4,756 Security Roles jobs in the United States
Information Security Analyst
Posted today
Job Viewed
Job Description
AppLovin makes technologies that help businesses of every size connect to their ideal customers. The company provides end-to-end software and AI solutions for businesses to reach, monetize and grow their global audiences. For more information about AppLovin, visit: . To deliver on this mission, our global team is composed of team members with life experiences, backgrounds, and perspectives that mirror our developers and customers around the world. At AppLovin, we are intentional about the team and culture we are building, seeking candidates who are outstanding in their own right and also demonstrate their support of others. Fortune recognizes AppLovin as one of the Best Workplaces in the Bay Area, and the company has been a Certified Great Place to Work for the last four years (2021-2024). Check out the rest of our awards HERE . Job Description: The Governance, Risk and Compliance (GRC) information security analyst is a highly respected, influential and in-demand role within the business. This position has a responsibility to the business in supporting and elevating the security posture of the company. The GRC Information Security Analyst role is expected to support the security and compliance strategy as directed by the Head of Information Security in support of the Business. Consequently, the position will require an understanding of Information Security Concepts, Information Risk Management and new technologies. The GRC information security analyst is also responsible for the planning and design of information security policies, procedures and on-going maintenance thereafter. This position will support the company’s Vendor Risk Management Program, Business Continuity Planning, ISO27001 Certification, and Data Privacy Program (as needed). In tandem with security leadership, the GRC security analyst consistently participates in the assessment and strengthening of the information security program. May act as the primary point of contact for internal and external auditors at the direction of management. The GRC security analyst monitors progress and enforces resolution of outstanding issues that may lead to non-compliance or security threats to the business. As a key member of the security team, the GRC security analyst must focus on strong risk management and corporate resiliency, and not be driven solely by compliance. Job Responsibilities: Coordinate cybersecurity risk assessment program in tandem with key stakeholders. Manage the ongoing maintenance and activities using our GRC Platform. Identify strengths and weaknesses in the security program as they relate to privacy, security, business resiliency and the supported compliance frameworks. Document and enforce areas of security improvement that balance risk with business operations and do not diminish efficiencies or innovation. Maintain strong oversight of third parties, vendors and business partners to safeguard against undue risk presented by external entities. Escalate to security management and business unit leads when points of weakness are discovered. Analyze findings, and document, recommend and report program gaps to security leadership as needed. Support monitoring current and proposed security changes impacting regulatory, privacy and security industry best practice guidance. Define qualitative and quantitative metrics to assess the success of the security program and provide regular reports to security and business leadership as needed. Act as a key participant in incident response to track occurrence and resolution, with strict documentation and reporting. Work in tandem with information security assurance, audit and risk management leadership to perform ongoing security assessments. Attend and fully engage in information security management meetings. Work across cross functional teams such as legal, privacy, human resources and others as needed. Support Client based inquiries from Business Development teams. Basic Qualifications: The ideal candidate will have 1-5 years experience with IT Security Audit, Compliance and Risk Management. Familiarity with regulations such as SOX, GDPR, PCI along with an understanding of IT and Cybersecurity Principles, NIST, ISO 27001 and or COBIT, COSO. Previous working experience with GRC tools, proficiency in using Excel (pivot tables, formulas) with data analysis or scripting knowledge a plus. Strong attention to detail, written and verbal communication skills and the ability to work cross functionally is a must. Certifications such as CISA, CRISC, ITIL are desired but not required. Bachelor’s degree in any of the following: IT/Information Systems; Business Admin; Risk Management and Compliance related fields is desirable. AppLovin provides a competitive total compensation package with a pay for performance rewards approach. Total compensation at AppLovin is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience. Depending on the position offered, equity, and other forms of incentive compensation (as applicable) may be provided as part of a total compensation package, in addition to dental, vision, and other benefits. CA Base Pay Range $99,000 - $149,000 USD AppLovin has become aware of a scam targeting jobseekers with fake “app optimization” and similar roles.We do not ask our candidates to download apps or make any form of payment(s).AppLovin works with applicants through our Careers page andapplovin.com email addresses. If you are contacted through other unofficial channels(such as WhatsApp or Telegram) or asked to download an app or make a payment, these contacts arenot legitimate. Confirm the informationhere andcontact us directly with any questions. AppLovin is proud to be an equal opportunity employer that is committed to inclusion and diversity. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status, or other legally protected characteristics. Learn more about EEO rights as an applicanthere . If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send us a request at AppLovin will consider for employment all qualified applicants with criminal histories in a manner consistent with applicable law. If you’re applying for a position in California, learn morehere . To support an efficient and fair hiring process, we may use technology-assisted tools, including artificial intelligence (AI), to help identify and evaluate candidates. All hiring decisions are ultimately made by human reviewers. Accepted file types: pdf, doc, docx, txt, rtf Enter manually Accepted file types: pdf, doc, docx, txt, rtf Education School * Select. Degree Select. Select. LinkedIn Profile * Have you worked at AppLovin or any of its affiliates before? Select. Are you legally authorized to work in the country in which you are applying? Select. Do you now or will you in the future need sponsorship for employment visa status in the country in which you are applying? Select. Voluntary Self-Identification For government reporting purposes, we ask candidates to respond to the below self-identification survey.Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiringprocess or thereafter. Any information that you do provide will be recorded and maintained in aconfidential file. As set forth in AppLovin’s Equal Employment Opportunity policy,we do not discriminate on the basis of any protected group status under any applicable law. If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection.As a government contractor subject to the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measurethe effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categoriesis as follows: A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability. A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service. An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense. An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985. Select. Voluntary Self-Identification of Disability Form CC-305 Page 1 of 1 OMB Control Number 1250-0005 Expires 04/30/2026 Voluntary Self-Identification of Disability Form CC-305 Page 1 of 1 OMB Control Number 1250-0005 Expires 04/30/2026 Why are you being asked to complete this form? We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years. Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) website at . How do you know if you have a disability? A disability is a condition that substantially limits one or more of your “major life activities.” If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to: Alcohol or other substance use disorder (not currently using drugs illegally) Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS Blind or low vision Cancer (past or present) Cardiovascular or heart disease Celiac disease Cerebral palsy Deaf or serious difficulty hearing Diabetes Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders Epilepsy or other seizure disorder Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome Intellectual or developmental disability Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD Missing limbs or partially missing limbs Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports Nervous system condition, for example, migraine headaches, Parkinson’s disease, multiple sclerosis (MS) Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities Partial or complete paralysis (any cause) Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema Short stature (dwarfism) Traumatic brain injury Disability Status Select. PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete. #J-18808-Ljbffr
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security Analyst
Chicago, IL, USA
Req #11752
Wednesday, July 16, 2025
Purpose of Job
HH Global is looking for an Information Security Analyst to help us ensure that our information security policies, procedures, standards and threat defenses are reviewed, maintained and continuously improved to provide an information security management system of excellence. This person will assist us with threat discovery and analysis and ensure we continue to be compliant with ISO27001:2022.
You will be responsible for supporting the overall enhancement and assurance of Information Security. The role includes developing, maintaining, enforcing Information security standards and procedures in line with ISO27001:2022 ISMS and SOC 2 Type II standards, industry best practice and stakeholder requirements; the provision of expert advice to projects within HH Global including evaluating, reviewing, recommending and setting baselines for new security technologies for use within the business.
This role includes a collective oversight of IT Security Governance, risk management, compliance and assurance including the technical and organizational controls assuring the confidentiality, integrity and availability of information assets. The Information Security Analyst is also responsible for providing expert guidance and techniques and presenting efficient and pragmatic change recommendations to stakeholders enabling them to own and manage their information security requirements and controls to change or improve our ISMS.
You will be required to implement security controls and work alongside the IT engineers and Security Operations Center to enhance the infrastructure and improve practices where possible.
The successful candidate is expected to have experience within an IT technical background to allow a good understanding on how to improve and maintain security posture from a security and technical perspective.
This will be a primarily remote role based in Chicago, Illinois.
Key Responsibilities
- Review and risk assess information security reports and dashboards to identify threats, vulnerabilities and opportunities for improvement regarding information security threat defenses.
- Assess, investigate and support security incidents and vulnerabilities.
- Support and collaborate with our Security Operations Center to respond to incidents and requests, and to improve our organizational security posture.
- Review, manage and implement security controls to cloud technologies.
- Support, control and evaluate IT Security operations.
- Organization and management of penetration tests and vulnerability management reports.
- Implement controls, policies and recommendations of security findings to improve the organization security posture.
- Assist in the development of plans to safeguard information security assets against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Assisting in the development, recommendation and implementation of Information Security framework for HH Global, in line with IS027000 series principals and good practice disciplines, including overarching policies, procedures, guidelines, awareness and training plans, security monitoring processes, privacy regulations and overall security infrastructure recommendations.
- To work collaboratively or independently as part of the Information Security and Risk team to ensure the design, delivery, implementation and operational testing of agreed security strategies meet the business needs.
- Assess Information Security controls to ensure they meet the legislative and regulatory compliance and propose remedial actions surrounding identified deficiencies.
- Monitoring security compliance through ongoing security control reviews and risk assessments, change management reviews and working closely with the ISR team to advise on Information Security issues that require support and closure.
- Assisting with the development of policies based on audit findings;
- Assisting with risk assessments;
- Assisting with the review, approval and implementation of IT changes with security conscious principles applied.
- Assisting with the support and ongoing maintenance of the ISO27001:2022 ISMS
- Contribution to Information Security strategy, overseen by the Global Head of Information Security and Risk.
- 2-3+ years of relevant experience
- Excellent attention to detail, analytical skills and an ability to analyze complex technical information to identify patterns and trends.
- An ability to work under pressure, particularly when dealing with security threats and at times of high demand.
- Knowledge of ISO 27001:2013 / 2022 frameworks, associated legislation and good practice standards together with good core knowledge of web and network security plus excellent general information security knowledge.
- Knowledge of SIEM platforms to derive the best value out of the tools for identifying security risks, malicious activity, and system misconfigurations within the information assets.
- Experience of Microsoft 365 security tools such as Microsoft Defender for Endpoint, Microsoft Intune and Microsoft Defender for Cloud Apps.
- Knowledge of Endpoint Detection and Response (EDR) configuration to monitor, detect and block cyber security threats.
- Managing and reporting from vulnerability management platforms, such as Qualys VMDR.
- Respond to security incidents and events, including triage, containment, and remediation activities.
- Working knowledge of hardware and software security products.
- Security hardening knowledge of IT systems, including but not limited to endpoints, servers and networks.
- Knowledge of Web Content Filtering Controls, Cloud Application Security Broker (CASB) and Data Loss Prevention (DLP) controls, policies and configuration.
- Experience with evaluating Threat Intelligence response and ways to manage them.
- Investigate security alerts and provide incident response.
- Monitor identity and access management, including monitoring for abuse of permissions by authorized system users.
- Test and evaluate security products.
- Use advanced analytic tools to determine emerging threat patterns and vulnerabilities.
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.
- Give advice and guidance to staff on issues such as spam and unwanted or malicious emails.
- Security risk assessment, gap analysis and management through controls to mitigate identified risks.
- You will be expected to work independently or as part of a team and will be able to quickly research and assimilate new information, keeping abreast of rapidly changing situations and work themes.
- You will have a diplomatic manner and strong interpersonal and communication skills that enable you to work with a wide range of people to deliver high profile pieces of work within pressured time frames.
- Excellent IT skills, including knowledge of computer networks, operating systems, software, hardware and security.
- An understanding of the cyber security risks associated with various technologies and ways to manage them.
- A good working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus.
- A good working knowledge of threat hunting.
- Written communication skills, for example to write technical reports.
- Time-management and organizational skills to manage a variety of tasks, prioritize workload and meet deadlines.
- Excellent attention to detail, analytical skills and an ability to analyze complex technical information to identify patterns and trends.
- An ability to work under pressure, particularly when dealing with threats and at times of high demand.
Company benefits
- Healthcare, dental, vision insurance
- Short-term and long-term disability coverage
- 401k with discretionary company match
- 16 days of PTO with 9 company holidays + 3 floating holidays
For U.S based applicants: The US base salary range for this position is $75,000 to $85,000 annually. Actual compensation packages are based on a variety of factors that are unique to each candidate, including skill set, experience, certifications and work location. This range may be different in other locations due to differences in cost of labor. The total compensation for this package includes an annual performance bonus target in addition to base salary.
#LI-SN1
Your application will be reviewed by a member of our Recruiting Team and we'll reach out to you directly if there's a fit for the position. We're using video conferencing software to conduct many of our interviews, but all interviews will be live with a member of our Recruiting or Hiring teams.
Other details- Pay Type
Salary
- Chicago, IL, USA
Share this job:
We're hiring at HH Global! Check out this opportunity:">
We're hiring at HH Global! Check out this opportunity:">
We're hiring at HH Global! Check out this opportunity:">
We're hiring at HH Global! Check out this opportunity:">
We're hiring at HH Global! Check out this opportunity:">
Information Security Analyst
Posted today
Job Viewed
Job Description
About IEX
IEX (IEX Group, Inc.) is an exchange operator and technology company dedicated to innovating for performance in capital markets. Founded in 2012, IEX launched a new kind of securities exchange in 2016 that combines a transparent business model and unique architecture designed to protect investors. Today, IEX applies its proprietary technology and experience to drive performance across asset classes, serve investors, and advocate for transparent and competitive markets.
Role Overview:
IEX is looking for an experienced Information Security Analyst to join our Information Security Team. You will perform security compliance and oversight of our environment and utilize security tools and processes to review, detect, investigate and/or escalate events that require further examination. You should have a solid understanding of information security, networking concepts, and strong analytical skills. You should be a strong team player who works with others to drive continuous improvement for yourself, the team and the program.
About You:
- Self-starter who is proactive and entrepreneurial
- Organized, detail-oriented, and process-oriented
- Cross-functional team player, resourceful, and responsive
- Excellent analytical, critical thinking, communication, and problem-solving skills
- Identify security threats by monitoring and correlating events originating from security tooling and event logs
- Apply and maintain standardized procedures to investigate and resolve potential security incidents
- Tune security tooling as required to optimize and enhance the information available for analyzing potential security events
- Identify and track security metrics related to environment and industry trends to create a normalized view of expected network behavior and to detect anomalies
- Assist in running the IEX vulnerability management program as well as identify vulnerabilities that may exist in the environment through available sources and assessments
- Identify and lead projects that further advance IEX's ability to detect, contain, and eradicate threats
- Review threat intelligence sources for items that are relevant to IEX and investigate those that are applicable
- Perform security and risk assessments of third-party tools, vendors, and systems
- Work within the information security analyst team to perform and optimize operations and compliance oversight processes to confirm adherence to policy requirements
- 3-5 years of experience in an Information Security Analyst role, or equivalent
- B.S./B.A. in Information Technology, Information Security, Computer Science, or a related field
- Strong passion for and background in cybersecurity/information security, or related field experience
- Deep understanding of threats, vulnerabilities, attack methodologies, and countermeasures
- Strong experience with reviewing event logs, syslog, and using SIEM technologies
- Familiarity with NIST standards and the MITRE ATT&CK Framework
- Experience with security tooling, applications, platforms
- SOAR
- Threat Intelligence
- SIEM
- Vulnerability Management Solutions
- AD/Entra ID
- EDR
- CSPM
- Experience with Microsoft Excel
- Project management experience
- Technical understanding of networking, operating systems, cloud platforms and related security technologies
- Scripting experience (e.g., Python, Ruby, BASH, Powershell) preferred
- Relevant certifications (e.g., SSCP, GCIH, GCIA, GCFA, CISSP) a strong plus
Our job titles may span more than one career level. The starting annual base pay is between $115,000 and $150,000 for this NY-based position. The actual base pay is dependent upon many factors, such as: training, transferable skills, work experience, business needs and market demands. The annual base pay range is subject to change and may be modified in the future. This role is eligible for bonus and equity.
Here at IEX, we are dedicated to an inclusive workplace and culture. We are an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, color, creed, religion, alienage or national origin, ancestry, citizenship status, age, disability or handicap, sex, marital status, veteran status, sexual orientation, genetic information or any other characteristic protected by applicable federal, state or local laws. This policy not only complies with all applicable laws and protects workers' rights but is vital to IEX's overall mission and values.
Information Security Analyst
Posted 1 day ago
Job Viewed
Job Description
SailPoint IIQ Platform Support Engineer
• SailPoint Support Engineer will require a strong understanding of Identity Access Management (IAM), and Access Governance/SailPoint suites of products
• Minimum 3 to 5 years of experience working with SailPoint technologies (IdentityIQ), concepts and features
• Patching, upgrades, system monitoring, and performance optimization
• Resolving defects and tickets to support access management operations. Additionally, the team handles day-to-day operational monitoring and provides support to audit, compliance and application teams by addressing user questions and issues.
• Install, customize, configure, and support identity provisioning and governance tools;
• Experience with IdentityIQ Administration and Implementation.
• Strong IAM domain knowledge & Experience in IAM area of Identity Access Management, SailPoint IIQ
• Experience in understanding the requirements related to audit and compliance reporting
• Strong experience in understanding IAM solution requirements and develop/modify business processes, prepare communication & training material for IAM/IIQ systems.
• Must be able to collect requirements related to user life cycle management and JML processes (Onboarding, offboarding etc.)
• Must be familiar with access governance features of IAM Tool Access recertification, Approval Workflows, Role Management, SOD policies
• Responsible for writing Runbooks, playbooks, Standard Operating Procedures (SOPs) and design documents
• Must be able to understand the requirements related to audit and compliance reporting
Salary Range- $110,000-$125,000 a year
#LI-SP3 #LI-VX1
Information Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Role : Information Security Analyst
Location: Baton Rouge, Louisiana (Onsite)
Duration: Longterm
The scope of the proposed services will include the following:
1. Managing InfoSec Identity Management requests through the OTS Ivanti ticketing system
2. Active Directory account creation/deletion
3. Active Directory group membership management
4. Active directory file share permission management
5. Privileged account management
Expertise and/or relevant experience in the following areas are mandatory:
1. Creating Active Directory users and groups.
2. Managing Active Directory users and groups
3. Understanding Active Directory enterprise wide deployments with multiple forests.
4. Managing and reviewing Microsoft Group Policy
5. Reviewing and processing information security requests.
Expertise and/or relevant experience in the following areas are desirable but not mandatory:
1. Basic PowerShell Knowledge
2. Compliance, or audit experience
3. Experience managing Identity and Access Management (IAM) systems
4. Documenting, Testing, and Reviewing Information Security Controls.
5. Coordinating notifications, responses, and escalations for security events and incident management activities
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
Description
At a high level, we are looking for a candidate with a bachelor’s degree (Cybersecurity focused) and at least 1 – 2 years of professional experience (not counting internships) or equivalent combination of education and experience. Ideally, a candidate would have professional experience in at least two or three of the areas below:
• Microsoft 365 (365 Defender focused)
• Endpoint Detection and Response (EDR)
• Azure Sentinel/ SIEM threat hunting
• Microsoft Purview
• Next Generation Firewalls (NGFW)
• Microsoft Intune
• Windows Active Directory and domain group policy
• Security Operation Center (SOC) experience
• Incident investigation and response skills
Pay and Benefits
The pay range for this position is $30.00 - $40.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following:
• Medical, dental & vision • Critical Illness, Accident, and Hospital • 401(k) Retirement Plan – Pre-tax and Roth post-tax contributions available • Life Insurance (Voluntary Life & AD&D for the employee and dependents) • Short and long-term disability • Health Spending Account (HSA) • Transportation benefits • Employee Assistance Program • Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a fully onsite position in Erlanger,KY.
Application Deadline
This position is anticipated to close on Jul 24, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We’re a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We’re a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We’re strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We’re building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
Imagine One Technology & Management is currently seeking an Information Security Analyst “contingent” on award of the associated work to the Imagine One Team. This position supports the U.S. Navy in Lexington Park, Maryland.
The ** Information Security Analyst** will plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. They may ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. They may also respond to computer security breaches and viruses.
Experience Requirements:
-
Qualifying candidates must possess ONE of the following required qualifications:
-
Minimum of five (5) years of experience carrying out duties similar to the functions above
-
NAVEDTRA 43350 (Malware)
-
NAVEDTRA 43469 Watchstation 303 - Information Assurance Technician Level III
-
NAVEDTRA 43301-5B LCS Total Shipboard Computing Environment (TSCE)
-
NAVEDTRA 43469 Watchstation 304 - Information Assurance Manager
-
JQR Incident Handling QC Analyst (306)
-
JQR Incident Handling Trends Analyst (305)
-
JQR Information Assurance Vulnerabilities Management (VAAP - Vulnerability Analysis and Assistance Program)
-
Experience in the following areas:
-
Enterprise Mission Assurance Support Service (eMASS)
-
Vulnerability Remediation Asset Manager (VRAM)
-
Navy Risk Management Framework (RMF) SOPs
-
Microsoft Defender for Endpoint (MDE)
-
Continuous Monitoring and Risk Scoring (CMRS)
-
Experience with performing STIG implementation
-
Experience performing vulnerability assessments with the Assured Compliance Assessment Solution (ACAS) tool
-
Experience remediating vulnerability findings to include implementing vendor patches
-
Experience reviewing RMF documentation such as system categorization, Security Plan, Implementation Plan, Security Assessment Plan, System Level Continuous Monitoring (SLCM) Plan, System POA&M
**Educational Requirements: **
-
Qualifying candidates must possess ONE of the following required educational qualifications:
-
Bachelor’s degree
-
CNSSI 4012-Senior Systems Managers/4013-System Administrators/4014-Information Systems Security Officers (ISSO) /4015-Systems Certifiers/4016-Risk Analysts
-
NDU CIO certificate-Chief Information Officer (CIO)
-
Computer Hacking Forensic Investigator (CHFI)
-
GIAC Reverse Engineering Malware (GREM)
-
CISM
-
GIAC Certified Incident Handler (GCIH)
-
EC-Council Certified Incident Handler (ECIH)
-
GIAC Certified Forensics Analyst (GCFA)
-
CEH
-
CISSP
-
GSEC
-
Licensed Penetration Tester (LPT) *Retired
-
CASP+ GSLC
-
CSSLP
-
NEC 741A Information System Security Manager
-
NEC 742A Network Security Vulnerability Technician
-
NEC H10A Basic Cyber Analyst/Operator
-
NETW 4001 Security Plus
-
SSC 6209-Network Operations and Technology
-
Hunt Methodologies Course (HMC)
-
Intermediate Cyber Core (ICC)
-
CYBR2100 Certified Ethical Hacker
-
CYBR2150
-
CYBR3420 Intermediate Cyber Core
Security Requirements:
-
Candidates must have U.S. Citizenship
-
Candidates must have an ACTIVE DoD Secret Clearance (or higher)
Imagine One Technology & Management, Ltd., offers a full package of benefits and competitive salary, excellent group medical, vision, and dental programs. 401K savings plan; $4K annual tuition reimbursement ($5K if pursuing master’s degree); employee training, development, and education programs; profit sharing; advancement opportunities; and much more!
ISO 9001:2015, ISO 2000-1:2018, ISO 27001:2013
CMMI Development and Services - Maturity Level 3
An Employee-Owned Business
EEO/Veterans/Disabled
*Imagine One “Contingent” offers for employment may stipulate that one or more requirements be satisfied before final commitment between candidate and Imagine One is established; namely, award of contract to the Imagine One Team. Contingent requirements vary and may also include, but not be limited to additional factors (i.e., the position still being available after negotiations with the Government; final approval of your qualifications by the Government; or ability to successfully acquire and/or transfer a DoD security clearance).
Be The First To Know
About the latest Security roles Jobs in United States !
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities & Qualifications
RESPONSIBILITIES
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Ensures the rigorous application of cybersecurity policies, principles, and practices in the delivery of all Information Technology (IT) and cybersecurity services. Develops and designs security solutions to maintain confidentiality, integrity, and availability of information throughout the enterprise. Identifies, plans, and documents improvements to security controls. Develops and documents recommendations and courses of action (COAs) to solve complex cybersecurity problems. Develops and interprets cybersecurity requirements and assists in the formulation of cybersecurity/IT budgets. Plans and schedules the installation of new or modified security hardware, operating systems, and software applications. Ensures the assessment and implementation of identified computer and network environment fixes as part of the Cybersecurity Vulnerability Management program. Guides the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program.
-
Maintaining the appropriate operational security posture for an information system
-
Manage the security of the information system through Certification & Accreditation (C&A)
-
Support the information system owner for the completion of security related responsibilities.
-
Review System Security Plans (SSP) and solutions
-
Recommend security mechanism implementations
-
Evaluate and document the effectiveness of solutions implemented
REQUIRED QUALIFICATIONS
-
Minimum 5 (five) years of experience with cybersecurity or information assurance
-
Minimum of Bachelor's Degree in a technical or business discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline
-
DoD Approved 8570 Baseline Certification: Category IAM Level II (One of the Following)
-
CAP
-
CASP+ CE
-
CISM
-
CISSP (or Associate)
-
GSLC
-
CCISO
-
HCISPP
-
Must know Risk Management Framework (RMF)
-
Active TS/SCI + Polygraph
PREFERRED QUALIFICATIONS
-
Experience with DoD Cybersecurity Policies
-
Experience with Xacta Solutions (Xacta 360)
-
Knowledge of Enterprise Mission Assurance Support Service (eMASS)
-
Experience with Zero Trust
-
Exposure to AWS (Amazon Web Services), ACAS (Security scanning software), vCenter, WSUS (Windows Server Update Service), and/or STIGs/IAVA
-
A problem solver who can get in, be given a project, and use engineering skills to determine a solution
-
Able to build systems from the ground up - network architecture/systems engineering
Overview
We are seeking an Information Security Analyst to join our team supporting US CyberCommand in Columbia, MD.
TekSynap is a fast growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration.
Additional Job Information
WORK ENVIRONMENT AND PHYSICAL DEMANDS
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
-
Location: Columbia, MD
-
Type of environment: Office
-
Noise level: (Low, Medium, High) Medium.
-
Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs.
-
Amount of Travel: less than 10%
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform theessential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus.
WORK AUTHORIZATION/SECURITY CLEARANCE
US Citizenship
TS/SCI with Polygraph
OTHER INFORMATION
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
WAGE INFORMATION
Target salary range: $77,000 - $95,000. The salary range displayed is an estimate and will be determined on several factors regarding the individual's particular combination of education, knowledge, skills, competencies and experience, as well as contract parameters and organizational requirements. The displayed salary is one component of the total compensation package for employees.
EQUAL EMPLOYMENT OPPORTUNITY
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact for assistance.
Job Locations US-MD-Columbia
ID 2024-7160
Category Information Technology
Type Regular Full-Time
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
ManTech seeks a motivated, career and customer-oriented Information Security Analyst to join our team in Belcamp, MD . This is an onsite position.
The Information Security Analyst will work in support of the Army for the Network Modernization & Mission Network Technical Service Support program (NetMod). NetMod sets forth the work efforts required to provide product technical support services for systems and equipment being produced, fielded, modified or supported by PdM Network Modernization (NetMod) and PdM Mission Network of the Project Manager (PM) Tactical Network (TN) of the Program Executive Office for Command Control and Communications-Tactical (PEO C3T). This support may also include future systems and equipment that is acquired for the Army to maintain its technological advantage.
Job responsibilities include but are not limited to:
-
Providing network environment and advanced level computing environment support
-
Paying special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured
-
Collecting data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment
-
Applying analytical skills to this data and all compliance with relevant non-technical controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts.
-
Conduct vulnerability assessments, risk analysis, and incident responses.
-
Actively monitoring network traffic for suspicious activity and potential security breaches.
-
Identify weaknesses in systems and applications to proactively address security risks.
Required Qualifications:
-
Bachelor's degree
-
5+ years of relevant experience
-
3+ years in the Department of Defense performing information management related duties.
-
Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement
-
Possess an understanding of network protocols and security principles
-
Demonstrated experience in security tools and technologies (firewalls, intrusion detection/prevention systems, SIEM)
-
Experience with vulnerability scanning and penetration testing
-
Possess analytical and problem-solving skills to identify and address security threats
Preferred Qualifications:
-
Basic understanding of programming
-
Experience with participating in simulated cyberattacks to identify vulnerabilities in systems and applications.
-
Experience updating and implementing complex security systems for an organization.
Security Clearance Requirements:
- Must possess an active Secret clearance
Physical Requirements:
-
Must be able to remain in a stationary position 50% of the time.
-
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
-
Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at and provide your name and contact information.
Information Security Analyst
Posted 3 days ago
Job Viewed
Job Description
Information Security Analyst
Job Locations
US-MA-Hanscom AFB
Job ID
2025-8280
Overview
Abacus Technology is seeking an Information Security Analyst to support security and information assurance activities for Hanscom AFB. This is a full-time position.
Responsibilities- Support Host Based Security System (HBSS).
- Implement software patches and security fixes when it cannot be done using enterprise MECM.
- Conduct troubleshooting and repairs over the phone, Teams, remotely utilizing Dameware, and desk-side.
- Deliver quality timely customer service while also meeting contract threshold metrics for phone and ticket resolutions.
- Periodically review processes, procedures, and client configurations for completeness, effectiveness and compliance with information assurance polices and DISA STIGs.
- Analyze ACAS vulnerability scan reports, deploy software upgrades and patches to mitigate identified vulnerabilities.
- Use expertise with tools such as PowerShell and Windows Scripting to repackage software applications, operating systems, and patches for deployment to workstations.
Qualifications
3+ years experience in information security. Bachelor's degree in a related field. Additional years of experience may be substituted for degree requirements. Must be Security+ CE certified. Strong knowledge of Windows Desktop Operating Systems (Windows 10/11). Working knowledge of Microsoft Active Directory. General knowledge of HBSS, ACAS, and ARAD. Knowledge of PowerShell and the ability to write custom scripts. Experience with a trouble ticket system such as Remedy or ServiceNow. Working knowledge of Microsoft Office Products (O365/2016), Teams, Outlook and Excel. Able to resolve issues quickly and efficiently to comply with metric requirements. Proficient with computer, network, and server hardware. Must have strong customer service and communication skills. Able to work in a team environment and interact with all levels of an organization in a professional manner. Keen attention to detail. Must be a US citizen and hold a current Secret clearance.
Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.
EOE/M/F/Vet/Disabled