This is a full-time, remote Data Analyst role at Milliman, focused on supporting a major business transformation program to modernize HRIS, Finance, Legal, and Professional Services Automation systems. The analyst is a critical member of the Data Enablement Team, ensuring data integrity, quality, and seamless migration through data profiling, mapping, validation, and integration.
- Location: Remote (Designated location: Chicago, IL).
- Salary Range: $78,800 - $145,130 (specific range depends on candidate location).
- Experience Required: Minimum 5 years of experience in a data analyst or similar data-focused role, preferably supporting large-scale system implementations or migrations.
- Focus: Data profiling, mapping, ETL support, data quality, metadata/lineage documentation, and supporting data governance during a major enterprise platform overhaul (HRIS, Finance, Legal, PSA).
- Technical Skills: Hands-on experience with SQL, Python, and relational databases.
Responsibilities: Data Integrity and Migration Lifecycle
The analyst collaborates closely with business and technical teams across the entire data lifecycle for the migration, from initial profiling through post-implementation governance.
- Data Analysis & Profiling: Profile data and analyze source systems and data structures to assess content, quality, and structure, supporting accurate mapping and migration processes. Analyze and document existing data sources, structures, and business rules within legacy systems.
- Data Mapping & Transformation: Develop comprehensive data mapping documents, including source-to-target specifications and transformation logic. Ensure mappings are compatible with MDM, data hub, and integration platform configurations.
- ETL and Validation: Support the extraction, transformation, and loading (ETL) of data, including profiling, cleansing, and validating migrated data. Perform data quality assessments and implement data validation processes to ensure completeness and accuracy.
- Documentation & Governance: Create and maintain data catalogs for consistent documentation and easy discovery. Assist in identifying data quality issues and contribute to metadata and lineage documentation.
- Integration Support: Assist in designing and testing data integrations between new enterprise platforms and other business applications.
- Stakeholder Collaboration: Collaborate with business stakeholders to gather requirements, refine business rules, and communicate data requirements for HR, Finance, Legal, and Professional Services functions.
- Issue Resolution: Track mapping progress, dependencies, and issues, providing timely updates and resolving blockers.
Required Skills and Qualifications
The successful candidate needs deep technical familiarity with data management practices and strong soft skills for collaboration within a major project environment.
- Experience: Minimum 5 years in a data analyst or similar role, with previous experience with data analysis, data profiling, data mapping, and ETL processes.
- Technical Tools: Hands-on experience with SQL, Python, and working with relational databases. Previous experience with data migration and data integration tools.
- Soft Skills: Excellent analytical skills with the ability to interpret and translate business requirements into technical specifications. Effective verbal and written communication, with the ability to collaborate across business and technical teams.
- Preferred Skills:
- Experience with HRIS, Finance, Legal, or Professional Services Automation systems.
- Familiarity with data governance and data quality best practices.
- Experience with cloud-based data platforms (e.g., AWS, Azure, Google Cloud).
Job Features
| Job Category | Data, Information Technology |
This is a full-time, Mid-Level, Remote Logistics Data Analyst role within the Outbound Transportation Team of the Logistics Department at WebstaurantStore.com, a leading e-commerce website for foodservice professionals. The analyst is responsible for using data to identify supply chain inefficiencies, developing suggested business logic improvements, and achieving financial savings by optimizing transportation operations.
- Location: Remote (Must be a legal resident in one of the specified US states).
- Employment Status: Full-Time (W-2 only).
- Education: No degree required; focus is on relevant skills and experience.
- Focus: Analyzing logistics data, optimizing outbound delivery rates and transit times, implementing cost reduction strategies, and managing transportation provider relationships.
- Technical Skills: Experience with PowerBI, RStudio, Python, SQL, or similar programs is required.
Responsibilities: Cost Reduction and Supply Chain Optimization
The analyst is expected to be a data-driven innovator who challenges the status quo and takes ownership of complex problems to drive process improvement and financial results.
- Financial & Process Improvement: Identify areas for potential financial savings within supply chain operations and implement strategies to realize cost reduction. The ability to think like an entrepreneur and challenge the status quo is highly desired.
- Reporting & Analysis: Design and produce reports to provide valuable insights. Utilize varied datasets and systems in tandem to provide clarity for "grey area" business needs.
- Outbound Optimization: Work with the Outbound Transportation Team to optimize delivery rates and transit times.
- Data Systems: Collaborate with the enterprise business intelligence department to improve and optimize data and reporting capabilities and processes.
- Tool Management: Help optimize custom-built transportation management tools.
- Vendor Management: Manage relationships with contracted transportation providers.
Required Qualifications and Technical Skills
The role prioritizes excellent analytical abilities, practical experience with data manipulation, and strong communication skills over a formal degree.
- Analytical Skills: Has excellent analytical skills, with the ability to look "behind the numbers" to understand operational mechanics.
- Data Proficiency: Experience creating, cleaning, and leveraging data and reporting tools to support proposed solutions.
- Technical Tools: Experience using PowerBI, RStudio, Python, SQL, or other similar programs.
- Software: Proficient in MS Excel (proficiency with other statistical software is a plus).
- AI/ML (Desired): Experience using AI and Machine Learning to support business operations and decisions is desired but not required.
- Soft Skills: Able to work autonomously, communicate effectively with diverse audiences, and balance multiple responsibilities in a fast-paced environment.
