1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

I logo
Innovative Management & Technology ServicesClarksburg, WV
Company Overview: Join a fast-growing company highly experienced in cyber security, cloud computing, virtualization, big data analytics, and project management!  IMTS offers competitive compensation, excellent benefits including tuition reimbursement and employer-contributed 401K, and referral bonuses.  We work with the best customers on-site at top government agencies. Job Title: Senior Information System Security Officer (ISSO) Primary Location: Clarksburg, WV - Hybrid Clearance: Top-Secret (TS) Position Summary: We are seeking a highly skilled and mission-driven Senior Information Systems Security Officer (ISSO) to join our cybersecurity team supporting a critical government program. This position requires deep knowledge of federal cybersecurity standards, hands-on technical security expertise, and the ability to lead compliance efforts in a Scaled Agile Framework (SAFe) development environment. You will serve as a key security advisor across engineering, operations, and leadership teams to ensure enterprise systems remain secure, compliant, and resilient. Responsibilities: Lead the implementation and maintenance of system security controls in compliance with federal cybersecurity frameworks, including NIST SP 800-53, RMF, OWASP, DISA STIGs, and Common Criteria. Oversee the full lifecycle of Authorization to Operate (ATO) processes, including preparation of System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, and risk assessments. Serve as a senior security advisor and liaison to system owners, developers, DevOps engineers, and government stakeholders. Participate in technical reviews of system architecture and ensure secure design of virtualized and software-defined infrastructures. Support integration of security controls into CI/CD pipelines using DevSecOps principles and tools (e.g., Jenkins, GitLab CI, SonarQube, Snyk). Provide security engineering support for modern cloud environments, including AWS, Azure, or Google Cloud Platform, and assess cloud-native security capabilities. Conduct vulnerability assessments, interpret scan results from tools like Tenable, Nessus, Splunk, or Qualys, and lead remediation efforts. Mentor junior ISSOs and analysts on security policies, best practices, and tool usage. Ensure continuous monitoring activities are aligned with organizational risk tolerance and compliance goals. Required Qualifications: Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or a related field (or equivalent combination of education and experience). 8+ years of progressive experience in information systems security, with at least 3 years in a senior-level or lead ISSO role supporting federal or state government agencies. Strong working knowledge of: NIST 800-53, RMF, FISMA, OWASP Top 10, and SANS Institute standards. SAFe Agile environments and integrating security in Agile workflows. Networking, Linux/Windows system administration, and secure software development practices. Cloud platforms (AWS, Azure, GCP) and related security tools (e.g., AWS Security Hub, Azure Defender). Experience in managing security documentation, participating in audits, and working with compliance frameworks. Relevant certifications such as CISSP, CISM, Security+, CEH, or equivalent. Active Top Secret clearance is required. U.S. Citizenship is required. Preferred Qualifications: Experience with Infrastructure-as-Code (IaC) tools such as Terraform, Ansible, or CloudFormation. Familiarity with container security (e.g., Kubernetes, Docker) and cloud-native application protection platforms (CNAPP). Prior work in defense, intelligence, or law enforcement IT environments. IMTS is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law.    Powered by JazzHR

Posted 30+ days ago

Quotient logo
QuotientFt meade, MD
Job Title: Information Assurance Specialist/Analyst Company: Quotient Position Availability (Evergreen) October – November Location (Multiple Locations): Ft Meade, Ft Belvoir, Maumee, OH Position Type: Full-Time Employee Type: FTE Clearance Requirements: Secret (Top-Secret Preferred) Company Overview: Quotient is a leading provider of customized information technology solutions, specializing in systems integration, full-stack software development, cybersecurity, project management, and operational support. We serve a diverse range of clients, including federal agencies, defense, civilian communities, and commercial customers across the United States. As a subsidiary of Virtual Technologies Group (VTG), Quotient continues to uphold its reputation as one of the most innovative, respected, and ethical providers of technology solutions. We are dedicated to providing growth and opportunity for our team while delivering exceptional value to our clients. Position Summary: Quotient is seeking a highly skilled Information Assurance Specialist to support cybersecurity and compliance efforts across mission-critical systems. The ideal candidate will have hands-on experience in IA, a deep understanding of cybersecurity frameworks, and a proven track record in achieving Authority to Operate (ATO) through the Risk Management Framework (RMF). This role involves developing and maintaining CONOPS, conducting security assessments, and ensuring systems meet federal and DoD cybersecurity standards. Key Responsibilities: • Lead and support the development of IA documentation, including System Security Plans (SSPs), CONOPS, and POA&Ms. • Manage and execute the Risk Management Framework (RMF) process to obtain and maintain ATO. • Conduct vulnerability assessments, security audits, and risk analysis. • Collaborate with system owners, developers, and stakeholders to ensure compliance with NIST, DoD, and agency-specific cybersecurity policies. • Monitor and report on system security posture and recommend mitigation strategies. • Provide IA support during system design, development, testing, and deployment phases. • Maintain up-to-date knowledge of cybersecurity threats, tools, and best practices. Minimum Qualifications: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field. 3+ years of experience in Information Assurance or Cybersecurity. Active CISSP certification. Experience supporting RMF and achieving ATO for federal systems. Familiarity with NIST SP 800-53, FISMA, and DoD IA policies. Strong understanding of CONOPS development and implementation. U.S. Citizenship and ability to obtain/maintain a security clearance. Preferred Qualifications: Additional certifications such as CISM, CISA, Security+, or CEH. Experience with eMASS, Xacta, or other compliance tools. Prior work with DoD or Intelligence Community systems. Experience in cloud security and FedRAMP compliance. Strong communication and technical writing skills. Why Join Us? At Quotient we provide more than just IT consulting solutions—we offer a dynamic environment where you can learn, grow, and expand your skillset. As a leading managed services, cybersecurity, and IT consulting firm, we support a diverse range of customers, giving you the opportunity to tackle unique challenges and stay ahead in a rapidly evolving industry. Join a team that values innovation, collaboration, and professional development. Whether you're looking to sharpen your technical expertise, work with cutting-edge technology, or make a real impact, we’re committed to helping you build a rewarding career. Benefits Overview: VTG offers a comprehensive benefits package to meet the needs of our employees and their families. Benefits include medical insurance plans, dental insurance, vision insurance, health savings accounts (HSA), flexible spending accounts (FSA), life insurance, short and long-term disability insurance, paid time off and holidays, and a 401(k) with employer match. EEO Statement: Quotient is an Equal Opportunity Employer. We celebrate diversity and are committed to creating an inclusive, respectful environment for all employees. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other legally protected status. We believe that diversity strengthens our team and drives innovation. All employment decisions are based on qualifications, merit, and business needs. If you require reasonable accommodation during the application or interview process, please contact recruit@quotient-inc.com. Powered by JazzHR

