This is a vital full-time, remote role at Vizrt, responsible for the deployment, configuration, and customization of the company's software-defined visual storytelling systems. The position requires a strong blend of system engineering expertise and broadcast IT knowledge.
- Location: Remote, United States.
- Experience: 2+ years of system engineering experience in a broadcast IT or enterprise software environment.
- Focus: Leading system deployment, configuration, and customization of Vizrt products, troubleshooting third-party integrations, and ensuring operational readiness in studio environments.
Key Responsibilities
The engineer leads the technical implementation and customization efforts for Vizrt's products.
- System Deployment: Lead the installation and advanced configuration of Vizrt products and systems into production environments.
- Customization & Development: Develop custom modules and code using third-party APIs to meet specific project requirements.
- Setup Management: Manage all aspects of system setup, configuration, customization, and testing systems that integrate with third-party hardware and software.
- Documentation: Rigorously document deployed systems and configurations.
- Continuous Improvement: Collect and share enhanced knowledge and customer feedback to support continuous improvement efforts within the organization, including managing code and patches in a structured way.
- Communication: Actively maintain communication with various stakeholders including end-users, developers, and technical staff.
Required Background and Technical Expertise
This position requires a technical background specifically tailored to the fast-paced broadcasting environment.
- Industry Experience: Strong understanding of television studio operations is essential.
- System Experience:
- Experience working with other broadcast systems is necessary, such as newsroom systems, vision mixers, and playout servers.
- 2+ years of experience with troubleshooting integrations between various systems.
- Knowledge and experience of Vizrt Mosart product and automation is highly advantageous.
- Technical Familiarity: Familiarity with data exchange technologies such as XML, REST, and SOAP.
- Education: Bachelor's Degree in Computer Science, Systems Engineering, or a similar field is recommended.
Job Features
| Job Category | Information Technology, Software Engineering |
This senior, fully remote Information Security Engineer position requires at least 5 years of relevant experience to tackle non-trivial security challenges across a hybrid infrastructure. The role demands proactive design, implementation, and maintenance of secure configurations for all key operational areas.
- Location: Remote (Work remotely from anywhere in the world).
- Experience: At least 5 years of relevant experience.
- Focus: Designing and managing secure network configurations, system hardening across multiple platforms (Windows, Linux, MacOS), securing containerized (Kubernetes, Docker) and public cloud environments, and automating security processes.
What You'll Be Doing: Implementation and Hardening
The engineer provides end-to-end security engineering, from network design to tool management and hardening procedures.
- Secure Design & Management: Design and manage the implementation of secure network configurations for server infrastructure, public cloud, and containerized environments.
- System Hardening: Perform security validation and implement hardening processes across various systems, ensuring IT staff are guided on best practices.
- Tool Management: Maintain current security tools and manage the implementation and integration of new ones. This includes systems like EDR, VM, MDM, and PAM.
- Proactive Solutions: Provide proactive solutions to non-trivial security challenges.
Required Technical Expertise
The ideal candidate possesses deep, practical experience across modern network and platform security domains.
- Networking Expertise: Strong understanding of networking fundamentals (TCP/IP, DNS, routing) and practical experience securing network infrastructure and configurations (firewalls, VPN, IDS/IPS).
- Platform Hardening: Expertise in hardening of operating systems and network services across different platforms (Windows, Linux, MacOS).
- Container & Cloud Security: Practical experience securing containerized environments and orchestration systems (Kubernetes, Docker), as well as practical experience securing public clouds.
- Security Tooling: Experience in implementing, maintaining, and configuring security tools (EDR, VM, MDM, PAM systems, etc.).
- Automation: Proficient in scripting and automation (Python, Bash).
Nice-to-Have Skills
- Experience in implementing Zero Trust architecture.
- Hands-on experience with network penetration testing.
- Experience with infrastructure-as-code (IaC) tools like Ansible and Terraform.
Job Features
| Job Category | IT & Cybersecurity |
Viasat is seeking an experienced Offensive Security Engineer to simulate real-world cyberattacks against its diverse infrastructure, including hardware, service networks, satellite ground stations, and large-scale web/cloud applications. This role requires developing and executing custom exploits and providing clear, actionable risk assessments to both technical and executive audiences.
