NOC Cyber Security Analyst
Cyber Security Analyst job in Oklahoma City, OK
**Req ID:** RQ203289 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Secret **Public Trust/Other Required:** None **Job Family:** Information Systems Management **Skills:** Information Systems,Information Technology Security,Leadership,People Management
**Certifications:**
SEC+ - CompTIA
**Experience:**
5 + years of related experience
**US Citizenship Required:**
Yes
**Job Description:**
Transform technology into opportunity as an Information Systems Manager with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
At GDIT, people are our differentiator. As an NOC Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter.
**HOW A NETWORK OPERATIONS CENTER CYBER LEAD WILL MAKE AN IMPACT:**
+ **Oversight** for network, cyber and physical security monitoring systems
+ **Mentor and develop** junior analysts including KPI management, helping them grow into seasoned professionals
+ **Serve as the escalation point** for complex incidents requiring deep technical expertise
+ **Coordinate real-time response** to security events, network issues, and physical security alerts
+ **Present to leadership** on security posture, incidents, and operational improvements
+ **Drive continuous improvement** through root cause analysis and process optimization
**WHAT YOU'LL NEED TO SUCCEED:**
+ **Education:** Bachelor's Degree from an accredited institute in a related field. (Will consider 4 additional years of experience in lieu of degree).
+ **Required Experience (5+ years):**
+ Familiarity with NIST IT security publications including NIST SP 800-37, 800-53, and related policies. Must have experience and expertise with applying these policies in a Federal Government IT program and provide the experience and expertise on complying with Federal IT security requirements as defined by the Office of Management and Budget (OMB), NIST, and GSA.
+ Experience and expertise in supporting Certification and Accreditations (C&As) for IT systems within the DoD. This should include knowledge of all controls that moderate level and the ability to incorporate these controls into DoD IT systems as well as to evaluate implementation of these controls into DoD IT systems.
+ Experience and expertise in oversight of multiple teams supporting the completion of a C&A.
+ Expertise conducting vulnerability scans at the operating system level, application level and data bases, completing code reviews and assessing compliance with Center for Internet Security (CIS) benchmarks.
+ Experience and expertise in completing POA&Ms, Assessments and other IT security data calls for DoD IT systems.
+ Broad familiarity with processes and security tools to advise on strategies for complying with DoD IT security requirements and in the development of IT security architectures for BIM program.
+ Excellent troubleshooting, problem-solving and collaborative skills
+ Thorough knowledge of ITSM best practices and supporting systems
+ **Required Technical Skills:**
+ Incident management expertise with a track record of managing complex, multi-team responses
+ Scripting abilities for automation and efficiency improvements
+ Demonstrated experience in managing around the clock operations ensuring services are maintained at SLA levels.
+ Experience with operations and administration of multiple network vendor systems
+ **Security Clearance Level:** DoD Secret Level Clearance required
+ **Required Certifications:** CISSP or DOD 8140 equivalent (CASP+, CCNA CCNP Security, CCSP, GCED, GCIA, GCLD, CISA, GSLC)
+ **Required Skills and Abilities:**
+ Exceptional verbal and written communication skills applied to the development and presentation of technical materials appropriate to a broad spectrum of audiences.
+ Adept at interfacing with Government at senior leader levels and representing the interests of GDIT
**Preferred Skills:**
+ 4+ years management of increasing level of Cyber work within a NOC
+ ITIL V3/4 Foundation or higher
**Location:** Oklahoma City, OK (position may start remote and move onsite)
**GDIT IS YOUR PLACE:**
+ 401K with company match
+ Comprehensive health and wellness packages
+ Internal mobility team dedicated to helping you own your career
+ Professional growth opportunities including paid education and certifications
+ Cutting-edge technology you can learn from
+ Rest and recharge with paid vacation and holidays
The likely salary range for this position is $112,967 - $152,837. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at ********************
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
NOC Cyber Security Analyst
Cyber Security Analyst job in Oklahoma City, OK
Type of Requisition: Regular Clearance Level Must Currently Possess: Secret Clearance Level Must Be Able to Obtain: Secret Public Trust/Other Required: None Job Family: Information Systems Management Job Qualifications: Skills: Information Systems, Information Technology Security, Leadership, People Management
Certifications:
None
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description:
Transform technology into opportunity as an Information Systems Manager with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
At GDIT, people are our differentiator. As an NOC Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter.
HOW A NETWORK OPERATIONS CENTER CYBER LEAD WILL MAKE AN IMPACT:
* Oversight for network, cyber and physical security monitoring systems
* Mentor and develop junior analysts including KPI management, helping them grow into seasoned professionals
* Serve as the escalation point for complex incidents requiring deep technical expertise
* Coordinate real-time response to security events, network issues, and physical security alerts
* Present to leadership on security posture, incidents, and operational improvements
* Drive continuous improvement through root cause analysis and process optimization
WHAT YOU'LL NEED TO SUCCEED:
* Education: Bachelor's Degree from an accredited institute in a related field. (Will consider 4 additional years of experience in lieu of degree).
* Required Experience (5+ years):
* Familiarity with NIST IT security publications including NIST SP 800-37, 800-53, and related policies. Must have experience and expertise with applying these policies in a Federal Government IT program and provide the experience and expertise on complying with Federal IT security requirements as defined by the Office of Management and Budget (OMB), NIST, and GSA.
* Experience and expertise in supporting Certification and Accreditations (C&As) for IT systems within the DoD. This should include knowledge of all controls that moderate level and the ability to incorporate these controls into DoD IT systems as well as to evaluate implementation of these controls into DoD IT systems.
* Experience and expertise in oversight of multiple teams supporting the completion of a C&A.
* Expertise conducting vulnerability scans at the operating system level, application level and data bases, completing code reviews and assessing compliance with Center for Internet Security (CIS) benchmarks.
* Experience and expertise in completing POA&Ms, Assessments and other IT security data calls for DoD IT systems.
* Broad familiarity with processes and security tools to advise on strategies for complying with DoD IT security requirements and in the development of IT security architectures for BIM program.
* Excellent troubleshooting, problem-solving and collaborative skills
* Thorough knowledge of ITSM best practices and supporting systems
* Required Technical Skills:
* Incident management expertise with a track record of managing complex, multi-team responses
* Scripting abilities for automation and efficiency improvements
* Demonstrated experience in managing around the clock operations ensuring services are maintained at SLA levels.
* Experience with operations and administration of multiple network vendor systems
* Security Clearance Level: DoD Secret Level Clearance required
* Required Certifications: CISSP or DOD 8140 equivalent (CASP+, CCNA CCNP Security, CCSP, GCED, GCIA, GCLD, CISA, GSLC)
* Required Skills and Abilities:
* Exceptional verbal and written communication skills applied to the development and presentation of technical materials appropriate to a broad spectrum of audiences.
* Adept at interfacing with Government at senior leader levels and representing the interests of GDIT
Preferred Skills:
* 4+ years management of increasing level of Cyber work within a NOC
* ITIL V3/4 Foundation or higher
Location: Oklahoma City, OK (position may start remote and move onsite)
GDIT IS YOUR PLACE:
* 401K with company match
* Comprehensive health and wellness packages
* Internal mobility team dedicated to helping you own your career
* Professional growth opportunities including paid education and certifications
* Cutting-edge technology you can learn from
* Rest and recharge with paid vacation and holidays
The likely salary range for this position is $112,967 - $152,837. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
Less than 10%
Telecommuting Options:
Onsite
Work Location:
USA OK Oklahoma City
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Virtual Cyber Security SDR, BDR, Contract to Hire
Cyber Security Analyst job in Oklahoma City, OK
Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats. They pride themselves on our innovative approach to safeguarding sensitive data, networks, and systems. Their team of experts provides comprehensive cybersecurity solutions that empower organizations to navigate the complex digital landscape with confidence.