Job Features
| Job Category | Data, Operations Management |
This is a full-time, remote Sustainability Data Analyst role at Carhartt, reporting to the Senior Manager, Sustainability, within the People & Impact Department. The core mission of this role is to lead the collection, analysis, and visualization of environmental performance data, with a primary focus on Greenhouse Gas (GHG) emissions (Scopes 1, 2, and 3), water, and waste. The analyst ensures a transparent, data-driven sustainability reporting process that supports science-based targets and voluntary environmental reporting.
- Location: Remote (Dearborn, MI is the department base).
- Experience Required: 3+ years of experience in data analysis or sustainability reporting, particularly with a global leading manufacturer (apparel or CPG preferred).
- Education: Bachelor’s degree in Environmental Science, Data Analytics, Sustainability, or a related field (Advanced degree preferred).
- Travel: Limited travel (10%).
- Focus: GHG inventory/accounting, data visualization (Power BI), ESG standards (CSRD, SEC), and cross-functional data-collection framework design.
Associate Responsibilities: Data Frameworks and Reporting
The analyst drives the technical and strategic effort to quantify and analyze the company's environmental footprint across the value chain.
- GHG Inventory Leadership: Lead the annual greenhouse gas emissions inventory/accounting process for Scope 1, 2, 3 categories including supply chain, product use, end-of-life, water, and waste measurements.
- Data Framework Design: Design and implement data collection frameworks across suppliers, logistics, product development, and retail channels to capture indirect emissions. Identify opportunities for automation and building data pipelines.
- Analysis & Target Setting: Analyze emissions data to identify hotspots, trends, benchmark performance, and support target-setting (e.g., science-based targets) and informed decision-making.
- Visualization & Reporting: Develop data visualizations and dashboards (using Power BI, etc.) to monitor sustainability KPIs. Prepare and present sustainability reports, papers, and presentations for internal and external stakeholders.
- Compliance & Insight: Partner with the Global Social Responsibility team, staying current on ESG reporting standards and regulations (e.g., CSRD, SEC climate disclosure).
- Modeling & Forecasting: Develop a framework to model impact and/or forecast future performance of future initiatives.
Required Skills and Experience
Success requires specialized experience in environmental accounting, data management, and the ability to influence cross-functional teams.
- Specialized Experience: 3+ years of experience in data analysis or sustainability reporting. Experience in Green House Gas Accounting (Scope 1, 2, 3 emissions) and water & waste data tracking.
- GHG Tools (Preferred): Experience with GHG accounting software (e.g., Carbonfact, Worldly) preferred.
- Compliance Knowledge (Preferred): Familiarity with ESG standards and experience with VPPA’s and/or renewable energy preferred.
- Technical Proficiency: Advanced experience and proficiency using Excel, PowerPoint/Keynote, Word, Power BI, etc.
- Soft Skills: Demonstrated ability to execute programs that achieve sustainability goals. Ability to persuade and influence, without having direct authority, to drive solutions. Excellent communication skills.
Job Features
| Job Category | Data |
This is a full-time, remote (US-Remote) Data Analyst role at MANSCAPED®, a leading men’s grooming and lifestyle consumer brand. Reporting to the Sr. Manager, Analytics, this role is a hybrid position focused on both data analysis and the building/optimizing of data pipelines (ETL). The analyst will drive smarter decisions across marketing, product, and operations by ensuring data is accurate, accessible, and actionable.
- Location: Remote, United States.
- Compensation Range: $75,000 - $85,000 USD annually.
- Experience Required: 2+ years of direct experience in analytics, reporting, or data management roles.
- Focus: SQL, ETL/pipeline maintenance, dashboard building, customer segmentation, and marketing/e-commerce data analysis (Shopify, Amazon, CRM).
- Work Environment: Remote-first employer with a monthly utility allowance.
Responsibilities: Pipelines, Insights, and Reporting
The analyst will combine a technical, hands-on approach to data engineering fundamentals with a strong analytical mindset to deliver actionable business intelligence.
- Data Pipeline/ETL: Support analytics and BI initiatives by maintaining and optimizing data pipelines and ETL processes .
- Note: This includes partnering with senior analysts and data engineers to ensure data is accurately modeled, transformed, and documented across sources (Shopify, Amazon, CRM, etc.).
- Analysis & Insights: Collect, analyze, and interpret data to identify trends and generate actionable insights for retention marketing, product performance, and customer segmentation.
- Reporting: Build and maintain automated dashboards and reports to track Key Performance Indicators (KPIs).
- Data Quality: Conduct data validation and quality checks to ensure data integrity and consistency.
- Modeling: Assist in developing and testing basic forecasting models and reports, and help refine business logic through SQL and analytics tools.
- Collaboration: Collaborate with cross-functional teams to improve data accessibility, reliability, and governance.
Required Qualifications and Technical Skills
The successful candidate must be proficient in SQL and experienced with common BI and data pipeline tools used in a modern e-commerce environment.
- Experience: 2+ years of direct experience in analytics, reporting, or data management roles.
- Core Technical Skills:
- Proficiency in SQL for querying, transforming, and aggregating data.
- Proficiency with Excel and Google Sheets for data analysis and modeling.
- Experience with data visualization tools such as Looker, Tableau, or Power BI.