- Location: Remote in CA, AZ, MD, GA, or hybrid in several city offices.
- Salary Range: $107,500.00 - $170,500.00 annually (Higher in specific high-cost metropolitan areas).
- Required Experience: 3+ years of experience in offensive cybersecurity engineering, network penetration testing, threat emulation development, and web/cloud application security.
- Citizenship: US Citizenship required (Government focus).
- Travel: Ability to travel up to 10%.
What You'll Do: Attack Simulation and Tool Development
The engineer's day-to-day focuses on identifying and exploiting vulnerabilities across the entire Viasat ecosystem.
- Web and Cloud Testing: Conduct comprehensive security assessments of large-scale web applications, APIs, cloud environments (AWS, Azure, GCP), and supporting container infrastructure (Kubernetes, Docker).
- Network Penetration Testing: Conduct gray-box and closed system penetration tests on Viasat network infrastructure, including customer-facing networks, firewalls, and core ISP systems.
- Exploitation: Develop and execute custom exploits to demonstrate the impact of vulnerabilities, focusing on chaining multiple weaknesses into complex attack scenarios.
- Research and Tools: Stay current with the latest security trends and exploits. Develop custom scripts and tools to automate testing processes and improve efficiency.
- Reporting: Create high-quality, comprehensive reports that detail vulnerabilities, risk levels, and specific remediation recommendations for engineering teams.
Required Skills
- Offensive Security Expertise: 3+ years in offensive cybersecurity engineering, network penetration testing, and threat emulation.
- Cloud & Containerization: Proficiency in cloud services and container technologies (AWS, Azure, GCP, Kubernetes, Docker).
- Web Languages: Experience with various web application development frameworks and languages (e.g., JavaScript, Python, Ruby, C, C++, REST, gRPC).
- Communication: Strong communications skills, adept at composing detailed reports and presenting technical briefings.
Helpful Qualifications (Preferred)
- Bachelor’s degree in Cybersecurity or related engineering discipline.
- OSCP or OSWE certifications.
Job Features
| Job Category | IT & Cybersecurity |
Edwards Lifesciences, a medical technology company, is seeking an Architect for Information Security specializing in IAM. This role is highly collaborative and requires deep technical knowledge to design, implement, operate, and maintain enterprise-level IAM services and related technologies globally, ensuring compliance and enhancing the overall security posture.
- Location: Multiple US locations (including remote in the Arlington Area, VA).
- Experience: Bachelor's Degree with 6 years of related experience, or equivalent work experience. Prior experience in an architect role focused on Information Security and/or IAM domain is preferred.
- Focus: Providing architectural leadership, security design patterns, and establishing best practices for all IAM capabilities, with a heavy emphasis on Active Directory, Entra ID, and privileged access management.
How You Will Make an Impact: Architecture, Leadership, and Strategy
The architect drives the secure evolution of the company's identity framework.
- Architectural Leadership: Provide design and architecture guidance for enterprise-level security initiatives, system integration, and tools within the IAM domain. Serve as the technical lead for major IAM security initiatives.
- Design Standards: Develop security design patterns and architectural models that ensure repeatable, consistent architecture for IAM capabilities. Establish security best practices to ensure compliance with enterprise-wide policies.
- Core Expertise: Demonstrate expertise in designing and implementing secure Active Directory and Entra ID solutions, including deep knowledge of authentication features (Kerberos, LDAP), security best practices (tiering, credential theft mitigations), and troubleshooting.
- Modern IAM: Understand modern IAM solutions (e.g., MFA, Conditional Access, PIM, SSO) and identity providers using SAML, OAuth, or OpenID Connect.
- Incident & Risk: Resolve issues and incidents through highly complex root cause analysis. Partner in security operations and forensic analysis when required.
- Liaison: Act as a business liaison and lead advisor, translating complex security concepts into business-friendly language for stakeholders.
Required and Preferred Qualifications
- Expertise: Expert knowledge of security concepts for identity and access management.
- AD/Entra ID: Proven experience in securing and troubleshooting Active Directory and Entra ID (Azure AD).
- Cybersecurity Breadth (Preferred): Understanding of at least three cyber security domains (e.g., platform, application, network, cloud, data, and identity security).
- Methodologies (Preferred): Experience implementing industry good practices (NIST, ISO 2700x, SANS). Working knowledge with threat modeling (STRIDE).
- Certifications (Preferred): Certifications in related disciplines (CEH, CISM, CISSP).
- Soft Skills: Proficient analytical and problem-solving abilities, excellent communication skills, and the ability to manage competing priorities.
Job Features
| Job Category | Information Technology, Security |
First Quality, a growing family-owned group of manufacturing companies, is seeking an Information Security Engineer to provide technical leadership and expertise to protect the confidentiality, availability, and integrity of its information assets. This role is highly focused on implementing security standards, managing vulnerability attack surface, and maintaining security tools.
- Location: Remote (US PA Home Office, working from the Eastern Time Zone).
- Experience: Minimum 2 years of experience running security solutions on network/security engineering/security operations.
- Focus: Leading the vulnerability management program, serving as the SME for security tools (CASB, EPP, Vulnerability Scanning Suite), implementing security standards for projects, and ensuring effective incident response.
- Key Technology Preference: Experience working with Palo Alto Firewalls Suite (certification highly preferred).
Primary Responsibilities: Leadership, Tools, and Risk Mitigation
The engineer drives technical security standards and resilience across the enterprise.
- Technical Leadership: Provide technical engineering security expertise for company-wide projects, implementing security standards and baselines, and researching advancements in security technologies.
- Vulnerability Management: Lead the vulnerability management program, working closely with the patching team to limit the attack surface.
- Security Tool SME: Be or become the lead SME for various security tools including CASB, the Vulnerability Scanning Suite, and EPP, to maintain and improve their functionality.
- Incident Response: Ensure guiding procedures for incident response (CIRT) are in place, effective, and validated periodically.
- Security Solutions: Investigate, recommend, and assist with implementing security solutions that provide detection, prevention, containment, and deterrence mechanisms (e.g., identity management, access control, intrusion prevention).
- Reporting: Track, generate, and provide effective reporting; recommend and implement an effective event correlation solution to analyze security tool output.
Required Qualifications and Skills
- Experience: Minimum 2 years of experience in security engineering/operations.
- Networking & Protocols: Comprehensive knowledge of network architectures, equipment, and designs. Working knowledge of WANs, LANs, internet, intranets, and network protocols (VPN, TLS, SSH, SFTP, TCP/IP).
- Security Controls Knowledge: Knowledge of IT security controls including firewalls, SIEM, NAC, CASB, DLP, IPS/IDS, encryption, tokenization, and XDR/EDR tools.
- Vulnerability: Knowledge of vulnerability scanners and how to successfully implement and maintain an enterprise patching program.
- Cloud & Firewalls: Experience with cloud security solutions. Experience with Palo Alto Firewalls Suite (certification highly preferred).
- Soft Skills: Proven abilities to analyze security risks, provide remediation recommendations, and create comprehensive security documentation.
Job Features
| Job Category | IT & Cybersecurity |
Dynatron Software is seeking a senior Cybersecurity Engineer to design, implement, and maintain security measures for its information systems and networks, particularly focusing on securing the company’s SaaS platform and cloud environments. This role requires extensive experience in incident response, threat intelligence, and digital forensics.
- Location: Remote.
- Compensation: Base Salary of $110,000 plus a Variable Bonus of 5% of base salary. Participation in Equity Incentive Plan is included.
- Experience: Minimum 5 to 10 years’ experience in cybersecurity engineer roles.
- Travel: Less than 10%.
- Focus: Leading security architecture and deployment, incident response, DevSecOps integration (securing the CI/CD pipeline), and ensuring compliance with NIST and SOC2.
What You'll Do: Design, Implementation, and Incident Response
The engineer acts as the subject matter expert and architect for organizational security posture.
- Architecture & Deployment: Collaborate with stakeholders to design secure system and infrastructure architecture. Evaluate, configure, and lead deployment of cybersecurity solutions, providing SME guidance for all technologies impacting security.
- DevSecOps & Application Security: Collaborate with DevOps and development teams to embed security into the software lifecycle (DevSecOps) and the CI/CD pipeline, focusing on securing SaaS applications and cloud platforms.
- Incident Leadership: Lead incident response and event investigation by troubleshooting complex security and infrastructure issues, providing technical expertise to resolve vulnerabilities and prevent future incidents.
- Governance: Develop, implement, and update security protocols and ensure secure management aligned with frameworks such as NIST and SOC2.
Required Experience and Knowledge
- Experience: Minimum 5 to 10 years’ experience in cybersecurity engineer roles.
- Incident & Forensics: Proven experience in incident response, threat intelligence, and digital forensics.
- Technical Depth: Strong knowledge of network protocols, firewalls, and endpoint security configurations.
- Cloud & Application Security: Extensive experience with cloud security and application security.
- Compliance: Experience with security frameworks such as NIST and SOC2.
Job Features
| Job Category | IT & Cybersecurity |
Lumen is seeking a Principal Security Engineer to join its Black Lotus Labs Research & Analysis team. This highly specialized role leverages petabyte-scale data and global internet visibility to perform cutting-edge threat research, focusing on tracking nation-state and cybercriminal threat actors (APTs). The role involves serving as a Subject Matter Expert (SME), leading projects, and driving thought leadership.
- Location: Remote, United States of America.
- Compensation: Salary ranges from $149,084 to $218,657 based on location and experience.
- Required Experience: 5+ years of experience in the Intelligence Community (IC), Department of Defense (DoD), or similar tracking and defending against nation-state threat activity.
- Security Clearance: Active TS/SCI clearance with poly is required.
- Focus: Advanced Persistent Threat (APT) tracking, technical security research, automating detection (Python), threat hunting methodology leadership, and executive communication.
The Main Responsibilities: Leadership, Research, and Automation
The Principal Engineer sets the strategic direction for threat intelligence generation and distribution.
- Threat Research Leadership: Serve as a Threat Research Subject Matter Expert (SME), setting priorities for threat analysis, identifying knowledge gaps, and mentoring team members.
- Advanced Tracking: Use industry-leading technical knowledge to define, develop, and implement techniques to lead the team in tracking sophisticated adversaries.
- Data Fusion & Automation: Conduct research across technical datasets, fusing Black Lotus Labs telemetry with third-party data to automate detection of the latest attacker tools, techniques, and procedures (TTPs). Build prototype threat hunting solutions and large data analysis tools with Python or equivalent languages.
- Strategic Insights: Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership.
- Thought Leadership: Spearhead thought leadership initiatives by leading Black Lotus Lab’s voice at security conferences and internal executive briefings.
Required Qualifications
- Threat Hunting Proven Track Record: Proven experience in threat hunting and in-depth technical security research, successfully identifying, tracking, and disrupting nation-state and cybercriminal actors.
- Experience: 5+ years of experience in the IC, DoD, or similar environment tracking nation-state activity.
- Clearance: Active TS/SCI clearance with poly (Mandatory).
- Technical Proficiency: Deep understanding of advanced threat hunting methodologies, attacker TTPs, and experience building prototype hunting solutions with Python.
- Communication: Exceptional communication and presentation skills to convey complex information to technical and non-technical audiences (executives, board members, conference attendees).
Well-Experienced Candidates May Also Have
- Proficiency in malware reverse engineering and incident response.
- Software development experience in Docker and big data technologies like Hadoop, Spark, and TensorFlow.
- Experience leading teams of technical threat discovery professionals.
Job Features
| Job Category | IT & Cybersecurity |
ScribeAmerica is seeking an Information Security Analyst to prevent cybersecurity incidents through monitoring, detection, analysis, and response across a multi-platform environment. This role is highly technical, involving hands-on security integration, vulnerability management, and support for critical compliance and disaster recovery activities.
