Cybersecurity & Cloud Architect

37544 Memphis, Tennessee Omni Inclusive

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Expertise Required : Strong background in designing comprehensive security architectures, with strong experience in Cloud Cybersecurity threats and mitigation strategies.
JD :
  • Security Architecture Design:
  • Design, develop, and maintain comprehensive security architectures to protect organizational assets, including networks, systems, applications, and data.
  • Define security requirements, standards, and guidelines to ensure consistent implementation of security controls across the organization.
Cloud Cybersecurity Expertise:
  • Serve as a subject matter expert (SME) in cloud cybersecurity, with a focus on identifying, assessing, and mitigating security risks in cloud environments.
  • Design and implement security controls, policies, and procedures to protect cloud-based infrastructure and services from cyber threats.
Threat Detection and Response:
  • Develop and implement threat detection and response mechanisms to identify and respond to security incidents in real-time.
  • Conduct security incident investigations, root cause analysis, and remediation activities to minimize the impact of security breaches.
Compliance and Governance:
  • Ensure compliance with industry regulations, standards, and best practices, such as GDPR, HIPAA, ISO 27001, and NIST Cybersecurity Framework.
  • Establish and maintain security governance frameworks, risk management processes, and compliance reporting mechanisms.
Security Awareness and Training:
  • Develop and deliver security awareness training programs to educate employees on security best practices, policies, and procedures.
  • Promote a culture of security awareness and accountability across the organization through regular communication and training initiatives.
Security Tool Evaluation and Implementation:
  • Evaluate, select, and implement security tools, technologies, and solutions to enhance the organization's security posture.
  • Conduct vendor assessments, proof-of-concept (POC) evaluations, and product deployments in alignment with business requirements.
Incident Response Planning:
  • Develop and maintain incident response plans, playbooks, and procedures to facilitate effective response and recovery from security incidents.
  • Conduct tabletop exercises and simulations to test incident response capabilities and identify areas for improvement.
Additional Inputs :
  • Experience in security architecture design, implementation, and management.
  • Deep understanding of cloud cybersecurity threats, vulnerabilities, and mitigation strategies, with hands-on experience in cloud security technologies and services.
  • Strong knowledge of security frameworks, standards, and regulations, such as GDPR, HIPAA, ISO 27001, and NIST Cybersecurity Framework.
  • Proven experience in threat detection, incident response, and security incident management.
  • Excellent communication, leadership, and collaboration skills, with the ability to work effectively in cross-functional teams.
  • Industry certifications such as Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), or Certified Information Security Manager (CISM) preferred.
View Now