Posted 30+ days ago

U logo
Upstate Family Health Center IncUTICA, NY
The Health Information Management (HIM) Manager at Upstate Family Health Center, Inc. (UFHC) is responsible for the efficient and effective management of health information services, ensuring compliance with all relevant regulations and standards. The HIM Manager will lead the HIM department, maintain and secure patient records, and support the organization’s Patient-Centered Medical Home (PCMH) and Federal Tort Claims Act (FTCA) certifications. This role involves collaboration with clinical and administrative staff to ensure that patient data is accurate, accessible, and secure. HIM Manager will also assist with identifying and monitoring performance measurements, and advising on information technology and improvement activities by Plan-Do Study-Act [PDSA] cycles, to achieve designated goals, guiding the improvement of the quality and efficiency of UFHC services, access to healthcare services with emphasis on performance goals for value-based revenue and performance guidelines. HIM Manager will supervise the HIM Department including but not limited to Medical Records Specialist, Quality Improvement Associate and other staff as needed and will monitor and audit Patients charts and assist in any training or correction in the medical records process to maintain HIPPA Compliance. Essential Roles and Responsibilities Activities include but are not limited to the following: Monitor, audit patient chart data to evaluate the UFHC performance in quality improvement, with duties included but not limited to: Work with Director of Quality/Compliance/Risk Management to assist with analysis of data related to the quality improvement (QA) program; Creating process to capture documentation for QI/HEDIS, Value Based Payment, payer Incentive programs and Assist with PCMH Certification to enhance reimbursement. Participate in developing and implementing interventions, and workflows; Evaluate and assist in reporting compliance rates for Quality Measures, Value based Payment on a quarterly basis; Evaluates medical records chart maintenance, documentation to optimize reimbursement by ensuring that and documentation are monitored to ensure accurately reflects and supports outpatient visits and to ensure that data complies with legal standards and Universal Data Systems (UDS) guidelines. Audit and assist with monitoring third party vendor compliance with UFHC quality standards and workflows on a continual basis and report to the QA/QI Committee Monthly. Determine adherence to performance measures standards by monitoring performance improvement activities by Plan-Do-Study-Act [PDSA] Cycles and provide guidance that can be utilized to achieve or improve performance. Assist in the maintenance and compliance to Patient Centered Medical Home (PCMH) standards of performance and provide guidance that can be utilized to achieve or improve performance through review of documentation or coding issues for review by management and/or professional evaluation committees. Act as a liaison with organizations as required improving UFHC utilization of the EMR and compliance with industry standards. Makes recommendations for changes in policies and procedures.  Develops and updates procedures manuals to maintain standards and m aintain knowledge of Regulator Guidelines and practice changes to allow for accurate reporting of measures and t o minimize the risk of fraud and abuse, and to optimize revenue recovery. Collaborate with the Director of Quality/Compliance/Risk Management to ensure any service of process/summons that the health center or its provider(s) receives relating to any alleged claim or complaint is promptly sent to the HHS, Office of the General Counsel, General Law Division, per the Claims Management Policy. Provides technical guidance to physicians and other staff in identifying and resolving issues or errors such as incomplete or missing records and documentation, ambiguous or nonspecific documentation, and/or codes that do not conform to approved coding principles/guidelines. Reads bulletins, newsletters, and periodicals and attends workshops to stay abreast of issues, trends, and changes in laws and regulations governing medical record coding and documentation. Preform audits in coding and clinical documentation and referral completion to provide feedback in a timely basis as to which measures and/or processes are falling out of compliance. Educate clinicians and departments on quality measure expectations and the importance of reporting standards and the impact on reimbursement Serves as a resource for Physicians in documentation improvement practices to measure and improve accuracy. Identifies training needs, prepares training materials, and conducts training for physicians and support staff to improve skills in the collection of quality health data. Maintain Supervisory role of All HIM, Quality Staff including but not limited to Medical Records Specialist , Quality Improvement Associate, and other staff as needed. Will also monitor HIM Directed Third party Vendors services for compliance to UFHC quality standards on a monthly basis. Work in conjunction with the Director or Quality/Compliance/Risk management to monitor, maintain and develop Risk Management, Compliance and Quality regulations and required guidelines. QUALIFICATIONS/EDUCATION/EXPERIENCE Associate’s Degree and/or experience related to computer programs associated with data management. Current HIM or Coding Certification (AAPC, AHMIA or another national agency)   Working Knowledge of PCMH and HEDIS reporting; and proficiency in the use of Window Based PC system and a range of software packages, including Microsoft Outlook. Ability to evaluate medical records and other health care data; Ability to interact effectively with people and perform as part of a team. Demonstrated organizational, written communication and oral communication skills. Attention to detail and excellent follow through Ability to manage multiple tasks simultaneously Demonstrated flexibility and problem-solving skills. Powered by JazzHR

Posted 30+ days ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we believe national security and innovation go hand in hand. As an Information Systems Security Engineer, you will play a key role in designing, developing, and integrating secure systems that support mission-critical operations. You will assess computing environments for vulnerabilities, ensure compliance with cybersecurity standards, and recommend robust mitigation strategies. Your work will help ensure that complex systems maintain strong security postures throughout their lifecycle.Independent Software is more than just a workplace, it’s a community of mission-driven professionals committed to technical excellence, integrity, and collaboration. You’ll have the opportunity to work on impactful programs that protect national interests, alongside a team that values your expertise and encourages continuous learning. We offer competitive compensation, flexible work options, and a culture that supports work-life balance. If you’re passionate about cybersecurity and want your work to truly make a difference, this is the place to do it. Key Responsibilities: Conduct technical security assessments of systems to identify vulnerabilities and ensure compliance with cybersecurity standards and regulations Validate system security requirements and contribute to secure system architecture and design Design, develop, implement, and integrate cybersecurity components across systems including networked and enclave environments Collaborate with system architects and developers to apply consistent and effective security functionality Build secure architectures and ensure trusted relationships between external systems and environments Support security planning, risk analysis, risk management, and mitigation strategies throughout the system development lifecycle Review and contribute to documentation including System Security Plans and Risk Assessments Support compliance with the Risk Management Framework and organizational security policies Recommend and implement system-level security solutions that meet data protection requirements Interact with internal teams and customers to coordinate cybersecurity strategies and implementations Required Skills and Qualifications: Twelve years of experience as an Information Systems Security Engineer in programs of similar scope and complexity Hands-on experience with cybersecurity principles including access control, authorization, authentication, PKI, and enterprise security architecture Experience designing secure environments for systems with multiple enclaves and varying classification levels Proficiency in risk management, vulnerability assessment, and system hardening Strong understanding of security engineering best practices and secure systems development Education and Experience: Bachelor’s degree in Computer Science, Computer Science, Information Assurance, Information Security, Systems Engineering, In lieu of a degree, an additional four years of relevant ISSE experience may be substituted Certifications: Must meet Department of Defense 8570.01-M requirements with a minimum certification of IASAE Level 2 certification Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

Nalley Consulting logo
Nalley ConsultingWashington, DC
Nalley Consulting is seeking Information System Security Officers in metro Washington, D.C. Position: Information System Security Officer (ISSO) LCAT: Mid and Senior Location: DIA HQ, Washington, D.C. Required clearance: TS/SCI with willingness to take CI poly Required experience: At least 10 years for Senior; at least 6 years for Mid. Required education: Bachelor's degree or master's degree Description: The ISSO ensures system, network, and security appliance auditing, virus scanning, and hardware and software configuration management requirements are executed as defined in client-approved system assessment documentation and policy. Additionally, the ISSO monitors the activities of program system administrators to ensure all relevant security procedures are followed. Requirements: Experience applying security systems concepts, requirements, design development, implementation, and integration to information systems Knowledge of the Risk Management Framework (RMF), performing system assessment and authorization through a Governance, Risk, and Compliance (GRC) tool Knowledge of risk mitigation and selecting and designing appropriate security controls for implementation Knowledge of incident response and data loss prevention, detection, and response Knowledge of the NIST and Federal Information Security Management Act (FISMA) requirements for monitoring and reporting Other desired areas: Experience with DoD security technical implementation guides (STIGs), checklists, and testing tools, including STIG Viewer, SCAP, and ACAS scanning tools Experience with cyber related tools such as Ansible, Terraform, Splunk, or STIG Viewer Bachelor’s degree in IT, Cybersecurity, Data Science, Information Systems, or CS DoD 8570 IAT or IAM Level III Certification such as CISSP Certification AWS Solutions Architect or Certified Security - Specialty Certification ABOUT NALLEY CONSULTING Nalley Consulting is a Service Disabled Veteran Owned Small Business working with prime partners to staff Department of Defense and Intelligence Community positions. Created by a U.S. Navy intelligence veteran, Nalley Consulting has grown to include multiple IDIQ vehicles in several states. Nalley Consulting fringe benefits include: Excellent medical, dental, and vision benefits PTO 11 paid federal holidays Tuition assistance Paid military-reserve leave Paid parental leave for birth or adoption 401k matching up to 5 percent of the base salary Flex time Company-paid short-term disability, long-term disability, and life insurance. Powered by JazzHR

Posted 30+ days ago

Academy Of Scholars logo
Academy Of ScholarsDecatur, GA
The Academy of Scholars, an ever-growing private Christian elementary school in Decatur, Georgia, is seeking a full-time  Information Technologist . The successful candidate will maintain the IT objectives and policies at the school level by providing on-site end user computing support, including investigating, troubleshooting, and resolving hardware, software, network, and instructional technology incidents. The candidate will be responsible for driving the school’s technology to a new level while at the same time improving and maintaining customer support. The ideal candidate is a reliable, skilled multi-tasker that can thrive in a fast-paced environment committed to consistently setting expectations and meeting deadlines.   This position requires good collaborative skills and the ability to communicate efficiently and effectively with internal customers as well as external customers such as vendors.   The position requires that all work be performed correctly, within acceptable time limits and when planned with only general supervision. *****Proven experience with Windows 10/11, Apple/Mac Devices and ChromeBooks Duties & Responsibilities Provides technical support to clients in the form of answering questions, troubleshooting to isolate, and diagnosing and correcting abnormal situations and problems Ensure all documentation is properly maintained and updated in a timely manner. Provides timely verbal and written communications with clients, vendors, and staff; as well as maintaining the school website, and assisting with electronic communications such as newsletters. Monitoring and maintaining network connections to connected devices such as printers, switches, servers, and wireless access points. Expectations Excellent analytical and problem-solving skills. Multi-tasking with the ability to adjust to needs which arise while providing quick resolution to problems. Strong verbal and written communication skills. Must be customer service and detail oriented. Qualifications Minimum of 5 years experience in a closely related position providing technical support, troubleshooting, and escalations for a school environment. Experience Proven experience with Windows 10/11, Apple/Mac Devices, Android Tablets and Chromebooks. Enterprise Management and Administration along with practical knowledge Google MDM Infrastructure including Firewall, Switches, and Apps (Google MDM experience is a Plus) Proven knowledge of Google for Education, Canvas LMS, Pearson Realize, Freckle, Seesaw and other related cloud-based school software packages is a Plus. Microsoft Office 365 (Teams is a Plus) Server Hardware Knowledge of Centralized Service Tools for Auditing, Helpdesk, and Asset Management Certification:  Apple or Microsoft Technology and/or CompTIA certification(s) preferred Google Admin Certification or equivalent experience preferred Education: BS degree in Information Technology, Computer Science, Engineering, a relevant field or equivalent experience Experience:  A minimum of 5-7 years of demonstrated relevant experience include providing end user support in an enterprise level organization, administering a Chromebook, Windows or Mac computing environment, Mobile Device Management, and/or implementation of WAN/LAN environments Working in academic environment: 2 years (Preferred) Administering Chromebook: 2 years (Preferred) Apple/Mac device: 2 years (Preferred) Google Education: 2 years (Preferred) Mobile Device Management: 2 years (Preferred) WordPress: 2 years (Preferred) Powered by JazzHR