- Pipeline Knowledge (Plus): Working knowledge of ETL concepts, data modeling, and pipeline automation (e.g., Daasity, dbt, Fivetran, Airflow, or similar tools) is a plus.
- E-commerce Knowledge (Plus): Solid understanding of marketing analytics tools (e.g., Google Analytics, Shopify, Klaviyo, etc.) and familiarity with cloud data warehouses (Snowflake, BigQuery, Redshift, etc.) are a plus.
Benefits Highlights
- PTO/Leave: Generous 20 accrued vacation days, 40 hours of paid sick leave, 3 paid mental health days, 9 paid holidays (including birthday), and paid parental leave.
- Retirement: Employee 401(k) plan with company match.
- Insurance: Comprehensive medical, dental (100% employer paid), and vision insurance, plus Paws & Claws coverage (pet insurance).
Job Features
| Job Category | Data, Product, Strategy and Ops |
This is a full-time, remote (US-Remote) Application Analyst role at PLOS, a nonprofit Open Access publisher. The role is centered on data stewardship, focusing on improving how PLOS manages, connects, and understands data across its application ecosystem. Key responsibilities include integrating systems, ensuring data quality/consistency across reporting platforms, and providing administration/support for various enterprise applications.
- Location: Remote, USA.
- Base Salary Range: $75,000 - $100,000 annually.
- Focus: Data quality and consistency, system integration, Tableau/SQL reporting, administering enterprise applications (e.g., JIRA, Confluence, NetSuite, HubSpot), and learning Editorial Manager (EM).
- Work Environment: Fully remote work environment (with a stipend on joining for home office). Some domestic and/or international travel may be required.
Responsibilities: Data Stewardship and Application Management
The analyst acts as the data steward for the applications team, ensuring seamless and accurate data flow, coupled with providing high-quality end-user support.
- Data Stewardship: Act as a data steward—monitoring data quality, maintaining field mappings, and ensuring seamless data flow between systems. Manage data in accordance with Information Governance policy and legal frameworks (GDPR).
- System Administration: Administer and maintain various enterprise applications (e.g., Tableau, JIRA, Confluence, Alchemer, NetSuite, HubSpot), including data management, system configuration, and security practices.
- Integration & Security: Partner with the Technology Services team to establish and enhance application integrations and uphold security best practices.
- User Support: Provide end-user support and administration for all user needs (account maintenance, reports, dashboards). Communicate policies, outages, bugs, and solutions.
- Process Improvement: Facilitate collaboration to translate business requirements into technical specifications. Proactively monitor usage and propose improvements for application usage and business processes.
- Documentation: Create and maintain technical documentation on policies, procedures, workflows, and deployed configurations.
Required Knowledge and Skills
The position requires deep analytical abilities, proficiency with data tools, and experience managing complex, integrated enterprise systems.
- Data Proficiency: Proficiency with data and reporting tools such as Tableau, SQL, and related data visualization/analytics platforms.
- Integration Knowledge: Strong understanding of system integrations, data mapping, and ensuring data quality and consistency across applications.
- System Administration: Experienced with administering large, enterprise-wide systems or platforms.
- Analytical Skills: Strong analytical skills with the ability to collect, organize, analyze, and disseminate significant amounts of information. Adept at queries, report writing, and presenting findings.
- Business Systems: Functional knowledge of business systems and strong understanding of typical operational workflows spanning multiple business functions (e.g., Sales, Marketing, Customer Service, Finance, etc.).
- Publishing Experience (Desirable): Experience with scientific research publishing or working with Publication Management Systems (Aries Editorial Manager) or similar submission tracking systems is highly desirable.
Job Features
| Job Category | Data, Information Technology, Support Service |
This is a full-time, remote (US) Group IT Security Analyst role at Marmon Electrical (part of Marmon Holdings, a Berkshire Hathaway company). This hands-on position works closely with the Group VP of IT to ensure the security and integrity of the organization’s systems and data. The analyst is responsible for managing security tools, leading compliance initiatives (especially CMMC), and driving risk management activities across the decentralized group.
- Location: Remote, United States.
- Experience: At least five years of experience in IT security, plus experience in providing desktop/network support.
- Education/Certification: Bachelor's degree in a related field and relevant certifications (e.g., Network+, Security+, DR, CISSP, CISM, or CISA).
- Travel: Estimate of about 10% travel to businesses is required.
- Focus: Tool management (Qualys, SentinelOne, etc.), CMMC compliance, third-party risk management (SOC 2), security policy implementation, and incident response.
Essential Duties: Compliance, Monitoring, and Risk Management
The analyst's role spans proactive defense, regulatory adherence, and incident handling across the Electrical group's decentralized environment.
- Security Tool Management: Proactive management and monitoring of existing cyber tools (e.g., Qualys, SentinelOne, Abnormal, Proof Point, Bitsight, Delinea, Artic Wolf, etc.).
- Compliance Leadership: Lead initiative to ensure defense businesses are CMMC compliant. Ensure compliance with PCI-DSS, ISO 27001, GDPR, CCPA, NIST, ITAR, and other regulations (based on current CIS standards) .
- Policy & Procedure: Implement security policies and procedures and ensure business compliance with Marmon Standard Practice Instructions.
- Third-Party Risk: Ensure third-party risk assessments are completed and that each service provider shares a SOC 2 Type 2 report.
- Incident Lifecycle: Monitor security events, conduct risk assessments, manage security incidents (containment, investigation, recovery), and collaborate on incident response and disaster recovery plans.
- Asset Management: Assist businesses in managing computer assets (ensuring cybersecurity tools installed and plans for end-of-life systems). Assist with domain registrations (SPF, DKIM, DMARC).
- Collaboration: Coordinate all security activities with Marmon Corporate and other IT teams. Participate in IT audits/assessments and train employees on best practices.
Required Qualifications and Technical Expertise
The candidate must have strong hands-on experience across both offensive and defensive security tools and core security frameworks.
- Experience: At least 5 years in IT security, with experience in desktop/network support.
- Security Technologies: Strong knowledge of security tools, including firewalls, antivirus software, IDS, offensive pen testing, defensive pen testing, and other security tools.
- Architecture: Experience with zero trust architecture and implementing zero trust principles.
- Frameworks: Familiarity with industry standards and regulations such as ISO 27001, CCPA, GDPR, and CIS.
- Communication: Excellent communication skills, including communicating technical information to non-technical stakeholders.
Preferred Experience:
- Previous experience in a highly decentralized and disparate technology environment.
- Experience with Mergers and acquisitions and systems integration.
- Familiarity with vendor tools like Microsoft, Cisco, Palo Alto, VMware, Hyper-V, Qualys, SentinelOne, etc.
Job Features
| Job Category | Information Technology, Security |
This is a senior-level, full-time Cyber Security Architect/Engineer role at Honeywell, focused on developing and enhancing cybersecurity solutions specifically for critical infrastructure and industrial businesses (OT/ICS) across major markets (Oil & Gas, Power Generation, etc.). This role requires serving as a technical leader, mentor, and Subject Matter Expert (SME) while conducting on-site security services for customers.
- Location: Houston, TX, United States (and 1 more, Remote).
- Experience Required: 7+ years in IT security/Networking; 5+ years in Security Projects; 3+ years in Vulnerability/Risk assessment.
- Travel: Willingness to travel 60-75% is required.
- Focus: Industrial Process Control Networks (PCN), network design/implementation, compliance with IEC-62443/ISO 27000, advanced security engineering, and customer consulting.
- Preferred Experience: 5 years’ experience in Operational Technology (OT).
Key Responsibilities: Leadership, Consulting, and Standards
The engineer assumes a leadership role in complex projects, provides high-level technical consulting, and ensures compliance with critical industry standards.
- Leadership & Mentorship: Assume a leadership role in operations teams, serving as a mentor to junior members and ensuring assigned projects are delivered on time and within budget.
- Customer Consulting: Provide on-site and offsite consulting, troubleshooting, network designs, implementation, and assessments for customer Industrial Process Control Networks (PCN).
- SME & Standards: Serve as a Subject Matter Expert (SME) on assigned Honeywell Solutions/Products. Master current industry security standards (e.g., IEC-62443, ISO 27000).
- Technical Currency: Stay technically current with cybersecurity solutions and maintain expert knowledge in designated network disciplines, including upholding industrial safety awareness.
- Customer Support: Diagnose problems and provide timely, accurate technical solutions in response to customer inquiries.
Required Technical Qualifications
The role demands a combination of advanced network engineering expertise, specific security certifications, and hands-on experience with industrial and enterprise technologies.
- Certifications (Mandatory):
- Cisco Certified Network/Design/Security Professional (at least one certification).
- GICSP or CISSP (Certified Information Systems Security Professional) or similar security certification.
- Advanced Cyber Security certifications such as GRID, CISM, or CISA.
- Core Experience:
- Networking, endpoint security, and conducting audits/assessments in IT security.
- Proven experience designing or deploying large projects leveraging virtualization, preferably VMware.
- Security & Network Technologies:
- Network Security Experience: Firewalls, ACL, IDS, IPS, SIEM, particularly with Cisco Routers, Switches, or Firewalls.
- Proficient in vulnerability scanning and assessments using tools like Nessus and NMAP.
- Microsoft Enterprise Services:
- Advanced experience with Microsoft Active Directory including creating and modifying Group Policy Objects (GPOs).
- Advanced experience implementing and troubleshooting DNS, WSUS, and Terminal Server.
- Experience with antivirus systems and backup & restore solutions.
- Soft Skills: Ability to lead teams of engineers successfully complete complex projects. Excellent written and oral communication skills.
Preferred Qualifications:
- 5 years’ experience in Operational Technology (OT).
- VMware Professional (VCP-DCV) certification.
- IEC-62443 Expert Certification.
- Knowledge of advanced networking protocols (HSRP, OSPF, EIGRP, VLAN, etc.).
Job Features
| Job Category | IT & Cybersecurity |
This is a full-time, remote (USA) Threat Detection Engineer role in the Security Operations Department at TENEX.AI, an AI-native Managed Detection and Response (MDR) provider. This is a critical role responsible for proactively identifying and mitigating security threats by developing, implementing, and maintaining advanced detection rules (YARA-L) within Google Security Operations (SecOps).
- Location: Remote, USA (Extreme preference/relocation packages offered for Sarasota, FL, or Overland Park, KS; Remote status reserved for "10x of 10x" talent).
- Experience: Minimum of 5 years of experience in a security operations role with a strong focus on threat detection and analysis.
- Education: Bachelor's degree in a related field (or equivalent practical experience).
