Post job

Cyber Security Analyst jobs in Springfield, OH

- 152 Jobs
All
Cyber Security Analyst
Information Security Analyst
Intrusion Detection Analyst
Defense Analyst
Data Security Analyst
Security System Engineer
  • Cyber Analyst/ Cyber Security Analyst

    Cyber Defense Technologies 3.9company rating

    Cyber Security Analyst job 23 miles from Springfield

    Cyber Analyst/Cyber Security Analyst Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Cyber Analyst/Cyber Security Analyst onsite in Dayton, OH with a TS/SCI clearance. In this role, you will monitor, analyze, for the purpose of mitigating threats. Responsibilities: Monitor network traffic, logs and alert to identify suspicious activity. Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threat. Perform in-depth analysis of potential threats, vulnerabilities, and incidents to determine severity and impacts. Qualifications: Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 5+ years of relevant experience Relevant experience may be considered in lieu of required education. Relevant certifications (e.g. CEH, Security +, CYSA+) Why Join Cyber Defense Technologies? At CDT, we offer a collaborative and inclusive work environment where your expertise in finance and HR can help shape the future of cybersecurity and engineering solutions. This position offers the opportunity to lead financial strategies while supporting HR initiatives in a fast-paced, government contracting environment. Compensation and Benefits: Competitive salary based on experience. Comprehensive benefits package, including health, dental, and retirement plans. Opportunities for professional development and career advancement. CDT is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity employer making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. Apply Now: If you are a proactive Cyber Analyst/Cyber Security Analyst and thrive in dynamic environments, we encourage you to apply and join the CDT team!
    $78k-105k yearly est. 60d+ ago
  • Cyber Security Analyst

    UIC Government Services and The Bowhead Family of Companies

    Cyber Security Analyst job 15 miles from Springfield

    Bowhead seeks an experienced Cyber Threat Analyst to join our team in Wright Patterson AFB, OH. The Cyber Security Analyst will be responsible for monitoring, tracking and reporting relevant events, types and sources to the correct departments. This highly skilled individual will work in various capacities alongside Computer Network Defense (CND) Incident Responders and Cybersecurity Engineers. The Cyber Threat Analyst will be responsible for applying technical and functional expertise to collect, normalize and characterize cyber incident and event data to identify anomalous or malicious activity including intrusions, attacks, data loss or other prohibited activities. The Cyber Threat Analyst will analyze and correlate incidents and events that may involve foreign intelligence entities and warn of anticipated hostile attacks against DoD information systems or networks. **Responsibilities** + Receive and initial analysis on warning intelligence information and proper sharing of intelligence notifications, notes and reports with customers. + Identify potential impact to customers by analysis of intelligence reports, forensic reports and reverse engineering of malware reports to determine associated indicators of compromise (IOC's) and using the IOCs to develop and distribute countermeasures to detect and prevent identified threats. + Evaluation of IOCs from incidents to determine association with known computer network exploitation (CNE) groups and thoroughly investigate the IOCs for other infrastructure possibly related to the CNE teams (domain registration, IP ownership, VPN infrastructure, strains of malware, etc.) for the possible addition of proactive defensive measures. + Will assist customers in preventing or mitigating the potential impact of cyber-attacks by developing, distributing and sharing countermeasures that may impact networks and information systems with peer DCO organizations and customers. **Qualifications** + A BS/BA degree in Computer Science or related field is required + Must have a minimum of a CompTIA Security+ certificate to start-will be required to obtain a Certified Ethical Hacker (CEH) certificate within 90 days of starting + A minimum of five (5) years of Linux and Networking experience, three (3) years' experience with IDS, IPS and Host Based Security Solutions and two (2) years of experience with malware analysis tools (such as IDA Pro, Cuckoo Sandbox, OllyDbg) is required + Must have demonstrable, strong programming skills-specifically in Python and C/C++ 2+ years of Python programming experience + Intermediate to advanced level skills in Microsoft Office software suite - Word, Excel, Outlook, PowerPoint + Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience + Presentation and strong public speaking skills are required + Strong interpersonal skills and good judgment with the ability to work alone or as part of a team SECURITY CLEARANCE REQUIRED: Must currently hold a security clearance at the Top Secret level and SCI eligible or the ability to obtain SCI. Physical Demands: - Must be able to lift up to 25 pounds - Must be able to stand and walk for prolonged amounts of time - Must be able to twist, bend and squat periodically \#LI-MN1 Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification. Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes. UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. All candidates must apply online at ****************** and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance (******************************************** The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c) UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs. **Join our Talent Community!** Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events. **ID** _2025-23334_ **Category** _Cybersecurity/Information Security_ **Location : Location** _US-OH-Wright Patterson AFB_ **Clearance Level Must Be Able to Obtain** _Top Secret/SCI_ **Minimum Clearance Required** _Top Secret_ **Travel Requirement** _Less than 10%_
    $72k-98k yearly est. 6d ago
  • Cyber Security Analyst/Implementation Specialist

    Tectammina

    Cyber Security Analyst job 43 miles from Springfield

    Responsibility for information cyber security analysis & response with the mission of protecting the firm from internet attacks / threat actors. Lead initiatives and the implementation of capabilities in order to advance the Cyber Threat program Enhance and distribute security incident response and escalation procedures to ensure timely and effective handling of security events and alerts Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements. A solid understanding of Penetration Testing, Vulnerability Management, Threat Vector Analysis, Intrusion Detection and Prevention, Incident Management and Response, Web Application Security, Risk Assessment and Mitigation methodologies, and Counter Threat Operations. Qualifications Cyber Security Analyst/Implementation Specialist - need someone that has broad cyber security knowledge that can not only recommend solutions, but more importantly also has experience implementing/managing those solutions. MUST HAVE JAVA DEVELOPMENT BACKGROUND Need solid remediation experience - how to remediate vulnerabilities in a web application CISSP certification is nice to have, not mandatory Additional Information Job Status: Contract to Hire Eligibility: EAD Green Card/ Green Card/ US Citizens Share the Profiles to ********************* Contact: ************ Keep the subject line with Job Title and Location
    $72k-99k yearly est. Easy Apply 60d+ ago
  • Cyber Security Analyst