Posted 30+ days ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
  Office of the Illinois Secretary of State Alexi Giannoulias Job Title:    Information Systems Technician I  Division:      Information Technology - Systems and Programming Union:          IFT Location:    501 S Second St, Springfield, IL – Sangamon County Salary:        $4,865.00 monthly, commensurate with experience  Overview: Responsibilities include, but are not limited to, the development of new Drivers programs, as well as enhancements and maintenance of existing Drivers programs and related sub-systems.  Duties and Responsibilities: Assists in the planning, analysis, design, development, and support of Drivers programs of varying size and complexity; maintains sub-systems of a large Drivers Services processing system and understands integration points to make relevant modifications when necessary; hands-on technical experience using technologies including COBOL, CICS, and JCL is required; a strong working knowledge of DB2, SQL, and stored procedure experiences is also required.  HTML, CSS, and XML interface development experience is preferred. Based on project specifications, utilizes applicable tools to design flowcharts, process models, and use cases in preparation for program development and testing.    Assists in analyzing test results for the detection of technical programming errors. Assists in assessing and formulating strategies to improve efficiency of existing applications, maintenance, and enhancement processes. Prepares and modifies detailed programming documentation in accordance with established documentation standards. Responsible for test plan development, execution, and unit testing verification. Performs other duties as required or assigned. Minimum Requirements: Requires knowledge skill and mental development equivalent to the completion of one year of college, with Computer Science coursework or  one and one-half (1.5) years of technical systems and/or programming experience. Hands-on technical experience using technologies including COBOL, CICS, and JCL is required. A strong knowledge of DB2, SQL, and stored procedure experiences is also required. HTML, CSS, and XML interface development experience is preferred.  Requires the ability to lift and carry up to 50 lbs. Requires a valid Illinois Driver's License. Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume or other attachments as needed. Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 30+ days ago

Edwards Lifesciences Corp logo
Edwards Lifesciences CorpTexas, AL

$123,000 - $174,000 / year

Innovation starts from the heart. At Edwards Lifesciences, we're dedicated to developing ground-breaking technologies with a genuine impact on patients' lives. At the core of this commitment is our investment in cutting-edge information technology. This supports our innovation and collaboration on a global scale, enabling our diverse teams to optimize both efficiency and success. As part of our IT team, your expertise and commitment will help facilitate our patient-focused mission by developing and enhancing technological solutions. As the Edwards Architect for Information Security, you will contribute with the security design, implementation, operation and maintenance of Identity and Access Management service and related technologies. Ideal candidates possess both broad and deep technical knowledge in Information Security and IAM practice. This is highly collaborative role, and you will work in close collaboration with multiple cross-functional teams. How you will make an impact: Providing design and architecture guidance for enterprise-level security initiatives, system integration, and tools within the Identity and Access Management (IAM) domain. Serving as the technical lead for enterprise-class IAM security initiatives. Developing security design patterns and architectural models that ensure repeatable, consistent architecture for IAM capabilities and related technologies. Establishing information security best practices and architectural models to ensure compliance with enterprise-wide security policies and standards in the IAM space. Acting as a business liaison and lead advisor to multiple business units. Leading operations and maintenance of key cybersecurity capabilities and services across multiple technologies. Staying informed on the evolving cybersecurity threat landscape to drive innovative solutions that enhance Edwards' security posture. Resolving issues and incidents through highly complex root cause analysis, followed by the development and implementation of strategic solutions. Translating complex security concepts into business-friendly language to facilitate stakeholder understanding and alignment. Performing other duties as assigned by management. What you'll need (Required): Bachelor's Degree in related field with 6 years of previous related experience, or equivalent work experience based on Edwards criteria What else we look for (Preferred): Previous related experience in Information Security and/or IAM domain with solid performance in an architect role working with cross-functional teams. Expert of security concepts for identity and access management. Experience in designing and implementing secure Active Directory and Entra ID solutions. Certifications in related discipline (e.g., CEH, CISM, CISSP) Knowledge of Active Directory authentication features (Kerberos, NTLM, LDAP). Experience with Active Directory security best practices (e.g. Privileged Access Management, credential theft mitigations, tiering model design). Knowledge of common attack vectors and methods such as pass the hash, pass the ticket, ransomware, kerberoasting. Experience of Active Directory capabilities (FSMO roles, schema management, trusts, replication, and Group Policy), Active Directory troubleshooting experience (AD replication, service health checks, advanced troubleshooting). Working knowledge of IAM services of any public cloud providers (Azure, AWS, GCP), is a plus. Understand modern IAM solutions (e.g. MFA, Authentication strengths, conditional access policies, PIM, External Identity, Entra ID Application Proxy, SSO, Application integrations) Understanding of identity providers using SAML, OAuth, or OpenID Connect. Experience in IAM engineering, building and maintaining security controls. Experience implementing industry good practices (e.g., NIST, ISO2700x, SANS) preferred. Experience and/or understanding of at least 3 cyber security domains (e.g., platform security, application security, network security, infrastructure, cloud security, data security and identity and access management). Working knowledge with threat modeling (STRIDE) Proficient analytical and problem-solving abilities to identify and mitigate potential identity security risks. Substantial knowledge and understanding of cybersecurity principles Experience drafting technical documentation. Excellent verbal and written communication skills and customer focused skills Ability to interact professionally with all organizational levels and proactively escalate issues to appropriate levels of management in the organization Ability to manage competing priorities in a fast-paced environment Strict attention to detail. Good organization and time management skills Ability to partner and facilitate security operations, incident response and forensic analysis when required. Adhere to all company rules and requirements (e.g., pandemic protocols, Environmental Health & Safety rules) and take adequate control measures in preventing injuries to themselves and others as well as to the protection of environment and prevention of pollution under their span of influence/control. Aligning our overall business objectives with performance, we offer competitive salaries, performance-based incentives, and a wide variety of benefits programs to address the diverse individual needs of our employees and their families. For California (CA), the base pay range for this position is $123,000 to $174,000 (highly experienced). The pay for the successful candidate will depend on various factors (e.g., qualifications, education, prior experience). Applications will be accepted while this position is posted on our Careers website. Edwards is an Equal Opportunity/Affirmative Action employer including protected Veterans and individuals with disabilities. COVID Vaccination Requirement Edwards is committed to protecting our vulnerable patients and the healthcare providers who are treating them. As such, all patient-facing and in-hospital positions require COVID-19 vaccination. If hired into a covered role, as a condition of employment, you will be required to submit proof that you have been vaccinated for COVID-19, unless you request and are granted a medical or religious accommodation for exemption from the vaccination requirement. This vaccination requirement does not apply in locations where it is prohibited by law to impose vaccination.

Posted 3 days ago

Prosync logo
ProsyncAnnapolis Junction, MD
ProSync Technology Group, LLC (ProSync) is an award-winning, SDVOSB Defense Contracting company with a strong military heritage and a record of excellence in supporting the Department of Defense and the Intelligence Community.  If you have prior military service or government contracting experience, are proud to serve and support our nation, and want to help support ProSync's mission to "Define and Redefine the State of Possible,” please apply today! The Senior Information Systems Security Officer (ISSO) will provide aid to the program, organization, system, or enclave's information assurance program and will also lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies in addition to the below. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Requirements A minimum of twelve (12) years of total experience in the information security arena. A minimum of seven (7) years of experience directly as an ISSO supporting IC or DoD programs and contracts of similar scope, type, and complexity. A Bachelors of Science degree in Computer Science, Information Assurance, Information Security, or related discipline. Experience supporting over 30 SSP's. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate). A Top Secret/SCI w/ Polygraph is required. Benefits Join PROSYNC and enjoy our great benefits! Compensation: We offer bonuses that are awarded quarterly to our employees and our compensation rates are highly competitive. Health & Retirement: We offer a comprehensive Health Benefits package and 401K Retirement plan so you can take care of yourself and your family, now and in the future. Other health-related benefits include an employee assistance program for those difficult times or when you need to take care of your mental health. Education: Individual growth is a priority at ProSync. Employees are encouraged to take advantage of our company-sponsored continuing education program so you can get your degree or that next certification you need to propel you to the next level. Work/Life Balance: A healthy work/life balance is essential for building and executing your work effectively at ProSync, but it’s also necessary to allow you the room to pursue everything else you want to develop in your personal life.. We offer generous Paid Time Off and 11 paid holidays a year. ProSync also provides flexible work options that work with your schedule and lifestyle.