Account Manager - Cybersecurity Sales- Mississippi

38111 Memphis, Tennessee Optiv

Posted today

Job Viewed

Tap Again To Close

Job Description

**_This position will require the employee to reside in the state of Mississippi._**
As an Account Manager, aka. Client Manager (CM) you'll be responsible for selling Optiv security services and security technology solutions to a select few strategic accounts (typically less than 20) within the territory of the state of Mississippi. You'll also be responsible for owning and coordinating all aspects of the sales cycle within your assigned accounts, and leading a cross-functional team to build and execute a multi-year strategic account management plan for your top accounts. Members of this cross-functional team will typically include a Solutions Architect, Client Operations Specialist and services practices personnel as appropriate for your accounts.
Development of a multi-year strategic account management plan for your top accounts is a core responsibility for the CM. You'll identify and understand your client's core security concerns and how they correlate to Optiv solutions that mitigate these cybersecurity risks. Based upon this understanding of the client, you'll bring together appropriate Optiv technical, services and leadership personnel to collaborate with your top account client leadership to refine and/or build a security strategy, and subsequently develop and propose solutions to address client security needs. In many cases this will take the form of security technology and services solutions, and as appropriate for the client, large and complex solutions comprised of security management consulting, hardware and software security technologies, advisory, implementation and support services, and managed security services. An overarching goal is to establish a trusted relationship with the client that results in Optiv being their primary security solution partner and provider.
You'll also engage clients with a heightened focus on ever-enhancing client satisfaction **.** This will include meeting with your top clients early in the year to understand and document their business, technology and security goals, as well as client expectations of Optiv in support of attaining those goals. You'll review these goals, expectations and progress with your top clients quarterly, engaging Optiv leadership and resources as necessary to ensure you and Optiv are on track to achieve or exceed these client-defined goals.
PRIMARY RESPONSIBILITIES
+ Build trusted, effective and productive relationships with client executives within assigned accounts.
+ Lead creation of multi-year strategic account management plans, for top accounts, based upon identified client business, technology and security goals, coupled with Optiv's understanding of security trends, threats and points of view for each assigned account.
+ Build a large sales pipeline, ideally 4 times assigned targets, within assigned accounts and achieve/exceed assigned gross margin target.
+ Manage current and multi-quarter forecasts with a high-degree of accuracy, currency and integrity.
+ Execute with discipline and in alignment with Force Management principles including MEDDICC and Command of the Message, among others.
+ Effectively communicate Optiv's value proposition as it relates to security services and technologies expertise and capabilities.
+ Build strong, collaborative and productive relationships with technology partners and their respective sales personnel to both gain and share leads in support of building qualified pipeline and maximizing mutually beneficial sales opportunities.
+ Initiate and / or monitor and mediate all necessary communications between clients, technology partners and members of the extended Optiv team (technical, sales, client operations, etc.) within each assigned account.
+ Maintain collaborative and effective internal communications with Optiv team members relative to specific opportunities, associated requirements and client satisfaction.
REQUIRED QUALIFICATIONS
+ Experience in product or services based sales typically gained over 2-3 years, ideally in a technology company.
+ Proven ability to build and execute territory and account prospecting and expansion plans with a track record of exceeding assigned quotas.
+ Experience engaging cross-functional resources such as sales, pre-sales technical support, and other support personnel in an effective fashion.
+ Demonstrated ability to build productive business relationships with key executives and sponsors within assigned accounts.
+ Effective presentation, verbal and written communication skills.
+ Negotiation experience
+ History of demonstrated achievement exceeding plan and expectations.
DESIRED QUALIFICATIONS
+ Strong business acumen and ability to correlate business goals with business and cyber security risk in support of developing complex security technology and services solutions.
+ Experience in building and selling complex and multi-year hardware, software, services and financing solutions to Fortune 1000 clients.
+ Experience in and knowledge of the IT Infrastructure market and competitors.
+ Experience in and knowledge of the IT security market and competitors.
+ Experience in and knowledge of the Risk & Compliance market and competitors.
+ Experience selling management consulting services.
**What you can expect from Optiv**
+ A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups ( .
+ Work/life balance
+ Professional training resources
+ Creative problem-solving and the ability to tackle unique, complex projects
+ Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities.
+ The ability and technology necessary to productively work remotely/from home (where applicable)
**EEO Statement**
Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law.
Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv's selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice ( . If you sign up to receive notifications of job postings, you may unsubscribe at any time.
View Now

Senior IT Security Analyst

38018 Cordova, Tennessee Yusen Logistics

Posted today

Job Viewed

Tap Again To Close

Job Description

Overview

The Sr. IT Security Analyst is responsible for assessing information risk and facilitates remediation of identified vulnerabilities for IT security and IT risk across the enterprise. Assesses information risk and facilitates remediation of identified vulnerabilities with the Bank network, systems and applications. Reports on findings and recommendations for corrective action. Performs vulnerability assessments as assigned utilizing IT security tools and methodologies. Performs assessments of the IT security/risk posture within the IT network, systems and software applications, in addition to assessments within the Vendor Management Program. Identifies opportunities to reduce risk and documents remediation options regarding acceptance or mitigation of risk scenarios. Facilitates and monitors performance of risk remediation tasks, changes related to risk mitigation & reports on findings. Maintains oversight of IT and vendors regarding the security maintenance of their systems and applications. The IT Security/Risk Analyst assists in all IT audits, IT risk assessments and regulatory compliance.

Responsibilities
  • Management of IT security and IT risk (e.g., data systems, network and/or web) across the enterprise.
  • Address questions from internal and external audits and examinations.
  • Develop policies, procedures and standards that meet existing and newly developed policy and regulatory requirements.
  • Facilitate IT security/risk training curriculum.
  • Serve as project manager/lead within IT security projects.
  • Promote awareness of applicable regulatory standards, upstream risks and industry best practices across the organization.

This position requires regular, predictable and timely attendance at work to meet department workload demands.

Qualifications
  • Bachelor’s Degree, Information Systems, Computer Science, Information Security or related field required.
  • 7-10 years IT security or information security experience with a proven ability to engage with Senior Management and implement information security solutions.
  • 4+ years experience in administering IT security controls in an organization.
  • Thorough understanding of Information Security principles, frameworks, as well as industry standards & practices such as CIS and SOGP. Understanding confidentiality, integrity, and availability tried.  Experience with SOX, JSOX, ISO 27001, CTPAT, TISAX, or NIST a plus
  • Knowledge of technical infrastructure, networks, databases and systems in relation to IT Security and IT Risk.
  • Experience with security tools such as SIEM, firewall, EDR, EPP, NDR, vulnerability management, Secure email gateway, and DNS filtering. Experience with Cisco security suites, Splunk, Palo Alto, Fortigate, and Rapid 7 a plus.
  • Ability to secure and respond to threats in a multi-cloud environment including configuring and maintaining cloud security posture management.
  • Strong understating of with Microsoft operating systems, Linux operating systems, Microsoft Azure, Google Computing Platform, and mobile devices. Experience with application security a plus.
  • Experience with Data classification and data loss prevention.
  • Certified Information Systems Security Professional (CISSP), or related certification.
  • Project management skills preferred.
  • Windows workstation and server administration experience preferred.
  • Prior experience performing security reviews and risk assessments preferred.

The above statements are intended to describe the general nature of work being performed. They are not to be construed as an exhaustive list of all responsibilities, duties and skills required.

Benefits

Yusen offers a generous Employee Benefits Package including:

  • Medical, Dental, and Vision beginning the 1st of the month following start date
  • 401k with a company match
  • Flexible Spending Accounts, Life and Accidental Death & Dismemberment Insurance, Short & Long Term Disability, Tuition Assistance Program, Commuter Benefits, vacation, and much more.

Any and all benefits offered are subject to the eligibility requirements, terms, and provisions set forth in the respective policies and plan documents, which you may request from Human Resources.

About Yusen Logistics (Americas )

Yusen Logistics is working to become the world’s preferred supply chain logistics company. Our complete offer is designed to forge better connections between businesses, customers and communities – through innovative supply chain management, freight forwarding, warehousing and distribution services. As a company we’re dedicated to a culture of continuous improvement, ensuring everyone who works with us is committed, connected and creative in making us the world’s preferred choice.

Yusen Logistics (Americas) Inc. values each individual employee and is committed to a diverse and inclusive workforce by providing equal employment opportunities for all applicants without regard to race, religion, color, sex, national origin, citizenship status, uniform service member status, age, disability, sexual and gender orientation, genetic information, or any other protected status in accordance with all applicable federal, state and local laws.

Los Angeles County Only : Yusen Logistics (Americas) Inc. will consider qualified applicants with a criminal history pursuant to the California Fair Chance Act. You do not need to disclose your criminal history or participate in a background check until a conditional job offer is made to you. After making a conditional offer and running a background check, if Yusen Logistics (Americas) Inc. is concerned about conviction that is directly related to the job, you will be given the chance to explain the circumstances surrounding the conviction, provide mitigating evidence, or challenge the accuracy of the background report. Find out more about the Fair Chance Act by visiting the Civil Right’s DepartmentFair Chance Act webpage.

View Now

GRC - Senior Security Risk Analyst

38111 Memphis, Tennessee Raymond James Financial, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

**_This position follows our hybrid workstyle policy: Expected to be in a Raymond James office location a minimum of 10-12 days a month._**
**_Please note: This role is not eligible for Work Visa sponsorship, either currently or in the future._**
**Responsibilities:**
+ Coordinate issue management within IBM OpenPages or similar issue management GRC Tools
+ Work with IT control owners to drive control remediation based on issues identified within audits or control assurance testing function
+ Aid in the implementation of control assurance functions by supporting development of control effectiveness tests
+ Support development for ServiceNow GRC, Policy and Compliance, or Integrated Risk Management (IRM) modules.
+ Understand business requirements related to risk and controls or GRC and work with software engineers to ensure business requirements are met
+ Analyze enterprise data (SIEM, endpoint security logs, etc.) to determine where data for control assurance activities can be gathered to meet development requirements
+ Plan and execute unit, integration, regression, and user acceptance testing (UAT).
+ Analyze, troubleshoot, resolve, and report issues
+ Participate in the requirements gathering phase to provide time estimation to client needs
+ Analyze technical development requirements
+ Create and update the configuration documentation
+ Seeks understanding of risks and procedures sufficient to understand the reasons for tasks being performed
+ Analyzes controls for adequacy of design and performs and/or supports control assurance testing activities
+ Performs other duties and responsibilities as assigned
**Qualifications:**
+ 5+ years' experience understanding and communicating business and technical requirements
+ Strong understanding of IT Security principles and controls
+ Experience supporting ServiceNow development efforts and user stories as part of agile development methodology is a plus
+ Experience with data analysis and data mapping
+ Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions.
+ Strong project management skills and ability to prioritize among high visibility projects
+ Use effective approaches for choosing a course of action or developing appropriate solutions; recommend or take action that is consistent with available facts, constraints and probable consequences.
+ Develop and use collaborative relationships to facilitate the accomplishment of work goals.
+ Make internal and external clients and their needs a primary focus of actions; develop and sustain productive client relationships.
+ Experience within a highly regulated environment like Financial Services preferred but not required
+ Certified Information Systems Security Professional (CISSP), Security+, GCCC or Certified Information Systems Auditor (CISA) or other cyber security certifications are differentiators; preferred but not required
View Now

Network Security Architect

38083 Millington, Tennessee Ritter Communications

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

Description

Ritter Communications is the largest privately held telecommunications provider serving exclusively the Mid-South, offering world-class broadband fiber, telecom, video, cloud and data center services. The company has grown rapidly over the years, investing millions recently in technology infrastructure and is now serving 155 communities and more than 57,000 customers in Arkansas, Texas, Missouri and Tennessee. Headquartered in Jonesboro, Arkansas, Ritter Communications invests heavily in the communities it serves by deploying proven, best-in-class infrastructure and technology, while coupling it with a world-class customer-focused experience.

General Summary:

The Network Security Architect is responsible for the development and standardization of comprehensive security strategies to protect the organization's network infrastructure, develop/test proper identification, and response procedures for Ritter Operations team. This role requires a deep understanding of network protocols, security technologies, and industry best practices.

Essential Job Functions:

  • Designs and implements secure network architectures, including firewalls, VPNs, Service Provider DDOS, intrusion detection systems (IDS), log management, general service provider access/infrastructure security suites, and other security devices;
  • Conducts risk assessments and security audits to identify vulnerabilities and recommend remediation strategies;
  • Develops security policies, standards, and procedures to ensure compliance with regulatory requirements;
  • Collaborates with Architecture, Engineering, and operational teams to integrate security into system design and development processes;
  • Establishes standards for monitoring network traffic for suspicious activity and respond to security incidents promptly;
  • Conduct red/blue team exercises;
  • Stays current with emerging threats, vulnerabilities, and technology trends in the cybersecurity landscape;
  • Conducts regular security assessments and vulnerability scans to identify potential risks and threats;
  • Provides technical guidance and operational and engineering groups regarding network security practices;
  • Documents network security configurations, processes, and incident response procedures;
  • Provides support and final escalation for operational and engineering groups;
  • Establishes lifecycles and budgets for all security equipment and products;
  • Monitors baseline of firmware for security risks across all supported hardware;
  • Leads change control by reviewing changes for technical accuracy and risk analysis;
  • Partners with external vendors on solution architecture and procurement;
  • Provides leadership to identify, manage, and resolve risks in a team environment;
  • Works independently with little supervision on day-to-day tasks, receiving general instructions on new assignments;
  • Travels to project areas, business related events, and other Ritter Communications locations as required;
  • Performs other duties as required.

Knowledge, Skills, and Abilities:

  • Expert knowledge of firewalls, preferably Cisco (Meraki, ASA) and Palo Alto;
  • Expert knowledge of DDOS platforms and how they apply to Service Providers, preferably Deepfield;
  • Demonstrated knowledge of the SOC2, NIST, or ISO 27001 Cyber Security Framework and associated best practices;
  • Expert knowledge of packet traces, Sflow/Cflow;
  • Demonstrated knowledge of security best practices in multi-tenant environments;
  • Demonstrated knowledge of risk management for infrastructure as well as CPE equipment;
  • Excellent verbal and written communication skills to both technical and non-technical stakeholders;
  • Adept at strategic thinking, time management, and problem-solving;
  • Ability to travel for business requirements; must possess a valid Driver's License with a satisfactory driving record.

Education and Experience:

BA or BS in information security, engineering, or related area or a minimum of 5 years in the service provider industry, with at least two of the preferred related certifications.

Preferred Certifications or equivalent:

  • Certified Information Systems Security Professional (CISSP)
  • GIAC Security Essentials Certification (GSEC)
  • Systems Security Certified Practitioner (SSCP)
  • Certified Information Security Manager (CISM)

Experience in creating and maintaining project plans highly preferred. Experience in cyber security and related infrastructure technologies, cloud-based infrastructure, and software defined networks required.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights notice from the Department of Labor.
View Now

Data Solutions Analyst - Security Master, Pricing & Reporting (Remote Option)

37544 Memphis, Tennessee Raymond James Financial Services

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

We are seeking an experienced Data Solutions Analyst to join our team, specializing in Security Master Reference, Pricing, and End to End Trading Data Management. This role demands a unique blend of technical expertise in financial securities data, operational problem-solving acumen, and strategic insight to ensure the accuracy and reliability of critical data enterprise wide.

This role will serve as the first line of defense, Tier 1 support, for all things security-master reference, pricing, and reporting trading data within Capital Markets. The ideal candidate will possess deep domain knowledge in security reference data governance, pricing validation, and trade lifecycle operations.

You will play a pivotal role in maintaining data integrity, resolving complex discrepancies in security setups and trade settlements, and optimizing workflows through our enterprise systems and vendor platforms such as Bloomberg, LSEG (Refinitiv), ICE, and others. By integrating high-quality data solutions, you will enhance operational efficiency, mitigate risks, and empower data-driven decision-making across trading, risk management, and compliance teams.

Responsibilities:

  • Operational Issue Resolution & Reporting: Investigate and resolve complex trade lifecycle and data discrepancies; manage Tier 1 reporting support and enhance reporting workflows through automation and standardization.

  • Data Governance & Quality Assurance: Oversee security master and pricing data integrity, implement robust data quality controls, and ensure compliance with regulatory standards such as GDPR, MiFID II, and SOX.

  • Vendor Data Management: Act as the subject matter expert for vendor data feeds (e.g., Bloomberg, Refinitiv, ICE), ensuring data accuracy, resolving issues, and optimizing integration workflows.

  • Process Optimization & Automation: Design scalable data workflows and automation tools (e.g., Python, ETL), lead initiatives to integrate cloud and AI/ML technologies for enhanced data curation.

  • Cross-Functional Collaboration & Knowledge Leadership: Partner with IT, Trading, Risk, and Compliance teams on system upgrades and data strategies; document standards and lead training on tools and best practices.

Experience:

  • 5+ years of experience in financial services technology, with a focus on security master data management (required), reference data, or pricing operations.

  • Extensive knowledge of financial instruments (equities, funds, derivatives, ETFs, fixed income) and their key reference IDs (Ticker, ISIN, CUSIP, Sedol, FIGI) and attributes by market sector/ security classifications.

  • Proficiency in vendor platforms: Bloomberg Terminal, LSEG Workspace (Refinitiv), ICE, S&P Capital IQ, and their APIs/data services.

  • Hands-on experience with data integration tools: SQL (required), Python, REST/SOAP APIs, and ETL pipelines.

  • Strong understanding of security master data models, market data architectures, and relational databases (e.g., Oracle, SQL Server).

  • Familiarity with data governance tools (e.g., Ab Initio) and issue-tracking systems (e.g., TFS, ServiceNow, JIRA).

Skills:

  • Exceptional analytical and problem-solving skills, with a track record of resolving complex data discrepancies and minimizing operational risk.

  • Strong communication skills, with the ability to articulate technical concepts to cross-functional teams (IT, Trading, Compliance).

  • Proven project management abilities, including leading cross-functional initiatives, system migrations, and Agile workflows.

  • Ability to balance tactical urgency (Tier?1 reporting/triage) with strategic planning for long-term data governance improvements.

  • Deep understanding of trade lifecycle events, settlement processes, and operational workflows impacted by security master data (e.g., corporate actions, pricing validation).

  • Experience diagnosing and resolving trade processing issues linked to security setup inaccuracies or pricing discrepancies.

  • Familiarity with Raymond James Capital Markets or similar large-scale capital markets environment-understanding how reference data and reporting integrate across multiple trading desks, compliance tools, and client platforms.

Licenses/Certifications:

  • None required.
View Now

Data Solutions Analyst - Security Master, Pricing & Reporting (Remote Option)

38111 Memphis, Tennessee Raymond James Financial, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

We are seeking an experienced Data Solutions Analyst to join our team, specializing in Security Master Reference, Pricing, and End to End Trading Data Management. This role demands a unique blend of technical expertise in financial securities data, operational problem-solving acumen, and strategic insight to ensure the accuracy and reliability of critical data enterprise wide.
This role will serve as the first line of defense, Tier 1 support, for all things security-master reference, pricing, and reporting trading data within Capital Markets. The ideal candidate will possess deep domain knowledge in security reference data governance, pricing validation, and trade lifecycle operations.
You will play a pivotal role in maintaining data integrity, resolving complex discrepancies in security setups and trade settlements, and optimizing workflows through our enterprise systems and vendor platforms such as Bloomberg, LSEG (Refinitiv), ICE, and others. By integrating high-quality data solutions, you will enhance operational efficiency, mitigate risks, and empower data-driven decision-making across trading, risk management, and compliance teams.
**Responsibilities:**
+ Operational Issue Resolution & Reporting: Investigate and resolve complex trade lifecycle and data discrepancies; manage Tier 1 reporting support and enhance reporting workflows through automation and standardization.
+ Data Governance & Quality Assurance: Oversee security master and pricing data integrity, implement robust data quality controls, and ensure compliance with regulatory standards such as GDPR, MiFID II, and SOX.
+ Vendor Data Management: Act as the subject matter expert for vendor data feeds (e.g., Bloomberg, Refinitiv, ICE), ensuring data accuracy, resolving issues, and optimizing integration workflows.
+ Process Optimization & Automation: Design scalable data workflows and automation tools (e.g., Python, ETL), lead initiatives to integrate cloud and AI/ML technologies for enhanced data curation.
+ Cross-Functional Collaboration & Knowledge Leadership: Partner with IT, Trading, Risk, and Compliance teams on system upgrades and data strategies; document standards and lead training on tools and best practices.
**Experience:**
+ 5+ years of experience in financial services technology, with a focus on security master data management (required), reference data, or pricing operations.
+ Extensive knowledge of financial instruments (equities, funds, derivatives, ETFs, fixed income) and their key reference IDs (Ticker, ISIN, CUSIP, Sedol, FIGI) and attributes by market sector/ security classifications.
+ Proficiency in vendor platforms: Bloomberg Terminal, LSEG Workspace (Refinitiv), ICE, S&P Capital IQ, and their APIs/data services.
+ Hands-on experience with data integration tools: SQL (required), Python, REST/SOAP APIs, and ETL pipelines.
+ Strong understanding of security master data models, market data architectures, and relational databases (e.g., Oracle, SQL Server).
+ Familiarity with data governance tools (e.g., Ab Initio) and issue-tracking systems (e.g., TFS, ServiceNow, JIRA).
**Skills:**
+ Exceptional analytical and problem-solving skills, with a track record of resolving complex data discrepancies and minimizing operational risk.
+ Strong communication skills, with the ability to articulate technical concepts to cross-functional teams (IT, Trading, Compliance).
+ Proven project management abilities, including leading cross-functional initiatives, system migrations, and Agile workflows.
+ Ability to balance tactical urgency (Tier 1 reporting/triage) with strategic planning for long-term data governance improvements.
+ Deep understanding of trade lifecycle events, settlement processes, and operational workflows impacted by security master data (e.g., corporate actions, pricing validation).
+ Experience diagnosing and resolving trade processing issues linked to security setup inaccuracies or pricing discrepancies.
+ Familiarity with Raymond James Capital Markets or similar large-scale capital markets environment-understanding how reference data and reporting integrate across multiple trading desks, compliance tools, and client platforms.
**Licenses/Certifications:**
+ None required.
View Now
Be The First To Know