    Illumination Works LLC 3.9company rating

    Cyber Security Analyst job 23 miles from Springfield

    Job Description Location and Travel Details: Dayton, OH area (Wright-Patterson AFB), Oklahoma City, OK area (Tinker AFB), or Ogden, UT / Salt Lake City, UT area (Hill AFB) The key responsibilities of the Cyber Security Analyst include: Provide support enforcing information systems security policies, standards, and methodologies Analyze threats and implement best practice methodologies for incident detection, reporting, and vulnerability remediation Maintain records on systems, applications, hardware, etc. to include system upgrades Maintain operational security posture for information systems Provide support to the Information System Security Officer (ISSO) for maintaining the appropriate operational IA posture for a system/program/enclave Provide CM for security-relevant information system software, hardware, and firmware Key skills for this position include: Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; encryption techniques/tools Demonstrated experience performing day-to-day security operations of large, complicated information and information processing systems Must be committed to adhering to best practices Must be a solutions-oriented team player and must possess a high level of self-initiative Must have excellent interpersonal skills Minimum education: Bachelor’s degree in Computer Science, Cybersecurity, or comparable academic discipline Minimum experience requirements: 6 months experience on an incident response team or vulnerability management team Must possess or be willing to obtain quickly a Security+ certification Must have or be willing to obtain Secret Clearance (this requires US Citizenship) Acceptable candidates must successfully pass a drug test and background screen Desired Experience: Practical understanding of the vulnerability management lifecycle Understanding of vulnerability management software About Illumination Works At Illumination Works, we know data, and we should, we’ve been doing it since we started in 2006! We specialize in everything data from big data to data science, data engineering, software engineering, and cloud design. We are a trusted technology partner in user-centered digital transformation—delivering impactful business results to clients. We partner with customers to solve their unique technology and data challenges and stay on top of modern technologies and advancements leveraging our Innovation Lab. Check out our website to learn more at *************** Why choose us? We invest in our employees in all aspects of their life and we value family. We offer market competitive salary, a generous PTO package, and comprehensive medical, dental, vision and life insurance plans. We also offer 401K, short/long-term disability insurance, a fun and engaging culture, and training opportunities to keep you up to speed on the latest technologies. Illumination Works is committed to hiring and retaining the best workforce. We hire the best talent for our customer’s needs. We make our hiring decisions without regard to race, color, religion, sexual orientation, gender identity or national origin, age, veteran status, disability, or any other protected class. Acceptable candidates must successfully pass a drug test and background screen.
    $73k-93k yearly est. 37d ago
  • Cyber Analyst

    Radiancetech

    Cyber Security Analyst job 19 miles from Springfield

    Radiance Technologies is an employee-owned company serving the defense and intelligence community with cutting-edge solutions and innovation. We offer a comprehensive benefits package that includes a competitive salary, generous 401(k) contributions, full health, dental, vision, and life insurance, and educational reimbursement to support your continued development. The candidate will support all-source scientific and technical intelligence (S&TI) analysis supporting NASIC, United States Air Force, Department of Defense (DoD) and National Level intelligence efforts. The candidate will interface with other Intelligence Community (IC) members, including both U.S. and foreign partners, and DoD agencies, within and external to NASIC in support of production activities. Job Duties Provide software reverse engineering and cyber vulnerability analysis of Government-provided software and datasets, including triage of provided datasets and vulnerability analysis of identified software Triage tasks will include reconstruction of file structures and identification/resolution of missing dependencies which prevent software from reaching a state where vulnerability analysis can be conducted Vulnerability analysis tasks include rehosting software to enable analysis, employment of translation software, fuzzers, hex editors, debuggers, forensic analyzers, and varying programing languages to discover and quantify vulnerabilities. Research potential tests and tools to utilize associated with the discovered vulnerabilities Maintain all-source awareness of intelligence reporting for topics relevant to exploited software Prepare documents, reports, and studies which pertain to Government selected topics of interest Required Skills and Qualifications: Active TS/SCI clearance Bachelor's Degree in STEM field (Electrical Engineering, Computer Engineering, or another relevant technical field) Effective interpersonal skills including the ability to collaborate successfully with other internal and external stakeholders Strong written and verbal communication skills with an ability to succinctly describe complex technical scenarios in simple, easily understood terms Strong analytic, critical thinking, and creative problem-solving skills Desired Skills and Qualifications: Experience supporting US Government Scientific & Technology Intelligence Centers EOE/Minorities/Females/Vet/Disabled
    $72k-98k yearly est. 36d ago
  • Entry Level Cyber Security Analyst

    Reynolds and Reynolds Company 4.3company rating

    Cyber Security Analyst job 23 miles from Springfield

    ":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks. You must also be able to communicate your findings and recommendations for management. You will work with teams across the organization including partnering with IT and Software Development on security related matters. If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-06-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance. We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off. At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center. We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation. Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment. Reynolds and Reynolds is an equal opportunity employer. ","
    $85k-110k yearly est. 3d ago
  • Chinese Mandarin Linguist - Defense Analyst

