landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

S logo
Saint Luke's Health System Kansas CityKansas City, MO
Job Description Saint Luke's Hospital in Kansas City is seeking an Information Associate to join our team. You will serve as an integral member of the primary patient care team by performing administrative tasks. This position is responsible for performing clerical and patient facing duties to maintain an organized healthcare office and allow medical staff to focus on patient care. Shift Details: 3 12 hour shifts- 8:00am-8:30pm, Saturday Shifts are required Responsibilities: Answers phone calls Greets patients and visitors Coordinates department communication within the unit between ancillary departments and with supervisory and management team Admits patients Administers and maintains patient records Breaks down medical charts for record keepings Coordinates billing Maintains unit inventory We are looking for someone that is excited about working with people and has a positive attitude. The ideal candidate has strong customer service skills, willingness to work, is adaptable and eager to learn. This position will require you to work autonomously as well as with a team. Job Requirements Applicable Experience: Less than 1 year Job Details Full Time Day (United States of America) The best place to get care. The best place to give care. Saint Luke's 12,000 employees strive toward that vision every day. Our employees are proud to work for the only faith-based, nonprofit, locally owned health system in Kansas City. Joining Saint Luke's means joining a team of exceptional professionals who strive for excellence in patient care. Do the best work of your career within a highly diverse and inclusive workspace where all voices matter. Join the Kansas City region's premiere provider of health services. Equal Opportunity Employer.

Posted 3 days ago

Nexxis Solutions logo
Nexxis SolutionsAnnapolis Junction, MD
Nexxis Solutions  is supporting current and near-term efforts to provide information and system security engineering, life cycle solutions, system security testing, risk assessment, and continuous monitoring. We are looking for candidates to provide Cybersecurity expertise to systems and projects to ensure that the appropriate security features and safeguards are designed, integrated, and implemented for all information systems. We are currently looking for cleared professionals in the following areas: Security Controls Assessor (SCA) ISSE/ISSM/ISSO DevSecOps Engineer IT Security IA System Administrator Security Engineer Cybersecurity Network Analyst (CSNA) Splunk Engineer/Administrator Penetration Tester Others… General Overview Be part of a team helping ensure proper level of security for customer software systems and network. Duties will include protecting system boundaries, keeping computer systems and network devices hardened against attacks and securing highly sensitive data. Possessing deep and wide expertise in the security space as well as having a background in security and/or systems engineering will be critical in these roles. Responsibilities vary by role but may include any of the following: Organize computer security architecture and develop detailed cyber security designs Review, develop and implement security measures for the protection of computer systems, networks and information Define system security requirements and prepare reports on your results Review and document standard operating procedures and protocols Configure and troubleshoot security infrastructure devices Create technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks Perform support and consulting of the company's personnel about security incidents and measures Prepare detailed reports including assessment-based findings, outcomes and propositions for further system security enhancement Degree Requirements: A B.S. in Cybersecurity, Information Technology, or a related field is required for most positions. A Master's or Ph.D. in Cybersecurity, IT, or a related field is a plus but not required for most positions.  (Some positions may consider additional years of experience in lieu of degree.) Certification Requirements: Most positions require DoD 8570.01-m (level 2 or above) compliance. A minimum of Security+ strongly preferred; CISSP or above required for some opportunities. Experience Requirements: Available positions range from entry level to 20+ years of experience. Clearance Requirements: A current TS/SCI clearance with appropriate level Polygraph is required. Nexxis Solutions offers competitive salary and comprehensive benefits package  (including paid time off, medical/dental/vision insurance, 401k and more).  Entry level: $90-120k;  Mid-level: $120-180k;  Senior level: $150-230k* Most positions offer minimal if any telework More benefit d etails can be found here:  Nexxis Solutions Benefits Overview * S alary ranges represent a general guideline.  Nexxis Solutions considers several factors when determining compensation including but not limited to: scope and responsibilities of the position; candidate's experience, education/certifications, skills; and current market conditions. Equal Employment Opportunity Policy Nexxis Solutions provides equal employment opportunities to all qualified individuals without regard to race, color, religion, age, sex, pregnancy, national origin, disability status, genetic information, military or veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Nexxis takes allegations of discrimination, harassment, and retaliation seriously, and will promptly investigate when such behavior is reported. If you have a disability and would like to request an accommodation in order to apply for a position with Nexxis Solutions, please contact us at 410-875-7980 or recruiting(at)nexxissolutions.com. Applicants have rights under Federal Employment Laws. You can find links to these notices here.

Posted 30+ days ago

T logo
Triaplex, Inc.Fort Meade, MD
Triaplex, Inc. is looking for an Information Systems Security Engineer  to join our team. This position will support and influence a number of software and system deployments. Familiarity or prior experience as a Systems Administrator or Systems Engineer is desired to enhance the engineer's perspective on customer needs and requirements. Key Responsibilities Utilize Risk Management Framework (RMF) process and procedures to assist system development and accreditation. Interpret Security Directives, Policies, Publications, and Regulations. Provide guidance on applying security directives and policies to Systems Engineers, System Administration, and System Owners.  Review and vailidate system Vulnerability Scans  Collaborate with System owners to flush out, implement, and verify security requirements to ensure compliance. Required Qualifications Bachelor's degree in a technical discipline from an accredited college or university At least 10 years' previous experience as an ISSO, ISSE/ISSM in the cybersecurity field Five years' additional relevant experience may be substituted for a Bachelor's degree. TS/SCI with polygraph Required Technical Certifications: DoD 8570.01 IASAE LvL 2 Compliant Certification CISSP Certification Desired Skillsets Experience with NIST 800-53 security control implementations, policies, and self testing Experience with RMF policies and procedures specific to mission customers.

