Start Date
Immediate
Expiry Date
28 Nov, 25
Salary
73000.0
Posted On
28 Aug, 25
Experience
0 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Relays, Communication Protocols, Data Analysis, Operations, Scripting, Automation, Iec, Python, Circuit Breakers, Overtime
Industry
Information Technology/IT
Job Posting End Date
09-07-2025
Please note the job posting will close on the day before the posting end date.
Job Summary
Responsible for low level security assignments with direction from senior team members. Establish basic understanding of Security operations and processes, which may include research and investigation of security events or project related activities. Assesses security controls through security testing or other means to ensure effectiveness. Create documentation and work activities in a clear, comprehensive manner, always maintaining high quality work. Demonstrates problem solving, research, and functional area knowledge.
Job Description
DESIGNATION - onsite/in the office every day when not traveling for work
OTHER REQUIREMENTS:
Licenses/Certifications: N/A
Some travel and overtime may be required. This position could be required to do shift work or be “On call” 24x7x365.
SOC/CIRC: Work shifts that rotate throughout month/year covering all possible schedule variations/rotation possibilities.
SOC/CIRC: Plan activities effectively within the context of round-the-clock, shift operations.
WHO WE ARE
At AEP, we’re more than just an energy company — we’re a team of dedicated professionals committed to delivering safe, reliable, and innovative energy solutions. Guided by our mission to put the customer first, we strive to exceed expectations by listening, responding, and continuously improving the way we serve our communities. If you’re passionate about making a meaningful impact and being part of a forward-thinking organization, this is the company for you!
AMERICAN ELECTRIC POWER (on-site)
$73K - $106K / Year
Compensation Data
Compensation Grade:
SP20-007
Compensation Range:
This may include intelligence as a first line of defense against threats and vulnerabilities, exploits and attacks, against the enterprise.
This may include intelligence as a first line of defense against threats and vulnerabilities, exploits and attacks, against the enterprise.