About the latest Cybersecurity specialists Jobs in Memphis !

Lead Systems Specialist-Information Security

38111 Memphis, Tennessee AutoZone, Inc.

Posted today

Job Viewed

Tap Again To Close

Job Description

**Job Description**
To deliver desired, sustainable business outcomes and assure the integrity and continuity of our systems. This position is responsible for the development, analysis, and delivery of strategic and tactical cyber threat intelligence to support proactive defense measures, offensive security operations, incident response, and risk mitigation across the organization. This includes sharing intelligence expertise, providing analytical guidance and mentorship, supporting stakeholders by leveraging the Intelligence Cycle, resolving intelligence-related inquiries, and delivering training as needed.
**Responsibilities**
Participate in any and potentially all roles of the security systems development life cycle. Roles may vary by project and assignment. This may include, but not limited to:
+ Responsible for analyzing and assessing system-specific vulnerabilities within AutoZone's IT infrastructure, including network systems, applications, and identity platforms, with a focus on configurations unique to the organization.
+ Leverages the Intelligence Cycle to identify, evaluate, and communicate cyber threats and risks to AutoZone's data, systems, and processes, recommending appropriate mitigation strategies to counter specific threat actor tactics, techniques, and procedures (TTPs).
+ Apply generative AI tooling to automate intelligence workflows, enhance threat detection capabilities, and streamline reporting and analysis processes.
+ Collaborate with technical teams to maintain a deep understanding of the IT environment, ensuring threat assessments are contextually accurate and operationally relevant.
+ Provides mentorship and guidance to junior analysts, sharing threat intelligence methodologies, technical insights, and best practices to strengthen team capabilities.
+ Maintains accurate planning, documentation, and time tracking for intelligence, procedures, projects, and initiatives.
**Qualifications**
+ Typically, eight to fifteen years' intelligence / security and / or cyber risk management experience in a mid- to large-enterprise environment
+ Advanced written and oral communication skills
+ Advanced task estimation, planning and execution skills
+ Advanced problem solving, domain technical and analytical skillsKnowledge of more than one of the following functional areas; Threat Intelligence / SOC / Incident Response should be one of the functional areas:Intelligence, to include an understanding of how to leverage all phases of the intelligence cycle in real-world scenarios, especially cyber related scenarios.SOC / Incident Response, e.g. formal incident response experience in a large, enterprise environment, threat hunting, forensics, etc.Infrastructure and Network security, e.g. experience with Palo Alto firewalls, experience with Web gateway proxies, Active Directory security controls, etc.Application Security, e.g. understanding of application-layer security controls and risks, penetration testing, code reviews, Vulnerability Management, etc.Identity & Access Management, e.g. LDAP administration, SSO, CyberArk administration, multi-factor authentication, etc.
+ Bachelor's degree in Computer Science or related field
+ Preferred: Understanding of, and experience with, scripting or coding languages
+ Preferred: Security credentials such as Certified Information Systems Security Professional (CISSP)
**About Autozone**
Since opening our first store in 1979, AutoZone has grown into a leading retailer and distributor of automotive parts and accessories across the Americas. Our customer-first mindset and commitment to Going the Extra Mile define who we are, for both our customers and AutoZoners. Working at AutoZone means being part of a team that values dedication, teamwork, and growth. Whether you're helping customers or building your career, we provide tools and support to help you succeed and drive your future.
**Benefits at AutoZone**
AutoZone offers thoughtful benefits programs with one-on-one benefits guidance designed to improve AutoZoners' physical, mental and financial well-being.
**All AutoZoners (Full-Time and Part-Time):**
+ Competitive pay
