Security Analyst Salary at Radancy BETA

How much does a Radancy Security Analyst make?

As of December 2024, the average annual salary for a Security Analyst at Radancy is $144,941, which translates to approximately $70 per hour. Salaries for Security Analyst at Radancy typically range from $133,715 to $154,850, reflecting the diverse roles within the company.

It's essential to understand that salaries can vary significantly based on factors such as geographic location, departmental budget, and individual qualifications. Key determinants include years of experience, specific skill sets, educational background, and relevant certifications. For a more tailored salary estimate, consider these variables when evaluating compensation for this role.

DISCLAIMER: The salary range presented here is an estimation that has been derived from our proprietary algorithm. It should be noted that this range does not originate from the company's factual payroll records or survey data.

Website:
radancy.com
Size:
1,000 - 3,000 Employees
Revenue:
$200M - $500M
Industry:
Software & Networking

We are the leading cloud-based talent acquisition software provider intelligently solving the most critical challenges for enterprises globally and delivering cost-efficient outcomes that strengthen their organizations. The Radancy Talent Acquisition Cloud, powered by rich data and deep industry insights, optimizes the entire candidate journey, enabling enterprises to hire the most qualified talent faster, while reducing costs and driving higher ROI, recruiter efficiency and an improved candidate experience.

See similar companies related to Radancy

What Skills Does a person Need at Radancy?

At Radancy, specify the abilities and skills that a person needs in order to carry out the specified job duties. Each competency has five to ten behavioral assertions that can be observed, each with a corresponding performance level (from one to five) that is required for a particular job.

  1. Information security: A practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of confidential, private, and sensitive information.
  2. Cybersecurity: Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Due to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
  3. Analysis: Analysis is the process of considering something carefully or using statistical methods in order to understand it or explain it.
  4. Security Systems: Security and protection system, any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack.
  5. Risk Management: Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities. Risks can come from various sources including uncertainty in financial markets, threats from project failures (at any phase in design, development, production, or sustainment life-cycles), legal liabilities, credit risk, accidents, natural causes and disasters, deliberate attack from an adversary, or events of uncertain or unpredictable root-cause. There are two types of events i.e. negative events can be classified as risks while positive events are classified as opportunities. Several risk management standards have been developed including the Project Management Institute, the National Institute of Standards and Technology, actuarial societies, and ISO standards. Methods, definitions and goals vary widely according to whether the risk management method is in the context of project management, security, engineering, industrial processes, financial portfolios, actuarial assessments, or public health and safety.

Related Jobs

Corporate Office, Atlanta
Atlanta , GA

Specific Responsibilities: Monitor up-time, reliability, stability, and policy maintenance of supported security systems and work with business units to remediate identified gaps. (15%) Monitor and respond to network traffic anomaly event detections and provide content and malware event analysis on multiple security solutions. (20%) Manage and monitor multiple network and host data leakage protection (DLP) solutions. (15%) Investigate and manage security information and event management (SIEM) alerts. (10%) Monitor email and spam gateway filtering solutions and perform remediation actions for malicious events. (10%) Monitor application whitelisting and file integrity solutions. (10%) Ensure cybersecurity configuration compliance using vulnerability management solutions. (10%) Perform vulnerability and penetration testing remediation management. (10%) Ensure security agents deployed across global assets maintain 99.9% compliance monthly. This role is responsible for communicating with t


Sponsored
12/11/2024 12:00:00 AM
Apex Systems
Norfolk , VA

Title: Security Analyst / Tech Writer Location: 100% Remote Contract: 6 - 8+ months with potential for full time hire after Pay: $45.00 - $55.00 / hourly rate (Pay based on experience level) Minimum Qualifications 5+ years of experience in a support and operations or design and security engineering role; or any combination of education and experience, which would provide an equivalent background. Strong Communication Skills written and oral IAM background 2FA background Experience with troubleshooting scripts and ports on network devices The Security Analyst/Tech writer is responsible for providing enterprise security solutions for business, regulatory, and legal requirements, and some tech writing to provide playbooks and plans for subsidiary tooling integration Participates and completes tasks associated with the implementations for IAM and 2 factor authentication systems and network security technologies; provides system and network architecture support; provides technical support t


Sponsored
12/11/2024 12:00:00 AM
G-TECH
Detroit , MI

Engagement Description - We are seeking a highly skilled Splunk Professional to join our team. The ideal candidate will have a strong background in Splunk SPL, custom dashboard creation, and data source comprehension. A solid foundation in cybersecurity is essential, along with proficiency in Python and/or PowerShell programming. Experience with Security Orchestration, Automation, and Response (SOAR), particularly Cortex XSOAR, is highly desired. This role requires a detail-oriented individual who can effectively analyze and interpret data to support our cybersecurity initiatives. Top 3 Required Skills/Experience - •Expertise in Splunk Search Processing Language (SPL). •Proven experience in building custom dashboards and visualizations. •Ability to fully understand and integrate various data sources into Splunk. Preferred Skills/Experience - Optional but preferred skills/experience. Include: •Proficiency in Python and/or PowerShell for automation and scripting tasks. •Experience in dev


Sponsored
12/11/2024 12:00:00 AM
G-TECH
Detroit , MI

This position shall perform cross-functional collaboration with the other members of the information security team, EIT division, and the business to manage the identification, mitigation, resolution and acceptance/deferral of information security risks to the organization. In addition, provide guidance on mandatory and recommended security and IAM controls to ensure they are appropriately implemented. Collaborate with project teams to interpret any security risks found during certification processes; help define mitigating controls and design plans for remediation, or alternatively assist with the exception process. Maintain continuity and consistency between all business unit level information protection programs. Manage the information security risk identification, mitigation, acceptance, monitoring and reporting processes. Collaborate with Governance, Risk and Performance team on metrics and reporting. Plan, execute, and manage multi-faceted projects related to risk management, mit


Sponsored
12/11/2024 12:00:00 AM
California State University
San Luis Obispo , CA

Security Analyst Job no: 544369 Work type: Staff Location: San Luis Obispo Categories: Unit 9 - CSUEU - Technical Support Services, Probationary, Full Time, Information Systems & Technology, Telecommute eligible (work onsite as scheduled and/or as requested and telecommute as scheduled) Job Summary Under general direction of the Director of Data Systems, the Security Analyst in the Office of Data Management is responsible for managing and enhancing the security infrastructure within Strategic Enrollment Management by overseeing access management, cross-system security, and compliance within higher education systems. This role involves developing and maintaining security roles and permissions in PeopleSoft, integrating these roles across multiple systems, and ensuring robust security practices. The Security Analyst also plays a key role in system implementation, policy development, and training, ensuring that security measures align with institutional requirements and regulatory standar


Sponsored
12/11/2024 12:00:00 AM
Talent Software Services
Richmond , VA

The position supports the Client's Information Security mission by implementing results-oriented strategic approaches, plans, programs, and procedures. This role focuses on security analysis for procurement teams, ensuring compliance with relevant Information Security Policies and Standards. Key responsibilities include identity and access management, system and services acquisition review, IT risk management, business continuity, IT disaster recovery planning, security awareness education and training, security vulnerability management, and security incident management. Responsibilities Document processes and create narratives/executive summaries. Create business-focused documentation for readers with various technical understanding. Share insights on information security and IT procurement approaches and implementation methodologies. Research and provide guidance on alignment with security policies and standards. Perform tasks related to security compliance and control evaluation, ri


Sponsored
12/11/2024 12:00:00 AM
CGI Technologies and Solutions, Inc.
Atlanta , GA

**Security Analyst** **Category:** Cyber Security **Main location:** United States, California, Sacramento **Alternate Location(s):** United States, Georgia, Atlanta United States, North Carolina, Charlotte United States, Texas, Houston United States, Texas, Dallas **Position ID:** J0924-1059 **Employment Type:** Full Time **Position Description:** This is a rare opportunity to join a fast-growing team of information security experts as we transform, enhance, and expand the security program for one of the largest information technology providers in the world. You will join the United States Global Technology Operations (US GTO) Security Strategy and Solutions team supporting governance, risk, and compliance consulting services as well as security service delivery across one or more US-based industries. The successful candidate will have a broad knowledge of current security practices as well as the ability to identify and apply legal, regulatory, and industry-specific security requirem


Sponsored
12/11/2024 12:00:00 AM
Real Time Resolutions Inc
Dallas , TX

Summary The IT Security Analyst shall be responsible for the following essential IT and Security functions: ESSENTIAL FUNCTION: Security Operations: Administer and maintain security tools; collaborate with vendors to resolve issues Monitor security alerts and reports; perform thorough incident investigations Act as a subject matter expert advising departments on security industry best practices Updating and maintaining the security systems, ensuring they are current and effective Enabling a vulnerability management program, including routine patching and maintenance Administer Linux and Windows operating systems, Virtual Private Networks, Local Area Networks, vulnerability scanning, and firewalls Develop and maintain scripts to automate data collection and generate reports Lead and execute Information Technology/Security projects, ensuring timely delivery and adherence to security standards Develop and update security policies and procedures in line with industry best practices and leg


Sponsored
12/11/2024 12:00:00 AM

Check more jobs information at Radancy

Job Title Average Radancy Salary Hourly Rate
2 Account Coordinator $135,996 $65
3 Account Director $266,641 $128
4 Accounting Clerk $63,921 $31
5 Accounts Assistant $66,360 $32
6 Accounts Payable $63,880 $31
7 Administrative Assistant $68,604 $33
8 Administrator $68,604 $33
9 Attorney $179,491 $86
10 Business Development $107,526 $52
11 Business Development Director $263,693 $127
12 Business Development Manager $176,107 $85
13 Checkout Cashier $38,423 $18

Hourly Pay at Radancy

The average hourly pay at Radancy for a Security Analyst is $70 per hour. The location, department, and job description all have an impact on the typical compensation for Radancy positions. The pay range and total remuneration for the job title are shown in the table below. Radancy may pay a varying wage for a given position based on experience, talents, and education.
How accurate does $144,941 look to you?

FAQ about Salary and Jobs at Radancy

1. How much does Radancy pay per hour?
The average hourly pay is $70. The salary for each employee depends on several factors, including the level of experience, work performance, certifications and skills.
2. What is the highest salary at Radancy?
According to the data, the highest approximate salary is about $154,850 per year. Salaries are usually determined by comparing other employees’ salaries in similar positions in the same region and industry.
3. What is the lowest pay at Radancy?
According to the data, the lowest estimated salary is about $133,715 per year. Pay levels are mainly influenced by market forces, supply and demand, and social structures.
4. What steps can an employee take to increase their salary?
There are various ways to increase the wage. Level of education: An employee may receive a higher salary and get a promotion if they obtain advanced degrees. Experience in management: an employee with supervisory experience can increase the likelihood to earn more.