Skip to content
  Thursday 15 January 2026
Trending
August 17, 2023Enhancing Learning Experience Through AI Voice Over Generator for Personalization July 29, 2025Cybersecurity Analyst March 17, 2025Cybersecurity Engineer June 5, 2025<h3>Massive AT&T Identity Data Leak Uncovered!</h3> December 11, 2023Head of Alleged Kelvin Security Money Laundering Arrested in Spain November 18, 2025Cybersecurity Engineer III November 27, 2024Cybersecurity Account Executive (Remote NY, NJ Metro) November 26, 2024Cybersecurity Risk Associate April 16, 2024Rockwell Automation ControlLogix and GuardLogix October 2, 2025Raise3D Pro2 Series 3D Printers
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Specialist
Careers

Cybersecurity Specialist

SecuredyouadmSecuredyouadm—April 16, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Description :We’re Canvas Credit UnionWe’re passionate about transforming financial services. Our members, families, and the communities we call home motivate everything we do. As part of the credit union movement, we believe in providing our members with education, support, and guidance to build strong financial futures.Why Canvas?At Canvas, we’re dedicated to transforming financial services from the inside out.Our culture is a top priority and second to none. We strive to balance hard work and high achievement with a fun, supportive environment.What you’ll doThe Cybersecurity Specialist is responsible for assisting in the management of the organization’s network and security posture. The Cybersecurity Specialist will support and troubleshoot in combination of network connectivity (administration of switches, routers, wireless access points, various routing protocols), security administration and analysis of logs (firewall administration, monitoring, identifying and investigation of security events/incidents). The Cybersecurity Specialist will assist with projects and initiatives that involve the organization’s network and security stack to safeguard the organization from emerging threats and drive the continuous improvement of the company’s overall security position. Additionally, they will ensure compliance with various regulatory laws and mandates for financial institutions. The Cybersecurity Specialist will work under the direct supervision of the IT management team to achieve departmental and organizational goals.Essential Duties/Responsibilities

  • Assist in the configuration, deployment, and support of network/security projects, tasks, and break/fixes.
  • Set up, configure, and support internal and/or external networks, including troubleshooting performance issues.
  • Install new releases and system upgrades for network/security appliances and evaluate and install patches.
  • Serve as an escalation point for helpdesk to assist in troubleshooting potential issues with end-user devices.
  • Monitor, review, and react to logs and reports from workstations, servers, network systems, and mobile devices.
  • Implement network security policies and procedures to protect against unauthorized access, modification, or destruction.
  • Assist in the deployment and configuration of network/security systems, including endpoint security solutions such as AV, DLP, NGFWs, and network appliances (routers, switches, NAC), and SD-WAN.
  • Conduct vulnerability assessments and provide guidance on remediation.
  • Document security events and provide various security information for audits and exams.
  • Maintain, improve, and keep up-to-date network/security policies residing in the Information Security Program.
  • Provide quality service to all internal and external customers via tickets, calls, email, and other communication methods.
  • Determine security requirements by evaluating business strategies and requirements; researching information security standards; research architecture/platform designs as necessary and identifying integration issues.
  • Ensure network (LAN/WAN) security access and protect against unauthorized access, modification, or destruction.
  • Assist with the evaluation of network and security technologies; virtual private networks (VPNs), firewalls, EDR, DLP, routers, and switches.
  • Knowledge of security frameworks which include NIST CSF, CIS, and ISO.
  • Implement security systems by specifying intrusion detection methodologies and equipment, prepare preventive and reactive measures, provide technical support and complete documentation.
  • Document and provide various security information for audits and exams.
  • Maintain, improve, and keep up-to-date security policies residing in the Information Security Program.
  • Ensure compliance with various regulatory laws and mandates for financial institutions.
  • Provide support in business strategies and projects outlined by Canvas pillars.
  • Clearly communicate technical solutions in a user-friendly, professional manner.
  • Exhibit support for the organization’s goals, values, initiatives and cost control.
  • Comply with the Bank Secrecy Act (BSA) and other compliance requests and requirements.
  • Follow all safety and security guidelines to properly safeguard member and organization assets.
  • Adhere to Canvas policies and procedures.
  • Recommend and help develop and implement new policies and procedures.
  • Embrace ongoing education and learn/apply new skills and software applications.
  • Regular attendance and punctuality are essential functions of the job.
  • Perform other job duties as assigned.

Job QualificationsKnowledge, Skill and Ability:

  • Network Security, Cloud Security, Network Hardware Configuration, Network Protocols (BGP, OSPF, and other dynamic routing protocols), Networking Standards, SD-WAN, Firewalls, VPN Technologies, Endpoint Security, Email Gateways, MDM, SSO, NIST, FIPS, GLBA, and DLP
  • Verbal, written and interpersonal communication skills with the ability to interact with technical staff and other senior management/credit union staff as appropriate.
  • Strong relationship building and teamwork skills.
  • Attention to detail and organizational skills; ability to manage multiple priorities with tight deadlines.
  • Analytical and problem-solving skills.
  • Ability to use basic manual tools for servicing personal computer equipment.
  • Working knowledge of Windows operating systems, Workstations, network/security tools to diagnose equipment, software or operational problems.
  • Solid knowledge and understanding of Canvas financial products and services.
  • Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
  • Ability to read, analyze, and interpret technical procedures, general business periodicals, professional journals, or governmental regulation.
  • Ability to maintain confidences.
  • Pre-employment background review (components include criminal, employment, address, social security number, motor vehicle record, sex offender, and global sanctions).

Education or Formal Training: Bachelor’s degree in related field or equivalent work experience, Network+ or Cisco Networking certification preferred, Security+.Experience: Three to six years of related experience and/or training; or equivalent combination of education and experience.This position has a starting pay range of $90,000.00-$105,000.00/annual, and final pay rate will be determined based on experience, education, skills, and internal equity factors.Canvas benefitsMedical/Dental/Vision InsurancePaid VacationPaid Sick TimePaid HolidaysPaid Wellness DayPaid Volunteer TimeFlexible Spending AccountHealth Savings AccountWorld Class 401(k) PlanTuition ReimbursementRate Discounts on Qualifying LoansMay be eligible for incentives or discretionary bonus based on resultsWorking Environment/Physical ActivitiesHigh volume, fast-paced, dynamic office environment with some travel. Must be able to work a flexible schedule including rotating shifts, on-call, evenings and weekends on maintenance or special projects as required. The job routinely uses standard office equipment such as computers, phones, printers, copiers, fax machines and filing cabinets. The position requires manual dexterity and frequent lifting 20-50 pounds. The position requires bending, stooping, and standing as necessary.Other DutiesPlease note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.Position will be open until filled, or if unable to fill until posting is canceled.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Lead Cybersecurity – Scrum Master
Lead Cybersecurity – Full Stack Software Developer
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Careers

Sr. Cybersecurity Analyst, Compliance

January 14, 20260
Careers

Cybersecurity Analyst

January 14, 20260
Careers

CYBERSECURITY ANLST SR

January 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Analyst
  • Lead Cybersecurity – SOX
  • Senior Cloud Security Engineer, AVP – BXTI Cybersecurity
  • Sr. Cybersecurity Analyst, Compliance
  • Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures