Source Job

US

  • Analyze system and application security.
  • Make recommendations to optimize the protection of computer systems and information resources.
  • Develop, test, implement, and maintain security policies and programs.

Security

20 jobs similar to Security Analyst 1

Jobs ranked by similarity.

US

Provide guidance to ensure project compliance to the United States Government Baseline (USGCB) for IT Security. Provide technical expertise of computer security laws, mandates, standards and policies in accordance with the Federal Information Security Management Act (FISMA). Represent the project in internal and external meetings, working groups, and integrated project teams to provide IT security compliance requirements.

DecisionPoint Corporation is seeking an Information Security Analyst to join our team!

$105,000–$135,000/yr

This role will support a broad range of business units and enterprise initiatives to ensure technology is designed and deployed securely. The Senior Cyber Security Engineer will be responsible for conducting end to end security and threat analysis of enterprise initiatives involving new or modified technology deployments. Function as a technical and engineering subject matter expert across various Cyber Security technology areas with a focus on network, application, cloud, and enterprise security controls.

NBCUniversal is one of the world's leading media and entertainment companies that creates world-class content and distributes across film, television, and streaming.

$64,938–$103,901/yr
US

  • Monitor alerts from security tools and work towards resolution.
  • Participate in incident response and perform incident reporting.
  • Collaborate with team members to develop SOC IR strategies.

CSG empowers companies to build unforgettable experiences, making it easier for people and businesses to connect with, use and pay for the services they value most. CSG's technologies and people have helped some of the world's most recognizable brands solve their toughest business challenges and evolve to meet the demands of today's digital economy.

Middle East

  • Define Canonical's security risk management standards and playbooks
  • Analyse and improve Canonical's security risk practices
  • Evaluate, select and implement new security requirements, tools and practices

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects, they recruit on a global basis and set a very high standard for people joining the company.

Review security features of products to help internal and external customers succeed. Solve end-to-end problems and review SaaS/PaaS configurations. Understand Security Controls and Risks and compliance standards.

GoDaddy empowers everyday entrepreneurs around the world by providing the help and tools to succeed online, making opportunity more inclusive for all.

  • Protecting cybersecurity cloud assets and delivering cybersecurity threat assessment, cyber intelligence, software security, and vulnerability assessment services.
  • Identifying and prioritizing critical business functions in collaboration with organizational stakeholders by performing security reviews, identifying gaps in security architecture, and developing security risk management plans and system security plans.
  • Evaluating cloud security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.

Allied Consultants, Inc. is an Austin-based firm delivering technical and business professionals within Texas State Agencies for over 33 years. They value their consultants and are committed to providing an exceptional experience.

US

Design, deploy, and operate network infrastructure to implement macro and micro segmentation. Operate UT’s Network Access Control (NAC) and Identity Based Network Services (IBNS) systems. Provide escalation support (tier 3+) for complex problems related to NAC and IBNS systems.

Enterprise Technology is dedicated to supporting the mission of the University of Texas at Austin of unlocking potential and preparing future leaders of the state.

US

This role is pivotal in securing desktop and mobile applications across complex environments, implementing best-in-class security practices and ensuring resilience against emerging threats. Involves hands-on work with secure coding, cryptography, authentication protocols, and OS-level hardening techniques while contributing to vulnerability remediation, incident response, and embedding security into the software development lifecycle. Shape the security posture of high-impact applications by guiding cross-functional teams on secure development standards.

Jobgether is a Talent Matching Platform that partners with companies worldwide to efficiently connect top talent with the right opportunities through AI-driven job matching.

US

Design and build security controls across the stack. Drive deployment of security enhancements and policy changes across multi-region infrastructure. Automate detection, prevention, and response with guardrails and paved paths.

1mind is a platform that deploys multimodal Superhumans for revenue teams, combining a face, a voice, and a GTM brain equipped with deep knowledge.

$221,000–$260,000/yr
US

  • Design and implement scalable infrastructure supporting HIPAA, SOC 2, and ISO 27001 compliance.
  • Create self-service security tools integrating with developer workflows (GitLab CI/CD, Terraform).
  • Lead threat modeling and security architecture reviews for new products and services.

Maven is the world's largest virtual clinic for women and families on a mission to make healthcare work for all of us.

$130,000–$150,000/yr
US Canada

  • Collaborate cross-functionally to design pragmatic security solutions.
  • Implement and maintain security controls for corporate infrastructure.
  • Respond to security incidents and conduct forensic investigations.

DNSFilter is revolutionizing network security by providing fast, accurate, and reliable threat protection and content filtering for businesses and organizations worldwide.

US

Participates in the requirement gathering process of an IAM (Identity and Access Management) technical vision. Analyzes and documents functional & nonfunctional requirements for various IAM domains. Works independently with clients to capture IAM use cases and define IAM requirements and processes.

GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions and minimize risk.

$100,649–$174,459/yr

  • Design and implement security solutions across enterprise platforms and cloud environments.
  • Perform threat modeling and security risk assessments for new features and platforms.
  • Partner with product teams to embed security requirements early in the SDLC.

Experian is a global data and technology company, powering opportunities for people and businesses around the world. As a FTSE 100 Index company listed on the London Stock Exchange, they have a team of 22,500 people across 32 countries and are committed to investing in their people.

US

  • Implement and maintain security measures to protect the organization's information assets and infrastructure.
  • Support product and development teams on application security challenges, including threat modeling and architecture reviews.
  • Support security incident response, perform root cause analysis, and drive remediation strategies.

insightsoftware is a global provider of comprehensive solutions for the Office of the CFO, transforming how teams operate and empowering leaders.

Europe

Analyze the vulnerability of a company’s infrastructure and threat tolerance. Investigate and document potential threats and information security issues. Implement security tools like firewalls, data loss prevention tools, and intrusion detection systems.

Software Mind develops solutions that make an impact for companies around the globe.

$140,000–$200,000/yr

  • Own Swiftly's security risk register and threat models; identify, prioritize, and drive remediation of risks across application and infrastructure.
  • Design secure architectures for our SaaS platform, mobile applications, and IOT/Hardware Integration, focusing on authentication, authorization, data protection, and network boundaries.
  • Define and maintain security KPIs and dashboards for executive and board reporting.

Swiftly is on a mission to help cities move more efficiently and is the leading transit data platform for agencies to share real-time passenger information.

$64,632–$96,948/yr
Europe

  • Help break down the barriers to cybersecurity.
  • Change the security game and make a real difference.
  • Protect businesses with enterprise-grade cybersecurity products.

Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. The company protects 3M+ endpoints and 1M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.

US

Monitor and analyze security events using SIEM platforms. Investigate and respond to alerts from XDR tools. Conduct proactive threat hunting across endpoints, networks, and cloud environments.

Since 1996, Numerix has provided expertise, analytics and software that redefine pricing and risk management in the financial markets, strengthening its leadership position.

$22,849–$32,750/yr
Mexico Argentina Costa Rica Unlimited PTO

  • Hardening of cloud based infrastructure.
  • Creating/maintaining Vulnerability Management program.
  • Implementation of security controls.

TrueAccord, a wholly owned subsidiary of TrueML, is a category-defining company combining machine learning with a human-based approach to transform debt resolution.

US

  • Lead the Cybersecurity Policy Program by overseeing the policy portfolio and identifying opportunities to enhance policy coverage.
  • Review submissions, supervise evaluations, and provide contract input within the third-party risk assessment process.
  • Support continuous compliance with PCI DSS and periodic user access recertification for critical systems and applications.

The New York Times is committed to being the world’s best source of independent, reliable and quality journalism that seeks the truth.