CrawlJobs Logo

Cyber Security Policy Analyst

lorienglobal.com Logo

Lorien

Location Icon

Location:
United States , New York

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

55.00 - 58.00 USD / Hour

Job Description:

The Cyber Security Policy & Advisory Analyst plays a key role in ensuring technology, data, and business systems are securely designed and operated. This role partners with business, architecture, and technical teams to assess solutions, identify cyber risks, and ensure alignment with internal security policies and standards. The analyst helps the organization manage cyber risk across IAM, Data, Cloud, OT, Infrastructure, and Application Security by reviewing architectures, analyzing data flows, and advising on secure design.

Job Responsibility:

  • Lead cyber security assessments for new and existing systems
  • Review solution architectures and lifecycle controls for policy and standards compliance
  • Provide expert advisory on cyber risks, control gaps, and mitigation options
  • Investigate, analyze, and document cyber risks within established risk management processes
  • Contribute to automated controls, continuous compliance monitoring, and integration of compliance checks into delivery pipelines

Requirements:

  • 5-10 years in Cyber or Information Security
  • Strong knowledge of IAM, Data, Cloud, OT, Infrastructure, and Application Security
  • Experience with cyber risk assessments, architecture reviews, or control evaluations

Nice to have:

  • CISSP, CISM, or similar
  • experience with ISO 27001, NIST CSF, or CIS Controls
  • familiarity with enterprise or regulated environments
  • exposure to automated compliance tools

Additional Information:

Job Posted:
February 14, 2026

Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cyber Security Policy Analyst

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Security Analyst

WiseTech Global is a world-leading software company building software for the gl...
Location
Location
United States , Chicago
Salary
Salary:
75000.00 - 95000.00 USD / Year
blumeglobal.com Logo
Blume Global
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Min 6 years' experience in a similar Cyber Security role
  • Working knowledge of security frameworks, policies and standards such as ISO27001, PCI DSS, Essential Eight, NIST CSF, and MITRE ATT&CK and applying them into operational context
  • Experience with cloud-based services and technologies
  • Ability to detect and defend against commonly-used attack tactics, techniques and procedures (TTPs) against known attack surfaces such as identity, email, endpoint, network and cloud
  • Passionate about growth and learning
  • A background prior to security in IT support/infrastructure would be advantageous (e.g. servers, networking protocols, security controls, O365/Azure)
  • First-hand experience with SIEM platforms, enterprise intrusion prevention systems, endpoint detection and response tools, and other security products
  • Able to communicate effectively in verbal and written format with technical and non-technical audiences
  • Ability to effectively plan, schedule and adapt to changing priorities, tasks and requirements to meet deadlines
  • Ability to work under pressure and at times with limited supervision
Job Responsibility
Job Responsibility
  • Analyze, review and respond to security alerts, events including triaging and advising on mitigation activities
  • Investigate security incidents and breaches to identify root causes and recommend improvements
  • Engage in testing and monitoring the performance of systems and services, making sure that security requirements are met
  • Maintain strong working relationships, work collaboratively, and share ideas, knowledge and experience with team members as required
  • Assist in continuously updating the company’s security incident, data breach response and disaster recovery plans
  • Undertake threat detection practices
  • Undertake security hardening support practices with teams
  • Vulnerability management to analyze findings from vulnerability reports, assist with risk assessments on the vulnerabilities and coordinate remediation and patching activities with system owners
  • Taking on a wide variety of security operations tasks on an as needed basis
Read More
Arrow Right

SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3-5 years of relevant experience in Cyber Fraud or SOC
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills
  • Bachelor’s degree/University degree or equivalent experience
Job Responsibility
Job Responsibility
  • Perform monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

AVP - SOC Cyber Fraud Analyst

The Security Operations Center Cyber Fraud Analyst is an intermediate level posi...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Ability to communicate effectively both orally and in writing
  • Strong knowledge of current Cyber Fraud trends including common Account Takeover techniques and banking malware
  • Deep understanding of Intrusion Detection analysis (TCP/IP, packet level analysis) as well as Application Layer Protocols (HTTP)
  • Advanced understanding of various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Knowledge of cutting-edge threats and technologies affecting Web Applications
  • Experience with Big Data Technologies, ETL Tools, Data Warehouse and Business Intelligence technologies is preferred
  • Experience with any scripting language and Splunk is a plus
  • Experience with vulnerability assessment as well as penetration testing or forensic analysis fields is a plus
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, GWAPT and CFE]
  • 5-8 years of relevant experience in Cyber Fraud or SOC
Job Responsibility
Job Responsibility
  • The analyst performs monitoring, research, assessment and analysis of Digital Fraud Attacks leveraging various Security Event Monitoring platforms including Web Threat Detection, Real Time Fraud Risk Assessment, Big Data and Digital Application Monitoring tools (Splunk, SAS, Teradata, and enterprise real time fraud detection tools)
  • Follow pre-defined actions to handle BAU and high severity issues including escalating to other support groups
  • Execute daily ad hoc tasks or lead small projects as needed
  • Create and maintain operational reports for Key Performance Indicators and weekly and monthly metrics
  • Perform assessment as well as troubleshooting to help isolate technical issues with the integration of fraud monitoring technologies
  • Participate in daily and ad hoc conference calls to manage quality assurance and documentation related tasks
  • Identify areas for tuning use cases to enhance monitoring value
  • Engage with Fraud Policy, Operations, Strategy and other teams for early detection, prevention and mitigation of detected fraudulent activities
  • Fulltime
Read More
Arrow Right

Principal Cyber Operations Analyst Trainer

Knight Federal Solutions Inc. is seeking a Principal Cyber Operations Analyst Tr...
Location
Location
United States , Suffolk
Salary
Salary:
Not provided
knightfederal.com Logo
Knight Federal Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree with a minimum of 10 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Master’s degree with a minimum of 6 years of professional and/or military operational experience
  • or specialized technical training and certifications directly related to the requirement
  • Joint Forces Staff College or Service equivalent
  • Thorough understanding of cyber operations and experience at the operational level
  • Must be willing to travel worldwide, to include areas considered hazardous duty (up to 25% of the time)
  • Must have an active U.S. Department of Defense (DoD) Secret security clearance with the ability to obtain a DoD Top Secret security clearance once aboard
  • Must be able to work on-site in Suffolk, Virginia
Job Responsibility
Job Responsibility
  • Acts as a subject matter expert and trainer in cyber operations in joint, multinational, interagency, and globally integrated exercises and operations
  • Integrates into, contributes to, and provides functional continuity in the DTD’s Fires and Effects Section
  • Mentors, trains, and supports new OTs
  • Participates as a member of Deployable Training Teams (DTTs)
  • Ascertains key command challenges at the operational and strategic levels of war and conducts cross-functional analysis of information gathered from joint exercises and training events for the development of lessons learned, insights, and best practices
  • Understands strategic thought and direction as it guides and is influenced by campaign, deliberate, and crisis planning at the operational level
  • Researches national strategic documents, historical exercise documents, real world operations, the operating environment, command mission, organization, plans, and orders, as well as interagency and coalition policies, strategies, and plans
  • Conducts trend analysis, understands and improves battle rhythms, provides observation and training, ties phased operational planning to strategic thought, and develops feedback
  • Develops the Commander’s Facilitated After-Action Review (FAAR), Executive Summary Report (ESR), Combined Functional Report (CFR), and Internal After Action Review (IAAR), Post-event debriefs and summaries, and input into the Joint Lessons Learned Information System (JLLIS)
  • Updates and maintains documents, articles, and periodicals
Read More
Arrow Right

Email Security Analyst

The Info Security Tech Sr Analyst is responsible for leading efforts to prevent,...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Technical and analytical expertise and experience (preferred 3+ years’ Information Technology/ Cybersecurity experience)
  • Understanding of and demonstrated experience with the tools and sources available to conduct email and threat analysis
  • Cross-functional understanding of email operations, security practices and the user experience
  • Ability to organize and appropriately prioritize multiple, ongoing tasks via efficient time management and forecasting
  • Project management skills a plus
  • Ability to work independently, as well as in team situations, to help internal and external customers achieve desired results
  • Strong written and verbal communication and presentation skills
Job Responsibility
Job Responsibility
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand
  • Analyze and provide oversight of analysis of email threats and controls
  • Develop and manage processes to track identified incidents to resolution
  • Develop metrics and reports as needed
  • Triage information received from vendors and process that information through previously defined internal workflows
  • Manage meetings with internal stakeholders to address open issues and identify process improvements
  • Actively engage in liaison activities with intelligence communities, industry associations, peer institutions, and information sharing communities
  • Apply developed communication and diplomacy skills to guide and influence decision makers
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients, and assets, by driving compliance with applicable laws, rules, and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing, and reporting control issues with transparency
  • Keep up to date with the ever-changing cyber security landscape to remain relevant and knowledgeable through internal and external certifications
  • Fulltime
Read More
Arrow Right

Security Incident Management Analyst

The Security Incident Management Analyst is an intermediate level position respo...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant professional certifications issued by GIAC, AWS, etc., preferably GCCC, GCIH, CEH, ECSA
  • General Industry knowledge of reporting obligations pertaining to local and national laws and regulatory bodies such as OCC, SEC, ECB, MAS
  • Working knowledge of common security models (Defense-in-Depth) and frameworks (MITRE Attack, Cyber Kill Chain, STIX)
  • Working knowledge of VERIS taxonomy
  • Working knowledge of OSI model
  • Working knowledge of security and/or incident response in cloud environments
  • Working knowledge of software development best practices, including agile methods
  • Familiar with Atlassian tools
  • Previous experience working in highly regulated environment
  • Previous experience in a fusion center and/or exposure to large scale incident response
Job Responsibility
Job Responsibility
  • Work as part of a best in class ‘follow the sun’ security incident response team
  • Lead and manage incident response activities to ensure that requisite triage, containment, and eradication are completed within targeted timeframes
  • Ensure that the security incident record is complete, accurate and fit for purpose
  • Collect and analyze evidence including investigative findings and prepare to coordinate with internal and external compliance and audit personnel
  • Execute incident response meetings and communicate complex security topics
  • exhibit good judgment and discretion when initiating escalations to all levels of the organization
  • Ensure that controls are utilized daily and that non-compliance remediation is addressed by appropriate selection
  • Provide IS consulting services, including interpreting and/or clarifying information security policy, procedures, standards or concepts
  • Assist with defining and implementing information security standards to align procedures and practices in pursuit of compliance with Citigroup standards
  • Validate compliance with information security policies, practices, and procedures, and resolve a variety of information security related issues in coordination with the relevant business(es)
  • Fulltime
Read More
Arrow Right

Security & Privacy Analyst

The Security & Privacy Analyst will play a key role in protecting Spectrum.Life’...
Location
Location
United Kingdom
Salary
Salary:
Not provided
spectrum.life Logo
Spectrum Life
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in information security, privacy, compliance, or a related field
  • Strong understanding of GDPR, data protection principles, and privacy best practices
  • Familiarity with security operations, vulnerability management, and incident response
  • Experience with security tools (e.g., SIEM, endpoint protection, logging platforms)
  • Ability to interpret risks and communicate them clearly to technical and non-technical audiences
  • Strong documentation, analytical, and problem-solving skills
  • Excellent attention to detail and commitment to quality
  • Experience in health-tech, clinical platforms, or handling sensitive health data
  • Certifications such as ISO 27001 Lead Implementer/Auditor, CompTIA Security+, CISSP, CIPP/E, or equivalent
  • Experience supporting audits or managing compliance frameworks
Job Responsibility
Job Responsibility
  • Monitor, assess, and respond to security alerts, incidents, and vulnerabilities across the technology environment
  • Support security operations activities including log analysis, threat detection, endpoint security, and access control management
  • Conduct regular vulnerability assessments and coordinate remediation with relevant teams
  • Assist in maintaining and improving security tools, controls, and frameworks (e.g., SIEM, IAM, MDM, KnowBe4, encryption standards)
  • Support third-party security reviews and due diligence assessments
  • Participate in business continuity and disaster recovery planning and testing
  • Support GDPR and other applicable privacy frameworks (e.g., ePrivacy, UK GDPR, HIPAA-aligned practices for clinical contexts)
  • Conduct Data Protection Impact Assessments (DPIAs) and Legitimate Interest Assessments (LIAs)
  • Assist in maintaining Records of Processing Activities (RoPA)
  • Review new product features and vendor integrations for compliance with privacy-by-design and security-by-design principles
What we offer
What we offer
  • Full time permanent contract
  • Competitive salary (Dependent on experience)
  • In-office, remote or hybrid working options
  • 25 days annual leave
  • 24/7 EAP and a wide range of health and wellbeing supports
  • Extensive list of employee perks and benefits
  • Fulltime
Read More
Arrow Right