analyst - Expert

Posted today
Job Viewed
Job Description
Job Description
The Cybersecurity Operations Analyst, Expert will use Huntington's forensics tools to complete investigations and respond to Information Security incidents as appropriate. He/she will serve within the DFIR (Digital Forensics & Incident Response) team to perform forensic investigations and Computer Incident Response Team (CIRT) functions, working with other forensics analysts to ensure all incidents and investigations are promptly addressed. The role works closely with members of the Cybersecurity Operations Center (CSOC), Insider Threat team, Corporate Security, Human Resources, and Legal to conduct forensics analysis, process digital evidence in support of litigation, and respond to cybersecurity incidents.
ESSENTIAL RESPONSIBILITIES:
+ Serves as a leader for Forensics Investigations, managing the CIRT and forensic workload. Serves as a liaison for Legal, Corporate Security, Human Resources, and/or other areas requiring forensics support. Advises lawyers and investigators on the relevance of data to a case or investigation.
+ May testify in court, if required.
+ Investigates reports of suspicious activity, analyzing evidence to determine the "who, what, when, and how" aspects of the incident.
+ Maintains the chain of custody for evidence used in crimes and/or incidents, including computers, mobile devices, and/or digital storage media.
+ Tracks and reports on metrics pertinent to the forensics workload.
+ Reviews technical and procedural documentation for systems and solutions to ensure completeness and accuracy.
+ Maintains and updates Runbooks and other support documents as appropriate
+ Provides input to architecture and technology teams on tools, processes, and requirements for forensics investigations
+ Maintains current knowledge of hardware, software and network technology and recommends modifications as required
+ Comply with the organization's cybersecurity policies, procedures among colleagues, contractors, alliances, etc.
+ Assist with automation efforts to streamline incident response procedures and capabilities.
+ Works with vendors to understand product roadmaps and plan for upgrades
+ Provide after hours on-call forensic support on a recurring basis
BASIC QUALIFICATIONS:
+ 5 years in a Forensics and Incident Response roles
+ 2 Years Experience documenting and maintaining procedures/runbooks
+ Bachelor's degree in Information Systems, Computer Science or related field preferred
PREFERRED QUALIFICATIONS:
+ Experience working with Enterprise Forensics tools
+ Experience with OpenText Enterprise EnCase solution, Exterro Forensics Took Kit, or similar solutions in an enterprise-wide deployment a plus
+ Experience with mobile forensics tools such as Cellebrite, Oxygen, or XRY.
+ Experience with Python, PowerShell, or Kusto Query Language
+ Strong organizational skills
+ Excellent communication and customer service skills
+ SIEM/SOAR, EDR/XDR experience a plus
+ Ability to develop strong partnerships
+ Ability to work flexible hours
+ Strong troubleshooting and problem-solving skills
+ Forensics and Cybersecurity Certifications (GCFA, GCFE, GASF, GCFR, CFCE) or equivalent
#Hybrid
#LI-SG1
#LI-BM1
Exempt Status: (Yes = not eligible for overtime pay) (No = eligible for overtime pay)
Yes
Workplace Type:
Office
Our Approach to Office Workplace Type
Certain positions outside our branch network may be eligible for a flexible work arrangement. We're combining the best of both worlds: in-office and work from home. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. Remote roles will also have the opportunity to come together in our offices for moments that matter. Specific work arrangements will be provided by the hiring team.
Huntington is an Equal Opportunity Employer.
Tobacco-Free Hiring Practice: Visit Huntington's Career Web Site for more details.
Note to Agency Recruiters: Huntington Bank will not pay a fee for any placement resulting from the receipt of an unsolicited resume. All unsolicited resumes sent to any Huntington Bank colleagues, directly or indirectly, will be considered Huntington Bank property. Recruiting agencies must have a valid, written and fully executed Master Service Agreement and Statement of Work for consideration.
Be The First To Know
About the latest Cybersecurity analyst Jobs in Ohio !
Cybersecurity Certification and Accreditation Analyst
Posted 7 days ago
Job Viewed
Job Description
Cybersecurity Certification and Accreditation Analyst
Job Locations
US-OH-Dayton
ID
Category
Defense
Type
Full Time
Overview
Amyx is seeking to hire a Cybersecurity Certification and Accreditation (C&A) Analyst for a remote position supporting Defense Operation Technology environments with regards to Authorization of information systems and all associated cybersecurity policies and procedures. The C&A Analyst should possess an understanding of how the security controls identified in the NIST 800-53 apply to the process of assessing and authorizing a large organization's IT infrastructure such as DLA's, in which there is a compilation of large and small enclaves, AIS applications and outsourced IT processes. The C&A Analyst will assist in the determination of the applicable severity value for an identified vulnerability (e.g., non-compliant security control), determine the possible ramifications on the system's current or future authorization, and be required to brief senior management on the progress or results of an information system undergoing the authorization process
Work may include occasional travel to industrial environments and customer sites. Will be required to work with a remote team on all cybersecurity and planning activities.