Posted 30+ days ago

tarte cosmetics logo
tarte cosmeticsNew York, NY

$75,000 - $85,000 / year

Job Title: Product Information Assistant Manager Job Summary: The Product Information Assistant Manager is responsible for managing, optimizing, and distributing product data across all relevant systems and internal channels. This role ensures that accurate, consistent, and high-quality product information is maintained to support business operations. Key Responsibilities: • Own and maintain the company’s Product Information Management (PIM) system. • Ensure accurate, complete, and enriched product data across platforms • Collaborate with product development, marketing, regulatory and other teams to gather and standardize product attributes. • Develop and enforce data governance standards, including taxonomy, naming conventions, and product attributes. • Oversee the import, mapping, and syndication of product data across ERP, PIM and third-party channels. • Identify and implement automation tools to streamline product data workflows. • Perform regular audits of product data to ensure compliance and quality standards. • Train internal stakeholders on PIM processes and tools. • Support global product launches and seasonal content refreshes. Desired Skills and Experience: • Bachelor’s degree in Marketing, Information Systems, Business, or a related field. • 3+ years of experience in product information management or related role. • Experience with ERP, preferably SAP or Microsoft NAVision. • Strong understanding of PIM systems • Proficient in Excel and data management tools. • Excellent organizational and communication skills. • Ability to manage cross-functional projects and work with global teams. • Experience working with data governance and taxonomy frameworks. Must have experience leveraging AI-powered tools (chatgpt, perplexity, replit, sora, etc) and innovation. Vibe coding experience is a plus. Our Perks: Salary range: $75,000-85,000K (Compensation will depend on a variety of factors, including but not limited to skill level, relevant work experience & education) Medical, dental, vision, 401K plan & access to health & wellness programs Paid vacation, holidays, summer Fridays, birthdays off, volunteer time & more Makeup gratis, employee discount on tarte.com, team give back initiatives Friendly, fun, creative & collaborative work environment

Posted 30+ days ago

T logo
TLA-LLCMcLean, VA
TLA is seeking an Information System Security Engineer (ISSE). This is a critical role responsible for designing, developing, implementing, and maintaining secure information systems and networks. The ISSE ensures that security requirements are effectively integrated into systems throughout their entire lifecycle, from design to disposal. This position involves close collaboration with system owners, developers, and other stakeholders to identify vulnerabilities, assess risks, and implement robust security controls in accordance with industry standards and regulatory frameworks such as the NIST Risk Management Framework (RMF) and DoD 8570/8140 guidelines. · Security Architecture and Design: Design, develop, and implement network and system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation. · Risk Management: Assess and mitigate system security threats and risks throughout the program life cycle, including performing technical security assessments and vulnerability analyses. · Compliance and Documentation: Ensure systems comply with applicable security policies, standards, and methodologies (e.g., NIST, DoD, FISMA). Prepare and maintain security documentation, including System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and security assessment reports. · Testing and Validation: Plan and conduct security verification testing, using tools like vulnerability scanners (e.g., Nessus, ACAS) to identify weaknesses and ensure controls are in place and effective. · Operational Support and Incident Response: Monitor systems for irregular behavior, support security incident response activities, and manage changes to systems while assessing their security impact. · Collaboration and Guidance: Serve as a subject matter expert, providing guidance to development, engineering, and program teams on secure design, development, and secure coding techniques. · System Hardening: Oversee the implementation of security configuration settings and hardening of systems (e.g., using DISA STIGs) to minimize vulnerabilities. Requirements Required Skills and Experience · Education: Bachelor's degree in Computer Science, Information Technology, Information Assurance, Information Systems Security Engineering, or a related field (or equivalent experience). · Experience: A minimum of 5-8 years of experience in information security engineering, system administration, and/or cybersecurity, with hands-on experience in implementing security controls and supporting authorization processes. · Technical Skills: o Expert knowledge of security engineering principles, secure architecture, and design concepts. o Hands-on experience with security tools such as vulnerability scanners (Nessus/ACAS), SIEM platforms (Splunk, LogRhythm), and security configuration tools (DISA STIGs, SCAP). o Strong understanding of network protocols, firewalls, intrusion detection/prevention systems, encryption techniques, and access controls. o Familiarity with various operating systems (Windows, Linux, Unix) and secure configuration management. o Experience with risk management frameworks, specifically the NIST RMF and/or DoD 8500 series guidance. · Soft Skills: Strong analytical thinking, attention to detail, problem-solving capabilities, and excellent communication skills to collaborate effectively with technical and non-technical stakeholders. · Clearance (if applicable): May require a U.S. Citizenship and an active security clearance (e.g., Secret, Top Secret, or SCI). Preferred Certifications · Certified Information Systems Security Professional (CISSP) · CISSP-Information Systems Security Engineering Professional (ISSEP) · Certified Cloud Security Professional (CCSP) · Certified Ethical Hacker (CEH) or GIAC certifications (GSEC, GCIH) Vendor-Specific Certifications: AWS Certified Security Specialty, Cisco Certified Network Associate (CCNA) Security, or similar cloud/network vendor certifications. Benefits At TLA , we build solutions that matter—supporting national security missions through technology innovation, collaboration, and excellence. Our team is passionate about leveraging modern technologies to deliver impactful, mission-focused outcomes for our customers. We offer a competitive and comprehensive benefits package including: Competitive salary and performance bonuses Medical, dental, and vision coverage Paid time off and federal holidays 401(k) with company match Education and certification reimbursement Training and professional development opportunities Employee referral bonuses and team events TLA is proud to be an Equal Opportunity Employer . We celebrate diversity and are committed to creating an inclusive environment for all employees.

Posted 3 weeks ago

C logo
cFocus Software IncorporatedSpringfield, VA
cFocus Software seeks a Geospatial Information System Security Officer (ISSO)SME to join our program supporting the Department of Homeland Security (DHS). This position is on-site in Springfield, VA. This position requires a Public Trust Clearance Qualifications: Bachelor’s or master’s degree in IT, Computer Science, or a related field. 9+ years of GIS Information Security experience DoD 8570 Level II/III certification Duties: Serve as the principal advisor to the GII System Owner (SO) providing guidance, oversight, and expertise based on DHS directives, and policies applicable throughout the Department. Responsible for ensuring the implementation and maintenance of security controls in accordance with the GII Security Plan (SP) and DHS policies. Research, develop, implement, test, and review DHS geospatial information security posture in order to both protect geospatial data and ensure access is provided to appropriate personnel only. Provide recommendations to DHS geospatial mission/system/data owners and stakeholders on best practices for securing systems, applications and content. Prepares all relevant geospatial information security artifacts to include (but not limited to) Interconnection Security Agreements (ISA), Privacy Impact Assessments, and Authority To Operate (ATO). Powered by JazzHR