- Key Focus: YARA-L rule development, Google SecOps, log analysis across cloud/EDR/network sources, TTP analysis, and detection automation.
Responsibilities: Rule Development, Analysis, and Automation
The engineer is the primary expert in threat detection logic, ensuring the security platform is highly tuned and effective against emerging threats.
- Detection Engineering: Design, develop, implement, and maintain custom detection rules, correlation searches, and alerts within Google Security Operations (SecOps) to identify malicious activity, security incidents, and policy violations.
- YARA-L Expertise: Utilize expertise in the SecOps detection engine and YARA-L syntax to create efficient and effective detection logic.
- Log Analysis: Analyze large datasets of security logs and events from various sources (cloud platforms, EDR, network devices, applications) to identify patterns and anomalies indicative of threats.
- Proactive Strategy: Stay up-to-date with the latest threat intelligence, attack techniques, and TTPs to proactively develop new detection strategies.
- Automation: Automate detection creation, threat intelligence gathering, and rule deployment.
- Collaboration & Documentation: Collaborate closely with Security Analysts to tune detection logic. Contribute to the development and maintenance of security documentation, playbooks, and response strategies.
- Mentorship: Provide mentorship, training, and guidance to junior team members.
Required Qualifications and Technical Environment
The position requires deep, proven experience with specific security tools, scripting, and modern threat concepts.
- Core Experience (5+ years): Minimum of 5 years in security operations, with a strong focus on threat detection and analysis.
- Platform Expertise (Essential): Proven experience developing and implementing YARA-L rules within Google Security Operations (SecOps) is essential.
- Threat Knowledge: Deep understanding of security principles, common attack vectors, and threat actor tactics, techniques, and procedures (TTPs). Experience with threat intelligence and its integration into detection strategies.
- Scripting: Proficiency in scripting languages such as Python or similar for automation and analysis.
- Diverse Tool Experience (including but not limited to): Cloud security platforms (GCP, AWS, Azure), Endpoint Detection and Response (EDR) solutions, SIEM systems, Network security devices, and IAM systems.
- Preferred Qualifications:
- Relevant security certifications (Security+, CySA+, GCIH, GCIA, or similar).
- Familiarity with MITRE ATT&CK framework.
- Experience with SOAR (Security Orchestration, Automation and Response) platforms.
- Knowledge of data science and machine learning concepts as applied to security analytics.
Job Features
| Job Category | AI (Artificial Intelligence), Information Technology, Security |
This is a senior-level Cybersecurity Quality Assurance Analyst role focused on Independent Verification and Validation (IV&V) activities. The analyst ensures that all cybersecurity assessment products and risk documentation meet stringent technical, security, and quality standards, validating compliance against multiple federal and industry frameworks before customer delivery.
- Position Type: Senior Level (Implied by requirements).
- Experience Required: Seven or more years of relevant cybersecurity experience for senior level; five years in Information Security Governance, Risk, and Compliance (GRC); and three years in third-party cyber risk management.
- Focus: IV&V, quality control of assessment documentation, validation against NIST/ISO/SOC standards, and third-party/vendor risk assessment.
- Certifications (Mandatory): Must hold and provide proof of at least one of the following certifications: CISSP, CISA, CISM, CTPRP, or CTPRA.
Responsibilities: Quality Control, Validation, and Documentation
The analyst is the final checkpoint, ensuring assessment integrity, regulatory compliance, and process consistency across the assessment lifecycle.
- Documentation Review: Review cybersecurity assessment documentation for accuracy, completeness, and compliance.
- Technical Validation: Conduct independent verification and validation (IV&V) of technical findings and risk statements.
- Standards Assessment: Evaluate evidence against federal and industry standards, specifically validating compliance with ISO 27001, SOC 1 and SOC 2, and NIST standards.
- Third-Party Risk: Assess vendor cybersecurity risk and review third-party risk documentation, demonstrating experience assessing and mitigating risks associated with vendor relationships.
- Quality Assurance: Identify deficiencies or deviations from required quality and security standards. Provide feedback and guidance to assessment teams to maintain quality consistency.
- Auditing & Reporting: Maintain documentation, audit trails, and quality records. Support internal audit activities and prepare reports for management review.
- Process Improvement: Recommend enhancements to assessment processes and methodologies.
Required Experience and Technical Expertise
The role requires a high degree of specialization in GRC, risk mitigation, and specific federal assessment frameworks.
- Information Security GRC (5+ Years):
- Expertise in writing technical and risk management reports.
- Experience assessing and mitigating risks associated with vendor relationships and vendor control evaluations.
- Technical understanding of cybersecurity concepts and working knowledge of ISO 27001, SOC 1 and SOC 2, NIST SP 800-53, and NIST SP 800-171.
- Experience performing risk-based due diligence.
- Third Party Risk Management (3+ Years):
- Experience evaluating third-party cyber risk.
- Experience developing and implementing sustainable third-party cyber risk processes.
- Federal Experience: Experience conducting assessments using NIST SP 800-53 within a federal agency.
- Foundational Skills: Understanding of the Systems Development Life Cycle (SDLC) and its application to secure systems. Effective technical writing and documentation capabilities.
- Education & Certifications: Advanced degree preferred, with relevant experience/certifications substituting. Mandatory certification from the list (CISSP, CISA, CISM, CTPRP, or CTPRA).
