
Through transformative payments and credential-driven transactions and privileges, Transact partners with institutions to help them make their campus experience mobile-centric, personal and individualized, and completely connected.
501 - 1000 employees
November 26

Through transformative payments and credential-driven transactions and privileges, Transact partners with institutions to help them make their campus experience mobile-centric, personal and individualized, and completely connected.
501 - 1000 employees
• Responsible for operations and administration of the organization’s enterprise security solutions and processes. • Investigates and responds to enterprise security events and requests. • Perform network security monitoring and incident response • Maintain records of security monitoring and incident response activities • Monitor and analyze a Security Information and Event Management (SIEM) to identify security issues for remediation. • Configure, schedule, and review the results of vulnerability scans • Coordinate account/access reviews • Gather evidence for compliance audits • Knowledge of creating Security Information Event Management (SIEM) policy rule sets with simplified matches or regex. • Run reports and analyze for indicators of compromise. • Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and investigates relevant event detail and summary information. • Consolidate and conducts comprehensive analysis of threat data obtained from classified, proprietary, and open source resources to provide indication and warnings of impending attacks against unclassified and classified networks. • Interface with a variety of people in a polite, positive, and professional manner. • Respond in a timely manner (within documented SLA) to security tickets. • Be available, ready, and able to promptly handle incoming support requests. • Communicate alerts regarding intrusions and compromises to network infrastructure, applications and operating systems. • Assists with implementation of countermeasures or mitigating controls. • Prepare briefings and reports of analysis methodology and results. • Adhere to policies, procedures, and security practices. • Resolve problems independently and follow documented escalation procedures • Recommend changes to Standard Operating Procedures and other similar documentation • Generate end-of-shift reports for documentation and knowledge transfer to subsequent security staff
• Bachelor's degree in computer science or 1-2 years of related experience in Networking, Cybersecurity or IT Infrastructure Industry preferred • Proficiency in Security Information Event Management • Proven propensity to learn new technologies and skills quickly • Thrives in a collaborative team environment • Demonstrates analytical problem-solving skills • Excellent written and verbal communication skills
• Employer paid Life Insurance / AD&D / Short-Term Voluntary Long-Term Disability Insurance / Term Life Insurance / AD&D • Access to FSA Plans & Commuter Benefit Plans • 401(k) Savings Plan where the Company Match of $0.50 for each $1 you contribute on the first 8% of pay. Both your contribution and the company contribution are immediately 100% vested. • Access to the Roper Employee Stock Purchase Plan • Paid Parental Leave Program
Apply NowNovember 19
Cyber Security Analyst at Ashland's IT-Cyber Security team managing cyber security alerts. Involved in incident response activities, documentations, and support operations of SOAR platform.
November 9
Cybersecurity Analyst in a US-based company focusing on incident management and threat assessment. Providing hands-on experience and mentorship while developing expertise in Microsoft cloud security operations.
November 4
Security Analyst supporting security infrastructure at AHEAD. Collaborating with IT and ensuring compliance with security protocols.