Posted 1 week ago

K logo
Kranze Technology Solutions, IncDes Plaines, IL

$100,000 - $150,000 / year

The Information System Security Manager (ISSM) is responsible for applying and documenting Information System (IS) security principles, practices, and procedures under the Risk Management Framework (RMF) to maintain compliance with applicable security regulations such as NIST, CNSSI, and NISPOM as well as governing the development and management of classified information systems. This position requires the ISSM to be a strong advocate for integrating security into front-end requirements and overseeing the implementation and sustainment of security controls in all stages of the program lifecycle. This is not a hybrid or work from home position. It is a full-time onsite position at the office in Des Plaines, IL. Responsibilities: Achieve and maintain Authorization to Operate for classified information systems Manages Risk Management Framework (RMF) process Leads and supports security assessments and audits Perform tasks to meet continuous monitoring requirements such as audit log reviews, security patching, and hardware/software configuration Lead the organization's CMMC compliance program, ensuring alignment and adherence to DoD cybersecurity standards (NIST SP 800-171, etc.) Develop, document, and guide the implementation of practical, actionable information security policies, procedures, and controls aligned with CMMC and NIST standards (SSP, POAM, etc.) Continuously assess, refine, and manage the implementation of security controls across the enterprise architecture, using security metrics to drive improvements Provide clear technical guidance to the IT team on the implementation and operation of security measures Evaluate and recommend emerging cybersecurity technologies and best practices relevant to our environment Support the Facility Security Officer in other security disciplines such as COMSEC, physical security, document control, Insider Threat, OPSEC, and visit requests Perform other duties as assigned Minimum Educational Qualifications & Requirements: Bachelor's degree in an applicable field and at least five years of relevant experience Preferred Security+ (or equivalent) certified Ability to perform risk assessment and risk management for classified information systems Ability to obtain Security Clearance, for which the United States Government requires United States citizenshi Strong written and verbal communication skills Ability to maintain organized and complete records Ability to prioritize competing demands and complete tasks on schedule Minimum Previous Experience: 5+ years of progressive experience in information security Expertise in RMF and ATO processes Previous experience with classified information system security management and administration Proven ability to translate CMMC/NIST SP 800-171 requirements into documented, implementable procedures Experience maturing a cybersecurity program, including developing processes and documentation Strong background in defense contracts and classified information handling procedures. Experience implementing and assessing systems using DISA STIGs for Windows and Linux operating system Experience in implementing and monitoring technical, administrative, and operational security controls Other Preferred Skills: 3+ years of experience in assessing and documenting test or analysis data to show cybersecurity compliance to auditors Experience with Microsoft Intune, Azure, Active Directory, Group Policy, and System Administration Experience with submitting and managing accreditation packages to Enterprise Mission Assurance Support Service (eMASS) Use of automated vulnerability and compliance scanning tools such as Security Content Automation Protocol (SCAP), Compliance Checker (SCC), Security Technical Implementation Guides (STIGs), and Nessus Experience with SIPRNet installation, deployment, and management We recognize that attracting the best talent is key to our strategy and success as a company. As a result, we aim for flexibility in structuring competitive compensation offers to ensure we are able to attract the best candidates. As required by law in this state, the estimated salary range for this position is $100,000-$150,000 and represents our good faith estimate as to what our ideal candidates are likely to expect. We tailor our offers within the range based on organizational needs, internal equity, market data, geographic zone, and the selected candidate’s experience, education, industry knowledge, location, technical and communication skills, and other factors that may prove relevant during the selection process. Benefits Kranze Technology Solutions is proud to provide extremely competitive benefits to all full time employees including: Comprehensive Leave plan (Paid Time Off) Comprehensive Health Care package including Medical, Vision, Dental, Health Savings Account (HSA), and more 401 (k) retirement plan Paid Overtime Flex Time and Flexible Scheduling Opportunities to travelTuition Reimbursement options Casual and relaxed work environment About Kranze Technology Solutions We are part of an SPX Technologies’ Communication Technologies platform in the Detection & Measurement business segment. KTS is focused in the defense industry specializing in Infrared Countermeasures (IRCM) systems, digital interoperability and networking, and program support for the US Navy, US Marine Corps, and Special Operations Command. We provide hardware and software product development, systems integration, system test and evaluation support, modeling and simulation analysis, and other engineering services to support the Warfighter. Each team member has significant opportunities to solve a variety of complex technical challenges in small teams while working hand in hand with our defense customers. KTS is an equal opportunity employer and prohibits discrimination and harassment of any kind. All applicants will be considered for employment without regards to race, color, religion, age, sex, sexual orientation, gender identity, national origin, veteran or disability status, or any other segmenting characteristics protected by law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to: Human Resources 847-737-7299 resumes@kranzetech.com Powered by JazzHR

Posted 30+ days ago

K logo
K2 Group, Inc.Arlington, VA
*This is a contingent opportunity   The Information Operations Specialist performs technical communications vulnerability assessments of computer networks, Industrial Control Systems, radio, wireless, and other communication systems that directly support the critical assets on DoD Installations or other agencies’ facilities.   Duties: Review and provide an assessment of the following: cyber issues and integration employment of the core capabilities of electronic warfare (EW) computer network operations (CNO) military deception and operations security (OPSEC) in concert with specified supporting and related capabilities to influence, disrupt, corrupt, or usurp adversarial human and automated decision-making Provide operational IO-related vulnerability mission impacts and remediation inputs  Experience:   Minimum Possess a minimum of 10 years IO and Cyberspace Operations (CS) experience Possess working knowledge of DoD’s IT system and network certification and accreditation processes to include system security authorization agreements. Excellent written and verbal communication skills.   Certifications:   I AT Level II required Education: Possess a Bachelor of Science in computer networks and cybersecurity or a related technical discipline with coursework in the areas of: evaluating, installing, configuring, maintaining, and troubleshooting computer and network hardware components and operating systems. In lieu of a degree, commensurate operational experience may be substituted.   Additional Requirements Possess working knowledge of Department of Defense's Information Assurance Vulnerability Alert processes. Mastery level experience working hands-on with Computer Network modeling software. Mastery level experience working hands-on with Computer Network vulnerability/compliance analysis software. Ability to lift and move object which weigh up to 50lbs. Expert in the performance of in-the-field vulnerability-based assessments in the technical area of Information and CyberSpace Operations. Desired Experience: Experience providing analytical support to one or more special operations forces (SOF) units or commands Tactical or operational level experience operating in a deployed environment  Experience working in a DoD environment, including with military departments, Joint Staff, Combatant Command, Service, or Agency IT organizations and environments Additional Requirements : Accept worldwide deployments which include high threat permissive areas presenting some risks to personal safety. Submit to immunization for worldwide travel.   Security Clearance:   Current Top Secret clearance with SCI eligibility     Benefits:    K2 Group’s benefit offerings include:  Medical/ Dental/ Vision Insurance; FSA Medical & FSA Dependent Care; Pre-tax 401(k) & ROTH 401(k) plans; Profit Sharing Plan; Life & Accidental Death Insurance; Short Term/ Long Term Disability; Voluntary Group Life Insurance option; Tuition Reimbursement; Job-related Course Reimbursement; Holiday Pay; and Paid Time-Off.    Powered by JazzHR

Posted 30+ days ago

Watermark Risk Management International logo
Watermark Risk Management InternationalSan Antonio, TX

$98,345 - $133,055 / year

Come make your mark with Watermark! 🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business. 🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We’re intimately familiar with DOD security programs and mission requirements. ⭐ OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do. 💲 COMPETITIVE BENEFITS PACKAGE to address our employees’ physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Systems Security Officer III The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. In this role you will… Develop physical or logical topologies for a system Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly Ensure all IS security-related documentation is current and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them Prepare reports on the status of security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct continuous monitoring activities for authorization boundaries under your preview Assist Department of Defense, National Agency and Contractor organizations with all RMF efforts Additional duties as assigned Experience Requirements: 5-7 years related experience Prior performance in roles such as System, Network Administrator or ISSO Education Requirements: Bachelor’s degree or equivalent experience (4 years) Certification Requirements: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire. Security Clearance Requirements: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a Counterintelligence polygraph Other Requirements: Reports to a physical location which occasionally requires the ability to traverse between buildings May require sedentary work at least 50% of the time Must be able to regularly list up to 50 lbs Ability to manage stress with a high degree of maturity/professionalism Demonstrated critical thinking and leadership skills and the ability to work well with others Effective verbal and written communication skills All Level I & Level II positions - candidate should possess some Special Access Program (SAP) experience All Level III positions -candidate should possess 2+ years of Special Access Program (SAP) experience The anticipated compensation range for this position is $98,345 - $133,055. M ultiple considerations are taken into account when determining the final salary/hour rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor categories. Central to Watermark’s employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation. Watermark is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws. Powered by JazzHR

Posted 1 week ago

N logo
Nightwing Intelligence SolutionsSterling, Virginia
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers’ most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing seeks part-time Information Review and Release Analysts for our Ft. Meade, Maryland client in support of a dynamic Intelligence Community office offering a flexible work schedule. The position is contingent on funding, and the number of hours worked per week is TBD. The work will be performed on the Ft. Meade campus. The position requires an individual to thoroughly research the substance and overall context of select documents, conduct first-level review of classified information and make the appropriate redactions-electronically and/or manually- based on the criteria of Executive Order (EO) 13526, the Freedom of Information Act (FOIA) and the Privacy Act (PA). The candidate must be able to successfully apply critical-thinking skills when evaluating each case, and when utilizing the broad array of customer systems and tools in order to accurately inform the review and release process. The individual will provide the rationale for redactions using legally defined exemption codes; provide recommendations for release of the documents; and record decisions in the appropriate system. Research of previous release decisions is required to ensure accuracy and consistency in our recommendations. Analysts in this role identify Other Government Agency (OGA) equities involved in the case and ensure that they are prepared for referral or coordination. Mandatory Qualifications and Experience for Declassification Services Significant historical knowledge of client policies related to information security and classification; understanding of client missions and organization; familiarity with client, IC, and DoD policies and regulations related to information security and classification is required Prior client experience is required, but on a case-by-case review of a contractor’s resume, the client may decide but is not required to accept a contractor with other relevant IC experience, which includes significant SIGNIT experience. Relevant experience must be in conducting research and analysis using established professional methods and techniques, including data and information management skills Prior Experience conducting declassification reviews is strongly preferred. We will also consider candidates with experience in a position requiring analytic skills (such as intelligence analysts, foreign disclosure officers, CD/CI/CT analysts, etc) AND a demonstrated familiarity with the requirements of FOIA, PA, EOMDR, and EO Must possess an active TS/SCI clearance with Poly on day one of employment Desired attributes A driven self-starter who collaborates with client staff and has the capability to recommend and to adapt to new processes A team player willing to collaborate and develop robust relationships with clients, colleagues and technical teams Skilled in time management; with the ability to prioritize competing tasks and multitask in order to meet tight deadlines Goal oriented individual who is able to apply critical thinking and provide out-of-the-box solutions Ability to communicate effectively with peers and various management levels delivering a proactive experience and approach to high quality services for all stake holders At Nightwing, we value collaboration and teamwork. You’ll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we’ll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team. Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.