Posted 30+ days ago

C logo
Concurrent Technologies CorporationColumbia, MD
Senior Principal Information Systems Security Engineer Concurrent Technologies Corporation Client Site – Columbia, MD area Minimum Clearance Required:   TS/SCI with Fullscope Poly Clearance Level Must Be Able to Obtain:  TS/SCI with Fullscope Poly CTC stays ahead of the latest technology advancements so we can help solve our clients' toughest challenges. As a part of the Information Technology (IT) Division, you will be strengthening our team of world-class experts aimed at providing our clients with the most effective solutions. Our expertise in achieving missions is unmatched, and we continue to have a major positive impact throughout the Department of Defense (DoD), Intelligence Community (IC), and beyond. Our IT solutions are at work in high-level, high-priority areas of the DoD and U.S. Government agencies. We are leaders in artificial intelligence and machine learning, cloud architecture and security, cross domain solutions, cybersecurity, edge node technology, synthetic environments, and more. We are honored to be a trusted provider of cutting-edge and customized solutions to our clients for decades. Our experts are leading the rapidly evolving IT industry with innovative work in a variety of disciplines, including DevSecOps, which underpins many of our efforts. With CTC's IT Division, you become part of a dedicated team committed to advancing the ever-growing possibilities in IT and meeting our clients' challenges with up-to-the-minute, customized, and powerful solutions. Key Responsibilities: To protect the interests of national security, cyber incidents must be coordinated among and across DoD organizations and sources outside the Department of Defense, and critical infrastructure and critical infra­structure sector Information Sharing and Analysis Centers (ISACs) via Tier I, Tier II, and Tier III support. CND response services include the actions taken to report, analyze, coordi­nate, and respond to any event or cyber incident for the purpose of mitigating any adverse operational or technical impact. Cyber incident reporting includes a well-defined framework for the timely reporting of any cyber event or incident. The report provides an accurate, meaningful, and complete understanding of the cyber incident from initial detection to analysis and remediation. This information feeds into the User-Defined Operational Picture, which provides local, intermediate, and DoD wide situational awareness of CND actions and their impact. Cyber incident analysis identifies several critical elements of an incident to determine and characterize its possible effects on DoD information networks, operational missions, and other defense programs. This activity relies on effective acquisition, preser­vation, and timely reporting of cyber incident data. Cyber incident response includes the coordinated development and imple­mentation of courses of action (CO As) that focus on containment, eradication, and recovery. At the same time, it ensures the acquisition and preservation of data required for tactical analysis, strategic analysis, and/or LE investigations. Basic Qualifications: Bachelor's Degree from an accredited college or university in Computer Science or related discipline and 12 years of directly related experience or a Master's degree and 10 years of directly related experience, or a PhD and 8 years of directly related experience. Fourteen (14) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government is required The Information Systems Security Engineer shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking  operations. Reviews certification and accreditation (C&A) documentation, pro viding feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain  solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control DoD 8570 compliance with IASAE Level 2 (i.e. CISSP) is required Preferred Qualifications: Cybersecurity degree AWS Experience Why CTC? Our teams at CTC are passionate and thrive on collaboration in a team environment When we encounter a difficult problem, we have a variety of talented and diverse employees that work together to solve the toughest challenges Competitive salary and benefits package Although our work at CTC is extremely important, we also recognize the need for our employees to maintain a proper mix of work and personal life Visit www.ctc.com to learn more Benefits: The starting salary range for this position has been established as $184,000 – $240,000 Medical Insurance and Prescription Dental Insurance Vision Insurance Life and AD&D Insurance Short-Term/Long-Term Disability Insurance Employee Assistance Program (EAP) Voluntary Critical Illness and Accident Insurance Tuition Reimbursement Assistance Paid Leave Paid Holidays Bereavement Leave Retirement Plan The Concurrent Technologies Corporation pay range for this job level is a general guideline and not a guarantee of compensation or salary. Join us! CTC offers exceptional career growth, cutting edge technology, educational opportunities, and recognition for quality work. https://concurrent-technologies-corporation.breezy.hr/ Staffing Requisition: SR# 2025-0047 “We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, protected veteran status, or any other characteristic protected by law.”

Posted 30+ days ago

Zero Hash logo
Zero HashChicago, IL
About the Job As the Director of Corporate Tax and Information Reporting, you will be responsible for leading our tax compliance, strategy, and user tax reporting functions. This includes overseeing all federal, state, and local tax filing requirements, and serving as the subject matter expert (SME) for the Company's global client tax reporting and withholding solution. This pivotal role ensures global tax compliance, manages corporate tax obligations, and oversees end-to-end tax reporting processes for our platform users. You will support all tax-related activities, including compliance, reporting, audits, and planning. Reporting to the Global Corporate Controller, the ideal candidate will be able to operate independently in a fast-paced environment and work closely and proactively with other teams. #LI-Remote This fully remote role is open to candidates in any AMER timezone. Key Responsibilities Corporate Tax Coordinate all aspects of U.S. federal, state, and local corporate income tax compliance, including return preparation, filing, and estimated payments. Manage global tax compliance and support international expansion efforts (e.g., VAT, local corporate tax filings). Manage tax provisions (ASC 740) and reporting for financial statement audits. Oversee state franchise tax filings and payments, ensuring timely and accurate compliance across all relevant jurisdictions. Ensure compliance with federal, state, and local tax laws by staying informed about filing requirements and communicating any tax issues to management. Maintain the Company's tax workpapers and tax returns to support tax provisioning and compliance. Partner with Finance and Legal on tax planning, M&A due diligence, entity structuring, and transfer pricing initiatives. Collaborate with Payroll to ensure compliance with ACA reporting requirements and proper tax treatment and reporting of equity compensation. Tax Information Reporting Own the end-to-end user tax information reporting process (e.g., W-8/W-9, 1099, tax lot reconciliation, etc.) for our digital assets platform. Partner with Product, Engineering, and Compliance teams to ensure accurate data collection and timely filing of tax forms. Monitor and implement changes in tax information reporting regulations (IRS, DAC8, CARF, etc.) relevant to digital assets. Serve as the SME for platform tax reporting questions and work cross-functionally with Client Relations to improve tax documentation and user communications. Support system and process development and remediation initiatives to ensure regulatory compliance, mitigate risk, and improve processes. Manage relationships with third-party vendors (e.g., tax engines, reporting providers). Requirements 10+ years of experience working at a public accounting firm or equivalent experience at a financial services or fintech company. Direct experience with crypto / stablecoins at a crypto-native company or fintech, a plus. Experience with end-to-end tax reporting for digital assets and extensive knowledge of tax information reporting regulations in multiple jurisdictions, including the U.S. and Europe. Experience preparing and reviewing accurate federal, state and local tax returns, and technical knowledge of income tax accounting (ASC 740). Able to communicate effectively with colleagues and management about tax related matters and lead meetings with potential customers and third-party vendors. Experience in implementing policies and procedures to comply with new tax requirements. Demonstrated track record of delivering results in a rapidly changing business environment. Bachelor's or master's degree in accounting or related field.  Preferred  CPA, JD or Master's in Taxation or equivalent. Benefits Offered We believe that the best way to succeed is by having a happy, motivated and healthy team. We offer the following benefits: Healthcare Insurance customary for region Vision & Dental Insurance customary for region Mental Health and Wellness Program Equity Ownership and Early Exercise Maternity & Paternity Leave  Educational budget of $1000  WFH stipend of $500 WeWork All Access Membership  Visa Sponsorship About Zero Hash Zero Hash is a B2B embedded infrastructure platform that allows any platform to integrate digital assets natively into their own customer experience quickly and easily (a matter of API endpoints). We power neo-banks, broker-dealers, and payment groups to offer digital asset trading and custody, crypto-backed rewards and round-ups programs as well as yield through staking and DeFi and NFTs.   Our thesis is very simple: every financial services firm will offer digital assets within the next 2 years and will do so through platforms such as Zero Hash. Zero Hash is defining the new FinTech vertical of digital-assets-as-a-service.  Clients include MoneyLion, Wirex, Deserve, MoonPay, tastytrade, Drivewealth. Backed by Point72 Ventures, NYCA, Bain Capital, tastytrade.  The Zero Hash Culture All Zero Hash employees are guided by the following characteristics and core principles: Independence/Ownership - An ability to work autonomously. Join Zero Hash, pitch ideas, and shape the work you do. Passion - We are innovating quickly and challenging the status quo. We want you to think big, be creative and ​make a difference every day.  Collaborative - A good attitude and respect for others. We're teammates, not co-workers. Everything we do is a shared success and equally a shared failure - we talk in terms of “we” not “me”. Initiative - An ability and passion for learning and asking questions. We will champion you, challenge you and push you to achieve your best - and we expect you to do the same.  Empathy - An ability to listen, respect and understand your co-workers, customers and everyone you interact with no matter how different they are to you. We are proud of our diversity. Adaptability - An ability to respond quickly. We are in a fast-paced industry and so we expect you to be creative when solving a new problem and comfortable under pressure.  Transparency - We believe that transparency is critical to empowering everyone to make the best decisions, both the company and its people and vice versa. Both as an organization and as individuals, we need to admit mistakes and learn from them. Integrity - Integrity creates trust. As both an organization collectively and as individuals, it is our most valuable asset. Follow us Twitter LinkedIn Youtube For candidates based in Colorado, please contact colorado-wages @zerohash.com to request compensation and benefits information regarding a particular role(s). Please include with your email the city you reside (or intend to reside in Colorado) and the title/link to the roles you're interested in.

Posted 30+ days ago

N logo
NJ Department of Environmental ProtectionTrenton, NJ
Title: Geographic Information Systems Intern Posting Number: DOIT-2025-4i Closing Date: November 3, 2025 Start Date: February 9, 2026 End Date: May 1, 2026 Existing Vacancies: 1 Location: 401 East State Street, Trenton NJ 08625 Internship Hours Per Week: up to 35 hours per week (5 days per week) Hourly Rate: Sliding Scale based on Education Level ($18-$23 Per Hour) Program: Management & Budget Program – Division of Information Technology - Bureau of Geographic Information Systems Program Description: The Bureau of GIS (BGIS) manages a vast library of aerial photographs and digital imagery. BGIS needs an intern to scan historical images, develop GIS digital image layers from this historical imagery, review newly collected images, develop and check vector data created from images. The Bureau also maintains a GIS Help Desk to support DEP staff, and we need another person to help support the GIS Help Desk. Project Description: Tasks include digitizing new data layers, editing and correcting spatial data, researching new technology, field checking data, creating maps, and/or answering questions from staff. Specific to the Position: Entry level GIS. Ability/desire to learn new systems and processes. Preferred Area of Study: Seeking individuals enrolled at an accredited university/college studying GIS or a general science background. License: Appointee will be required to possess a driver's license valid in New Jersey only if the operation of a vehicle, rather than employee mobility, is necessary to perform the essential duties of the position. Employee Benefits TES / Hourly employee benefits include: Earned Sick Time* *Pursuant to the State/Department's policy, procedures, and/or guidelines. Residency: All persons newly hired on or after September 1, 2011 have one year from the date of employment to establish, and then maintain principal residence in the State of New Jersey subject to the provisions of N.J.S.A. 52:14-7 (L.2011, Chapter 70), also known as the "New Jersey First Act". Authorization to Work: Selected candidates must be authorized to work in the United States per the Department of Homeland Security, United States Citizenship and Immigration Services regulations. Note: The State of New Jersey does not provide sponsorship for citizenship to the United States. Veteran's Preference: To qualify for New Jersey Veteran's Preference/status, you must establish Veteran's Preference through the Department of Military and Veterans' Affairs. Please submit proof of your Veteran's Preference along with your resume as indicated below. For more information, please visit https://nj.gov/military/veterans/services/civil-service/preference/ SAME applicants: If you are applying under the NJ SAME program, your supporting documents (Schedule A or B letter) must be submitted along with your resume by the closing date indicated above. For more information on the SAME program, please visit https://nj.gov/csc/same/overview/index.shtml , email SAME@csc.nj.gov , or call CSC at (609) 292- 4144 and select Option #3. Equal Opportunity Employment : The State of New Jersey seeks to increase the richness and diversity of its workforce, and in doing so, become the employer of choice for all people seeking to work in State Government. To evaluate the effectiveness of our efforts to attract and employ a diverse workforce, applicants are asked to voluntarily answer a few brief questions on the NJ Affirmative Action Information Form . All information is considered confidential and will be filed separately with the agency's affirmative action officer. This information will not be part of your application for employment and will not be considered in any hiring decision. DEP Notices of Vacancy have a 4:00 p.m. deadline on the closing date. When filing for these opportunities, please be sure to have your letter of interest and credentials sent electronically before 4 p.m. on the closing date. The New Jersey Department of Environmental Protection is an Equal Opportunity Employer and is committed to inclusive hiring and a diverse workforce. We strongly encourage people from all backgrounds to apply. Accommodations under ADA will be provided upon request. Powered by JazzHR

Posted 3 days ago

Rackner logo
RacknerDayton, OH
Title:  Information Systems Security Manager (ISSM) Location: Dayton, OH Clearance: Active Secret Clearance About this role: Rackner is seeking a Information Systems Security Manager (ISSM)  to support the AFRL/RG (AFWERX) Technical Operations Branch. AFWERX is the innovation arm of the Department of the Air Force (DAF) and accelerates agile and affordable capability transitions by teaming innovative technology developers with Airman and Guardian talent. The innovation arm of the Department of the Air Force and powered by the Air Force Research Laboratory (AFRL) supports both internal and external (federal and industry partners) users across multiple CONUS locations through client hardware support (NIPR, DREN) and cloud-based (e.g. IaaS, PaaS, SaaS) applications. Additionally, the program's Technical Operations Branch provides Risk Management Framework (RMF) and cybersecurity support to the different AFWERX divisions (i.e. AFVentures, Spark, Prime), including Flight Test Program Management (FTPM) support to both manned and unmanned flight tests. We are looking for experience with: Bachelor of Arts (BA)/Bachelor of Science (BS) and 10 years of experience, three (3) of which must be in the DoD OR 15 years of directly related experience with proper certifications as described below., five (5) of which must be in the DoD Must have at least one of the following certifications (DoD 8570 IAM II or IAM III certified): CAP CASP+ CE CISM CISSP (or Associate) GSLC CCISO HCISPP Highly preferred to be Google Cloud Security Engineer, Google Workspace Engineer, and/or Google Cloud Architect certified What will make you successful: Knowledge of Information Systems Security and risk management processes and requirements per the Risk Management Framework (RMF), to include building, managing, and submitting RMF packages in support of IT platforms, cloud/web-based applications, traditional applications, or embedded IT systems Assist with S&T Protection Plan efforts to include: Identifying and validating security requirements Providing guidance to ensure the protection of technologies and information of various classification levels. Develop or evaluate program, project, or technology area security risk assessments and analyses, and provide mitigation plans. Provide security oversight for all aspects of technology control and S&T protection planning Development of certification and accreditation documents Provide support as a technical security advisor to internal and external entities on matters affecting overall protection architecture Who We Are: Rackner is a software consultancy that builds cloud-native solutions for startups, enterprises, and the public sector. We are an energetic, growing consultancy with a passion for solving big problems for both startups and enterprises. We enable digital transformation for large organizations through the newest in distributed technologies as we are laser focused on end-to-end application development, DevSecOps, AI/ML and systems architecture and our methodology focuses on cloud-first and cost-effective innovation. Our customers hail from a diverse, ever growing list of industries. Additional Info/Benefits Rackner embraces  and promotes employee development and training and covers the cost of certifications relevant to a position and the technologies/services provided .  Fitness/Gym membership eligibility, weekly pay schedule and employee swag, snacks & events are offered as well! 401K with 100% matching up to 6% Highly competitive PTO Great health insurance with large network of providers Medical/Dental/Vision Life Insurance, and short & long term disability Industry-Leading Weekly Pay Schedule Home office & equipment plan     #ISSM #InformationSystemsSecurityManager #DoD #secret #AFWERX #DAF #agile #AFRL #NIPR #DREN #IaaS #PaaS #SaaS #IoC #TechnicalOperationsBranch #RiskManagementFramework #RMF #cybersecurity #FlightTestProgramManagement #FTPM #AFVentures #Spark #Prime #DoDIATIII #googlecloud #gcp

Posted 30+ days ago

Zoox logo
ZooxFoster City, CA
In this pivotal position, you will lead the definition and execution of Zoox's Information security strategy, ensuring alignment with risk prioritization and a return on investment methodology. As a key collaborator with the Zoox executive team and senior leadership, you will adeptly navigate resource dependencies, constraints, and risks while using established security frameworks like NIST 800-53 and ISO 27001 to drive the maturation of our information security program. As Zoox gears up for a significant service launch, your role will also be pivotal in ensuring the company's readiness to meet data privacy requirements, including GDPR, CCPA, and other relevant regulations. In this role, you will: Develop and define the vision, strategy, framework, and roadmaps for the IT Information Security team. Drive conversations with executives and business stakeholders to execute the overall enterprise IT security strategy, including risk conveyance, program updates, resource requirements, priorities, and escalations. Oversee Information Security Governance across the entire organization, inclusive of enterprise and product domains. Drive the creation and adoption of up-to-date security policies, standards, and guidelines. Base Salary Range There are three major components to compensation for this position: salary, Amazon Restricted Stock Units (RSUs), and Zoox Stock Appreciation Rights. A sign-on bonus may be offered as part of the compensation package. The listed range applies only to the base salary. Compensation will vary based on geographic location and level. Leveling, as well as positioning within a level, is determined by a range of factors, including, but not limited to, a candidate's relevant years of experience, domain knowledge, and interview performance. The salary range listed in this posting is representative of the range of levels Zoox is considering for this position. Zoox also offers a comprehensive package of benefits, including paid time off (e.g. sick leave, vacation, bereavement), unpaid time off, Zoox Stock Appreciation Rights, Amazon RSUs, health insurance, long-term care insurance, long-term and short-term disability insurance, and life insurance. About Zoox Zoox is developing the first ground-up, fully autonomous vehicle fleet and the supporting ecosystem required to bring this technology to market. Sitting at the intersection of robotics, machine learning, and design, Zoox aims to provide the next generation of mobility-as-a-service in urban environments. We’re looking for top talent that shares our passion and wants to be part of a fast-moving and highly execution-oriented team. Follow us on LinkedIn Accommodations If you need an accommodation to participate in the application or interview process please reach out to accommodations@zoox.com or your assigned recruiter. A Final Note: You do not need to match every listed expectation to apply for this position. Here at Zoox, we know that diverse perspectives foster the innovation we need to be successful, and we are committed to building a team that encompasses a variety of backgrounds, experiences, and skills.

Posted 2 weeks ago

R logo
ReBuild ManufacturingLos Angeles, CA
About Re:Build Manufacturing Re:Build Manufacturing is a rapidly growing family of industrial businesses combining enabling technologies, operational superiority, and strategic M&A to build America’s next generation industrial company. At Re:Build we deploy deep expertise in operations management and technology to supercharge performance of our subsidiaries by implementing core technologies across industrial platforms in diverse growth markets. Our goal is to help revitalize the U.S. manufacturing base over the coming decades, creating substantial opportunities for our employees and the communities where we operate. We leverage deep professional expertise and a candid, principled operating culture to drive differentiated outcomes for our customers, our employees, our communities and our investors. Ours is a fast-paced environment where individuals can stretch and be challenged with a wide variety of opportunities and projects. We empower and support our employees to pursue their fullest potential and provide meaningful avenues for personal and professional growth.   Who we are looking for You will be responsible for implementing and monitoring technical security controls to ensure compliance with Re:Build's requirements and enhance the overall security posture of the organization. You will be a direct report to the VP, Security, working closely with security, IT personnel, software engineers, and partners across our businesses to identify and remediate vulnerabilities and deficient controls, investigate anomalies, and implement processes and technology that systematically reduce risk to the organization. What you get to do! Design, implement, and manage security controls, leveraging Microsoft 365 E5 Security and Compliance and Azure. Analyze systems and networks for compliance with Re:Build policy, industry standard methodologies and regulations. Conduct regular security assessments, vulnerability scans, and penetration tests to identify and address potential security risks. Fully leverage Microsoft Sentinel, increasing observability and monitoring, promptly responding to, and tuning alerts to mitigate threats, minimize impact, and reduce noise. Collaborate with IT and other departments to ensure security is integrated into all aspects of the organization's infrastructure and processes. Stay up-to-date with the latest security trends, threats, and technologies to continually improve the organization's security posture. Assist in the development and execution of business impact assessments, incident response plans and disaster recovery procedures with collaborators across Re:Build. Work with Security and IT personnel to prepare and manage Information Assurance documentation including System Security Plans (SSPs) and Plans of Action & Milestones (POA&M). Lead root cause analysis on security incidents and provide recommendations for containment and remediation. Prepare and present regular reports on key performance indicators, security metrics, and incidents to senior management. Evangelize information security and foster a security culture. What you bring to the Team Minimum of 5 years’ security experience, including implementation and management of security controls, vulnerability management, and investigations. Significant experience with Microsoft 365 Security and Compliance tools and Azure Sentinel. Demonstrated ability to prioritize and manage multiple workloads efficiently, and communicate effectively with diverse teams and stakeholders to ensure timely and successful completion of security initiatives. Bachelor's degree in Information Security (or related field) and/or relevant certifications (e.g., Security+, Microsoft Cybersecurity Architect Expert, CMMC Certified Professional, CISSP) preferred. Background administering and/or securing Windows, Linux, and cloud providers (e.g., AWS, Azure) preferred. Background supporting security and compliance initiatives in the manufacturing and/or defense industries preferred. Strong understanding of security frameworks and standards, specific experience with NIST SP 800-171 and other 800-series publications preferred. To conform to U.S. Government technology export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8 U.S.C 1324b(a)(3), or eligible to obtain the required authorizations from the U.S.   Location Requirements This position is remote eligible, but preference will be given to candidates within commuting distance to one of our locations and willingness to work in office at least once/week: Los Angeles, CA (preferred) Denver, CO Framingham, MA Merrimack, NH Kalamazoo, MI New Kensington, PA Cleveland, OH Rock Hill, SC Rochester, NY Compensation includes base salary range $110K to $150K, depending on location and work experience. Additionally you will be eligible for annual cash bonus and equity.  The BIG payoff We are a company who is going to make a difference in the industries and the communities in which we choose to operate. Every employee of Re:Build will share ownership in the company and will share in the financial rewards of the success we achieve together, at all levels of the company! We want to work with people that reflect the communities in which we operate Re:Build Manufacturing is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, veteran status, marital status, parental status, cultural background, organizational level, work styles, tenure and life experiences. Or for any other reason. Re:Build is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need assistance or an accommodation due to a disability, you may contact us at accommodations.ta@ReBuildmanufacturing.com or you may call us at 617.909.6275.  