Position Summary: As a Virtual SDR, BDR at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. As one of the first 20 employees, you will play a vital role in shaping the direction of our company and driving growth. Their recent seed round raised an unbelievable $11M at a $36M valuation, and the founders' last venture resulted in a big exit with the sale of the company to Microsoft.
They operate in the IT Security space and are 100% virtual. In this dynamic and customer-facing role, you will leverage your technical expertise and sales acumen to provide strategic guidance and support to our clients throughout the sales process.
This position offers a unique blend of technical knowledge, sales skills, and the opportunity for nationwide travel.
We Are Looking For:
As a mid-level Business Development Rep. (BDR SDR) you'll be at the tip of the spear, responsible for researching and qualifying top of funnel leads while being the first to connect with our potential customers. You'll research and build contact lists, make outbound cold calls/emails to those who fit our Ideal Customer Profile (ICP) and will then partner with AEs to get customers onboarded. This position will spend roughly 80% of the time on the phone or email prospecting for new clients. This position is a great way for individuals to gain in-depth sales experience with a rapidly growing SaaS security company looking to win the category!
What You'll Do:
Generate high volume quality MQLs through various direct sales efforts such as calls, emails, events, webinars, and other channels generated by Marketing.
Make daily outbound calls/emails to prospects who have demonstrated interest.
Follow up on all calls and emails until meetings are booked or you've been able to move the prospect through the funnel.
Record all activities and properly manage lead stage/flow in our Salesforce CRM.
Achieve or exceed monthly quotas of meetings, demos, and qualified leads worked with AEs.
Schedule product demos on AE's calendar.
Discern buyer intent and partner with AEs to get the right customers onboarded.
Work closely with Marketing, Product, and CS/CX to clearly communicate critical top-of-funnel feedback and suggestions that help optimize segmentation, content, & features.
What You'll Need:
Must have BDR/SDR experience in the SaaS or similar software space
Great speaking self-awareness and ability to read prospect signals and adjust accordingly to move the prospect down the funnel.
Must have a clear, easy-to-understand phone voice and a professional Zoom presence with the ability to engage and empathize over the phone.
Hands-on experience with multiple sales prospecting techniques like cold calling, cold emailing, video conference selling, and social outreach is a must.
Knowledge of sales & marketing constructs, the evergreen funnel, and playbooks are important.
Must be a great listener with an ability to address objections graciously and frame the next steps clearly.
Good writers and creative thinkers needed - Must be able to craft well-written (great grammar and spelling), compelling emails, and responses that lead prospects down the funnel.
Verifiable track record of success and goal attainment in a frontline sales-oriented role
Deep knowledge of software and social networks (especially LinkedIn, Facebook, and Twitter) is important.
Track record of (over)achieving sales quotas.
Must have a strong, self-motivated drive, passion, and desire to deliver results.
Experience in a fast-growing startup environment is a big plus.
What We Offer:
Contract to Hire, Strong Salary plus comm after 90 days
Full Benes
PreIPO equity
Be part of an exciting high-growth SaaS organization
An impactful role with lots of growth potential
A lot of freedom to apply your creative and strategic skills
A work-hard, play-hard environment
100% virtual
Virtual Cyber Security SDR, BDR, Contract to Hire
Cyber Threat Analyst
Cyber Security Analyst job in Oklahoma City, OK
**Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)**
Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
Cyber Threat Detection & Response Analyst
Cyber Security Analyst job in Alex, OK
Requirements
Minimum Qualifications (Knowledge, Skills, and Abilities)
Bachelor's degree in an IT related field or equivalent years of IT related experience
Active and current Top Secret federal security clearance
10+ years of cyber-related experience with demonstrated experience in threat detection.
Must meet DoD 8570/ 8140 IAT Level II certification requirements (CCNA Security, Sec+, or SSCP)
Must be able to obtain CSSP-IR certification within 180 days of hire (eg. CE|H, GCIH, CySA+)
Physical Demands and Work Environment
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. Reasonable accommodations may be made to enable individuals with disabilities to perform these functions.
While performing the duties of this position, the employee is regularly required to talk or hear. The employee frequently is required to use hands or fingers, handle or feel objects, tools, or controls. The employee is occasionally required to stand; walk; sit; and reach with hands and arms. The employee must occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this position include close vision, distance vision, and the ability to adjust focus. The noise level in the work environment is usually low to moderate.
Northern Technologies Group is an equal opportunity employer. We do not discriminate based on race, color, religion, sex, national origin, disability, age, or any other protected status under federal, state, or local law.
Travel
Up to 10%
Shift
Normal office hours that align with the core hours of the customer
Note
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. Employees will be required to follow any other job-related instructions and to perform any other job-related duties requested by any person authorized to give instructions or assignments. This document does not create an employment contract, implied or otherwise, other than an “at will” relationship.
Salary Description $150,000 - $160,000
Security Engineer, Access Risk
Cyber Security Analyst job in Oklahoma City, OK
Meta's security team is the central engine driving data and systems security at the company, supporting Meta and all of its family of apps. The organization is responsible for preventing malicious actors from compromising our environment as well as detecting and responding to them before they can do damage. We ensure that we are maintaining the protections we say we will, and engaging with the community to help those outside the company learn from the work we do. We work across all parts of the company, from the corporate infrastructure to production to external services, interfacing with nearly every team in the company.We are looking for an experienced Security Engineer to join our Identity, Authentication & Access Management (IAM) leadership team to drive cross-company initiatives to reduce access risk, while maintaining an acceptable balance of friction for our workforce.
**Required Skills:**
Security Engineer, Access Risk Responsibilities:
1. Proactively identify and prioritize areas of access risk across the company
2. Lead major cross-company workstreams to deploy capabilities from multiple security teams to mitigate this risk
3. Understand technical implementation of Meta's highest-risk assets (eg. our social graph cache) and design appropriate solutions to reduce internal access risk
4. Understand how our workforce interacts with assets across the company, and pursue opportunities to reduce friction and help the company move fast
5. Work with policy and legal teams to strengthen our standards and governance, and software engineering teams to influence design of our core access control systems
6. Influence asset-owning teams and their leadership across Meta to adopt appropriate access control designs and operational processes
**Minimum Qualifications:**
Minimum Qualifications:
7. Understanding of how to manage security risks in a fast-moving environment
8. Significant experience in driving large cross-company engineering initiatives
9. Experience communicating and influencing across functions to drive solutions
10. Experience delivering executive-level security strategies
11. Engineering experience and capacity to understand and reason about complex technical systems
12. B.S. Computer Science or equivalent work experience
13. 10+ years of work experience in software or security engineering
**Preferred Qualifications:**
Preferred Qualifications:
14. Practical experience with authorization or access management solutions
**Public Compensation:**
$213,000/year to $293,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Cyber Security Analyst II
Cyber Security Analyst job in Tulsa, OK
Job Details Position Type: Full Time Salary Range: Undisclosed Travel Percentage: Up to 25% Job Shift: Day Job Category: Information Technology Description IS ONSITE IN TULSA, OK The Cyber Security Analyst will work within a variety of security disciplines including, red/blue team exercises, threat hunting, vulnerability management, design, architecture, technical service management, and service operation functions as appropriate in cybersecurity disciplined fields. The Cyber Security Analyst will contribute and participate in Disaster Recovery and cyber recovery activities, and work on a team accountable for Incident Response. Our organization leverages the CIS CSC and NIST Cyber Security Framework and works well in a cross functional environment. This role is a technical, cybersecurity role, and will actively work on complex technical scenarios across an international audience to arrive at a resolution via a methodical standardized process, and provide detailed technical cybersecurity support. The Cyber Security Analyst will work across a variety of critical business domains including consumer, dealer, corporate and industry lines such as manufacturing, financial services, and general merchandise, etc.
Essential Job Duties and Responsibilities:
* Generalist within the Detect/Respond/Recover CIS CSC and NIST CSF domains
* Assist in maintaining a secure enterprise environment across the AAON technical landscape; leverage specific or broad in-depth technical skillsets to achieve this outcome
* Demonstrate understanding and ability to apply cyber security best practices, understand common issues and remediation techniques leveraging systematic approach (MITRE ATT@CK, OWASP top 10, NIST CSF, CIS CSC, etc.)
* Knowledge of the best available tools, software, threat hunting techniques, red/blue team member, pen testing, applications and systems for maintaining best-in-class security environment status
* Demonstrate expertise with security and information system life cycle methodologies, including remediation of cyber security issues, as well as audit risk mitigation activities.
* Communicate clearly, diplomatically and effectively at all levels of the organization and to audiences with varying degrees of process and technical knowledge
* Assist with security testing and vulnerability management across various technical mediums
* Execute tasks in a high-pressure environment and multi-task | Experience working in a team-oriented, matrixed, collaborative environment while using analytical and problem-solving skills.
* Other duties as assigned.
Qualifications
Education and Experience Requirements:
Bachelor's degree in Computer Science, Digital Programs, Cyber Security, or related field
Qualifications:
Required qualifications include
* 2 years applicable experience with the above duties (including internships & military experience).
* Hands on experience and proficiency in various cybersecurity tools that are common across the information security industry
* In-depth knowledge of common network cyber security tools/technologies to support the information security program
Knowledge, Skills, and Abilities:
The following is a list of knowledge, skills, and abilities, necessary for fulfilling job functions as a Cyber Security Analyst II.
* Must demonstrate analytical, problem solving, and interpersonal skills
* Excellent written and verbal communication skills
* Able to work independently and with others
* Strong technical computer programming and trouble-shooting skills
* High attention to detail
* Demonstrates strong multi-tasking capabilities and organizational skills.
Physical Requirements and Working Conditions:
The following is a list of requirements needed to effectively complete the necessary job functions of the Cyber Security Analyst II.
* Work requires frequent exposure to manufacturing facilities with seasonal hot and cold temperatures, dust, and some chemical fume exposure.
* Ability to sit comfortably for prolonged periods of time.
* Ability for occasional travel as the job may require visiting customers and project sites.
Disclaimer:
Please note this is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. This is not an exhaustive list of all functions that the employee may be required to perform, and the employee may be required to perform additional functions. The company reserves the right to revise this at any time. The employee must be able to perform the essential functions of the position satisfactorily. If requested, reasonable accommodations may be made to enable employees with disabilities to perform the essential functions of the job, absent undue hardship.
Education and Experience Requirements:
Bachelor's degree in Computer Science, Digital Programs, Cyber Security, or related field
Qualifications:
Required qualifications include
* 2 years applicable experience with the above duties (including internships & military experience).
* Hands on experience and proficiency in various cybersecurity tools that are common across the information security industry
* In-depth knowledge of common network cyber security tools/technologies to support the information security program
Knowledge, Skills, and Abilities:
The following is a list of knowledge, skills, and abilities, necessary for fulfilling job functions as a Cyber Security Analyst II.
* Must demonstrate analytical, problem solving, and interpersonal skills
* Excellent written and verbal communication skills
* Able to work independently and with others
* Strong technical computer programming and trouble-shooting skills
* High attention to detail
* Demonstrates strong multi-tasking capabilities and organizational skills.
Physical Requirements and Working Conditions:
The following is a list of requirements needed to effectively complete the necessary job functions of the Cyber Security Analyst II.
* Work requires frequent exposure to manufacturing facilities with seasonal hot and cold temperatures, dust, and some chemical fume exposure.
* Ability to sit comfortably for prolonged periods of time.
* Ability for occasional travel as the job may require visiting customers and project sites.
Disclaimer:
Please note this is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. This is not an exhaustive list of all functions that the employee may be required to perform, and the employee may be required to perform additional functions. The company reserves the right to revise this at any time. The employee must be able to perform the essential functions of the position satisfactorily. If requested, reasonable accommodations may be made to enable employees with disabilities to perform the essential functions of the job, absent undue hardship.
Education and Experience Requirements:
Bachelor's degree in Computer Science, Digital Programs, Cyber Security, or related field
Qualifications:
Required qualifications include
* 2 years applicable experience with the above duties (including internships & military experience).
* Hands on experience and proficiency in various cybersecurity tools that are common across the information security industry
* In-depth knowledge of common network cyber security tools/technologies to support the information security program
Knowledge, Skills, and Abilities:
The following is a list of knowledge, skills, and abilities, necessary for fulfilling job functions as a Cyber Security Analyst II.
* Must demonstrate analytical, problem solving, and interpersonal skills
* Excellent written and verbal communication skills
* Able to work independently and with others
* Strong technical computer programming and trouble-shooting skills
* High attention to detail
* Demonstrates strong multi-tasking capabilities and organizational skills.
Physical Requirements and Working Conditions:
The following is a list of requirements needed to effectively complete the necessary job functions of the Cyber Security Analyst II.
* Work requires frequent exposure to manufacturing facilities with seasonal hot and cold temperatures, dust, and some chemical fume exposure.
* Ability to sit comfortably for prolonged periods of time.
* Ability for occasional travel as the job may require visiting customers and project sites.
Disclaimer:
Please note this is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. This is not an exhaustive list of all functions that the employee may be required to perform, and the employee may be required to perform additional functions. The company reserves the right to revise this job description at any time. The employee must be able to perform the essential functions of the position satisfactorily. If requested, reasonable accommodations may be made to enable employees with disabilities to perform the essential functions of the job, absent undue hardship.
THIS POSITION IS ONSITE IN TULSA, OK
Job Summary:
The Cyber Security Analyst will work within a variety of security disciplines including, red/blue team exercises, threat hunting, vulnerability management, design, architecture, technical service management, and service operation functions as appropriate in cybersecurity disciplined fields. The Cyber Security Analyst will contribute and participate in Disaster Recovery and cyber recovery activities, and work on a team accountable for Incident Response. Our organization leverages the CIS CSC and NIST Cyber Security Framework and works well in a cross functional environment. This role is a technical, cybersecurity role, and will actively work on complex technical scenarios across an international audience to arrive at a resolution via a methodical standardized process, and provide detailed technical cybersecurity support. The Cyber Security Analyst will work across a variety of critical business domains including consumer, dealer, corporate and industry lines such as manufacturing, financial services, and general merchandise, etc.
Essential Job Duties and Responsibilities:
* Generalist within the Detect/Respond/Recover CIS CSC and NIST CSF domains
* Assist in maintaining a secure enterprise environment across the AAON technical landscape; leverage specific or broad in-depth technical skillsets to achieve this outcome
* Demonstrate understanding and ability to apply cyber security best practices, understand common issues and remediation techniques leveraging systematic approach (MITRE ATT@CK, OWASP top 10, NIST CSF, CIS CSC, etc.)
* Knowledge of the best available tools, software, threat hunting techniques, red/blue team member, pen testing, applications and systems for maintaining best-in-class security environment status
* Demonstrate expertise with security and information system life cycle methodologies, including remediation of cyber security issues, as well as audit risk mitigation activities.
* Communicate clearly, diplomatically and effectively at all levels of the organization and to audiences with varying degrees of process and technical knowledge
* Assist with security testing and vulnerability management across various technical mediums
* Execute tasks in a high-pressure environment and multi-task | Experience working in a team-oriented, matrixed, collaborative environment while using analytical and problem-solving skills.
* Other duties as assigned.
LEAD INFORMATION SECURITY ENGINEER-FEDERAL MB
Cyber Security Analyst job in Oklahoma City, OK
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Lead Information Security Engineer is a member of the Industrial Security team supporting Lumen Government Services and is responsible for performing cybersecurity compliance actives in support of government contracts as well as Lumen Product and Services targeting the Government market. The Lead Information Security Engineer must execute all six phases of the Risk Management Framework (RMF) process in accordance with FISMA, DoD, FIPS, and NIST requirements and policy. Responsibilities include developing RMF documentation (System Security Plan, Security Control Traceability Matrix, Plan of Action & Milestones, various Standard Operating Procedures, Continuous Monitoring Plan, etc), tracking/resolving vulnerabilities, performing continuous monitoring activities, developing security policies, and supporting cybersecurity guidance and compliance related activities. The Lead Information Security Engineer works closely with Lumen government customers (Federal and State), Lumen government program teams, Lumen operational teams, Lumen security teams, as well as Lumen Product and Services teams targeting our government customers.
A successful candidate will have excellent communications skills and experience presenting cybersecurity issues to a wide variety of audiences. The candidate must be able to work independently and as a team leader to develop and execute strategies. The candidate must possess and maintain a broad technical knowledge of current and emerging technologies used within corporate infrastructure and government customer infrastructure.
**The Main Responsibilities**
+ Perform as an Information Systems Security Officer (ISSO) for government system
+ Achieve and maintain ATO (Authority to Operate), as required.
+ Write System Security Plans (SSP), Plan of Actions & Milestones (POA&M), Continuous Monitoring Plan, Risk Assessments, Privacy Impact Analyses (PIA), and supporting documentation for systems subject to NIST SP 800-53
+ Lead Security Assessment and Authorization processes and procedures
+ Manage cybersecurity audits by federal departments/agencies, including third party auditors
+ Develop and complete continuous monitoring reports and briefings
+ Interface with appropriate government agencies, company management and employees, customers, vendors, and suppliers to ensure understanding of and compliance with security requirements
+ Review vulnerability and compliance scan results (Nessus, Qualys, etc), and work with the various team members to remediate vulnerabilities, and track ongoing vulnerability status and remediation activities
+ Conduct periodic reviews to ensure compliance with established policies and procedures
+ Investigate and document cybersecurity incidents, as well as provide protective and corrective measures in response to such incidents
+ Report all cybersecurity incidents to the program Information Systems Security Managers (ISSM) through reports and briefings
+ Participate in the change management process to ensure changes to software, hardware, and firmware do not adversely impact the security of an environment
+ Develop, facilitate, and present information security awareness and security training on various customer and corporate security policies
+ Coordinate and participate in business development opportunities related to cybersecurity compliance to include evaluating Requests for Information (RFI) and
+ Requests for Proposal (RFP) from government customers and documenting cybersecurity responses
+ Recommend security best practices and system configuration standards
**What We Look For in a Candidate**
+ 6+ years or experience performing cybersecurity, certification & accreditation (C&A), or assessment & authorization (A&A) related activities
+ Excellent oral and written communication skills, collaboration skills, and experience in presenting cybersecurity issues to all levels of management, as well as non-technical staff
+ Strong work ethic, demonstrated self-starter with the ability to work in a fast paced, team-oriented environment
+ Uses strong interpersonal skills to build partnerships with stakeholders and peers
+ Ability to successfully complete Government suitability and/or Government personnel security requirements is highly desired.
+ Education: Bachelors or equivalent years of experience.
+ Professional cybersecurity certification (CISSP, CISM, GSLC, CCISO)
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$103,711 - $138,281 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$108,896 - $145,195 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$114,082 - $152,109 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
\#GSS
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
**What to Expect Next**
\#LI-JS1
Requisition #: 338652
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
07/22/2025
Cloud Security Engineer
Cyber Security Analyst job in Oklahoma City, OK
Datavant is a data platform company and the world's leader in health data exchange. Our vision is that every healthcare decision is powered by the right data, at the right time, in the right format. Our platform is powered by the largest, most diverse health data network in the U.S., enabling data to be secure, accessible and usable to inform better health decisions. Datavant is trusted by the world's leading life sciences companies, government agencies, and those who deliver and pay for care.
By joining Datavant today, you're stepping onto a high-performing, values-driven team. Together, we're rising to the challenge of tackling some of healthcare's most complex problems with technology-forward solutions. Datavanters bring a diversity of professional, educational and life experiences to realize our bold vision for healthcare.
**What We're Looking For**
As a Cloud Security Engineer in the Secure Product & Infrastructure program, you will be part of a highly technical team, actively working to build security into Datavant's infrastructure. You'll play a key role helping to build secure patterns, and enabling engineering teams to move fast, while being secure.
**What You Will Do**
+ Use your strong understanding of AWS security to help Datavant navigate all the traps of good AWS products vs. great AWS products and know when to be thoughtful on use.
+ Have strong experience and understanding of containerization, as well as operating and securing Kubernetes clusters.
+ Have a point of view on secure continuous development and represent it as Datavant continues to mature working collaboratively with other team members.
+ Have a point of view on secure network controls and the deep design paradigms of secure cloud networking, and overlay networks.
+ Have experience working with engineering teams, helping to tune WAF rules for applications.
+ Review components being built in our cloud infrastructure (via pull request reviews and contribution). During these reviews you'll be mentally present and use your ability to evaluate risk such that you have a great impact on the delivery of secure code. This role is not merely a +1.
+ You will have an understanding of risks, but may have some knowledge gaps in depth of risk management. It's OK, we'll teach you. The core skill set you bring to the table is a development mindset.
+ Work directly with DevOps peers to help build practical and usable security into the SDLC and AWS.
+ Own new projects for advancing security in our environment. Be a technical expert and collaborate with others on the teams to ensure project success. Your impact here cannot be understated, you are a core contributor and have deep influence to empower Datavant greatness.
**What You Need to Succeed**
+ You are humble.
+ You have an "automation first" mindset.
+ You can build Infrastructure as Code in Terraform. It is expected that you have a "git native" skillset.
+ You can articulate start to finish what a secure release cycle should look like in detail.
+ You have opinions and options on most of the steps.
+ You are a consummate collaborator, it's inherent in your work behavior.
+ You value time deeply and optimize for greatest impact.
+ 3+ years of working in at least 1 major public Cloud provider and a desire to learn a second.
+ 2+ years of operating, and securing Kubernetes clusters.
+ Broad scoped projects don't scare you, they energize you. However, you like to get things done fast (and help others) with limited dependencies.
**What Helps You Stand Out**
+ You are often viewed as the "expert in the room" on cloud security in your current role.
+ You have experience with SCA, SAST, and secrets detection.
+ You have experience with security in healthcare or other highly regulated space. Examples: FEDRAMP, HIPAA/HITRUST, SOC 2, PCI experience from an operational response standpoint.
We are committed to building a diverse team of Datavanters who are all responsible for stewarding a high-performance culture in which all Datavanters belong and thrive. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status.
At Datavant our total rewards strategy powers a high-growth, high-performance, health technology company that rewards our employees for transforming health care through creating industry-defining data logistics products and services.
The range posted is for a given job title, which can include multiple levels. Individual rates for the same job title may differ based on their level, responsibilities, skills, and experience for a specific job.
The estimated total cash compensation range for this role is:
$152,000-$190,000 USD
To ensure the safety of patients and staff, many of our clients require post-offer health screenings and proof and/or completion of various vaccinations such as the flu shot, Tdap, COVID-19, etc. Any requests to be exempted from these requirements will be reviewed by Datavant Human Resources and determined on a case-by-case basis. Depending on the state in which you will be working, exemptions may be available on the basis of disability, medical contraindications to the vaccine or any of its components, pregnancy or pregnancy-related medical conditions, and/or religion.
This job is not eligible for employment sponsorship.
Datavant is committed to a work environment free from job discrimination. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status. To learn more about our commitment, please review our EEO Commitment Statement here (************************************************** . Know Your Rights (*********************************************************************** , explore the resources available through the EEOC for more information regarding your legal rights and protections. In addition, Datavant does not and will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay.
At the end of this application, you will find a set of voluntary demographic questions. If you choose to respond, your answers will be anonymous and will help us identify areas for improvement in our recruitment process. (We can only see aggregate responses, not individual ones. In fact, we aren't even able to see whether you've responded.) Responding is entirely optional and will not affect your application or hiring process in any way.
Datavant is committed to working with and providing reasonable accommodations to individuals with physical and mental disabilities. If you need an accommodation while seeking employment, please contact us at *********************** . We will review your request for reasonable accommodation on a case-by-case basis.
For more information about how we collect and use your data, please review our Privacy Policy (**************************************** .
Industrial Security Analyst - Oklahoma City OK
Cyber Security Analyst job in Oklahoma City, OK
ATTENTION MILITARY AFFILIATED JOB SEEKERS
- Our organization works with partner companies to source qualified talent for their open roles. The following position is available to
Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers
. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps. Unless specifically stated otherwise, this role is "On-Site" at the location detailed in the job post.
Job Description
RELOCATION ASSISTANCE: No relocation assistance available
CLEARANCE TYPE: Secret
TRAVEL: Yes, 10% of the Time
Description
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Aeronautics Systems Sector is seeking an Industrial Security Analyst 2 to join our excellent, diverse team of security professionals. This position reports to the Manager / FSO. This is an on-site position at the 59th Street facility in Oklahoma City. The selected candidate will provide industrial security support for multiple DOD Collateral and Special Access Programs.
Supports a fast-paced environment; create, maintain and leverage working relationships with internal and external customers. Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken. Working knowledge of 32 CFR Part 117 (NISPOM).
Duties include, but are not limited to:
Builds and maintains a strong security program compliant with the 32 CFR Part 117 (NISPOM) and all other applicable security requirements.
Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment.
Proactively supports security requirements for proposal activities including develops Basis of Estimate (BOE) for security labor support for classified programs.
Studies and implements U.S. security regulations that apply to company operations.
Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies.
Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to records and materials.
Develops, implements, and maintains a comprehensive security education, training, and awareness program.
Successfully plans and performs all manner of security inspections, including self-inspections, CSA inspections, and internal inspections, as required.
Investigates security incidents and prepares reports to submit to CSA personnel.
Leads and performs the security tasks associated with the construction or modification and approval of classified areas.
Develops, implements, and maintains all manner of required security documentation to include OPSEC plans, CONOPS, SOPs, desktop instructions, and more.
Leads and performs all manner of contract security classification actions including reviewing and interpreting Form DD-254, creating Form DD-254 for subcontractors, and more.
Additional Qualifications/Responsibilities
Basic Qualifications:
Bachelors Degree with 2 years of Industrial Security experience or an additional 4 years of Industrial Security experience will be considered in-lieu of a degree
Current Active Secret clearance with ability to obtain/maintain Top Secret
Excellent oral and written communication skills
Preferred Qualifications:
Top Secret clearance
COMSEC experience
Classification review experience
Experience completing compliance self-inspections and supporting formal customer compliance inspections
Experience drafting and completing corrective action plans
Self-starter with minimal supervision
Excellent customer service and communication skills
Ability to work independently and follow projects through to completion
Ability to maintain flexibility to deal with changing priorities and deadlines
Willing to work in a fast paced, deadline driven environment
Salary Range: $60,500.00 - $90,700.00
C2ISR Information System Security Officer
Cyber Security Analyst job in Oklahoma City, OK
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Command and Control, Intelligence, Surveillance, and Reconnaissance (C2ISR) Information System Security Officer (ISSO) will provide cybersecurity support to Joint Theater Air-to-Ground Simulation Systems (JTAGGS), Airborne Warning and Control Systems (AWACS), Airborne Surveillance Command and Control (ASC2), and/or Theater Air Control System (TACS) training and ground systems and networks. The ISSO is responsible for ensuring the appropriate operational security posture for information systems and must have detailed knowledge and expertise required to manage the security aspects of an information system. Responsibilities include implementation of the requirements of the Joint Special Access Program (SAP) Implementation Guide (JSIG), Risk Management Framework (RMF), and other security requirements as assigned. Duties also include physical and environmental protection, personnel security, and incident handling. Coordinate and synchronize security policy guidance with PLEXSYS Facility Security Officer and C2ISR Information System Security Manager (ISSM) and work in close coordination with Partner/Government ISSO/ISSM.
Duties & Responsibilities
Execute on-site information system security program to include implementation and validation of automated informational security, ensuring security requirements are satisfied for C2ISR training systems
Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
May assist in the development and updating of required Authority to Operate (ATO) artifacts
Conduct system audits in accordance with System Security Plan requirements
May be required to conduct maintenance on the networks, systems, and hardware
May be required to perform software upgrades on networks, systems, and hardware
Understand and follow NISPOM/ODAA/RMF/ICD/NIST/JSIG classified system accreditation and certification requirements
Other duties as assigned
REQUIREMENTS
Bachelor's degree in related field or 2 years' experience in related field
Extensive Training or experience with Windows based Information Systems standards with a working knowledge of Linux operating systems
Specialized computer training in networking and active directory
Experience with security audits for information systems
Strong communication and problem-solving skill
Ability to work in both a Team environment as well as independently
Must be organized and detail orientated
Current DoD 8570 IAT Level II and IAM Level I or higher certification (i.e. Security + or equivalent certification)
DESIRABLE
Experience with DoD Security Regulations and Policies
Experience with Type 1 and/or Type 2 virtualization platforms
Experience managing system security in an enterprise environment
Strong system documentation skills
Experience with Trellix ePO (HBSS), Splunk, and Tenable Security Center/Nessus (ACAS)
AUTHORITY
Must have or be able to obtain and maintain a Top-Secret clearance with approval for SAP and SCI access
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
Medical/Vision/Prescription/Dental Benefits
Life, AD&D and Long Term Disability Coverage
Paid Holidays, Military Leave, and Paid Time Off
401k Plan with eligibility from first day of employment
Education reimbursement for job-related courses for full-time employees
PriceClub/COSTCO/Sam's Club annual membership
PLEXSYS Interface Products, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Information Systems Security Officer - 201805
Cyber Security Analyst job in Oklahoma City, OK
Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology.
Ability to obtain a security clearance is REQUIRED.
A Security+ Certification is REQUIRED.
This position is 100% onsite.
· Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems
· Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform
· Ensure common controls are available for all hosted systems to inherit and maintain
· Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy
· Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents
· Update POA&Ms throughout the POA&M lifecycle till closure for all system controls.
· Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation
· Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies
· Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications
· Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings.
· Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle
· Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated
· Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A).
· Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports.
Requirements
At least 2+ years of related experience
Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, Security Planning and Architecture, Incident Analysis, and General Security Best Practices
Knowledge of NIST regulatory compliance requirements
Deep knowledge of the information security principles
Experience developing Information Security policies and procedures
Experience performing A&As and supporting the Risk Management Framework lifecycle
Ability to communicate, both written and orally, to both technical and non-technical stakeholders
Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer
Benefits
Benefits Include:
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
Security Engineer II - IT Security Services
Cyber Security Analyst job in Tulsa, OK
Greetings from Donato Technologies Inc.We have an immediate opening with my client. If you are looking for a new project, please send me a copy of your updated resume SECURITY ENGINEER II - IT SECURITY SERVICESW2 Contract Tulsa, OK Summary: Under supervision, the purpose of this position is administration of advanced security technologies, automation, and procedures to protect, detect and respond to cybersecurity issues in real-time, performing security initiatives across the company, analyzing threats and escalations from multiple sources, both internal and external, triaging a wide variety of security events, conducting detailed and comprehensive investigation and drive issues to closure, contributing to developing innovative solutions for detection and event handling, and collaborating with security partners and threat intelligence teams to derive indications and warnings of impending threat; and performs other related assigned duties. Responsibilities: • Supports Security System Infrastructure and Applications• Implements and tests endpoint security tools • Administration of security tools and products• Conducting scans of networks to find vulnerabilities • Implementation and testing of new security products and procedures• Investigating Cyber Incident Response and Recovery activities • Researching data for Legal and HR investigations• Works closely with other information technology staff, vendors, and internal customers to optimize and support the security tools and systems• Cross-trains junior engineers and customers on the use of security products and procedures • Must report to work on a regular and timely basis Reasonable accommodations may be made to enable individuals with disabilities to perform the essential tasks. Qualifications: Training and Experience: Must meet one of the following options or an equivalent combination of training and experience per Personnel Policies and Procedures, Section 128: 1. (a) Completion of sixty (60) hours from an accredited college or university including coursework in management information systems, computer science, information technology, information systems, or other related fields relevant to the essential tasks listed in this ; and, (b) Six (6) years' experience relevant to the essential tasks listed in this , preferably experience in enterprise-class systems analysis and/or systems administration; or, 2. (a) Graduation from high school or possession of a General Education Development (GED) certificate; and (b) Five (5) years experience relevant to the essential tasks listed in this job description; and, (c) Possession of a current industry accepted certification in two (2) of the following: 1) Security+; or 2) Server+; or 3) Network+; or 4) Certified Information Systems Security Professional (CISSP); or 5) Cisco Certified Network Associate (CCNA); or 6) Cisco Certified Network Professional (CCNP); or 7) Cisco Certified Internetwork Expert (CCIE); or 8) Microsoft Azure Certification PAY INCREASE OPPORTUNITY Employee will be eligible for the equivalent of a one (1) step increase upon completion of one (1) additional certification, listed in Training and Experience, not previously submitted, as approved by management and one (1) year employment in the position. Knowledge, Abilities and Skills: Knowledge of:• Considerable knowledge of an Enterprise Infrastructure Applications and Systems• Considerable knowledge of cyber threats and response tactics• Considerable knowledge of endpoint protection• Considerable knowledge of identity management, Intermediate knowledge of intrusion detection systems• Considerable knowledge of intrusion prevention systems• Considerable troubleshooting methods used with information systems and infrastructure-type applications• Considerable knowledge of operational characteristics and capabilities of applicable systems management applications• Considerable knowledge of various enterprise-level solutions• Considerable knowledge of personal computers and edge devices• Considerable knowledge of basic-level scripting Ability to:• Ability to troubleshoot and analyze fundamental systems/infrastructure applications/issues• Ability to communicate verbally and in writing with all levels of customers• Ability to document advanced technical information in a concise and understandable format• Ability to cross-train customers • Ability to perform basic scripting Skill in:• Skill in communicating effectively, in writing and verbally, to a diverse customer base Physical Requirements: Physical requirements include arm and hand dexterity enough to use a keyboard and telephone; occasional lifting and carrying up to 50 pounds; may be subject to sitting for extended periods, walking, standing, reaching, bending, kneeling, handling, and twisting; and vision, speech, and hearing sufficient to perform the essential tasks. Licenses and Certificates: 1. Possession of a valid Oklahoma Class “D” Driver License. 2. Possession of two (2) appropriate professional certifications, as listed under Training and Experience, as approved by management, not previously submitted, within one (1) year of date of hire Working Environment: The working environment is primarily indoors in an office setting; it may require some travel to various City locations to provide computer-related assistance; and on-call, after-hour support for assigned production systems. Jennifer Sampson
Technical Recruiter.......................................................DONATO TECHNOLOGIES, INC12100 Ford Rd, #306, Dallas, TX 75234Direct : **************
Email: ******************** Web: ******************
DONATO TECHNOLOGIES WAS FOUNDED IN 2012, WE SPECIALIZE IN STAFFING, CONSULTING, SOFTWARE DEVELOPMENT, AND TRAINING ALONG WITH IT SERVICES. INFORMATION TECHNOLOGY REMAINS OUR STRENGTH!
We partner with clients, appreciate, and understand their business needs and bring them the most innovative and relevant technology solutions available.
Our experience has made us who we are today. We have partnered with a lot of clients and built technology that powers their business.
Careers At Donato Technologies, Inc., we unite top-tier talent within a creative, collaborative, and supportive atmosphere, transforming daunting challenges into enjoyable and rewarding pursuits.
As a valued member of our team, you'll experience unparalleled opportunities to engage with both clients and cutting-edge technology.
We serve as the ultimate destination for talented individuals with aspirations and ambitions, addressing companies' growth needs comprehensively. We hold our clients, consultants, and talent in the highest regard.
If you're prepared to embark on a career in the technology fast lane, Donato is your ideal destination.
Security Engineer II
Cyber Security Analyst job in Oklahoma City, OK
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Senior IT Security Analyst
Cyber Security Analyst job in Midwest City, OK
Title:
Senior IT Security Analyst
Belong. Connect. Grow. with KBR!
KBR's National Security Solutions team (NSS) provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country's most critical role - protecting our national security.
Program Summary
KBR is looking for a motivated, energetic, and experienced Cybersecurity Professional with Assessment and Authorization (A&A) and hands on Cybersecurity Operational experience to join our team in Oklahoma City OK.
Job Summary
The successful candidate will be joining a team to initiate and complete the complex cybersecurity requirements of multiple systems in the DoD environment. The selected candidate must show the capability to complete an assessment and authorization application package and be dedicated to the success of our customers. The selected candidate will maintain situation awareness and initiation actions to improve or restore cybersecurity posture as well as conducting annual security reviews of all cybersecurity controls and test of selected cybersecurity control. The selected candidate's main area of work will be at Tinker AFB with some remote days possible and must be able to obtain a SECRET clearance.
Roles and Responsibilities
Technical security guidance in all phases of system accreditation requirements ensuring they are coordinated and communicated across the participant activities
Technical assistance in analyzing operations and systems architectural products
Perform verification and validation testing and provide guidance on mitigating risk to systems
Performs risk and vulnerability analysis, cybersecurity vulnerability management and compliance and reporting
Responsible for security assessments and reporting, cyber security control analysis mitigation and reports, and A&A compliance reports
Basic Qualifications
Associate's Degree in a technical discipline and five (5) years of related work experience
IAM Level 1 Certification
Experience preparing Certification and Accreditation packages following the Risk Management Framework (RMF) process
Must have at least one of the following Certifications: SEC+ CE, CAP, CND, GSLC
Knowledge of standalone, closed-loop, platform IT, Platform IT with interconnection, and DoD/DISA networks
Experience implementing Cybersecurity processes, provide guidance, and develop documentation throughout the system development life-cycle Knowledge of fundamentals
Demonstrate the ability to assess current security state, assess security controls and similar to support cybersecurity and ATO documentation
Demonstrate the ability to communicate effectively with other system engineers, system administrators, software developers, and information assurance professionals operational users and diverse mission planners
Ability to obtain a SECRET clearance
Use of MS Office Suite; specifically, MS Excel, PowerPoint and Word
Preferred Qualifications
USAF/Military/FAA aviation background
Bachelor's Degree in Computer Science, Cybersecurity or in a related technical discipline and two (2) years of related work experience
CISSP or equivalent
Familiarization with NIST SP 800-53 Rev Security and Privacy Controls for Information Systems and Organizations
Experience developing, implementing, and documenting formal security programs and policies throughout the program and monitors compliance to these policies and programs
Experience collaborating with security managers (both corporate and local), other ISSE's and ISSM's to define, improve, implement and maintain information security policies, strategies, and procedures
Experience validating and verifying system security requirements definitions and analysis and establishes system security designs
Experience with e Policy Orchestrator (ePO) Server Host Base Security System (HBSS), Microsoft Defender, Assured Compliance Assessment Solution (ACAS), eMass, or current similar CS tools
CISCO ASA 5512, CISCO Switches/Routers
Ability to obtain a TS/SCI clearance
Belong, Connect and Grow at KBR
At KBR, we are passionate about our people and our Zero Harm culture. These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a People First company. That commitment is central to our team of team's philosophy and fosters an environment where everyone can Belong, Connect and Grow. We Deliver - Together.
KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
Information Security Analyst I
Cyber Security Analyst job in Edmond, OK
Job Details 1400 BUILDING - EDMOND, OK Full Time 4 Year Degree $50000.00 - $60000.00 Salary/year Negligible Monday - Friday 8AM-5PM Information TechnologyDescription
Kirkpatrick Bank hires individuals who are committed to building long lasting relationships by delivering high quality customer service to all of our customers and within our communities. In return Kirkpatrick strives to offer a competitive and comprehensive benefit package.
Shift hours: Monday - Friday 8:00am to 5:00pm
Kirkpatrick Bank offers the following benefits (subject to eligibility requirement):
Company subsidized health and dental insurance for employees and dependents
Health and Dependent care flexible spending accounts, HSA account
Company provided life insurance and long term disability
Generous 401 (K) Match
Paid Sick and Vacation
Wellness Plan
Employee Banking products and services provided
Position Summary: The Information Security Analyst I will plan, implement, and monitor security procedures for the protection of the organization's computer networks and information.
Must live in, or plan to relocate to, Oklahoma City metro as this is an on-site role.
Supervisory Responsibilities: None
Essential Job Functions and Responsibilities:
Collaborates with users to discuss computer data access needs, to identify security threats and violations, and to identify and recommend needed planning, policy or process changes
Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information
Develops and implements plans to safeguard digital data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs
Reviews violations of security policies; provides training to ensure violations do not recur
Monitors and restricts access to sensitive, confidential, or other high-security data
Performs risk assessments, audits, and tests to ensure proper functioning of data processing activities and security measures
Safeguards system security and improves overall server and network efficiency by training users and promoting security awareness
Committed to Company Mission and Core Values
The above represents general responsibilities for the position. Other duties, responsibilities, and qualifications may be required and/or assigned as necessary.
Qualifications
Skills and Abilities:
Self-starter with the ability to prioritize tasks
Demonstrated problem-solving and analytical skills
Proficient, or able to gain proficiency with, a broad array of security software applications and tools
Thorough understanding of computer-related security systems including firewalls, encryption, and password protection and authentication
Proficient in Microsoft Office Suite or related software
Understanding of TCP/IP networks
Understanding of Microsoft operating systems and related systems hardening techniques
Experience with Microsoft 365/Entra ID products a plus
Excellent verbal and written communication skills
Organized with attention to detail
Education and Experience
Bachelor's degree in Cybersecurity, Information Security, Computer Science, Programming, or a related field preferred
CompTIA Security+ or other security-related certification a plus
At least three years of experience in information security highly preferred
Experience with at least one compliance framework (GLBA, NIST CSF, PCI DSS, etc.) preferred
Physical Requirements and Working Conditions:
Prolonged periods sitting at a desk and working on a computer
Must be able to lift up to 25 pounds at times
Professional office environment
Flexibility to work evenings and weekends, sometimes with little advance notice
Some travel required
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions
Kirkpatrick Bank is an Equal-Opportunity Employer who offers EEO to all persons without regard to race, color, religion, age marital or veterans status, sex, national origin, physical or mental disability or any other legally protected class.
Security Engineer - Security Risk Management
Cyber Security Analyst job in Oklahoma City, OK
The Meta Security team is responsible for improving the security posture of the software and services used throughout our company. Our work spans Facebook, Instagram, WhatsApp, Oculus, and all of the underlying systems and infrastructure that power these products behind the scenes.We are seeking a committed and experienced security engineer to join our Security Risk Management (SRM) team to help design and build solutions to:* Drive better understanding of security risk and enable investment decisions through automation, monitoring, and tracking of Meta's security tools, systems, and controls* Enable security and software engineers to seamlessly respond to requests to prove effective design and operation of security capabilities* Increase maturity of security capabilities through control improvements and redesign
**Required Skills:**
Security Engineer - Security Risk Management Responsibilities:
1. Work with a team of software, data, and security engineers that design, build, and own software solutions that scale high fidelity security risk contextualization, tracking, and reporting
2. Understand and influence evolution of security capabilities across various domains to scale and automate: a) monitoring the effectiveness, and b) increasing the maturity of those capabilities
3. Design and build solutions to scale managing and responding to risk management & compliance related requests
**Minimum Qualifications:**
Minimum Qualifications:
4. Bachelor's degree or equivalent experience in information security
5. 5+ years work experience securing enterprise-scale infrastructure software and services
6. 3-5+ years programming experience with at least one of the following languages: Python, PHP, Ruby, or similar scripting languages
7. Experience remediating infrastructure security gaps across broad corporate boundaries using influence and relationships
8. Experience with security control automation/monitoring or "compliance as code" implementations
9. Experience thinking critically and defending solutions with solid communications skills in a cross-functional setting to influence decision makers across all levels of technical background
**Preferred Qualifications:**
Preferred Qualifications:
10. Networking and system administration experience of server (Linux, Windows) and client (Windows, mac OS, Linux) operating systems
11. Experience influencing software engineers to build products meant to scale security solutions
12. Experience generating automated metrics to measure service and program effectiveness and consistency
13. Experience with common risk & compliance program activities (e.g., controls, risk, policy management)
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Virtual Cyber Security SDR, BDR, Contract to Hire
Cyber Security Analyst job in Tulsa, OK
Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats. They pride themselves on our innovative approach to safeguarding sensitive data, networks, and systems. Their team of experts provides comprehensive cybersecurity solutions that empower organizations to navigate the complex digital landscape with confidence.
Position Summary: As a Virtual SDR, BDR at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. As one of the first 20 employees, you will play a vital role in shaping the direction of our company and driving growth. Their recent seed round raised an unbelievable $11M at a $36M valuation, and the founders' last venture resulted in a big exit with the sale of the company to Microsoft.
They operate in the IT Security space and are 100% virtual. In this dynamic and customer-facing role, you will leverage your technical expertise and sales acumen to provide strategic guidance and support to our clients throughout the sales process.
This position offers a unique blend of technical knowledge, sales skills, and the opportunity for nationwide travel.
We Are Looking For:
As a mid-level Business Development Rep. (BDR SDR) you'll be at the tip of the spear, responsible for researching and qualifying top of funnel leads while being the first to connect with our potential customers. You'll research and build contact lists, make outbound cold calls/emails to those who fit our Ideal Customer Profile (ICP) and will then partner with AEs to get customers onboarded. This position will spend roughly 80% of the time on the phone or email prospecting for new clients. This position is a great way for individuals to gain in-depth sales experience with a rapidly growing SaaS security company looking to win the category!
What You'll Do:
Generate high volume quality MQLs through various direct sales efforts such as calls, emails, events, webinars, and other channels generated by Marketing.
Make daily outbound calls/emails to prospects who have demonstrated interest.
Follow up on all calls and emails until meetings are booked or you've been able to move the prospect through the funnel.
Record all activities and properly manage lead stage/flow in our Salesforce CRM.
Achieve or exceed monthly quotas of meetings, demos, and qualified leads worked with AEs.
Schedule product demos on AE's calendar.
Discern buyer intent and partner with AEs to get the right customers onboarded.
Work closely with Marketing, Product, and CS/CX to clearly communicate critical top-of-funnel feedback and suggestions that help optimize segmentation, content, & features.
What You'll Need:
Must have BDR/SDR experience in the SaaS or similar software space
Great speaking self-awareness and ability to read prospect signals and adjust accordingly to move the prospect down the funnel.
Must have a clear, easy-to-understand phone voice and a professional Zoom presence with the ability to engage and empathize over the phone.
Hands-on experience with multiple sales prospecting techniques like cold calling, cold emailing, video conference selling, and social outreach is a must.
Knowledge of sales & marketing constructs, the evergreen funnel, and playbooks are important.
Must be a great listener with an ability to address objections graciously and frame the next steps clearly.
Good writers and creative thinkers needed - Must be able to craft well-written (great grammar and spelling), compelling emails, and responses that lead prospects down the funnel.
Verifiable track record of success and goal attainment in a frontline sales-oriented role
Deep knowledge of software and social networks (especially LinkedIn, Facebook, and Twitter) is important.
Track record of (over)achieving sales quotas.
Must have a strong, self-motivated drive, passion, and desire to deliver results.
Experience in a fast-growing startup environment is a big plus.
What We Offer:
Contract to Hire, Strong Salary plus comm after 90 days
Full Benes
PreIPO equity
Be part of an exciting high-growth SaaS organization
An impactful role with lots of growth potential
A lot of freedom to apply your creative and strategic skills
A work-hard, play-hard environment
100% virtual
Virtual Cyber Security SDR, BDR, Contract to Hire
Information Systems Security Officer - 201805
Cyber Security Analyst job in Oklahoma City, OK
Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology.
Ability to obtain a security clearance is REQUIRED.
A Security+ Certification is REQUIRED.
This position is 100% onsite.
· Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems
· Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform
· Ensure common controls are available for all hosted systems to inherit and maintain
· Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy
· Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents
· Update POA&Ms throughout the POA&M lifecycle till closure for all system controls.
· Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation
· Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies
· Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications
· Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings.
· Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle
· Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated
· Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A).
· Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports.
Requirements
At least 2+ years of related experience
Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, Security Planning and Architecture, Incident Analysis, and General Security Best Practices
Knowledge of NIST regulatory compliance requirements
Deep knowledge of the information security principles
Experience developing Information Security policies and procedures
Experience performing A&As and supporting the Risk Management Framework lifecycle
Ability to communicate, both written and orally, to both technical and non-technical stakeholders
Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer
Benefits
Benefits Include:
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
SECURITY ENGINEER II - IT SECURITY SERVICES
Cyber Security Analyst job in Tulsa, OK
Greetings from Donato Technologies Inc. We have an immediate opening with my client. If you are looking for a new project, please send me a copy of your updated resume SECURITY ENGINEER II - IT SECURITY SERVICES W2 Contract
Tulsa, OK
Summary: Under supervision, the purpose of this position is administration of advanced security technologies, automation, and procedures to protect, detect and respond to cybersecurity issues in real-time, performing security initiatives across the company, analyzing threats and escalations from multiple sources, both internal and external, triaging a wide variety of security events, conducting detailed and comprehensive investigation and drive issues to closure, contributing to developing innovative solutions for detection and event handling, and collaborating with security partners and threat intelligence teams to derive indications and warnings of impending threat; and performs other related assigned duties. Responsibilities: Supports Security System Infrastructure and Applications Implements and tests endpoint security tools Administration of security tools and products Conducting scans of networks to find vulnerabilities Implementation and testing of new security products and procedures Investigating Cyber Incident Response and Recovery activities Researching data for Legal and HR investigations Works closely with other information technology staff, vendors, and internal customers to optimize and support the security tools and systems Cross-trains junior engineers and customers on the use of security products and procedures Must report to work on a regular and timely basis Reasonable accommodations may be made to enable individuals with disabilities to perform the essential tasks. Qualifications: Training and Experience: Must meet one of the following options or an equivalent combination of training and experience per Personnel Policies and Procedures, Section 128: 1. (a) Completion of sixty (60) hours from an accredited college or university including coursework in management information systems, computer science, information technology, information systems, or other related fields relevant to the essential tasks listed in this ; and, (b) Six (6) years experience relevant to the essential tasks listed in this , preferably experience in enterprise-class systems analysis and/or systems administration; or, 2. (a) Graduation from high school or possession of a General Education Development (GED) certificate; and (b) Five (5) years experience relevant to the essential tasks listed in this job description; and, (c) Possession of a current industry accepted certification in two (2) of the following: 1) Security+; or 2) Server+; or 3) Network+; or 4) Certified Information Systems Security Professional (CISSP); or 5) Cisco Certified Network Associate (CCNA); or 6) Cisco Certified Network Professional (CCNP); or 7) Cisco Certified Internetwork Expert (CCIE); or 8) Microsoft Azure Certification PAY INCREASE OPPORTUNITY Employee will be eligible for the equivalent of a one (1) step increase upon completion of one (1) additional certification, listed in Training and Experience, not previously submitted, as approved by management and one (1) year employment in the position. Knowledge, Abilities and Skills: Knowledge of: Considerable knowledge of an Enterprise Infrastructure Applications and Systems Considerable knowledge of cyber threats and response tactics Considerable knowledge of endpoint protection Considerable knowledge of identity management, Intermediate knowledge of intrusion detection systems Considerable knowledge of intrusion prevention systems Considerable troubleshooting methods used with information systems and infrastructure-type applications Considerable knowledge of operational characteristics and capabilities of applicable systems management applications Considerable knowledge of various enterprise-level solutions Considerable knowledge of personal computers and edge devices Considerable knowledge of basic-level scripting Ability to: Ability to troubleshoot and analyze fundamental systems/infrastructure applications/issues Ability to communicate verbally and in writing with all levels of customers Ability to document advanced technical information in a concise and understandable format Ability to cross-train customers Ability to perform basic scripting Skill in: Skill in communicating effectively, in writing and verbally, to a diverse customer base Physical Requirements: Physical requirements include arm and hand dexterity enough to use a keyboard and telephone; occasional lifting and carrying up to 50 pounds; may be subject to sitting for extended periods, walking, standing, reaching, bending, kneeling, handling, and twisting; and vision, speech, and hearing sufficient to perform the essential tasks. Licenses and Certificates: 1. Possession of a valid Oklahoma Class D Driver License. 2. Possession of two (2) appropriate professional certifications, as listed under Training and Experience, as approved by management, not previously submitted, within one (1) year of date of hire Working Environment: The working environment is primarily indoors in an office setting; it may require some travel to various City locations to provide computer-related assistance; and on-call, after-hour support for assigned production systems.
Jennifer Sampson
Technical Recruiter
.......................................................
DONATO TECHNOLOGIES, INC
12100 Ford Rd, #306, Dallas, TX 75234
Direct : **************
Email: ********************
Web: ******************