    Atlas Advisors 3.8company rating

    Cyber Security Analyst job 23 miles from Springfield

    Chinese Mandarin Linguist Are you driven by the challenge of decoding adversary intent and shaping strategic decision-making through deep language and cultural insight? ATLAS Advisors is seeking a skilled professional to join our mission-focused team supporting the U.S. Air Force and the Intelligence Community. This role plays a vital part in helping analysts and decision-makers understand foreign military doctrine and emerging operational concepts, which are critical for informing U.S. defense planning and deterrence strategies. If you have strong language proficiency, a background in intelligence, and a desire to apply your skills to cutting-edge research and analysis, this is an opportunity to contribute directly to national security from behind the scenes. Responsibilities: Translate and analyze Chinese-language documents related to military doctrine, including warfighting strategies, deterrence and escalation, and competition dynamics Work closely with Government Technical Managers and Subject Matter Experts Interpret the implications of foreign military concepts Support Science & Technical Intelligence production Contribute to analysis related to UAS force employment Contribute to Model-Based Systems Engineering efforts Support enhancements to data processing and exploitation methods Qualifications Required: Active TS/SCI security clearance ILR Level 3 proficiency in Chinese Mandarin and English Able to relocate to or commute daily to Dayton, Ohio Desired: Experience analyzing foreign military doctrine, especially People's Liberation Army sources Familiarity with joint fires planning and targeting concepts Knowledge of un-crewed systems and UAS force employment Background in S&TI analysis for NASIC, DIA, or similar agencies Understanding of MBSE and its application to defense systems Ability to assess the operational impact of foreign doctrine Experience producing or supporting IC intelligence products Comfortable briefing or collaborating with GTMs and SMEs Strong analytical writing skills for defense and IC audiences Compensation and Benefits Competitive salary 401(k) retirement plan Full medical care benefits package Paid training and professional development
    $68k-103k yearly est. 5d ago
  • Cybersecurity Incident Response & Threat Detection Analyst

    Teksynap

    Cyber Security Analyst job 43 miles from Springfield

    **Responsibilities & Qualifications** **RESPONSIBILITIES** + Provide continuous 24x7x365 monitoring and analysis of SIEM platforms and other cybersecurity monitoring tools to detect and respond to cybersecurity threats. + Identify, analyze, and respond to unauthorized activity across the Enterprise Network Environment using industry-standard incident response processes. + Conduct root cause analysis for cybersecurity events and incidents to support threat mitigation and recovery efforts. + Employ cybersecurity capabilities and deliberate actions in response to alerts, indicators of compromise (IOCs), and emerging threats. + Monitor event logs and network traffic to detect Advanced Persistent Threats (APTs), "low and slow" attacks, and other anomalous behavior. + Review security events and indicators to identify patterns or trends suggestive of compromise or malicious activity. + Leverage Open Source Intelligence (OSINT) and threat intelligence feeds to maintain situational awareness of active threats. + Support the configuration, tuning, and sustainment of cybersecurity tools and applications, including firewalls, IDS/IPS, antivirus, and forensic platforms. + Assist in the implementation of Defense-In-Depth strategies, applying network perimeter controls and signature-based protections. + Develop scripts and tools (preferably in SPL, Python, or PowerShell) to automate or enhance threat detection and incident response workflows. **REQUIRED QUALIFICATIONS** **Experience** + Minimum of 5 years of relevant experience in cybersecurity operations or incident response. + At least 2 years of experience performing root cause analysis for cybersecurity incidents. + Hands-on experience with at least two of the following security tools: + Firewalls + Intrusion Detection/Prevention Systems (IDS/IPS) + Host-based Antivirus + Data Loss Prevention (DLP) + Vulnerability Management + Forensics + Malware Analysis + System/Device Hardening + Understanding of Defense-in-Depth strategies and layered security controls. + Ability to develop and implement tools or scripts to enhance detection and response capabilities. **Certifications** + DoD 8570 IAT Level II Baseline Certification + COMPTIA Security+ CE + Cisco Certified Network Associate (CCNA) + COMPTIA Cybersecurity Analyst (CySA+) + Global Information Assurance Certification (GIAC) Global Industriel Cyber Security Professional (GICSP) + Global Information Assurance Certification (GAIC) Security Essentials Certification (GSEC) + Certified Network Defender (CND) + Systems Security Certified Practitioner (SSCP) + DoD 8570 CSSP-IR Certification + Certified Ethical Hacker (CEH) + CyberSec First Responder (CFR) + Cisco Certified Network Associate (CCNA Cyber Ops) + CCNA Security + Computer Hacking Forensic Investigator (CHFI) + Cybersecurity Analyst Plus (CYSA+) + GIAC Certified Forensic Analsyt (GCFA) + GIAC Certified Incident Handler (GCIH) + Implementing Cisco Cybersecurity Operations (SCYBER) Comp TIA Penetration Tester+ (PenTest+) + Must have relevant Computer Network Defense CE certification within six (6) months of onboarding **Clearance** + Top Secret - IT-I Critical Sensitive or Tier 5 (T5) **Overview** We are seeking a Cybersecurity Incident Response & Threat Detection Analyst to join our team supporting External Application Incident Response Support Services. TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers. We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays. Visit us at **************** . Apply now to explore jobs with us! The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation. By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration. **Additional Job Information** **WORK ENVIRONMENT AND PHYSICAL DEMANDS** The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. + Locations: DLA Land and Maritime Columbus OH, Ft. Belvoir, VA, HDIFC Battle Creek MI (One position any one of these sites) + Type of environment: Office + Noise level: Medium + Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs. + Amount of Travel: Less than 10% **PHYSICAL DEMANDS** The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus. **WORK AUTHORIZATION/SECURITY CLEARANCE** + U.S. Citizen + Secret clearance **OTHER INFORMATION** Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment. **EQUAL EMPLOYMENT OPPORTUNITY** In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment. TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance. **Job Locations** _US-OH-Columbus | US-VA-Fort Belvoir | US-MI-Battle Creek_ **ID** _2025-8071_ **Category** _Cybersecurity_ **Type** _Regular Full-Time_
    $71k-100k yearly est. 23d ago
  • Cybersecurity Incident Response & Threat Detection Analyst

    Sql Database Administrator In Fort Belvoir, Virginia

    Cyber Security Analyst job 43 miles from Springfield

    Responsibilities & Qualifications RESPONSIBILITIES Provide continuous 24x7x365 monitoring and analysis of SIEM platforms and other cybersecurity monitoring tools to detect and respond to cybersecurity threats. Identify, analyze, and respond to unauthorized activity across the Enterprise Network Environment using industry-standard incident response processes. Conduct root cause analysis for cybersecurity events and incidents to support threat mitigation and recovery efforts. Employ cybersecurity capabilities and deliberate actions in response to alerts, indicators of compromise (IOCs), and emerging threats. Monitor event logs and network traffic to detect Advanced Persistent Threats (APTs), "low and slow" attacks, and other anomalous behavior. Review security events and indicators to identify patterns or trends suggestive of compromise or malicious activity. Leverage Open Source Intelligence (OSINT) and threat intelligence feeds to maintain situational awareness of active threats. Support the configuration, tuning, and sustainment of cybersecurity tools and applications, including firewalls, IDS/IPS, antivirus, and forensic platforms. Assist in the implementation of Defense-In-Depth strategies, applying network perimeter controls and signature-based protections. Develop scripts and tools (preferably in SPL, Python, or PowerShell) to automate or enhance threat detection and incident response workflows. REQUIRED QUALIFICATIONS Experience Minimum of 5 years of relevant experience in cybersecurity operations or incident response. At least 2 years of experience performing root cause analysis for cybersecurity incidents. Hands-on experience with at least two of the following security tools: Firewalls Intrusion Detection/Prevention Systems (IDS/IPS) Host-based Antivirus Data Loss Prevention (DLP) Vulnerability Management Forensics Malware Analysis System/Device Hardening Understanding of Defense-in-Depth strategies and layered security controls. Ability to develop and implement tools or scripts to enhance detection and response capabilities. Certifications DoD 8570 IAT Level II Baseline Certification COMPTIA Security+ CE Cisco Certified Network Associate (CCNA) COMPTIA Cybersecurity Analyst (CySA+) Global Information Assurance Certification (GIAC) Global Industriel Cyber Security Professional (GICSP) Global Information Assurance Certification (GAIC) Security Essentials Certification (GSEC) Certified Network Defender (CND) Systems Security Certified Practitioner (SSCP) DoD 8570 CSSP-IR Certification Certified Ethical Hacker (CEH) CyberSec First Responder (CFR) Cisco Certified Network Associate (CCNA Cyber Ops) CCNA Security Computer Hacking Forensic Investigator (CHFI) Cybersecurity Analyst Plus (CYSA+) GIAC Certified Forensic Analsyt (GCFA) GIAC Certified Incident Handler (GCIH) Implementing Cisco Cybersecurity Operations (SCYBER) Comp TIA Penetration Tester+ (PenTest+) Must have relevant Computer Network Defense CE certification within six (6) months of onboarding Clearance Top Secret - IT-I Critical Sensitive or Tier 5 (T5) Overview We are seeking a Cybersecurity Incident Response & Threat Detection Analyst to join our team supporting External Application Incident Response Support Services. TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers. We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays. Visit us at ***************** Apply now to explore jobs with us! The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation. By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP". As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration. Additional Job Information WORK ENVIRONMENT AND PHYSICAL DEMANDS The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. Locations: DLA Land and Maritime Columbus OH, Ft. Belvoir, VA, HDIFC Battle Creek MI (One position any one of these sites) Type of environment: Office Noise level: Medium Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs. Amount of Travel: Less than 10% PHYSICAL DEMANDS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus. WORK AUTHORIZATION/SECURITY CLEARANCE U.S. Citizen Secret clearance OTHER INFORMATION Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment. EQUAL EMPLOYMENT OPPORTUNITY In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as “protected status”). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment. TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance.
    $71k-100k yearly est. 15d ago
  • Incident Response & Detection Analyst (CND)

    Northern Technologies Group 3.9company rating

    Cyber Security Analyst job 43 miles from Springfield

    Northern Technologies Group, Inc. (NTG), an SBA-certified 8(a) small business, is committed to delivering high-quality IT and cybersecurity solutions to federal customers. We are actively pursuing new opportunities to support a Department of Defense customer's cybersecurity mission. This position is part of a proposal effort and is contingent upon contract award. All offers and compensation will be determined based on contract terms and candidate qualifications. NTG is seeking experienced Incident Response & Detection Analysts to join our cyber defense team supporting a Department of Defense customer. You will work within a 24/7 security operations center, conducting live threat detection, analysis, and coordinated response across complex environments. Essential Duties and Responsibilities Monitor and triage security events from SIEM, IDS/IPS, and host logs. Conduct forensic analysis, determine root cause, and respond to live cyber threats. Collaborate with threat hunters and SIEM developers to improve detection techniques. Utilize scripting (e.g., Python, PowerShell) to automate detection/response. Leverage malware analysis tools, packet captures, and threat intel feeds. Document incidents, mitigation strategies, and lessons learned. Support integration of threat intelligence into ongoing incident response processes. Requirements Minimum Qualifications (Knowledge, Skills, and Abilities) Active and current Top Secret federal security clearance 5+ years of experience in cybersecurity with at least 2 years being in root cause analysis DoD 8570/8140 IAT Level II (e.g., CompTIA Security+ CE, CySA+, GSEC, SSCP) CSSP-IR (Incident Responder) (e.g., CE|H, CFR, GCFA, GCIH, SCYBER, or CYSA+) CND-CE certification within 6 months of hire Proficient in malware forensics, IDS/IPS and scripting Familiar with TTPs and threat hunting techniques Preferred Qualifications (Knowledge, Skills, and Abilities) Familiarity with MITRE ATT&CK and SOAR platforms Experience in live SOC environments Important Note This position is part of a proposal effort and is contingent upon contract award. All offers and compensation will be determined based on contract terms and candidate qualifications. Physical Demands and Work Environment The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. Reasonable accommodation may be made to enable individuals with disabilities to perform these functions. While performing the duties of this position, the employee is regularly required to talk or hear. The employee frequently is required to use hands or fingers, handle or feel objects, tools, or controls. The employee is occasionally required to stand; walk; sit; and reach with hands and arms. The employee must occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this position include close vision, distance vision, and the ability to adjust focus. The noise level in the work environment is usually low to moderate. Northern Technologies Group is an equal opportunity employer. We do not discriminate based on race, color, religion, sex, national origin, disability, age, or any other protected status under federal, state, or local law. Travel Up to 10% Shift Hours and shift determined by location. Note This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. Employees will be required to follow any other job-related instructions and to perform any other job-related duties requested by any person authorized to give instructions or assignments. This document does not create an employment contract, implied or otherwise, other than an “at will” relationship.
    $69k-96k yearly est. 27d ago
  • Computer Network Defense(CND)Analyst

    Apotheosis

    Cyber Security Analyst job 43 miles from Springfield

    Overall Assignment Description: The CND Analyst will perform actions to protect, monitor, detect, analyze and respond to unauthorized activity within assigned information systems and computer networks. Duties include: Employs Cybersecurity capabilities and deliberate actions to respond to a CND alert or emerging situational awareness/threat. Serves as an expert on CND requirements and compliance to such requirements by using IA tools and techniques to perform compliance analysis and correlation, tracking and remediation, coordination and escalating CND non-compliance. Provides technical analysis and sustainment support for the enterprise for IA tools and applications, and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats Skills and Experience: Required: Must possess a current DOD Top Secret Clearance and be eligible for SCI and IT-1 access at time of proposal submission Five (5) years of relevant experience or related formal education Two (2) years of experience performing root cause analysis of cybersecurity events and incidents Two (2) years of experience analyzing network traffic and/or system logs DOD Approved 8570/8140 Baseline Certification : Category IAT Level II DOD Approved 8570/8140 CSSP Certification : CSSP-IR Must possess written and verbal skills to appropriately document and brief Cybersecurity Incidents Working knowledge of at least two cybersecurity areas: Firewall IDS/IPS Host based antivirus Vulnerability Management JETS RFQ SP4709-24-Q-0002 DLA Cyber Emergency Response Team (CERT) Cyber Security Service Provider (CSSP) Support Forensics Malware Analysis Device Hardening Understanding of Defense-in-Depth Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python
    $61k-85k yearly est. 60d+ ago
  • Computer Network Defense (CND) Analyst [JOB ID: 20241022]

    Top Secret Clearance Jobs

    Cyber Security Analyst job 43 miles from Springfield

    Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Phoenix Cyber is looking for Computer Network Defense (CND) Analysts to support a government client. This position in onsite in Columbus, OH. Job Responsibilities Performs actions to protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks. Employs Cybersecurity capabilities and deliberate actions to respond to a CND alert or emerging situational awareness/threat. Serves as an expert on CND requirements and compliance to such requirements by using IA tools and techniques to perform compliance analysis and correlation, tracking and remediation coordination, and escalating CND non-compliance. Provides technical analysis and sustainment support for the enterprise for IA tools and applications and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats. Required Skills Five years of relevant experience Top Secret Clearance CSSP Certification: CSSP-IR (CySA, CEH etc) Computing Environment Cert: Incident Response Must possess experience working within a SIEM Must possess experience analyzing logs from multiple sources such as system event logs, F5, Firewall, etc. Must possess experience reviewing and analyzing network traffic through packet captures Must possess written and verbal skills to appropriately document and brief cybersecurity incidents Phoenix Cyber is a national provider of cybersecurity engineering services, operations services, sustainment services and managed security services to organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations team. Phoenix Cyber is an equal opportunity employer and complies with Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, the Vietnam Era Veteran's Readjustment Assistance Act (VEVRAA), all amendments to these regulations, and applicable executive orders, federal, and state regulations. Applicants are considered without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, and/or veteran status. Phoenix Cyber participates in E-Verify to confirm the employment eligibility of all newly-hired employees. To learn more about E-Verify, including your rights and responsibilities, go to ************************* Powered by JazzHR
    $61k-85k yearly est. 60d+ ago
  • Data Security analyst

    Us Tech Solutions 4.4company rating

    Cyber Security Analyst job 43 miles from Springfield

    US Tech Solutions is a global staff augmentation firm providing a wide-range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit our website ************************ We are constantly on the lookout for professionals to fulfill the staffing needs of our clients, sets the correct expectation and thus becomes an accelerator in the mutual growth of the individual and the organization as well. Keeping the same intent in mind, we would like you to consider the job opening with US Tech Solutions that fits your expertise and skillset. Job Description Scope/Responsibilities/Duties: • 0-2 years general experience, bachelor' s degree or equivalent combo of education/experience; • Some experience in desired tech area; position functions with high level of supervision; • Assesses security and/or compliance of university systems; responsible for assessing, monitoring and analyzing data, identifying security, risk or compliance issues and/or events • Leveraging job aids for common issues or incidents • Demonstrated ability to work in a team, attention to detail, solid written communications and some technology experience • To perform system based risk assessments. • Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial. Qualifications • Review risk assessment questionnaires, perform information security control reviews and complete documentation for submission to risk management governance committees for approval or denial. Additional Information Thanks & Regards, Kushal Kumar Talent Acquisition Specialist Tel: ************
    $56k-78k yearly est. 60d+ ago
  • Physical Security Systems Analyst (CCure 9000)

    Blue Star Partners 4.5company rating

    Cyber Security Analyst job 43 miles from Springfield

    Rate: $45 - $50/hr Contract Duration: 3 to 6 Months with possible extension/Contract to Hire Contract Type: W2 (must be authorized to work in the US; no sponsorships or C2C/1099) Job Overview We are seeking a motivated and adaptable Physical Security Systems Analyst to support the maintenance, implementation, and modernization of physical security systems, including card readers, security cameras, backend equipment. This role involves hands-on work with security equipment, troubleshooting, end-of-life replacement strategies, supporting service calls, and assisting the Lead Analyst in critical tasks. The ideal candidate will take ownership of various responsibilities related to physical security technology, standards, and upgrades. Experience with CCURE 9000 and/or Avigilon cameras and equipment is required. Key Responsibilities End-of-Life Equipment Implementation: Assist in replacing and implementing end-of-life security equipment, including cameras, access control systems, and alarm systems. Service and Maintenance Support: Respond to service calls, troubleshoot issues, and ensure consistent operation of physical security systems. Backup for Lead Analyst: Serve as a backup to the Lead Analyst, ensuring project continuity and system oversight during absences. Updating Security Standards: Support the update and maintenance of security system standards and documentation to align with current technology and best practices. Technology Development and Testing: Evaluate, develop, and test new physical security technologies, participating in proof-of-concept testing to identify deployment suitability. Site Implementation Assistance: Provide on-site support for new technology implementations and equipment upgrades. System Audits and Labeling: Conduct equipment audits (physical and software-based), label devices, and replace batteries where needed. Documentation and Reporting: Maintain detailed records of installations, upgrades, audits, and services; contribute to reports on equipment health and project status. Collaborative Engagement: Work with Facilities, Security, IT teams, and integrators to support project timelines and execution. Security Operations Center Support: Ensure alarm data reliability and assist in refining configurations for improved responsiveness and reduced false notifications. Emergency Support: Provide ongoing support during outages, patches, and system changes to maintain system availability. Equipment Refresh Planning: Participate in the annual equipment refresh cycle to prioritize and replace outdated equipment. Vendor and Manufacturer Liaison: Coordinate with vendors for support, warranty claims, training, and troubleshooting. Continuous Improvement: Develop and refine training materials, quick reference guides, and documentation for internal use. Site Security Coverage: Conduct site walks, audits, and evaluations to ensure proper security coverage, offering recommendations and assisting with best practice implementations. Qualifications Education: Associate's or Bachelor's degree in Information Technology, Cybersecurity, or a related field, or equivalent work experience. Experience: 2-4 years of experience in physical security systems, access control, surveillance, or a similar field. Technical Skills: Expertise with physical security technologies (e.g., CCure 9000, Avigilon). CCure 9000 certification is required. Ability to troubleshoot technical issues effectively. Additional Skills: Strong organizational and documentation abilities. Willingness to travel to various sites as needed. Effective communication and teamwork skills. Preferred Skills Knowledge of security systems such as Avigilon or Software House. Experience with service integrators (e.g., PSI, SDI). Familiarity with updating and implementing security standards. Ability to work proactively and independently in a fast-paced environment.
    $45-50 hourly 60d+ ago
  • IT Security Specialist 4/ITSS2 (39604)

    Idealforce

    Cyber Security Analyst job 43 miles from Springfield

    IDEALFORCE has a CONTRACT position available immediately for a IT Security Specialist(ITSS2) to join our customer in Columbus, OH. This is an ONSITE position and require in person interview. Please find below additional details about this job. Job Description Security Consultant to help IT Augment the security staff until OIT can take over all Security related needs for the agency. This position will function as a highly skilled Security Consultant with specific responsibilities that include: -Monitor network and information system activity. -Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.) Uses creativity and innovation to automate and streamline processes and procedures. -Understands customer support, likes to work with people and can ensure that the customer is satisfied. -Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc. -Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT -Perform specialized security functions (e.g. forensics for incident response). -Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services. -Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc. SPECIAL NOTE: Client is running a 24/7 operation. Consultant may need to come in during incident or emergency situations. During the interview process with the ODPS staff, the resource consultant must demonstrate competence/experience in their specific area(s) of project assignment. The resource's experience must also be documented for review and verification. Offered resources not showing technical or functional competence/experience will be sufficient reason to reject the Offeror's proposal. It is the responsibility of the Offeror to pre-screen their candidates to ensure compliance. Resource will have a background check conducted by ODPS. Qualifications -1-2 Years SIEM (Q-Radar preferred) -8 years customer service experience -8 Years Troubleshooting experience -8+ years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP. -8 years' experience with Active Directory. -4 Years experience with Web and Email Filtering and Security (Ironport) -5+ Years experience with Imperva (DAM/WAF) -1 years of Vulnerability scanning experience (Qualys) -3 years A/V suite experience McAfee -3 years IPS (IBM) -Contributes to continuous process improvements to increase the efficiency of section. -Excellent communication skills both written and oral. -Strong communication/ leadership skills. -Strong influence, collaboration and negotiation experience. -Ability to collaborate with supporting resources across business and/or functional lines. -Have excellent oral and written skills/possess strong meeting and work session facilitation skills. -Have the ability to work independently and as part of a team, the ability to manage time and resources to meet assigned deadlines. -Have strong understanding of prioritization stemming from the elicitation of system and/or user requirements. -Have excellent organizational skills, proven analytical, planning, problem solving, and decision-making skills. -Must be knowledgeable in the English language/speak clearly and understandably use the English language. Desired Skills -Q-Radar -Ironport Web and Email Security -Imperva -Certifications in Microsoft -Powershell 3.0 scripting background. -Qualys -McAfee Enterprise solutions -IPS -Splunk -Other security related tools. -ITIL Knowledge and ITSM Tools. Additional Information Additional Information : - "All your information will be kept confidential according to EEO guidelines". - All candidates who are authorized to work in US are encouraged to apply. - Candidates must clear the Background check prior to commencing the assignment. THIRD PARTY CANDIDATES: Email your candidate/s resume to joseph dot shelton at idealforce.com along with the following details: Rate, Current location and Availability. Disclaimer : The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
    $71k-100k yearly est. 60d+ ago
  • Information Security Analyst