Job Features
| Job Category | IT & Cybersecurity, Technical Services |
This is a full-time, remote Senior InfoSec Analyst role at Rise8, a company focused on transforming the US Government through advanced technology and collaborative, agile practices. This senior role leads the security strategy, ensuring complex systems are secure and compliant with DoD frameworks, with expertise required in cloud security, containerization, and Continuous RMF (cRMF).
- Location: Remote, United States.
- Salary Range: $115,688 - $144,611 annually.
- Experience: 6–10 years of experience in cybersecurity, information assurance, security operations, or related fields.
- Focus: Leading security assessments, applying best practices to cloud/container environments, engaging with DoD RMF and cRMF compliance, and incident response.
- Culture: Emphasis on pairing, continuous learning, empowerment, and kind collaboration.
As a Senior InfoSec Analyst, You Will: Leadership, Compliance, and Mentorship
The analyst drives security posture across the technology stack and serves as a mentor and escalation point within the team.
- Assessment & Risk Management: Lead portions of cybersecurity assessments across the technology stack, identifying vulnerabilities and recommending remediation strategies. Assist in shaping cybersecurity risk management activities to prioritize security initiatives.
- Compliance & Frameworks: Engage with external cybersecurity and compliance organizations to support alignment with Continuous RMF (cRMF) and DoD frameworks .
- Incident Response: Lead incident response investigations for medium-complexity events, conducting root cause analyses and proposing resilience improvements.
- Proactive Security: Collaborate with cross-functional teams to apply cybersecurity best practices across systems, applications, and cloud environments.
- Mentorship & Reporting: Provide cybersecurity education and regular reporting on risks, metrics, and issues to technical and leadership audiences. Mentor junior team members, supporting skills development.
Qualifications: DoD, Cloud, Containerization, and Certifications
The role demands extensive experience with government security compliance coupled with modern cloud and application security proficiency.
- Experience & Education: 6–10 years of experience. BA/BS degree in Cybersecurity, Computer Science, or equivalent practical experience.
- Core Security Knowledge: Solid understanding of cybersecurity principles, including risk management, vulnerability management, encryption, boundary defense, auditing, and authentication.
- Platform Security: Proficient with cloud, application, and platform security practices, including CIS benchmarks, container security, and cloud-native security tools.
- Security Technologies: Experience implementing and managing technologies such as firewalls, IDS/IPS, anti-malware, vulnerability scanners, encryption technologies, and IAM platforms.
- DoD Compliance: Strong familiarity with DoD security frameworks (e.g., DoD RMF, NIST 800-53) and exposure to Impact Level (IL4, IL5, IL6) requirements.
- Certifications (Required/Plus):
- Required: CISSP (or Associate CISSP), CISM, CySA+, or equivalent.
- Plus: Cloud certifications (AWS, Azure, or GCP) or security-related certifications (e.g., Security+, CCSK).
- Preferred Experience:
- Experience working within a Continuous RMF (cRMF) environment.
- Hands-on experience with cloud security tools, vulnerability management platforms, and compliance automation frameworks.
Benefits Highlights (Provided by Rise8)
- Retirement: 401k match at 10% gross pay.
- PTO: 4 weeks accrued PTO/sick leave, 11 Federal holidays, plus your birthday, jury duty, and bereavement.
- Education: Accrued budget of up to $3,500 per year for professional development.
- Equipment: Company-provided MacBook Pro.
- Wellness: Annual wellness budget ($500) or a $75 monthly credit towards a Life Time membership.
Job Features
| Job Category | Cloud Engineering, IT & Cybersecurity |
This is a full-time, remote (US-Remote) Security Operations Analyst II role at HealthEquity, joining a dynamic Risk & Security Team that manages a converged program covering cybersecurity, physical security, privacy, fraud, enterprise risk, and incident management. The analyst will be on the front lines, focusing on the detection, analysis, and response to security incidents.
- Location: Remote, United States.
- Salary Range: $75,500.00 to $84,000.00 annually.
- Schedule: Works a four-day work week (4x10), specifically Wednesday - Saturday MT from 9 AM to 7 PM.
- Experience: 2–3 years in information security operations is required.
- Focus: Incident response, malware analysis, improving detection capabilities, and supporting fraud and insider threat programs.
What You'll Be Doing: Incident Response and Threat Analysis
The analyst will operate advanced security tools, analyze threats, and actively contribute to the defense posture through technical engagement.
- Detection & Response: Detect, analyze, and respond to security events and incidents across multiple domains: cyber, DLP (Data Loss Prevention), fraud, and privacy functions.
- Operations: Operate advanced monitoring and investigation tools. Triage and respond independently to alerts.
- Threat Analysis: Perform malware analysis and study attacker tactics, techniques, and procedures (TTPs).
- Improvement: Improve detection rules and reduce false positives through purple team engagements (collaborating with red and blue teams).
- Documentation & Mentorship: Document incidents, provide reports, and collaborate across teams. Mentor junior analysts and support insider threat and fraud prevention programs.
- Threat Intelligence: Stay ahead of emerging threats and industry trends.
Required Qualifications and Success Factors
The successful candidate needs hands-on experience in security operations, strong analytical skills, and a commitment to continuous learning.
- Experience: 2–3 years in information security operations with strong analytical and critical thinking skills.
- Education: Bachelor’s degree in Cybersecurity or related field (or equivalent experience).
- Skills: Ability to triage and respond independently to alerts. A passion for learning and adapting in a fast-changing environment.
- Preferred Certifications: CHFI, SANS GIAC, ECIH, CEH, Security+, Network+
Job Features
| Job Category | IT & Cybersecurity, Security |
This is a full-time, remote (US-Remote) Information Systems Security Engineer role at Tyto Athene. This senior technical position is responsible for providing technical security administration and engineering across a wide array of infrastructure, with a critical focus on ensuring compliance with CMMC 2.0, ISO 27k, and other regulatory frameworks.
- Location: Remote, United States.
- Salary Range: Typically between $90,000 - $125,000 annually (compensation dependent on skills and experience).
- Experience: 4 or more years of experience in information systems, cybersecurity compliance, or an IT Security Role.
- Key Focus: CMMC 2.0/ISO 27k compliance, firewall/network security, vulnerability management, security monitoring, and incident response.
- Background: Requires a Compliance / Risk / Audit background.
Responsibilities: Compliance, Engineering, and Incident Response
The engineer ensures the technical security posture is strong, well-documented, and compliant, acting as an operational resource for key security tools.
- Compliance & Audit: Ensures compliance with CMMC 2.0, ISO 27k and other frameworks. Tracks and documents system security findings, audit results, and compliance reporting. Works with 3rd party auditors to maintain policies and procedures.
- Vulnerability & Risk Management: Perform vulnerability testing, remediation planning, risk analysis, security assessments, and make necessary updates.
- Security Administration: Provides technical security administrative duties for infrastructure related to firewalls, encryption, intrusion detection systems (IDS), vulnerability scanning, security monitoring tools, authentication, web filtering, and identity management.
- Network Protection: Reviewing network security settings and configurations against industry benchmarks. Define access privileges, control structures, and system hardening guidelines.
- Incident Response: Monitor, respond, investigate, and remediate security alerts and/or incidents. Maintain and test the Information Security Incident Response Plan, and related procedures.
- MSSP Liaison: Monitors SLAs for responsiveness and coverage and acts as a liaison with the Managed Security Service Provider (MSSP).
Required Qualifications and Technical Environment
The role requires a strong compliance background combined with foundational technical knowledge across multi-platform enterprise environments.
- Experience: 4+ years experience in information systems, cyber security compliance, or IT Security.
- Required Background: Compliance / Risk / Audit background.
- Certifications (Required/Preferred):
- Security +
- CISSP or CEH
- Zscaler cert is a plus.
- MCP Windows Server 2022 and MCP Windows 11.
- Foundational Knowledge: A foundational understanding of security technologies leveraged to support a large-scale, multi-platform enterprise environment (Windows, Mac, Unix, and mainframe platforms).
- Documentation: Familiarity with audit preparation documentation such as System Security Plans (SSPs), Plan of Action & Milestones (POA&M), Certification and Accreditation packages, and Contingency Plans.
Job Features
| Job Category | IT & Cybersecurity |
This is a full-time, Fully Remote Cybersecurity Analyst role at CyberMaxx, an MDR (Managed Detection & Response) company that tightly integrates MDR with offensive security, threat hunting, and DFIR (Digital Forensics and Incident Response). This role is crucial for improving detection capabilities, maintaining incident response processes, acting as an escalation point, and driving continuous improvement.
- Location: Fully Remote (Designated for Maryland, United States).
- Salary: $70,000 - $80,000 (Exempt/Salaried).
- Experience: 3 years’ experience performing similar duties.
- Certification: Certified in one or more "intermediate level" security certifications is required.
- Shift/Schedule: Ability to work in an operational/shift-based environment with flexible working hours to include evenings and weekends, and facilitate reasonable out-of-hours communications (SOC operations calls).
Position Summary: Escalation, Process, and Product Expertise
The analyst serves as a key operational and strategic resource, refining security products and leading response efforts for complex incidents.
- Security Tuning: Formalize and deliver security product tuning requests to improve detection capabilities and overall efficiency.
- Incident Response & DFIR: Develop and maintain incident response use incidents and documentation. Coordinate basic forensics activities as needed.
- Escalation & Leadership: Act as an initial escalation point for complicated or sensitive work. Conduct after action reviews on high-impact incidents to identify process and human capital improvements.
- Process Improvement: Drive and Implement continuous improvement and knowledge sharing. Identify and resolve opportunities to automate repetitive tasks. Proactively propose improvements to reduce risk and potential future incidents.
- SME Role: Act as a primary subject matter expert for one or more security products.
- Mentorship: Aid in onboarding and mentoring new team members.
Required Qualifications and Success Factors
Success in this role requires a blend of technical expertise, operational flexibility, and soft skills suited for high-stress situations.
- Experience & Education: Bachelor’s degree in related field and/or equivalent work experience, plus 3 years’ experience performing similar duties.
- Certifications: Mandatory certification in one or more "intermediate level" security certifications (unspecified type).
- Operational Requirements:
- Ability to work in an operational/shift-based environment (evenings and weekends required).
- Able to function effectively in high stakes and high stress situations.
- Domain Knowledge: Demonstrated experience with the security industry, including an understanding of best practices, risk mitigation, and compliance frameworks.
- Communication: Fluent in English (writing and speech) with the ability to effectively communicate complex security concepts with end customers.