- Identify, assess, and mitigate risks associated with OT systems.
- Work closely with cybersecurity analysts, engineers, and IT/OT professionals to gather information and ensure documentation reflects current practices and configurations.
- Work closely with cybersecurity analysts, engineers, and other stakeholders to ensure effective implementation of security controls.
- Implement and maintain continuous monitoring programs for OT environments.
- Conduct security control assessments to evaluate the effectiveness of security controls in place for OT systems.
- Prepare and review accreditation packages, including system security plans (SSPs), risk assessments, and security control assessments
- Must have the ability to communicate accurate information
Qualifications
Required:
* Secret Clearance
* Must be eligible for IT-II
* Five (5) years of relevant C&A experience; Risk Management Framework (RMF) and NIST C&A experience; DOD cybersecurity experience
* Experience in assessing security controls and conducting authorization reviews for large, complex organizations.
* Relevant certification meeting DOD IAM level III, or IAT level II
* Bachelor's degree in Computer Science, Information Technology, Cybersecurity, Engineering, or a related field.
Desired:
* DLA/DOD Experience
* Experience or training in Operational Technology (OT) systems
* Certified Information Systems Security Professional (CISSP); Certified Information Security Manager (CISM); Certified in Risk and Information Systems Control (CRISC); or Global Industrial Cyber Security Professional (GICSP)
* Master's degree.
Benefits include:
- Medical, Dental, and Vision Plans (PPO & HSA options available)
- Flexible Spending Accounts (Health Care & Dependent Care FSA)
- Health Savings Account (HSA)
- 401(k) with matching contributions
- Roth
- Qualified Transportation Expense with matching contributions
- Short Term Disability
- Long Term Disability
- Life and Accidental Death & Dismemberment
- Basic & Voluntary Life Insurance
- Wellness Program
- PTO
- 11 Holidays
- Professional Development Reimbursement
Please contact with any questions!
Amyx is proud to be an Equal Opportunity Employer. All qualified candidates will be considered without regard to race, color, religion, national origin, age, disability, sexual orientation, gender identity, status as a protected veteran, or any other characteristic protected by law. Amyx is a VEVRAA federal contractor and we request priority referral of veterans.
Physical Demands
Employee needs to be able to sit at a workstation for extended periods; use hand(s) to handle or feel objects, tools, or controls; reach with hands and arms; talk and hear. Most positions require ability to work on desktop or laptop computer for extended periods of time reading, reviewing/analyzing information, and providing recommendations, summaries and/or reports in written format. Must be able to effectively communicate with others verbally and in writing. Employee may be required to occasionally lift and/or move moderate amounts of weight, typically less than 20 pounds. Regular and predictable attendance is essential.
Senior Information Security Analyst
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various security tools (SIEM, IDS/IPS, firewalls, endpoint protection).
- Conduct in-depth analysis of security incidents, including investigation, containment, eradication, and recovery.
- Perform vulnerability assessments and penetration testing to identify system weaknesses.
- Develop and implement security policies, procedures, and guidelines.
- Manage and maintain security infrastructure, including firewalls, VPNs, and access control systems.
- Stay current with emerging threats, vulnerabilities, and security technologies.
- Develop and deliver security awareness training to employees.
- Collaborate with IT teams to ensure security is integrated into system design and implementation.
- Contribute to the development and testing of the organization's incident response plan.
- Perform security audits and ensure compliance with relevant regulations and standards (e.g., ISO 27001, NIST).
- Recommend and implement security enhancements to protect the organization's assets.
- Mentor junior security analysts and provide technical guidance.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 5-7 years of experience in information security, with a focus on security operations, incident response, and vulnerability management.
- Strong understanding of network security principles, cryptography, and common attack vectors.
- Experience with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, firewalls, and endpoint security solutions.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Relevant security certifications such as CISSP, CEH, or SANS certifications are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and interpersonal skills, with the ability to explain technical concepts to non-technical audiences.
- Experience with cloud security (AWS, Azure, GCP) is a plus.
- Ability to work independently and as part of a team in a high-pressure environment.
Senior Information Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts and events to detect and respond to threats.
- Conduct regular vulnerability assessments and penetration tests.
- Develop and implement security policies, standards, and procedures.
- Lead incident response efforts, including investigation, containment, and recovery.
- Manage and maintain security technologies such as firewalls, IDS/IPS, and SIEM.
- Perform risk assessments and develop mitigation strategies.
- Ensure compliance with relevant data protection regulations (e.g., GDPR, CCPA).
- Collaborate with IT teams to implement security best practices.
- Develop and deliver security awareness training to employees.
- Stay current with emerging security threats and technologies.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable.
- 7+ years of experience in information security analysis and operations.
- Strong knowledge of cybersecurity principles, frameworks, and technologies.
- Experience with incident response, threat hunting, and vulnerability management.
- Proficiency in security tools and technologies (SIEM, IDS/IPS, EDR).
- Excellent analytical, problem-solving, and communication skills.
- Ability to work independently and manage multiple priorities in a remote environment.