- Location: Remote (Full-time).
- Salary Range: $60,000 – $70,000 (Annual Salary).
- Experience: Minimum 2-4 years experience in Cybersecurity technology or a related technology field.
- Education/Certification (Preferred): AA or AS degree in a related field. SSCP or CompTIA Security+ certified professionals preferred.
- Focus: Security monitoring (SIEM/SOAR), vulnerability scanning and patching, compliance (ISO 27001/HiTrust), Public Cloud security (AWS/GCP), and Incident Response.
Duties and Responsibilities: Operations, Compliance, and Cloud
The analyst manages both daily operational security and critical compliance/architecture projects.
- Monitoring & Analysis: Daily review of Security Alerts, Security Dashboards, and SEIM/SOAR systems. Utilizes troubleshooting tools to review and respond to cyber threats.
- Vulnerability & Testing: Participates in hands-on scanning and patching of Windows/Linux/MacOs systems using vulnerability scanning and patch management tools. Performs monthly, quarterly, yearly Security Pen-testing, Security Scans, and Red Team/Blue Team engagements.
- Compliance & Authorization: Performs in all activities of Certification and Accreditation (C&A) / Assessment and Authorization (A&A). Supports the implementation of ISO 27001 CSF and HiTrust CSF.
- Cloud Security: Assists in the Security architecture, design, configuration, and implementation of AWS/GCP public cloud, including connectivity, network, and containerization.
- Incident Response: Acts as a member of the Company Cyber Incident Response team and assists during all BCP/DR (Business Continuity / Disaster Recovery) activities.
- Automation: Develops scripts/programs to automate system compliance lockdown processes.
Required Education and Experience
- IT Infrastructure: Full-stack knowledge of IT infrastructure, from applications & databases to hypervisors and networking.
- System Administration: Experience in Linux/Windows/MacOS System Administration and Network/System Administration.
- Security Tools: Knowledge/Experience with vulnerability scanners and penetration testing tools.
- Cloud: Public Cloud Infrastructure Expertise (GCP, AWS or Azure).
- Other Skills: Solid understanding of computer networking, basic understanding of software development/build processes, OSINT and Social Engineering skills, and excellent technical writing skills.
Job Features
| Job Category | IT & Cybersecurity |
This senior Information Security Analyst role is critical for advancing enterprise security by leading the deployment and governance of Non Human Identity (NHI) and Privileged Access Management (PAM) solutions. The role emphasizes implementing NHI auditing and management tools, establishing robust security standards, and ensuring business and IT alignment.
- Location: Remote Job.
- Experience: 5–7 years of experience leading enterprise-level PAM projects with a focus on Non Human Identities.
- Focus: Architecture, design, and implementation of NHI and PAM technologies; deploying NHI auditing tools (preference for Oasis experience); and developing NHI technology standards.
Key Responsibilities: Leadership, Deployment, and Governance
The analyst drives the security strategy for automated and privileged access across the organization.
- Implementation Leadership: Lead architecture, design, and implementation of NHI and PAM technologies across complex enterprise environments.
- Tool Deployment: Deploy and manage NHI auditing and management tools, with a preference for experience in Oasis (or similar solutions like Astrix).
- Governance & Standards: Develop and maintain detailed documentation and input on NHI technology standards and security practices. Establish and optimize internal/external checks and controls to ensure security governance and data quality.
- Stakeholder Alignment: Align NHI and PAM projects with evolving business needs and enterprise IT strategies. Translate technical security solutions into clear, non-technical documentation for various stakeholders.
Qualifications
- Experience: 5–7 years of experience leading enterprise-level PAM projects with a focus on Non Human Identities.
- Technical Proficiency: Proven experience deploying NHI solutions (such as Oasis, Astrix). Expert-level knowledge of Non Human Identities and PAM.
- Education: Bachelor’s degree in Computer Science, Information Systems, or equivalent experience.
Job Features
| Job Category | IT & Cybersecurity, Security |
Fixpoint is hiring experienced Information Security Engineers for a research project with a leading AI company. The role involves leveraging professional expertise to help shape how next-generation AI models understand and reason about the field of information security.
- Location: Remote, United States (Must be a U.S. resident).
- Duration: Approximately 3–4 weeks.
- Commitment: Minimum of 10 hours per week (fully asynchronous and flexible schedule).
- Compensation: $32 – $46 per hour (potentially higher for exceptional candidates).
- Classification: 1099 independent contractor status.
About the Project: Educating AI
The contractor will use their professional experience to explain the role of an Information Security Engineer to the AI model.
- Explain the Profession: Explain the challenges and skillsets of the job.
- Define Excellence: Explain what excellence looks like in the profession.
- Design Content: Design questions related to the occupation of an Information Security Engineer.
Required Experience
- Professional Experience: 5+ years of full-time work experience.
- Core Security Skills (Experience with):
- Identifying security system weaknesses, such as using penetration tests.
- Coordinating monitoring of networks or systems for security breaches or intrusions.
- Scanning networks using vulnerability assessment tools.
- Developing response and recovery strategies for security breaches.
- General Requirements: Native-level English skills and U.S. residency are mandatory.
Nice-to-Haves
- Developing information security standards and best practices.
- Implementing software tools for security threat detection, prevention, and analysis.
- Providing technical support for security products.
Job Features
| Job Category | AI (Artificial Intelligence), IT & Cybersecurity, Security |
Mindrift is seeking a Freelance Cybersecurity Analyst to work as an AI Trainer, contributing to projects aimed at giving GenAI models complex reasoning skills in cybersecurity. This role requires deep, hands-on experience in security operations to analyze and validate AI-generated content and performance.
- Location: Remote (Must currently reside in the specified country—though the posting says Remote Iowa, US is listed).
- Compensation: Up to $55/hour, depending on skills, experience, and project needs.
- Type: Part-time, fully remote, freelance project with a flexible schedule.
- Focus: Training AI models by analyzing simulated security incidents, conducting threat hunting, assessing AI-generated reports, and refining the model's understanding of SOC workflows and specific security tools.
What You'll Do: AI Training and Cybersecurity Investigation
The analyst's duties directly involve evaluating and improving the AI model's security capabilities.
- Incident & Threat Analysis: Analyze and investigate simulated security alerts and incidents across endpoints, identities, and cloud environments.
- Threat Hunting: Conduct proactive threat hunting using KQL or similar query languages.
- AI Validation: Assess the accuracy and depth of AI-generated security incident reports and threat analyses.
- Product Expertise: Review, validate, and improve the model’s understanding of Microsoft Defender products and standard Security Operations Center (SOC) workflows.
- Feedback Loop: Provide expert feedback on AI performance in identifying and classifying cybersecurity threats.
Requirements: SOC, Microsoft Defender, and KQL Proficiency
- Experience: At least 3 years of hands-on experience in cybersecurity operations, incident response, or threat detection.
- Work Background: Proven background working in Security Operations Centers (SOC).
- Technical Proficiency: Proficient in Microsoft Defender products (Endpoint, Identity, Cloud Apps) and familiar with Microsoft Sentinel or similar SIEM tools (Splunk, QRadar, Elastic).
- Query Language: Strong experience using KQL (Kusto Query Language) or equivalent log analysis tools for threat detection and investigation.
- Education/Certification: Bachelor's or Master’s Degree in Cybersecurity or related field is preferred. Recognized industry certification (e.g., SC-200, AZ-500, CISSP, CEH, CompTIA Security+) is preferred.
Job Features
| Job Category | AI (Artificial Intelligence), IT & Cybersecurity |
Stratfield is seeking a Technical Support Analyst for a 6-month remote contract position (with possible extension). This role is centered on diagnosing and troubleshooting technical issues across distributed sites, requiring strong investigative skills using modern observability platforms.
- Location: Remote, US-based (Contract position).
- Duration: 6 months (with possibility of extension).
- Focus: Hands-on technical troubleshooting, root cause analysis, monitoring with Datadog, and supporting systems deployed in Kubernetes environments.
Responsibilities: Diagnosis, Resolution, and Improvement
The analyst's duties are focused on technical investigation and driving solutions within a complex system environment.
- Hands-on Troubleshooting: Follow up with locations to identify and diagnose technical issues.
- Monitoring & Root Cause: Use monitoring and logging tools such as Datadog (or similar observability tools) to troubleshoot and determine the root cause of problems.
- Technical Investigation: Ability to debug issues, analyze logs, and identify root causes.
- Resolution Management: Resolve or efficiently escalate issues while maintaining detailed documentation of findings and actions. Collaborate with cross-functional teams to ensure timely issue resolution.
- Process Improvement: Identify recurring problems and contribute to overall process and system improvements.
Required Skills and Qualifications
- Technical Troubleshooting: Strong technical troubleshooting and problem-solving abilities.
- Observability: Experience using Datadog or similar observability tools.
- Containerization: Familiarity with Kubernetes environments.
- Investigation: Ability to debug issues, analyze logs, and identify root causes.
- Soft Skills: Excellent communication and documentation skills.
- Preferred: Experience supporting multi-site or distributed technology environments.
Job Features
| Job Category | Data, Support Service, Technical Services |
Fresenius Kabi is seeking a Functional Workday Support Analyst to serve as a key resource for the stability, efficiency, and optimization of their Workday system. This specialist provides Tier 2 support, troubleshooting configuration issues and driving system enhancements while ensuring compliance and data integrity.
- Location: United States (Remote).
- Salary Range: $65,000 - $85,000 per year.
- Experience: At least 3 years of experience providing technical support for enterprise systems, preferably Workday, including system testing and documentation.
- Focus: Advanced technical support and configuration within Workday, managing data integrations, supporting system releases, and developing user training/documentation.
Responsibilities: Configuration, Integration, and Stability
The analyst acts as the Workday configuration expert and escalation point for the organization.
- Technical Support & Resolution: Provide technical support, troubleshooting, and resolution for Workday issues, including configuration errors, data discrepancies, and system functionality concerns.
- Escalation & Collaboration: Collaborate with Tier 1 support, HR, Finance, IT, and external vendors to resolve escalated cases and implement cross-functional system solutions.
- Data & Performance: Analyze system performance, identify root causes, and implement corrective actions to ensure data integrity and system stability. Partner with integration teams to manage and support data interfaces between Workday and other business systems.
- Testing & Releases: Contribute to system testing, validation, and quality assurance for new configurations, releases, and upgrades. Stay current on Workday releases.
- Documentation & Training: Assist with the preparation and updating of HRIS documentation (process guides, knowledge base articles). Conduct end-user training sessions to enhance user adoption.
- Compliance: Ensure compliance with data security, audit requirements, and company policies in all HRIS processes and activities.
Requirements and Technical Skills
- Education: Bachelor’s degree in computer science, information systems, business administration, human resources, or a related field.
- Workday Proficiency: At least 3 years of experience, with proficiency in configuring Workday system settings, security roles, and reports.
- Certifications (Plus): Workday certification(s) such as Workday HCM.
- Business Acumen: Understanding of HR and finance business processes is desirable.
- Soft Skills: Strong analytical and problem-solving skills, excellent communication, and the ability to manage multiple tasks in a fast-paced environment.
Job Features
| Job Category | Data, Support Service |
Fortra is hiring an Associate Support Analyst for an entry-level position focused on providing first-line technical support for their secure file transfer products. The ideal candidate is a self-starter with a strong desire to learn and develop problem-solving skills in a dynamic cybersecurity environment.
- Location: Remote, United States.
- Compensation: $45,000 - $65,000 USD (Annual Salary).
- Experience: Entry-level; Bachelor's degree in a technical field preferred, or equivalent experience. Previous software support experience is a plus but not required.
- Focus: Triage and resolution of technical cases, troubleshooting secure file transfer connectivity, learning product configurations, and continuously enhancing technical expertise in networking and OS environments.
What You'll Do: Learning, Troubleshooting, and Communication
The analyst's primary duties center on technical investigation, effective customer communication, and internal collaboration.
- Learning and Growth: Develop a strong understanding of Fortra's secure file transfer products, their configurations, and customer deployment models. Actively seek opportunities to expand technical knowledge of operating systems and networking.
- First-Line Support: Triage incoming support cases to assess urgency, troubleshoot effectively, and escalate when necessary.
- Investigation: Collect and analyze system data, identify potential causes, and resolve issues related to products, connectivity, and configurations.
- Communication: Engage with customers professionally via email, phone, and case management platforms to guide them through troubleshooting and provide timely solutions.
- Collaboration: Work closely with peers to share knowledge, resolve complex issues, and improve troubleshooting processes.
Qualifications and Skills
- Aptitude: Strong desire to learn and grow in a technical support role. Strong problem-solving skills with a systematic approach.
- Technical Fundamentals: Basic knowledge of multiple operating systems: Windows, macOS, Linux, and IBM i systems.
- Networking: Foundational understanding of TCP, File Transfer Protocols (FTP), and DNS. Troubleshooting knowledge in routing, firewalls, port management, and connectivity is required.
- Environments: Experience in remote desktop, cloud, and virtualized environments is required.
- Soft Skills: Excellent communication skills, especially over the phone, and the ability to take initiative while collaborating within a team.
Job Features
| Job Category | Support Service, Technical Services |
Strategic Information Group, a premier supplier of enterprise software solutions, is seeking a Tier 2 ERP Support Analyst (Application/Functional focused) to support its manufacturing clients. This analyst is responsible for resolving complex ERP issues, mentoring junior staff, and proactively driving continuous process improvements within stable, secure, and compliant QAD environments.
- Location: Remote - USA.
- Base Pay Range: $75,000 - $120,000 (Commensurate with experience).
- Incentive Pay: Up to 30% of base salary.
- Required Experience: 7–10 years of ERP/IT support experience, with at least 5 years specifically in QAD/Progress environments.
- Focus: Advanced functional/application troubleshooting, configuration optimization, cross-module support, UAT, and ITIL-based continuous improvement.
Tier 2 Responsibilities: Advanced Application Support
The Level 2 analyst is expected to perform all Level 1 duties and focus on resolving advanced, complex issues across multiple ERP modules:
- Application/Module Support: Resolve advanced issues in key QAD modules including Order-to-Cash (O2C), Procure-to-Pay (P2P), Finance, Production, Inventory, and Reporting.
- Configuration & Optimization: Advise clients on parameter settings, workflows, and usage best practices. Streamline ERP functional workflows and ensure alignment with business needs.
- Complex Resolution: Troubleshoot posting errors, stuck processes, status mismatches, and variance reconciliations. Understand end-to-end flows (e.g., sales order → shipping → invoicing → finance).
- Mentoring & Documentation: Mentor Tier 1 Analysts on advanced troubleshooting and proper ticket hygiene. Perform installations, upgrades, and complex changes. Document clearly in tickets, runbooks, and Knowledge Base (KB) articles.
- ITIL/Continuous Improvement: Log all continuous improvement ideas and implemented changes into the Continuous Improvement Register (CIR) using ITIL standards.
- Communication: Collaborate directly with clients during live troubleshooting and communicate with stakeholders at both technical and executive levels.
Minimum Qualifications (Level 2)
- ERP Expertise: 7–10 years of ERP/IT support experience, with at least 5 years in QAD/Progress environments.
- Methodology: Working knowledge of ITIL principles and their application in service delivery.
- Professional Skills: Demonstrated ability to manage complex issues independently and under pressure. Excellent client communication skills (de-escalation, sensitive situations).
- Technical Breadth: Advanced knowledge in the application (APP) scope with a working understanding of the technical (TECH) area.
Preferred Experience
- Certifications: ITIL Intermediate/Strategic Leader, Progress DBA, QAD ERP Admin, Linux, or related.
- Integrations: Experience with integrations (EDI, QXtend, APIs) and customizations.
- Security & Compliance: Experience with security audits, access reviews, and compliance reviews.
Job Features
| Job Category | Human Resources, Support Service |