Summary: This information outlines numerous10- IT security roles, including their key duties, required qualifications, and certifications. Positions variety from IT Specialist (INFOSEC) to Security Researcher-Cloud, every with unique skills wanted, along with cybersecurity knowledge, experience with tools like SIEM, and know-how of regulatory standards. The FAQs deal with common questions about activity obligations, necessary abilities, certifications, and career paths within those roles.
List Of Jobs
1: IT Specialist (INFOSEC)(Direct Hire)
Apply for IT Specialist (INFOSEC)(Direct Hire)
Job Description and Detail:
Position Title: IT Specialist (INFOSEC)
Employment Type: Full-Time, Direct Hire
Organization: US Government National Mortgage Association (Ginnie Mae)
Location: Remote
Overview:
The US Government National Mortgage Association (Ginnie Mae) is seeking a skilled and dedicated IT Specialist (INFOSEC) to join our team. This position is responsible for ensuring the security of Ginnie Mae’s information systems and data. The ideal candidate will have extensive experience in information security, risk management, and compliance within a governmental or financial services environment.
Key Responsibilities:
- Develop and maintain security policies, standards, and procedures.
- Perform security assessments and audits, recommend mitigation measures.
- Monitor and analyze security alerts, respond to incidents.
- Work with IT departments on security integration.
- Ensure compliance with FISMA, NIST, and other government standards.
- Developing and delivering safety training programs.
- Managing security services and implementing new technologies.
- Stay current with security trends, threats and solutions.
Qualifications:
- Bachelor’s degree in computer science, information technology, cybersecurity, or a related field; Advanced degree preferred.
- Professional certification (CISSP, CISM, CEH) highly desired.
- Minimum of 5 years experience in information security in government or finance.
- Strong knowledge of government information security regulations and standards.
- Experience with firewall, IDS/IPS, and SIEM solutions.
- Excellent analytical, problem solving and communication skills.
- Ability to work independently and remotely as a team.
2: Information Security Analyst
Apply For Information Security Analyst
To qualify for the position of Information Security Analyst at Tufts University, a candidate typically wishes the subsequent qualifications and revel in:
Qualifications:
- Education:
- Bachelor’s degree in information security, computer science, information technology, or related field.
- A Master’s degree or higher may be preferred or provide an advantage.
- Certifications:
- Related certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CEH (Certified Ethical Hacker), or similar certification.
Experience:
- Professional Experience:
- Multiple years (usually 3-5 years) of experience in information security or a related field.
- Demonstrated experience in security assessment, threat identification, incident response and vulnerability analysis.
- Technical Skills:
- Proficiency with protection equipment and technology including SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection System/Intrusion Prevention System), firewalls, antivirus software, and encryption technology.
- Knowledge of network protocols, operating systems, and web applications.
- Analytical Skills:
- Strong analytical and troubleshooting skills to identify and resolve safety issues.
- Ability to analyze safety records, alerts, and statistics to identify and mitigate risks.
Required Characteristics:
- Attention to Detail:
- Meticulous attention to detail to identify potential security threats and vulnerabilities.
- Communication Skills:
- Excellent written and verbal conversation skills to efficaciously file findings and recommend solutions.
- Ability to provide an explanation for complicated protection issues to non-technical stakeholders.
- Team Collaboration:
- Strong interpersonal skills to collaborate with IT teams, staff, and other departments.
- Ability to lead or participate in incident response teams.
- Integrity and Ethics:
- High standards of integrity and ethics in dealing with sensitive and confidential information.
- Adaptability:
- Ability to live updated with the contemporary safety tendencies, technologies, and first-rate practices.
- Willingness to continuously analyze and adapt to new security challenges.
- Problem-Solving Abilities:
- Creative and important thinking talents to develop effective security answers and strategies.
- Resilience:
- Ability to handle excessive-strain conditions and reply quickly to safety incidents.
These qualifications and characteristics make sure that the candidate can efficiently guard Tufts University’s records property and make contributions to a steady computing environment.
3: Identity Access Administrator
Apply For Identity Access Administrator
For an “Identity Access Administrator” position at GoHealth Urgent Care, the qualifications and experience typically required may include:
Qualifications:
- Educational Background:
- Bachelor’s degree in information technology, computer science, or related field. Certifications and relevant experience may be considered in lieu of a degree.
- Certifications (preferred but not always required):
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- Certified Information Systems Auditor (CISA)
- Microsoft Certified: Identity and Access Administrator Associate
Experience:
- Work Experience:
- 3-5 years of revel in in identification and get right of entry to control (IAM) or associated IT safety roles.
- Hands-on revel in with IAM technology and solutions along with Microsoft Azure Active Directory, Okta, or comparable.
- Technical Skills:
- Proficiency in handling person bills, roles, and permissions.
- Experience with single sign-on (SSO), multi-element authentication (MFA), and federated identification management.
- Understanding of protection protocols, which includes LDAP, SAML, OAuth, and OpenID Connect.
- Soft Skills:
- Strong analytical and problem-fixing capabilities.
- Excellent communique skills, both written and verbal.
- Ability to paintings collaboratively in a team environment.
- Attention to detail and a dedication to maintaining high standards of security and compliance.
Responsibilities:
- Access Management:
- Managing person identities and get right of entry to privileges throughout diverse structures and applications.
- Implementing and keeping IAM solutions to ensure stable get admission to.
- Policy Development:
- Developing and implementing guidelines and methods associated with identity control and get admission to control.
- Security and Compliance:
- Ensure compliance with regulatory requirements and industry standards.
- Conduct regular audits and reviews of IAM policies and procedures.
- Incident Response:
- Responding to security incidents involving unauthorized access or breach of identity.
- Identifying and mitigating IAM-related security issues.
- Continuous Improvement:
- Staying up-to-date with the latest IAM technologies and best practices.
- Continuously improving IAM processes and systems.
These qualifications and experiences are general guidelines and may vary depending on the specific requirements of GoHealth Urgent Care for the Identity Access Administrator role.
You might be Interested in
4: IT Security Officer
Qualifications and Experience Requirements
Required Qualifications:
- Education:
- Bachelor’s degree in IT, Computer Science, Cybersecurity, or related field.
- Preferably CISSP, CISM, or equivalent certifications.
- Experience:
- 5+ years in IT security.
- Experience in creating and implementing security policies.
- Knowledge of security systems like firewalls and anti-virus software.
- Technical Skills:
- Network security expertise.
- Risk evaluation and vulnerability management.
- Understanding of GDPR, HIPAA, ISO/IEC 27001, NIST, COBIT, OWASP.
- Soft Skills:
- Strong analytical and problem-fixing abilities.
- Excellent verbal exchange talents.
- Detail-oriented and organized.
Additional Requirements:
- Character Traits:
- Integrity and ethical behavior.
- Alignment with World Relief’s mission.
- Proactive and updated on cybersecurity trends.
- Responsibilities:
- Perform security assessments and audits.
- Train staff on security awareness.
- Monitor and respond to protection incidents.
- Ensure compliance with safety rules and regulations.
Preferred Qualifications:
- Advanced Education:
- Master’s in Cybersecurity or related field.
- Additional Certifications:
- CEH, CompTIA Security+, or similar.
- Experience in Non-Profit Sector:
- Previous non-profit experience is a plus.
5: Cyber Security Analyst-Remote Nationwide
Apply For Cyber Security Analyst-Remote Nationwide
Qualifications and Experience Requirements
- Bachelor’s degree in Computer Science, Information Security, or associated field.
- Relevant certifications like CISSP, CISM, CEH, or CompTIA Security .
Experience:
- 3-5 years in cybersecurity or related roles.
- Proficiency in safety incident detection and reaction.
- Familiarity with SIEM systems, IDS/IPS, firewalls, and endpoint safety.
- Knowledge of community protocols, running structures (Windows, Linux, Unix), and cloud protection.
- Skills in scripting languages (Python, PowerShell, Bash) for automation.
Skills:
- Problem-fixing and analytical abilties.
- Strong written and verbal communication talents.
- Ability to work independently and in far flung groups.
6: Internal Auditor-IT
Apply For Internal Auditor-IT
For the ‘Internal Auditor-IT’ position at Arch Capital Group Ltd, the qualifications and experience requirements are:
Qualifications and Experience Requirements
- Education: Bachelor’s degree in IT, Computer Science, Accounting, Finance, or associated field. Relevant certifications (e.G., CISA, CIA).