Posted 30+ days ago

ARSIEM logo
ARSIEMAnnapolis Junction, MD
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support. As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. ARSIEM seeks an Information Systems Security Officer 3 . This position will support one of our government clients in Annapolis Junction, MD. Responsibilities Support a program, organization, system, or enclave's information assurance program. Support proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with managing security aspects of the information system and performing day-to-day security operations. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems security software, hardware, and firmware. Manage changes to the system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF). Minimum Qualifications Ten (10) years of combined work-related experience in IT, cybersecurity or security authorization is required. Experience in several areas is required: knowledge of current security tools, hardware/software security implementation, communication protocols, or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. A bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. Four (4) additional years of work-related experience may be substituted for a bachelor's degree. Required Certifications (one or more): CAP, CND, Cloud+, GSLC, Security+ CE, HCISPP Required Capabilities Provide support to senior ISSOs for implementing and enforcing information systems security policies, standards, and methodologies Assist with the preparation and maintenance of documentation Assist in evaluating security solutions to ensure they meet security requirements for processing classified information. Assist with Configuration Management (CM) for information system security software, hardware, and firmware. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc., including system upgrades. Propose, coordinate, and implement information systems security policies, standards, and methodologies. Develop and maintain documentation for Security Authorization by ODNI and DoD policies. Provide CM for security-relevant information system software, hardware, and firmware. Ensure compliance with the system security policy. Evaluate security solutions to ensure they meet security requirements for processing classified information. Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave Develop and update the system security plan and other Cybersecurity documentation Clearance Requirement: This position requires an active TS/SCI with a polygraph. You must be a US Citizen for consideration. Candidate Referral: Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is $5,000, and the referrer is eligible to receive the sum for any applicant we can place within 12 months of referral. The bonus is paid after the referred employee reaches six months of employment. ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

Posted 30+ days ago

ARSIEM logo
ARSIEMColumbia, MD
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support. As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. ARSIEM is currently looking for an Information Systems Security Engineer 2 to participate as a security engineering representative on engineering teams for the design, development, implementation, and/or integration of secure networking, computing, and enclave environments. This position will support one of our Government clients in Columbia, MD. Responsibilities Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validate and verify system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Build IA into systems deployed to operational environments. Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and networking operations. Review certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering designs. Apply system security engineering expertise in one or more of the following to: System security design process Engineering life cycle Information domain Cross-domain solutions Commercial off-the-shelf and government off-the-shelf cryptography Identification, authentication, and authorization System integration Risk management Intrusion detection Contingency planning Incident handling Configuration control Change management, auditing, certification, and accreditation process Principles of IA (confidentiality, integrity, non¬ repudiation, availability, and access control) Security testing Minimum Qualifications A minimum of 14 years of experience as an Information System Security Engineer (ISSE) on programs and contracts of similar scope, type, and complexity is required. A Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. Note: Four (4) years of lSSE experience may be substituted for a Bachelor's degree. DoD 8570.01-M compliance with IASAE Level2 is required. A CISSP or CASP+ is required for this position. Ability to perform the following job tasks: Participate as a security engineering representative on engineering teams for the design, development, implementation, and/or integration of secure networking, computing, and enclave environments. Participate as a security engineering representative on engineering teams for the design, development, implementation, and/or integration of IA architectures, systems, or system components. Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments. Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components. Support the Government in enforcing the design and implementation of trusted relationships among external systems and architectures. Apply knowledge of lA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments. Support security planning, assessment, risk analysis, and risk management. Identify overall security requirements for the proper handling of Government data. Interact with the customer and other project team members. Perform system or network designs that encompass multiple enclaves, including those with differing data protection/classification requirements. Provide security planning, assessment, risk analysis, and risk management. Recommend system-level solutions to resolve security requirements. Support the Government in enforcing the design and implementation of trusted relationships among external systems and architectures. Preferred Qualifications RMF/Risk Assessments, Network Architecture, Zero Trust The ARSIEM pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) job responsibilities, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other laws. Benefits: For an overview of our benefits, please visit our benefits tab. https://www.arsiem.com/careers/ Original Posting Date: 2025-07-08 Clearance Requirement : This position requires an active TS/SCI with a polygraph. You must be a U.S. Citizen for consideration. Candidate Referral : Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is $10,000, and the referrer is eligible to receive the sum for any applicant we are able to place within 12 months of referral. The bonus is paid after the referred employee reaches 6 months of employment. ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

Posted 30+ days ago

ARSIEM logo
ARSIEMAnnapolis Junction, MD
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support. As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. ARSIEM seeks an Information System Security Manager 2 . This position will support one of our government clients in Annapolis Junction, MD. Responsibilities Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with the NSA/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP). Minimum Qualifications Ten (10) years of work-related experience in security authorization is required. Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation, communication protocols, or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. An additional four (4) years of work-related experience may be substituted for a bachelor’s degree. Required Certifications (one or more): CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, HCISPP Required Capabilities Perform requirements gathering and analysis of said requirements Perform functional analysis to identify required tasks and their interrelationships Identify and map current security infrastructure as a foundation to define future programs Collaborate with engineers on systems integration efforts Plan and coordinate the implementation of IT security programs and policies Analyze user needs to determine functional and cross-functional requirements Gather and organize technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the multi-level security arena. Perform functional allocation and identify resources required for each task. Perform risk analysis that also includes risk assessment Enable Government planning, coordination, and oversight of organizational implementation of information security services Enable design and implementation of future IT systems and related security Assist Program Managers with administrative and technical oversight of specific programs within the portfolio Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM) Provide support for a program, organization, system, or enclave's information assurance program Provide daily oversight and direction to contractor ISSOs Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives Serve as the Program's ISSM Enable the Government with the development and implementation of NSA IT security services. Collaborate with engineers on systems integration and life cycle requirements. Advise Program Managers on administrative and technical oversight matters regarding portfolio programs. Clearance Requirement: This position requires an active TS/SCI with a polygraph. You must be a US Citizen for consideration. Candidate Referral: Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is $5,000, and the referrer is eligible to receive the sum for any applicant we can place within 12 months of referral. The bonus is paid after the referred employee reaches six months of employment. ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