Posted 1 week ago

Ivy Tech Community College logo
Ivy Tech Community CollegeIndianapolis, Indiana

$300,000 - $315,000 / year

THE OPPORTUNITYIvy Tech Community College invites nominations and applications for the position of Senior Vice President & Chief Information Officer - a transformative leadership opportunity for a bold, visionary, and collaborative information technology executive who will help shape the future of the largest singly accredited statewide community college system in the United States. Under the direction of the President, the Senior Vice President & Chief Information Officer (SVP & CIO) is the most senior information technology administrator of the College, providing visionary and operational leadership for strategic planning, implementation, and improvement of technologies, solutions, and related support services closely aligned with the vision, mission, and strategic priorities of the College.This is more than a leadership role — it is an opportunity to leave a legacy that transforms lives across every corner of Indiana. IVY TECH COMMUNITY COLLEGE Indiana’s Engine of Opportunity - Ivy Tech Community College is the nation’s largest singly accredited statewide community college system. With 45 locations and 200,000 students served annually, Ivy Tech is committed to transforming Indiana through accessible, affordable, and high-quality education. The college offers over 70 academic programs aligned to regional workforce needs — including health sciences, advanced manufacturing, IT, business, and education — and is a primary pipeline for transfer to Indiana’s four-year institutions. Affordability and Success : The tuition per semester is $2,577.11, and four out of five graduates finish with no college debt. Career and Transfer Focus : Ivy Tech offers over 70 academic programs, and more than 5,000 students transfer to a four-year university annually. The college also holds the top spot for apprenticeships in the U.S. and graduates the highest number of associate-level nurses in the nation. Flexibility: The college offers flexible class formats and 8-week courses, with over 500 classes available online. MISSION, VISION & STRATEGIC PLAN Our Mission : We are a diverse, open-access college that fuels Indiana’s economy through excellence in teaching and proactive engagement with industry and community partners, embedded in a culture of innovation that empowers all students to learn and succeed. Our Vision : Ivy Tech students will earn 50,000 high-quality credentials each year aligned with the needs of Indiana’s workforce and communities. Strategic Plan - Ivy Tech’s Strategic Plan, titled “Higher Education at the Speed of Life,” conveys all we seek to achieve with the vision, mission, and goals we have laid out. Life moves fast. Economies change. Technology disrupts. We must anticipate and respond rapidly to have the maximum positive impact on the state we call home. And that’s why we are pleased and honored to execute a plan that keeps pace with the demands of our lives and our communities. MAJOR RESPONSIBILITIES Provides leadership for strategic technology planning that supports the vision, mission, and priorities of the College. Serves as the key contributor to the formulation of the College’s business and digital strategies. Builds strong relationships with internal and external key stakeholders to maximize opportunities for IT to support efficient and effective business operations. Proactively advises the President’s Cabinet and Executive Council on the emerging technologies and digital trends that are most relevant to College goals and evolving needs. Fosters a customer-service-oriented tone and develops a responsive, effective team that keeps the mission of the College top of mind. Leads cultural and operational transformation from the current state to a future state defined by technology capabilities, operational discipline, service orientation, and speed to solution capabilities and flexibility. Develops and manages the Systems Office Information Technology Solutions budget with oversight of system-wide technology budgets and expenditures. Plans, sponsors, drives, and ultimately oversees Workday Student Information System (SIS) implementation for the college. Develops and administers a financial life-cycle replacement model for technology. Compiles, develops, and implements system-wide technology policies. Works closely with the IT Information Security team to develop and enforce cybersecurity best practices to protect the college and its digital assets and infrastructure. Oversight for the deployment of system-wide technology, including establishing product standards, technical review systems, security procedures, and protocols. Ensures appropriate holistic IT risk management framework and methodologies are in place and maintained. Leads enterprise-wide data governance strategy to ensure integrity, privacy, and ethical use of institutional data. Develops and supports a culture of engagement and extreme ownership, creates effective programs to maintain staff skills, and provides guidance to ensure staff career goals and objectives of staff are met. Motivates staff to do their very best work. The Senior Vice President & Chief Information Officer supervises the following positions: Assistant Vice President of CRM Operations Assistant Vice President of President Data Strategy Assistant Vice President for Workday Enterprise Solutions Chief Technology Officer Vice President of Shared Services KEY AREAS OF OPPORTUNITY Artificial Intelligence Integration - Harness AI to enhance teaching, learning, and administrative operations while establishing the ethical frameworks, governance, and training needed to ensure responsible and equitable adoption across the College. Workday Finance & HCM (Two Years Post-Implementation) - Enhance integrations, expand Workday Extend development, and improve support and empowerment to functional areas, while acknowledging system limitations. Workday Student (Full Cycle Implementation) - Lead a transformative, system-wide implementation that modernizes student services and enhances the learner experience while guiding complex change management across campuses and functional areas to ensure strong adoption, smooth data migration, and minimal disruption. Contact Center Evaluation and Enhancement - Strengthen a unified, student-centered contact center that delivers consistent, high-quality support across all campuses while coordinating seamless processes, shared systems, and collaborative workflows to ensure timely responses, clear communication, and an exceptional customer experience. COMPENSATION $300,000-315,000 annually, with opportunities for annual incentive bonuses tied to institutional and individual performance goals. QUALITIES AND QUALIFICATIONS Earned bachelor's degree in a related field (required) and substantial experience in postsecondary educational administration. An advanced degree is preferred. Seasoned IT leader with 10+ years' management experience that includes senior-level role(s) in large, complex organization(s). Experience as a strategic, innovative, and pragmatic thinking, results-oriented, and a proven record of digital transformation. Experience with long- and short-term strategic planning, functional transformation, large system implementation, legacy modernization, change management, business acumen, and ability to manage decision-making processes in a highly diverse organization. Experience with data governance and cloud strategy. Experience with ERP systems, higher education ERP systems is preferred. Experience with Workday and/or Salesforce is preferred. Experience with AI is preferred. Experience in a higher education institution is preferred. Strong emotional intelligence, adaptability, and professional presence to navigate a dynamic and evolving institution. A collaborative and transparent leadership style, coupled with the courage to make principled decisions grounded in integrity and institutional values. Excellent interpersonal, communication, and listening skills, with the ability to engage a wide range of constituencies effectively. Willingness and ability to travel regularly to campuses across Indiana and out of state as needed for professional engagement. This is a transformative leadership opportunity for a bold and collaborative executive who will help shape the future of Ivy Tech Community College and advance its mission as Indiana’s most powerful engine for workforce transformation, career advancement, and educational access. IVY TECH LEADERSHIP President Dr. Martin (Marty) Pollio Dr. Martin (Marty) Pollio brings more than 25 years of transformational leadership in education to his role as the 10th president of Ivy Tech Community College. As president of Ivy Tech, Dr. Pollio serves as the chief executive officer of Indiana’s largest public postsecondary institution, which enrolled more than 200,000 students in the 2024-25 academic year. Dr. Pollio champions the implementation of Higher Education at the Speed of Life, the college’s strategy to deliver 50,000 annual credential completions aligned with the needs of Indiana’s workforce. He leads a team of nearly 7,000 faculty and staff across the college’s 19 campuses in Indiana and online and oversees major institutional initiatives that strengthen academic quality and improve student retention, completion, employment, and transfer outcomes. Dr. Pollio joined the college on July 1, 2025, after a nationally recognized tenure as superintendent of Jefferson County Public Schools (JCPS), one of the largest urban public school districts in the United States. In his eight years of leadership, JCPS increased its high school graduation rate and nearly doubled its postsecondary readiness rate while reducing achievement gaps. Central to Dr. Pollio’s educational philosophy is a deep commitment to preparing students for success at work and in life. At JCPS, he directed the Academies of Louisville, a nationally recognized initiative that embedded career pathways into the high school experience. He previously led similar efforts while serving as principal of Jeffersontown and Doss high schools, where he drove improvements in student achievement by bridging academic instruction with hands-on, work-based learning opportunities. Dr. Pollio holds a Bachelor of Arts in education from Indiana University, a Master of Science in health education from Eastern Kentucky University, and a Doctor of Education in educational leadership and management from the University of Louisville. The President’s Cabinet The President’s cabinet is a team of six, including the president of the foundation and the following positions: Provost & Senior Vice President of Academic Affairs Senior Vice President for Workforce and Careers Senior Vice President & Chief Financial Officer Senior Vice President & Chief Information Officer Senior Vice President, Legal and Public Affairs Ivy Tech’s Chancellors Ivy Tech’s 19 campus leadership teams oversee localized strategy, operations, and successes. APPLICATIONS & NOMINATIONS Nominations, expressions of interest, and applications (including resumes and letters of interest) may be submitted in confidence to Woodhouse Search LLC at: laurie@woodhousesearch.com . Ivy Tech Community College is an accredited, equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, ethnicity, national origin, marital status, religion, sex, gender, sexual orientation, gender identity, disability, age or veteran status. As required by Title IX of the Education Amendments of 1972, Ivy Tech Community College does not discriminate on the basis of sex, including sexual harassment in its educational programs and activities, including employment and admissions. Questions specific to Title IX may be referred to the College’s Title IX Coordinator or to the US Department of Education Office of Civil Rights.

Posted 4 days ago

Kokosing logo
KokosingWesterville, Ohio
Kokosing (www.kokosing.biz) is one of America's 40 largest General Contractors and services a broad spectrum of clients in both the private and public business sectors. Kokosing's services include heavy civil/industrial construction such as highways, bridges, underground utilities, water/wastewater facilities, and marine construction. For over 70 years, Kokosing has successfully attracted the most qualified technical personnel in the construction industry by offering visible challenges, superior quality, and attractive rewards. With over $2.8 billion in annual sales and a commitment to its workforce, Kokosing is the winning team. Job Description: The Senior Cybersecurity/Information Security Analyst will be responsible for overseeing all aspects of information security within the organization. This role involves designing, implementing, and monitoring security measures to protect systems, networks, and data from cyber threats. The ideal candidate will have extensive experience in cybersecurity, working with security SaaS providers, a proactive approach to identifying vulnerabilities, and the ability to collaborate across departments to ensure a secure enterprise environment. Key Responsibilities: Develop, implement, and maintain comprehensive information security policies, standards, and procedures. Ensure alignment with industry standards such as NIST, CIS, and other relevant frameworks. Work with SaaS providers in conducting regular risk assessments and audits to identify vulnerabilities and ensure compliance with regulatory requirements. Oversee SaaS provider monitor of networks and systems for security breaches, intrusions, and unusual activity using advanced security tools (e.g., SIEM, IDS/IPS). Lead incident response efforts, including investigation, containment, remediation, and documentation of security incidents. Perform root cause analysis and implement corrective actions to prevent recurrence. Review and contribute to the configuration and maintenance of firewalls, VPNs, endpoint protection, and other security technologies. Participate in regular vulnerability scans and penetration testing to identify and mitigate risks. Ensure secure configuration of cloud, on-premises, and hybrid environments. Review and recommend cybersecurity training programs to educate employees on best practices and emerging threats. Promote a culture of security awareness across the organization. Ensure compliance with applicable laws, regulations, and industry standards (e.g., CMMC, NIST, CIS, PCI-DSS). Prepare and present reports on security posture, incidents, and compliance to the Manager of Cyber/Information Security and senior leadership. Collaborate with IT, operations, and other departments to integrate security into business processes and systems. Provide guidance and mentorship to junior members of the cybersecurity team. Stay current on emerging threats, technologies, and best practices to recommend improvements to the security program. Qualifications: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (Master’s degree preferred). Minimum of 5-7 years of experience in cybersecurity or information security roles, preferably in a manufacturing or construction environment. Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are highly desirable. Strong knowledge of network protocols, firewalls, intrusion detection/prevention systems, and encryption technologies. Experience with security tools such as Splunk, CrowdStrike, Cisco Umbrella, Artic Wolf, or similar platforms. Proficiency in cloud security (e.g., AWS, Azure) and securing industrial control systems (ICS) is a plus. Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis. Soft Skills: Excellent analytical and problem-solving skills with attention to detail. Strong communication skills to articulate complex security concepts to technical and non-technical stakeholders. Ability to work independently and manage multiple priorities in a fast-paced environment. Work Environment: This role may require occasional on-call availability for incident response. Hybrid options may be available, depending on organizational needs. Occasional travel may be required for audits, training, or collaboration with other sites. Kokosing is an equal employment opportunity/affirmative action federal and state contractor. The company does not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other protected class.

Posted 30+ days ago

C logo
Circor CareersCorona, California
Business units are in Corona, California; Warren, Massachusetts; Hauppauge, New York; Paris, France; Uxbridge, UK; and Tangier, Morocco. Parent company CIRCOR International is headquartered in Burlington, Massachusetts and CIRCOR Aerospace & Defense is headquartered in Corona, California. POSITION DETAILS Position Summary CIRCOR is actively searching to identify a dynamic and impactful Senior Information Systems Security Manager (ISSM) to assure that the sites (Corona and New York) comply with all applicable cybersecurity regulations of the Department of Defense (DoD) and to develop/enhance the protection of Controlled Unclassified Information (CUI) and the Cybersecurity Maturity Model Certification (CMMC) framework in accordance with NIST SP 800-171 and applicable DFARs. The Senior ISSM serves as the linchpin of an organization's cybersecurity strategy, tasked with safeguarding data integrity, confidentiality, and availability. The role of a Senior ISSM is instrumental in developing, implementing, and maintaining security protocols that align with regulatory requirements and industry standards. This role requires a blend of technical proficiency, analytical thinking, and strong leadership abilities to manage security incidents, conduct risk assessments, and ensure compliance with security policies. The position is also responsible for the Information Assurance (IA) program as stipulated by various US Government requirements from the DoD and regulatory bodies. This person maintains the formal IS security program and policies for their assigned area of responsibility and oversees the operational information systems security implementation policy and guidelines. The Senior Information Security System Manager deploys, maintains, and supports on premise services. The incumbent also provides impeccable customer service by responding to customer service requests timely and accurately. Responsible for the design, implementation, maintenance, and support of CIRCOR’s Intel & cloud servers, backend systems supporting the production processes for the division, as well as data storage platforms and hosted services. Provides support in maintaining service levels, and performance monitoring. Ensures that all allocated tasks and procedures are carried out effectively and efficiently to current documented standards and a The Senior ISSM provides support for a program, organization, system, or enclave’s information assurance program. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Performs vulnerability/risk assessment analysis to support certification and accreditation. Manage changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Maintains and updates any and all associated Plan of Action and Milestones (POAMs) documentation. Works with vendors to identify, troubleshoot, and resolves hardware, software, network-related, operating system issues; research and tests possible solutions and implements solutions. Perform daily monitoring and management of backups; monitor backup jobs, execute restore jobs, troubleshoot failed jobs, and initiate corrective actions, when necessary. Monitors the health of critical systems, identify trends, and present results to IT Management. Ensure operational stability of technologies and services supporting the lines of business. Lead & meet project deliverables for new and / or changes to existing technology within project requirements. Participate in technical integration activities in support of mergers and acquisitions. Complete projects to budget, timelines, quality standards and business stakeholder requirements. Maintain broad technical knowledge on current and emerging technologies relevant to the enterprise. Monitor cybersecurity compliance by performing periodic self-inspections, tests, and reviews of information systems to ensure that workstations/servers are operating as authorized/accredited and that conditions have not changed. Coordinate with program/project stakeholders, IT & Trade Compliance teams, Facility Security and IT team members to define, implement and maintain an acceptable information systems security posture. Maintain day-to-day security posture and continuous monitoring of IS including security event log review and analysis, including audit & updates of air-gapped laptops. Preparation and maintenance of security Assessment and Authorization documentation. Adhere to established IT policies and standard operating procedures. Coordinate across other sites and seek Best Practice tools and processes in support of a rigor Cybersecurity posture. Internal & External Relationships: Works closely with all departments to provide a reliable infrastructure to support the business needs. Frequent communication with all levels of management and associates including IT Cybersecurity officer, Trade Compliance organization and Legal. Interaction with other ISSMs across A&D sites to establish best practices and an efficient compliance process. Work closely with Customers and all governmental agencies to support the Business relationship in terms of regulation compliance. CANDIDATE REQUIREMENTS Senior Information Systems Security Manager (ISSM) Qualifications & Skills: Bachelor's degree in Computer Science, Information Technology, or a related field. CISSP, CISM, or similar certification. Experience with security frameworks such as NIST, ISO 27001. Strong understanding of network protocols and security architecture. Proficient in using security tools like SIEM, IDS/IPS, and vulnerability scanners. Excellent analytical and problem-solving skills. Experience in risk management and incident response. Strong communication and interpersonal skills. Familiarity with cloud security leading practices. Bachelor's degree in Cybersecurity, Information Systems, or a related field. Minimum of 6-8 years of experience in information security or related roles. In-depth knowledge of information security principles and practices. Experience with security compliance and regulatory requirements. Proficiency in security risk assessment and management. Ability to develop and implement security policies and procedures. Strong technical skills in network and system security. Ability to work independently and as part of a team to support business needs. Excellent written and verbal communication skills. Strong organizational and multitasking abilities.