    Foxhole Technology, Inc. 4.0company rating

    Cyber Security Analyst job 43 miles from Springfield

    Title: Information Security Analyst Clearance: DoD Secret, wtih TS eligibility Hours: M-F 1500 - 2330 Foxhole Technology provides robust cybersecurity and IT support capabilities for federal civilian and defense agencies. A recognized leader in navigating technology and security challenges, Foxhole delivers mission-focused innovations to answer evolving and complex needs. Our talented employee-owners provide agile, scalable services and solutions that solve operational gaps, operate critical systems, and protect and secure the enterprise - across the organization and around the world. Foxhole Technology is seeking a experienced is seeking a highly motivated Information Assurance and Security Analyst with strong collaboration and communication skills to support our newly awarded contract. This position plays a critical role in supporting all facets of information assurance, system security, and compliance across the enterprise. Job Description Maintain and execute the Information Security Plan. Categorize and assign security controls in Enterprise Mission Assurance Support Service (eMASS). Create, update, and manage Assessment & Authorization (A&A) packages in eMASS. Coordinate and track inherited security controls within eMASS. Manage and update entries in the DoD Information Technology Portfolio Repository (DITPR). Oversee Ports, Protocols, and Services Management (PPSM). Support processes for achieving and maintaining Authority to Operate (ATO) and Interim Authority to Test (IATT). Prepare and submit reports in support of the Federal Information Security Management Act (FISMA). Ensure compliance with Security Technical Implementation Guides (STIGs) and Information Assurance Vulnerability Alerts (IAVAs). Respond to and manage cybersecurity incidents in coordination with the Cybersecurity Service Provider (CSSP). Conduct vulnerability scanning and compliance reviews using Assured Compliance Assessment Solution (ACAS). Oversee compliance activities related to Continuous Monitoring (ConMon) and Risk Management Framework (RMF) scoring. Develop and maintain system profiles, security plans, and artifacts within eMASS Minimum Requirements Active Secret clearance with ability to obtain a Top Secret clearance. DoD 8570 IAT Level II certification (e.g., Security+ CE) or above- required. Minimum of 3+ years of experience in Information Security RMF - required. Experience with DoD RMF, DIACAP, or NIST RMF. Background in system accreditation, security assessments, and security engineering within the System Development Life Cycle (SDLC). Hands-on experience with Host-Based Security System (HBSS). Strong understanding of DoD, IC, and national-level system security practices across LAN/WAN, Cross Domain Solutions (CDS), and Cloud technologies. Familiarity with security tools and frameworks such as ACAS, HBSS, Nessus, Splunk, etc. Knowledge of Computer Network Defense (CND) procedures and technologies. Understanding of boundary protection, enclaving, and encryption techniques/tools. Demonstrated ability to develop security artifacts (e.g., Security Plans, POA&Ms, CONOPS). Experience supporting RMF or FedRAMP accreditation efforts. Working knowledge of ITIL processes is a plus. More Information Requirements of position: Think analytically, effective verbal and written communication skills, make decisions, observe/remember details, interpret data, concentrate on tasks, adjust to change, handle stress/emotions. Regular attendance, maintain work schedule, attend meetings, meet deadlines, keyboard/type, handle confidential information, use math/calculations, stay organized, operate office equipment, may direct others. Must be able to see, have eye/hand coordination, and lift up to 10 lbs. May be exposed to dust/dirt, humidity, and noise. Foxhole Technology is an Equal Opportunity Employer and makes hiring decisions without regard to race, color, religion, sex (including pregnancy, childbirth and sexual orientation), national origin, age, disability, genetic information, military/veteran status, or any other protected class. We can recommend jobs specifically for you! Click here to get started.
    $70k-94k yearly est. 9h ago
  • Information Security Analyst

    Danis Construction

    Cyber Security Analyst job 32 miles from Springfield

    IS ON-SITE AT OUR MIAMISBURG, OHIO OFFICE ** At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life. We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally. One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO. Why Join Danis? Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities. Competitive Compensation: Enjoy annual merit increases and bonuses. Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options. Secure Your Future: 401K plan and profit-sharing opportunities. Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work. Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects. Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career. What You'll Bring Bachelor's degree in Cybersecurity, Information Technology, or a related field. 3+ years of hands-on experience in cybersecurity or a related discipline. Working knowledge of security frameworks (e.g., NIST, ISO 27001). Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners). Strong analytical and investigative mindset. Clear, confident communication and collaboration skills. Experience managing cross-functional projects and navigating complex security challenges. Responsibilities Your Impact Strategic Leadership Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices. Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives. Governance, Risk, & Compliance Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps. Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act). Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics. Training & Awareness Drive cybersecurity awareness through engaging education initiatives. Oversee new hire onboarding for required cyber training. Facilitate tabletop exercises to simulate and prepare for real-world scenarios. Threat Detection & Response Continuously monitor systems for suspicious activity or breaches. Respond swiftly to security incidents and ensure thorough documentation. Engage in proactive threat hunting and analysis to detect emerging risks. Vulnerability & Risk Management Lead regular system assessments and vulnerability scans. Ensure robust network segmentation, firewall health, and secure backups. Security Architecture & Tools Oversee the deployment and management of critical security tools. Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT. Evaluate and enhance our security technology stack. Collaboration & Communication Build trusted partnerships across IT and the broader organization to strengthen security culture. Support business continuity and disaster recovery planning with department leads. Manage vendor risk and ensure third-party compliance with internal standards. Preferred Skills Familiarity with enterprise systems and platforms (e.g., ERP, CRM). Deep expertise in endpoint protection, network monitoring, and DLP tools. Calm, strategic approach to crisis management. Qualifications Working Environment Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure. Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement. Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments. Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively. Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity. Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack. EEO Statement Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status, or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit, and business need. Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees. #LI-ONSITE #sponsored
    $71k-100k yearly est. 9h ago
  • Information Security Expert