Posted 30+ days ago

XDIN logo
XDINGreensboro, North Carolina
Description XDIN subsidiary of ALTEN Group, includes 500 employees dedicated to the automotive engineering development. ALTEN is a Leader in Engineering & Information Technology system, and operates in over 21 countries (Europe, North America, Asia, Africa and Middle East) with more than 28,000 employees of which 88% are engineers. At XDIN, we are always looking for world-class talent to lead our global teams through commitment and dedication to our OEM and Tier I clients. We believe in quality support from concept through production, and delivering the best customer experience while at the same time attaining a great place to work! XDIN Offers Competitive wages, BOE. Major health, dental insurance benefits and vision savings plan. 401k, and basic life. Supplemental benefits such as short-term disability, accident, cancer and life insurance. Paid company holidays and earned time off. We place a high value on thought leadership. We want every employee to develop all the skills required to become an engineering and technology thought leader; contributing to the knowledge assets of our team and our clients. From day one, every consultant is trained and mentored to elevate their careers. Responsibilities: Performs network and application technical vulnerability assessments using vulnerability assessment tools. Performs penetration testing activities to detect vulnerabilities and attack chains. Utilizes penetration testing skills to conduct analyses to gather deeper situational awareness and provide greater security insight of the environment. Lead the Security Awareness efforts, including facilitating presentations on topics of relevance, evaluating and implementing awareness training Assist in network security efforts including Data Loss Prevention, Intrusion Prevention and SIEM analysis Test security measures including OS patches, system hardening, and application configuration Monitor, review and troubleshoot alerts Review, interpret and adapt customer, regulatory and corporate security and compliance requirements into technical design options Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements. Produce security policies, standards, and guidelines Perform security research Produce security risk advisories based on newly identified threats and risk assessment Assist in performing IT audit, third party evaluations, and risk assessment activities Requirements: Bachelor’s degree in Information Technology, Computer Science or a related discipline Approximately 3 years’ work experience in Information Security in an enterprise network (Internships and Co-Ops can be included) A recognized information security certification or accreditation such as Security+, CISSP, or CEH is a plus. Fundamental understanding of penetration testing techniques and technologies Fundamental understanding of application development security concepts such as OWASP Top 10 Vulnerabilities Fundamental understanding of Active Directory administration and Windows authentication Fundamental understanding of security technologies such as SIEM, IDS/IPS, Web filters, two-factor authentication, web application firewalls Fundamental understanding of Malware detection, analysis, exploitation, containment, and eradication techniques experience Experience with systems analysis including, but not limited to: Gathering requirements from stakeholders, Constructing RFP/RFQs, devising and planning proof-of-concepts, defining use and test cases, driving critical security infrastructure projects, creating cogent status reports for senior management, strong technical understanding of vulnerabilities, and how attackers can exploit vulnerabilities to compromise systems. Excellent verbal, written, and presentation skills; in particular, demonstrated ability to effectively communicate technical and business issues and solutions to multiple organizational levels internally and externally as needed Knowledge of security frameworks and governance such as NIST, ISO27000 series, HIPAA, GDPR, PCIDSS Solid analytical and problem solving skills; ability to think strategically and turn ideas into actions Familiarity with Project Management concepts. Familiarity with scripting languages such as Python Ability to work with little supervision and consistently deliver results The Location: This opportunity is based in Greensboro, NC.