+ Unrivaled company culture
+ Medical, dental and vision plans
+ Exclusive discounts and perks, including an AutoZone in-store discount
+ 401(k) with company match and Stock Purchase Plan
+ AutoZoners Living Well Program for free mental health support
+ Opportunities for career growth
**Additional Benefits for Full-Time AutoZoners:**
+ Paid time off
+ Life, and short- and long-term disability insurance options
+ Health Savings and Flexible Spending Accounts with wellness rewards
+ Tuition reimbursement
Minimum age requirements may apply. Eligibility and waiting period requirements may apply; benefits for AutoZoners in Puerto Rico, Hawaii, or the U.S. Virgin Islands may differ. Learn more about all that AutoZone has to offer at Careers.AutoZone.com.
We proudly support Veterans, Active-duty Service Members, Reservists, National Guard and Military Families. Your experience is highly valued, and we encourage you to apply to join our team.
**Online Application:**
An online application is required. Click the Apply button to complete your application. For step-by-step instructions on how to apply visit careers.autozone.com/candidateresources.
AutoZone, and its subsidiary, ALLDATA are equal opportunity employers. All applicants will be considered for employment without attention to age, race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status, or any other legally protected categories.
**Job Identification** 11772
**Job Schedule** Full time
AutoZone, and its subsidiary, ALLDATA are equal opportunity employers. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status, or any other legally protected categories.
View Now

Information Systems Security Officer (ISSO)

37544 Memphis, Tennessee Porter-Leath

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Information Systems Security Officer (ISSO)

CONTACT GOVERNMENT SERVICES | Memphis , TN 38103

CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ~ this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.

CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.

Skills and attributes for success
  • Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades.
  • Maintain responsibility for managing cybersecurity risk from an organizational perspective.
  • Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.
  • Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.
  • Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).
  • Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
  • Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.
  • Provide subject matter expertise for cyber security and trusted system technology.
  • Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.
  • Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes.
  • Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.
  • Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications
  • Bachelor's Degree.
  • A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.
  • eMASS experience.
  • Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.
  • Strong desktop publishing skills using Microsoft Word and Excel.
  • Experience with industry writing styles such as grammar, sentence form, and structure.
  • Ability to multi-task in a deadline-oriented environment.

Ideally, you will also have:

  • CISSP, CASP, or a similar certificate is preferred.
  • Master's Degree in Cybersecurity or related field.
  • Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.
  • Demonstrated ability to work well independently and as a part of a team.
  • Excellent work ethic and a high commitment to quality.
Our Commitment

Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.

For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.

Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.

We care about our employees. Therefore, we offer a comprehensive benefits package.

Health, Dental, and Vision

Life Insurance

401k

Flexible Spending Account (Health, Dependent Care, and Commuter)

Paid Time Off and Observance of State/Federal Holidays

Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Join our team and become part of government innovation!

Explore additional job opportunities with CGS on our Job Board

~/

For more information about CGS please visit: ~ or contact:

#J-18808-Ljbffr
View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Specialists Jobs View All Jobs in Memphis