Posted 5 days ago

S logo
STRWoburn, Massachusetts

$136,000 - $170,000 / year

About the Team: The Security team at STR is comprised of highly skilled professionals who are responsible for maintaining compliance with Government protocol and directives. The Classified Cybersecurity (CCS) team consists of a collaborative group of ISSM’s, ISSO’s, and ISSE’s who are passionate about national security and take great pride in maintaining Confidentiality, Integrity, and Availability of our Information Systems and enable execution of STRs portfolio of programs across a vast customer base. The Role: STR has an exciting opportunity for a well-rounded cybersecurity professional to join our Cybersecurity/Risk Management Framework (RMF) program as a key contributor for classified programs. In this dynamic position, you will interface and collaborate with other Cybersecurity professionals (ISSMs, ISSOs), Security professionals (CPSOs, FSOs), and System Administrators from our Classified Information Technology (CIT) organization. Your responsibilities will include ensuring overall compliance, managing configuration changes, supporting security architecture, and staying abreast of current and future technologies. Please note…this is not a remote and/or hybrid role and requires you to be onsite. Responsibilities: Conduct both vulnerability and compliance scans of Information Systems. Support the development of Risk Management Framework (RMF) documentation and control validation testing for Authority to Operate (ATO) accreditations. Develop cybersecurity requirements, design, and architecture for current and emerging program needs. Implement Information Assurance and Information Security protections and requirements in program development and execution environments. Apply required security controls to networking devices, databases, operating systems, and hardware/software components. Assist ISSMs and ISSOs in monitoring and resolving Plan of Action and Milestones (POA&M) to mitigate system vulnerabilities. Conduct reviews and technical inspections to identify and mitigate potential security weaknesses, ensuring all security features are implemented and functional. Support the completion of Continuous Monitoring requirements in accordance with RMF and NIST SP800-53 standards. Perform other tasks as assigned by the manager. Who you Are: Security Clearance: Active Top Secret security clearance with the ability to obtain SAP and SCI access (U.S. citizenship required). Experience: 3-5 years of technical (hands-on) experience in Information Assurance/Cyber Engineering, including requirements development and implementation. Certification: DoD 8570 IAM Level III certification (CISA, CISM, CISSP, etc.) or the ability to obtain within 6 months of hire. Familiarity: Knowledge of the DCSA Authorization and Assessment Process Manual (DAAPM) and the Joint Special Access Implementation Guide (JSIG). Technical Skills: Configuration, certification, and auditing/analysis of Windows/Linux operating systems and system virtualization in peer-to-peer, LAN & WAN networks. Managing and implementing DISA STIGs and benchmarks in various operating systems (Windows, RHEL, Ubuntu). Using IA vulnerability/compliance scanning tools (e.g., NMap, ACAS, Nessus, Security Content Automation Protocol (SCAP)). Maintaining/managing Security Incident and Event Management (SIEM) and centralized auditing tools (e.g., Splunk, PowerStrux). Familiarity with Microsoft Deployment Toolkit (MDT). Supporting the hardening of new builds of Information Systems (IS) and ensuring full functionality before deployment. Scripting in Windows and/or Linux. Using McAfee/Trellix ePO, including familiarity with DLP components. Experience in one or more of following technical areas Artificial Intelligence, DevSecOps, Cloud or Containerization. Experience with NIST SP800-53 technical control implementation and assessment. Attributes: Excellent communication skills, detail-oriented, self-starter with a focus on understanding STR CCS and CIT processes and procedures. A desire for continuous improvement while working in a team environment and the ability to handle multiple fast-changing priorities/projects effectively. Pay Information Full-Time Salary Range: $136,000 - $170,000 The salary range listed is based on external market data. Offers are based on factors, such as but not limited to, the candidate’s experience, education, training, key skills/critical skills, security clearances, and prevailing market and business conditions. STR is a growing technology company with locations near Boston, MA, Arlington, VA, near Dayton, OH, Melbourne, FL, and Carlsbad, CA. We specialize in advanced research and development for defense, intelligence, and national security in: cyber; next generation sensors, radar, sonar, communications, and electronic warfare; and artificial intelligence algorithms and analytics to make sense of the complexity that is exploding around us. STR is committed to creating a collaborative learning environment that supports deep technical understanding and recognizes the contributions and achievements of all team members. Our work is challenging, and we go home at night knowing that we pushed the envelope of technology and made the world safer. STR is not just any company. Our people, culture, and attitude along with their unique set of skills, experiences, and perspectives put us on a trajectory to change the world. We can't do it alone, though - we need fellow trailblazers. If you are one, join our team and help to keep our society safe! Visit us at www.str.us for more info. STR is an equal opportunity employer. We are fully dedicated to hiring the most qualified candidate regardless of race, color, religion, sex (including gender identity, sexual orientation and pregnancy), marital status, national origin, age, veteran status, disability, genetic information or any other characteristic protected by federal, state or local laws. If you need a reasonable accommodation for any portion of the employment process, email us at appassist@str.us and provide your contact info. Pursuant to applicable federal law and regulations, positions at STR require employees to obtain national security clearances and satisfy the requirements for compliance with export control and other applicable laws.

Posted 1 day ago

I logo

Senior Information System Security Officer (ISSO)

Innovative Management & Technology ServicesClarksburg, WV

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Company Overview:
Join a fast-growing company highly experienced in cyber security, cloud computing, virtualization, big data analytics, and project management!  IMTS offers competitive compensation, excellent benefits including tuition reimbursement and employer-contributed 401K, and referral bonuses.  We work with the best customers on-site at top government agencies.

Job Title: Senior Information System Security Officer (ISSO)
Primary Location: Clarksburg, WV - Hybrid
Clearance: Top-Secret (TS)

Position Summary:
We are seeking a highly skilled and mission-driven Senior Information Systems Security Officer (ISSO) to join our cybersecurity team supporting a critical government program. This position requires deep knowledge of federal cybersecurity standards, hands-on technical security expertise, and the ability to lead compliance efforts in a Scaled Agile Framework (SAFe) development environment. You will serve as a key security advisor across engineering, operations, and leadership teams to ensure enterprise systems remain secure, compliant, and resilient.

Responsibilities:

  • Lead the implementation and maintenance of system security controls in compliance with federal cybersecurity frameworks, including NIST SP 800-53, RMF, OWASP, DISA STIGs, and Common Criteria.
  • Oversee the full lifecycle of Authorization to Operate (ATO) processes, including preparation of System Security Plans (SSPs), Security Assessment Reports (SARs), POA&Ms, and risk assessments.
  • Serve as a senior security advisor and liaison to system owners, developers, DevOps engineers, and government stakeholders.
  • Participate in technical reviews of system architecture and ensure secure design of virtualized and software-defined infrastructures.
  • Support integration of security controls into CI/CD pipelines using DevSecOps principles and tools (e.g., Jenkins, GitLab CI, SonarQube, Snyk).
  • Provide security engineering support for modern cloud environments, including AWS, Azure, or Google Cloud Platform, and assess cloud-native security capabilities.
  • Conduct vulnerability assessments, interpret scan results from tools like Tenable, Nessus, Splunk, or Qualys, and lead remediation efforts.
  • Mentor junior ISSOs and analysts on security policies, best practices, and tool usage.
  • Ensure continuous monitoring activities are aligned with organizational risk tolerance and compliance goals.

Required Qualifications:
  • Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or a related field (or equivalent combination of education and experience).
  • 8+ years of progressive experience in information systems security, with at least 3 years in a senior-level or lead ISSO role supporting federal or state government agencies.
  • Strong working knowledge of:
    • NIST 800-53, RMF, FISMA, OWASP Top 10, and SANS Institute standards.
    • SAFe Agile environments and integrating security in Agile workflows.
    • Networking, Linux/Windows system administration, and secure software development practices.
    • Cloud platforms (AWS, Azure, GCP) and related security tools (e.g., AWS Security Hub, Azure Defender).
  • Experience in managing security documentation, participating in audits, and working with compliance frameworks.
  • Relevant certifications such as CISSP, CISM, Security+, CEH, or equivalent.
  • Active Top Secret clearance is required.
  • U.S. Citizenship is required.

Preferred Qualifications:
  • Experience with Infrastructure-as-Code (IaC) tools such as Terraform, Ansible, or CloudFormation.
  • Familiarity with container security (e.g., Kubernetes, Docker) and cloud-native application protection platforms (CNAPP).
  • Prior work in defense, intelligence, or law enforcement IT environments.

IMTS is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law. 

 

Powered by JazzHR

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall