Apply

Security Analyst

Posted 10 days agoViewed

View full description

πŸ’Ž Seniority level: Junior

πŸ“ Location: United States

πŸ” Industry: Simulation & Training

πŸ—£οΈ Languages: English

πŸͺ„ Skills: CybersecurityCompliance

Requirements:
  • Willingness to learn cybersecurity skills
  • Some familiarity with security technologies
Responsibilities:
  • Safeguard information systems
  • Support compliance with cybersecurity frameworks such as NIST 800-171 and CMMC
  • Assist with optimizing security technologies
  • Contribute to effective security practices
Apply

Related Jobs

Apply

πŸ“ United States

🧭 Internship

πŸ’Έ 15.0 - 22.0 USD per hour

🏒 Company: Ensono

  • Basic understanding of [relevant skills or tools, e.g., Microsoft Office, PowerBi, etc.].
  • Strong written and verbal communication skills.
  • Excellent organizational and time management abilities.
  • Ability to work independently and as part of a team.
  • Excellent attention to detail and accuracy.
  • Knowledge of data protection regulations and compliance standards.
  • Strong communication and interpersonal skills.
  • Overseeing the organization, storage, retrieval, and security of documents within the company. This role involves implementing document management systems, ensuring compliance with regulatory requirements, and facilitating efficient document workflows.
  • Conduct supplier audits and assessments as needed.
  • Identify areas for improvement and work with suppliers to implement corrective actions.
  • Work with various departments to develop and document risk mitigation strategies and action plans.
  • Monitor the effectiveness of risk controls and recommend improvements.

SQLCybersecurityMicrosoft OfficeComplianceRisk ManagementData management

Posted 1 day ago
Apply
Apply

πŸ“ Philadelphia, Pennsylvania; Boston, Massachusetts; New York City, New York; Baltimore, Maryland; Washington, D.C.; Charlotte, North Carolina; Raleigh-Durham, North Carolina; Atlanta, Georgia; Chicago, Illinois; CT, DE, FL, GA, IL, IN, MA, MD, MI, NC, NJ, NY, OH, PA, TN, and VA

🧭 Full-Time

πŸ” Information Security

🏒 Company: HealthVerityπŸ‘₯ 101-250πŸ’° $100,000,000 Series D over 3 years agoInformation ServicesInformation TechnologyHealth Care

  • 2-5 years information security and/or system administration experience under Linux-focused on patching, configuration management, and vulnerability remediation
  • ISC2, SANS or similar security certifications
  • Working knowledge of Nmap, Nessus, OpenVPN, tcpdump, OpenSSL and other security related tools
  • Comfortable with scripting in Python and Bash
  • Understanding of data network configuration and infrastructure concepts, including TCP/IP, DNS, routers, internet/intranet/extranet, firewalls, web servers and security hierarchy including the application of encryption key infrastructures and authentication processes
  • Manage and triage security incidents and events daily
  • Own operational security tool administration and optimization of configuration settings
  • Perform scanning activities and ensuring records are created to document and track vulnerabilities
  • Ensure our logging system configuration is consistent with policy and procedure requirements and generates reports that aid in incident response and investigation
  • Participate in select security led projects to expand and/or improve security capabilities
  • Research InfoSec trends, analyze threat intelligence reports via subscribed feeds and recommend security posture changes
  • Aid in identifying procedure maintenance and create documentation as needed
  • Participate in Contingency Planning and Incident Response exercises

PythonSQLBashCybersecurityLinuxComplianceRisk ManagementScripting

Posted 3 days ago
Apply
Apply

πŸ“ United States, United Kingdom

🧭 Full-Time

πŸ’Έ 115000.0 - 130000.0 USD per year

πŸ” Information Security

🏒 Company: HackerOneπŸ‘₯ 201-500πŸ’° $49,000,000 Series E about 3 years agoπŸ«‚ Last layoff over 1 year agoInternetComputerNetwork Security

  • 3+ years of experience in security testing or ethical hacking
  • Strong technical knowledge of OWASP top 10
  • Comfortable using security testing tools such as Burpsuite
  • Evaluate vulnerability reports submitted by hackers
  • Collaborate with hackers to understand vulnerabilities
  • Independently reproduce reported vulnerabilities

Cybersecurity

Posted 10 days ago
Apply
Apply

πŸ“ AL, AZ, CA, CO, CT, FL, GA, ID, IL, IN, IA, KY, ME, MD, MA, MI, MN, MO, NV, NJ, NY, NC, OH, OR, PA, TN, TX, VA, WA, WI

πŸ’Έ 80000.0 - 120000.0 USD per year

πŸ” Child care management software

🏒 Company: Procare SolutionsπŸ‘₯ 51-100πŸ’° Private over 6 years agoInformation TechnologyHealth CareChild Care

  • BA/BS degree or higher and 8+ years of experience in cybersecurity or relevant education and experience.
  • 5+ years’ experience in incident response or cybersecurity operations center.
  • 3+ years' experience with security tools like SIEM, Analytics, Malware detection.
  • Deep expertise in threat intelligence, incident response, SIEM, EDR/MDR, SOAR, and Vulnerability Management.
  • Current security certifications such as CISSP, CISA, CRISC, CEH, etc.
  • Solid understanding of system and security controls on Windows, Linux/Unix, and MacOS.
  • Strong knowledge of network security concepts and best practices.
  • Experience with security tools like firewalls and intrusion detection systems.
  • Ability to analyze security logs and network traffic.
  • Hands-on experience with cloud services, Kubernetes and Docker, with major providers.
  • Strong verbal and written communication skills.
  • Perform hands-on operational support of threat identification, monitoring of vulnerabilities and risks in Procare’s environments.
  • Utilize log ingestion platforms for security analytics and identify tactics, techniques, and attack patterns.
  • Monitor emerging security threats, advise on risk to the organization.
  • Install, configure, and maintain security tools like SIEM systems.
  • Manage the Cybersecurity Incident Response (CISRT) process, including reports and root cause analysis.
  • Investigate security incidents, analyze root causes, and coordinate corrective measures.
  • Maintain accurate incident reports and documentation related to security activities.
  • Collaborate with teams to ensure effective security measures and incident responses.
  • Monitor compliance with security policies and patching of systems.
  • Continuously monitor network traffic and security alerts for suspicious activities.
  • Manage corporate secure email gateway and certificates.
  • Participate in proactive security monitoring and improvement initiatives.
  • Update monthly security metrics for leadership distribution.

AWSDockerCloud ComputingCybersecurityKubernetes

Posted about 1 month ago
Apply
Apply

πŸ“ United States, Canada

🧭 Full-Time

πŸ’Έ 110000.0 - 135000.0 USD per year

πŸ” Information Security

  • Knowledge of GRC frameworks e.g., ISO 27001 and SOC 2
  • 5+ years experience in an Information Security role
  • Experience working with internal/external auditors
  • Participate in information security governance, risk, and compliance objectives
  • Support due diligence requests for clients
  • Manage access review process

ComplianceRisk Management

Posted about 1 month ago
Apply
Apply

πŸ“ US

πŸ’Έ 1.0 - 2.0 USD per hour

πŸ” Digital Healthcare

🏒 Company: iRhythm TechnologiesπŸ‘₯ 101-250πŸ’° $643,600,000 Post-IPO Debt 12 months agomHealthWearablesMedical DeviceHealth CareHealth Diagnostics

  • Bachelor's degree in computer science, information security, or a related field.
  • 12+ years of experience in information security, focused on product security for medical devices.
  • Strong understanding of security principles and methodologies related to medical devices.
  • Exceptional writing, editing, and proofreading abilities.
  • Familiarity with CMS and document repository systems.
  • Experience with vulnerability scanning and penetration testing in healthcare.
  • Expertise with FDA Cybersecurity guidance and regulations.
  • Familiarity with NIST Cyber Security Framework and NIST SP 800-171.
  • Knowledge of secure coding practices and development methodologies for medical devices.
  • Experience with medical device design control requirements for software development.
  • Lead and own the end-to-end device product security management process.
  • Ensure compliance with FDA Cybersecurity guidance through collaboration with teams.
  • Conduct comprehensive risk assessments for medical devices, identifying vulnerabilities.
  • Develop and maintain cyber threat models considering patient safety and data privacy.
  • Participate in security design reviews and recommend system security requirements.
  • Promote secure coding practices and assist in incident response for medical devices.
  • Assist with vulnerability management and collaborate on data privacy compliance.

CybersecurityDocumentationCompliance

Posted 3 months ago
Apply
Apply

πŸ“ USA

πŸ’Έ 80000 - 110000 USD per year

πŸ” Insurance and Cybersecurity

🏒 Company: At-Bay

  • Bachelor’s degree or equivalent.
  • Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline.
  • Willingness to travel as needed.
  • Previous EDR, MDR, XDR, security monitoring, or incident response experience.
  • Strong oral and written communication skills.
  • Experience performing security operations with various endpoint and network tools.
  • Familiarity with deployment, tuning, and operation of security tools from vendors like CrowdStrike and SentinelOne.
  • Experience with SIEM or similar tools for security data analysis.
  • Skills in analyzing potential indicators of compromise, rapid response to incidents, and cyber threat intelligence.
  • Operation and tuning of security monitoring tools including EDR, network monitoring, email security, DLP, SIEM, and security automation tools.
  • Identification and analysis of anomalous activity in customer technology environments.
  • Triage of event data to identify potential indicators of compromise.
  • Escalation of potentially malicious activity to engage incident responders.
  • Participation in incident investigation, containment, remediation, and recovery activities.
  • Developing and maintaining relationships with customers for MDR service delivery.
  • Developing and delivering reports on identified activity to customer stakeholders.

AWSCloud ComputingCybersecurityGCPMicrosoft AzureAmazon Web ServicesAzureCommunication SkillsAnalytical SkillsCollaborationProblem SolvingAttention to detailOrganizational skillsPresentation skillsTime ManagementWritten communication

Posted 3 months ago
Apply