- Experience: 3-5 years in IT auditing or related fields. Knowledge of IT controls, security practices, and regulatory requirements.
- Technical Skills: Proficiency in audit software (e.g., ACL, IDEA), understanding of IT systems and cybersecurity principles.
Required Characteristics:
- Analytical Skills: Strong trouble-fixing and attention to detail.
- Communication Skills: Excellent verbal and written communication, potential to give an explanation for technical issues to non-technical audiences.
- Critical Thinking: Assess risks and controls, strategic thinking.
- Interpersonal Skills: Collaborative, discreet with confidential information.
- Adaptability: Flexible, up-to-date with technology and trends.
- Ethics and Integrity: High integrity and professional ethics.
7: Cybersecurity Engineer 2
Apply For Cybersecurity Engineer 2
Cybersecurity Engineer 2
Company: Dexcom
Remote
Cybersecurity Engineer 2 at Dexcom – Qualifications and Experience
Required Qualifications:
- Education:
- Bachelor’s diploma in Computer Science, IT, Cybersecurity, or related discipline.
- Experience:
- 3-5 years in cybersecurity or related field.
- Familiarity with cybersecurity tools and technologies.
- Experience with security frameworks (e.G., NIST, ISO, HIPAA).
- Technical Skills:
- Proficient in safety technologies (firewalls, IDS, antivirus, vulnerability assessment).
- Knowledge of community safety, encryption, information protection.
- Scripting skills (Python, PowerShell) and automation tools.
- Cloud security knowledge (AWS, Azure).
- Certifications (preferred):
- CISSP, CISM, CEH, or similar.
- Soft Skills:
- Strong problem-solving and attention to element.
- Excellent communication and teamwork.
- Up-to-date with cybersecurity developments.
- Other Requirements:
- Ability to control a couple of priorities in a quick-paced environment.
- Experience with incident response and risk management.
- Understanding of regulatory requirements and industry standards.
8: Windows Security Engineer
Apply For Windows Security Engineer
Qualifications and Experience
- Education: Bachelor’s degree in a related field.
- Experience: 5+ years in Windows security, with expertise in Windows Server, Active Directory, and security solutions.
- Skills: Proficiency with Windows security tools, networking concepts, and scripting (PowerShell).
- Certifications: CISSP, CEH, CompTIA Security+, or similar.
- Preferred: Experience with cloud security, EDR tools, and SIEM. Strong hassle-solving and communique competencies.
Candidates should be able to work on-site in Atlanta or relocate.
9:Database Security Engineer ::Remote:
Apply For Database Security Engineer
For a “Database Security Engineer” at ARK Solutions, you typically need:
- Degree: Bachelor’s in Computer Science or related field.
- Certifications: CISSP, CISM, or similar (preferred).
- Skills: Proficiency in SQL Server, Oracle, MySQL, or PostgreSQL; knowledge of encryption, access controls, and security standards.
- Experience: Hands-on experience with database security and risk management.
- Soft Skills: Strong analytical, communication, and teamwork abilities.
- Additional: Experience with cloud databases and compliance regulations is a plus.
10: Security Researcher-Cloud
Apply For Security Researcher-Cloud
Corelight Security Researcher-Cloud
Education and Certifications
- Bachelor’s diploma in Computer Science, Cybersecurity, or related discipline.
- Preferred: Advanced stages (Master’s or Ph.D.).
- Preferred: Relevant certifications (CCSP, CISSP).
Technical Skills
- Strong knowledge of cloud platforms (AWS, Azure, GCP).
- Proficiency in cloud security frameworks and best practices.
- Experience with cloud security tools and technologies.
- Proficiency in programming languages (Python, Go).
- Experience with scripting languages for automation and security analysis.
- Deep understanding of network security protocols and architectures.
- Familiarity with cloud-native security solutions and threat detection technologies.
Experience
- Proven experience in cybersecurity research and analysis.
- Hands-on experience in security incident response, vulnerability assessment, and threat hunting.
- First in security research.
- Strong analytical and problem solving skills.
- Excellent verbal and written communication skills.
Frequently Asked Questions:
What qualifications are required for an IT Specialist (INFOSEC)(Direct Hire) position?
Typically, a bachelor’s degree in Information Technology, Cybersecurity, or a related field is required. Certifications like CISSP, CISM, or Security+ may also be necessary, along with several years of experience in information security.
What does an Information Security Analyst do?
An Information Security Analyst is responsible for protecting an organization’s computer systems and networks. They monitor for security breaches, implement security measures, and work on disaster recovery plans.
What skills are necessary for an Identity Access Administrator?
Key skills include knowledge of identity and access management (IAM) principles, familiarity with tools like Active Directory, and strong problem-solving abilities. Understanding security protocols and regulatory compliance is also crucial.
What are the main responsibilities of an IT Security Officer?
An IT Security Officer is responsible for developing and implementing security policies, ensuring compliance with regulations, managing security incidents, and conducting security audits and assessments.
What does a Cyber Security Analyst (Remote Nationwide) do?
A Cyber Security Analyst identifies and mitigates cybersecurity threats, monitors security systems, investigates security incidents, and ensures that security measures are up to date across remote networks.
What qualifications are necessary for an Internal Auditor-IT position?
A bachelor’s degree in IT, Accounting, or a related field is usually required. Certifications like CISA, CIA, or CPA are often preferred, along with experience in IT auditing or internal controls.
What does a Cybersecurity Engineer 2 typically work on?
A Cybersecurity Engineer 2 designs, implements, and manages security measures to protect an organization’s systems and data. They also assess vulnerabilities, respond to security incidents, and ensure compliance with security standards.
What is the role of a Windows Security Engineer?
A Windows Security Engineer is responsible for securing Windows-based systems within an organization. They manage security settings, monitor for vulnerabilities, and implement security patches and updates.
What experience is needed for a Database Security Engineer (Remote)?
Experience in database management and security is essential. Knowledge of database platforms like Oracle, SQL Server, and experience with encryption, access controls, and regulatory compliance are also important.
10. What tasks does a Security Researcher-Cloud perform?
Answer: A Security Researcher-Cloud investigates and analyzes cloud security threats, develops security solutions, and advises on best practices for securing cloud environments. They may also conduct penetration testing and vulnerability assessments.
What certifications are beneficial for an IT Specialist (INFOSEC) position?
Certifications like Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and CompTIA Security+ are highly beneficial for this role.
What industries commonly hire Information Security Analysts?
Information Security Analysts are commonly employed in industries such as finance, healthcare, government, technology, and telecommunications.
How does an Identity Access Administrator contribute to cybersecurity?
An Identity Access Administrator ensures that only authorized users have access to the organization’s systems and data. They manage user permissions and help prevent unauthorized access, thereby strengthening overall cybersecurity.
What is the difference between an IT Security Officer and an Information Security Analyst?
An IT Security Officer typically has a broader role that includes policy development, compliance, and overseeing security strategies, while an Information Security Analyst focuses more on the technical aspects of monitoring and protecting systems.
What does a Cyber Security Analyst (Remote) need to know about remote work environments?
They must understand the unique security challenges of remote work, such as securing VPNs, ensuring secure communication channels, managing remote access, and protecting against remote phishing attacks.
What is the career path for an Internal Auditor-IT?
The career path typically starts with roles like IT Auditor or Junior Auditor, progressing to Senior IT Auditor, Audit Manager, and potentially leading to positions like Chief Audit Executive (CAE).
What type of security issues does a Cybersecurity Engineer 2 address?
They address issues like network security, application security, incident response, encryption, and compliance with security standards and regulations.
What tools does a Windows Security Engineer commonly use?
They often use tools like Microsoft Defender, Group Policy, Security Compliance Manager (SCM), and various security monitoring tools to protect Windows environments.
What are the primary responsibilities of a Database Security Engineer (Remote)?
Their responsibilities include securing databases from unauthorized access, implementing encryption methods, monitoring for breaches, and ensuring compliance with data protection regulations.
What makes the role of a Security Researcher-Cloud unique?
The role is unique due to its focus on cloud-specific security issues, such as multi-tenancy risks, securing API endpoints, and developing strategies to protect data in cloud environments.