- Self-Development: Passionate about cybersecurity and self-driven to continue to learn/develop relevant skillsets.
Job Features
| Job Category | IT & Cybersecurity |
This is a senior-level, remote Cyber Security Engineer Sr. role focused on Network Security within the Cybersecurity Risk Management Department of a large, diverse healthcare environment. The engineer is responsible for the design, engineering, implementation, and maintenance of advanced network security technologies and configurations, driving strategies around network segmentation, Zero Trust concepts, and strengthened controls.
- Location: Remote, United States.
- Experience: 5+ years of required experience (8+ years preferred) in Cyber Security, Firewall, Network, and Cloud Security Technologies.
- Industry Experience: Extensive experience working within a large healthcare system is required.
- Focus: Firewall architecture, network protection, security gap remediation, and alignment with frameworks like HIPAA Security Rule and NIST Cybersecurity Framework.
- Certifications (Preferred): CISSP, GIAC, OSCP, PCNSA, PCNSE, SISE, CCNA, or other industry-standard certifications.
Essential Duties: Architecture, Controls, and Strategy
The engineer is expected to act as a technical thought leader, translating security strategy into engineered and implemented network controls.
- Design & Implementation: Design, engineer, implement, and maintain new and existing network security solutions, configurations, and technologies.
- Control Enhancement: Enhance preventative and automated network security controls aligned with business requirements to strengthen protection against cyber threats.
- Strategic Initiatives: Assist in developing strategies for expanding network segmentation, implementing zero trust concepts, and increasing visibility into cybersecurity risks across healthcare assets.
- Documentation & Standards: Assist in developing and documenting an overall network protection strategy, including perimeter definition, cloud/data center security, and service-level segmentation.
- Technical Guidance: Provide ** technical guidance** to Cyber Security and IT teams, driving secure-by-design configurations and issue remediation.
- Process: Operate effectively in structured, process-driven environments and participate in process optimization efforts.
Key Qualifications and Technical Requirements
The position demands expert-level, hands-on experience with leading firewall and cloud security products, particularly in a complex enterprise setting.
- Required Experience (5+ years):
- Extensive experience working within a large healthcare system.
- Hands-on experience with Palo Alto Networks firewalls (physical and virtual), Panorama, Prisma Access, and SD-WAN.
- Experience with Network Access Control (NAC) and Web Application Firewalls (WAF).
- Hands-on experience with automation tools like Terraform and cloud security services like Cloud Armor and Google Cloud Platform (GCP).
- Required Knowledge:
- Expert-level understanding of firewall architectures and network protection technologies.
- Advanced knowledge of security principles, issues, techniques, and implementations.
- Strong understanding of threat actor techniques, tactics, and procedures (TTPs).
- Familiarity with regulatory frameworks such as HIPAA Security Rule and NIST Cybersecurity Framework.
Job Features
| Job Category | IT & Cybersecurity |
This is a contract (12+ months), fully remote LIS (Laboratory Information System) Support Analyst role at CereCore, focused on supporting the Public Health Electronic Lab Reporting (PHELR) onboarding initiative for MEDITECH Expanse. The analyst is a technical expert responsible for building, validating, and supporting HL7 laboratory interfaces connecting Expanse to public health entities and external systems.
- Location: Fully Remote (US).
- Contract Length: 12+ months.
- Focus: MEDITECH Expanse Lab interface build and troubleshooting (HL7), PHELR/ELR onboarding, and ensuring compliance with public health reporting requirements.
- Highly Preferred Experience: Prior state onboarding or ELR integrations experience.
Responsibilities: Interface Build, Validation, and Compliance
The analyst acts as the technical expert for lab data exchange, ensuring accurate and compliant data flow between the LIS and external systems.
- Interface Management: Build, configure, and validate laboratory interfaces (HL7) within MEDITECH Expanse to support ELR onboarding and other integrations.
- Troubleshooting: Maintain and troubleshoot LIS interfaces to ensure accuracy and performance throughout onboarding and testing phases. Proven ability to troubleshoot and resolve integration and connectivity issues independently.
- Compliance: Ensure compliance with regulatory and public health reporting requirements during ELR setup, and participate in meetings with state or public health entities as needed.
- LIS Dictionary: Support the development and maintenance of Expanse Lab dictionaries, ensuring consistency with best practices.
- Quality Assurance: Perform quality assurance checks, validation testing, and thorough documentation of lab interfaces, data flows, and testing results.
- Collaboration: Collaborate closely with internal project teams, laboratory personnel, and external partners (vendors, state entities).
Required Knowledge and Technical Skills
The role demands specialized experience in healthcare integration standards and the specific MEDITECH LIS environment.
- LIS Interfacing Expertise: Strong Lab interfacing experience, specifically designing, building, and troubleshooting HL7 laboratory interfaces connecting MEDITECH to third-party systems.
- Platform Experience: Experience with Laboratory Information Systems (LIS) integrations, preferably with MEDITECH environments and specific experience with MEDITECH Expanse Lab dictionaries.
- Integration Standards: Working knowledge of HL7 messaging, data mapping, and interface engine principles.
- Regulatory Experience (Strongly Preferred): State onboarding or Public Health ELR integration experience highly preferred.
- Soft Skills: Excellent organization, documentation, and communication skills; self-directed and accountable with a high degree of attention to detail.
Job Features
| Job Category | Healthcare, Support Service |