    Cyberthink 4.2company rating

    Cyber Security Analyst job 43 miles from Springfield

    Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years .NET development experience Required 5 Years Thanks Naimesh Solanki Sr. Technical Recruiter Phone: ************ x 6578 Qualifications Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years Additional Information All your information will be kept confidential according to EEO guidelines.
    $62k-80k yearly est. 60d+ ago
  • Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Cyber Security Analyst job 31 miles from Springfield

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: ***********************************************************************************************************************************************************************************
    $83k-112k yearly est. 60d+ ago
  • Cybersecurity Incident Response & Threat Detection Analyst

    Teksynap

    Cyber Security Analyst job 43 miles from Springfield

    Responsibilities & Qualifications RESPONSIBILITIES Provide continuous 24x7x365 monitoring and analysis of SIEM platforms and other cybersecurity monitoring tools to detect and respond to cybersecurity threats. Identify, analyze, and respond to unauthorized activity across the Enterprise Network Environment using industry-standard incident response processes. Conduct root cause analysis for cybersecurity events and incidents to support threat mitigation and recovery efforts. Employ cybersecurity capabilities and deliberate actions in response to alerts, indicators of compromise (IOCs), and emerging threats. Monitor event logs and network traffic to detect Advanced Persistent Threats (APTs), "low and slow" attacks, and other anomalous behavior. Review security events and indicators to identify patterns or trends suggestive of compromise or malicious activity. Leverage Open Source Intelligence (OSINT) and threat intelligence feeds to maintain situational awareness of active threats. Support the configuration, tuning, and sustainment of cybersecurity tools and applications, including firewalls, IDS/IPS, antivirus, and forensic platforms. Assist in the implementation of Defense-In-Depth strategies, applying network perimeter controls and signature-based protections. Develop scripts and tools (preferably in SPL, Python, or PowerShell) to automate or enhance threat detection and incident response workflows. REQUIRED QUALIFICATIONS Experience Minimum of 5 years of relevant experience in cybersecurity operations or incident response. At least 2 years of experience performing root cause analysis for cybersecurity incidents. Hands-on experience with at least two of the following security tools: Firewalls Intrusion Detection/Prevention Systems (IDS/IPS) Host-based Antivirus Data Loss Prevention (DLP) Vulnerability Management Forensics Malware Analysis System/Device Hardening Understanding of Defense-in-Depth strategies and layered security controls. Ability to develop and implement tools or scripts to enhance detection and response capabilities. Certifications DoD 8570 IAT Level II Baseline Certification COMPTIA Security+ CE Cisco Certified Network Associate (CCNA) COMPTIA Cybersecurity Analyst (CySA+) Global Information Assurance Certification (GIAC) Global Industriel Cyber Security Professional (GICSP) Global Information Assurance Certification (GAIC) Security Essentials Certification (GSEC) Certified Network Defender (CND) Systems Security Certified Practitioner (SSCP) DoD 8570 CSSP-IR Certification Certified Ethical Hacker (CEH) CyberSec First Responder (CFR) Cisco Certified Network Associate (CCNA Cyber Ops) CCNA Security Computer Hacking Forensic Investigator (CHFI) Cybersecurity Analyst Plus (CYSA+) GIAC Certified Forensic Analsyt (GCFA) GIAC Certified Incident Handler (GCIH) Implementing Cisco Cybersecurity Operations (SCYBER) Comp TIA Penetration Tester+ (PenTest+) Must have relevant Computer Network Defense CE certification within six (6) months of onboarding Clearance Top Secret - IT-I Critical Sensitive or Tier 5 (T5) Overview We are seeking a Cybersecurity Incident Response & Threat Detection Analyst to join our team supporting External Application Incident Response Support Services. TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers. We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays. Visit us at ***************** Apply now to explore jobs with us! The safety and health of our employees is of the utmost importance. Employees are required to comply with any vaccination requirements mandated by contract, applicable law or regulation. By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP". As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration. Additional Job Information WORK ENVIRONMENT AND PHYSICAL DEMANDS The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. Locations: DLA Land and Maritime Columbus OH, Ft. Belvoir, VA, HDIFC Battle Creek MI (One position any one of these sites) Type of environment: Office Noise level: Medium Work schedule: Schedule is day shift Monday - Friday. May be requested to work evenings and weekends to meet program and contract needs. Amount of Travel: Less than 10% PHYSICAL DEMANDS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to use hands to handle, feel, touch; reach with hands and arms; talk and hear. The employee is regularly required to stand; walk; sit; climb or balance; and stoop, kneel, crouch, or crawl. The employee is regularly required to lift up to 10 pounds. The employee is frequently required to lift up to 25 pounds; and up to 50 pounds. The vision requirements include close vision, distance vision, peripheral vision, depth perception, and ability to adjust focus. WORK AUTHORIZATION/SECURITY CLEARANCE U.S. Citizen Secret clearance OTHER INFORMATION Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment. EQUAL EMPLOYMENT OPPORTUNITY In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, sexual orientation, gender identity, protected veteran status, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as “protected status”). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment. TekSynap is committed to ensuring that our online application process provides an equal employment opportunity to all job seekers, including individuals with disabilities. If you believe you need a reasonable accommodation in order to search for a job opening or to submit an application, please contact *************** for assistance.
    $71k-100k yearly est. 23d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Springfield, OH?

The average cyber security analyst in Springfield, OH earns between $62,000 and $113,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Springfield, OH

$84,000
Job type you want
Full Time
Part Time
Internship
Temporary