Posted 30+ days ago

Wells Fargo Bank logo
Wells Fargo BankCharlotte, North Carolina
About this role: Wells Fargo is seeking an Information Security Engineering Senior Manager in Technology as part of Cybersecurity. Learn more about the career areas and lines of business at wellsfargojobs.com. Wells Fargo is seeking a Information Security Senior Manager. This role will be responsible for setting the strategy and direction for advanced cyber security threat detection, monitoring and alerting, while supporting cyber security incident response orchestration for the company. This position will interact directly with the Cyber Threat Fusion Center and SIEM stakeholders. The ideal candidate will have extensive experience in leading engineering design and development to create innovative technical capabilities. This role will develop and refine cyber security detections and content in various cybersecurity applications and platforms as well as strategic plans and technology roadmaps. The candidate should have experience in building prototypes and proof of concepts, pilot systems, and optimize databases in support of operational, business, and strategic requirements. The candidate will have experience in consulting senior leadership with decisions related to business process, security controls, policies and standards, regulations and investment prioritization with a focus on threat monitoring and alerting tools and applications. The ideal candidate will have extensive experience in conducting research and identifying technologies to address capability gaps for emerging cyber threats, attack methods, and evolving Tactics, Techniques, and Procedures (TTPs). The candidate should have experience with data analytic techniques, including artificial intelligence, machine learning, statistics, and data mining to solve core business challenges. The position will require regular interface with external entities including threat monitoring and alerting product vendors, financial industry contacts, and government agencies. Interaction with internal partners including legal, fraud, financial crimes, technology and line of business leaders and executives will be required. This position will be responsible for: Daily operational management of the Security Content Development team and the Cyber Security Operations program Establishing baselines for specific threat types that qualify as candidates for security orchestration Interfacing with technology stakeholders, conduct requirements gathering and build out proof of concept capability Oversee the continuous monitoring across multiple technology platforms, including but not limited to servers, workstations, network, storage, legacy systems, and other IP-enabled systems across multiple networks Manage and partner with security service providers for security tool and process enhancements to improve the security posture In this role, you will: Manage and develop a team of individual contributors and managers in roles with moderate complexity and risk Maintain a broad awareness of the state of information security companywide Identify and recommend complex and innovative solutions addressing functions including vulnerability detection, threat data, network intrusion and development, and implementation of vulnerability mitigation strategies Identify security risks and solutions for networks and virtual private network applications, security tools, public key infrastructures, authentication and directory services, and access management services Identify, formulate, implement information security and Line of Business management Determine appropriate strategy for information security policy, standards and procedures for systems, applications and tools Set guidelines for compliance and risk management requirements for supported area and work with other stakeholders to implement key risk initiatives Advise more experienced management on issues with high, critical impact Collaborate and influence all levels of professionals including more experienced managers Lead team to achieve objectives Interface with Information Security Industry Leaders, Financial industry Leaders, Analysts and Regulators Manage allocation of people and financial resources for Information Security Analysis Develop and guide a culture of talent development to meet business objectives and strategy Required Qualifications: 6+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education 3+ years of Management or Leadership experience. 5+ years of information security experience 5 + years of experience creating and implementing strategic plans and roadmaps at the executive level for enterprise-wide business initiative Desired Qualifications: Experience managing large or multiple technology development efforts within a major line of business. Ability to influence across all organizational levels, particularly senior management. Ability to communicate effectively, in both written and verbal formats, with senior executive-level leaders. Proficiency in Excel and other Microsoft Office products (Power Point, Word, Access) Pay Range Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates. $159,000.00 - $305,000.00 Benefits Wells Fargo provides eligible employees with a comprehensive set of benefits, many of which are listed below. Visit Benefits - Wells Fargo Jobs for an overview of the following benefit plans and programs offered to employees. Health benefits 401(k) Plan Paid time off Disability benefits Life insurance, critical illness insurance, and accident insurance Parental leave Critical caregiving leave Discounts and savings Commuter benefits Tuition reimbursement Scholarships for dependent children Adoption reimbursement Posting End Date: 5 Oct 2025 Job posting may come down early due to volume of applicants. We Value Equal Opportunity Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic. Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit’s risk appetite and all risk and compliance program requirements. Applicants with Disabilities To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo . Drug and Alcohol Policy Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy to learn more. Wells Fargo Recruitment and Hiring Requirements: a. Third-Party recordings are prohibited unless authorized by Wells Fargo. b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.

Posted 2 days ago

AHU Technologies logo
AHU TechnologiesWashington, District of Columbia
Qualifications 5-7years of experience developing, maintaining, and recommending enhancements to IS policies/requirements (Required) 5-7years of experience performing vulnerability/risk analyses of computer systems/apps (Required) 5-7years of experience identifying, reporting, and resolving security violations(Required) Patching Servers both Windows and Linux (Required) Patching Desktop Windows 10/11 (Required) Understanding of VMware environment (Desired) Production support (Required) Server and Desktop troubleshooting (Required) Basic understanding of industry standards like NIST, CIS, COBIT, ISO 27001 (Desired) SIEM Logging, Monitoring and Configuration (Desired) Cloud experience (MS Azure) (Desired) Flexible work from home options available. Compensation: $60.00 - $70.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 1 week ago

L logo
Lomas OfficeAlbuquerque, New Mexico
Make a difference in someone's life! If you would like more information about job opportunities and would like a call, please fill out this inquiry form! We are happy to connect with you and help you decide if you would like to pursue a job with ARCA! We have all shifts (full-time and part-time) available throughout the Albuquerque and Corrales area. No experience is required and we provide paid training! You bring the heart and we will teach you the rest! If you would like to contact us directly, please call Natalie Kelley @ 505.332.6851!

Posted 4 weeks ago

B logo
Buena Vista Regional Medical CtrStorm Lake, Iowa
Responsible for directing and coordinating of plans and production activities of the information Systems/Information Security and Communication Departments of the Hospital. Provides authority and accountability for the coordination of department functions. Must have excellent communication and customer service skills. Must demonstrate ability to analyze situations and problems and to prioritize and delegate task to be accomplished.

Posted 1 day ago

Barbaricum logo
BarbaricumTampa, Florida
Barbaricum is a rapidly growing government contractor providing leading-edge support to federal customers, with a particular focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the latest in technology and the highest caliber of talent. Headquartered in Washington, DC's historic Dupont Circle neighborhood, Barbaricum also has a corporate presence in Tampa, FL, Bedford, IN, and Dayton, OH, with team members across the United States and around the world. As a leader in our space, we partner with firms in the private sector, academic institutions, and industry associations with a goal of continually building our expertise and capabilities for the benefit of our employees and the customers we support. Through all of this, we have built a vibrant corporate culture diverse in expertise and perspectives with a focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is seeking a highly skilled System Information Assurance and Security Engineer to support USSOCOM implementation and migration for next generation Identity, Credential, and Access Management (ICAM). This position supports engineering efforts to install, test, and implement this new framework as part of the broader Zero Trust (ZT) implementation efforts. The ICAM Engineers implement the design, integration, and governance of enterprise identity solutions that form the foundation of a Zero Trust security model. This role requires a proven track record in identity architecture, access governance, authentication technologies, and compliance with Department of Defense (DoD) cybersecurity standards. Responsibilities: Execute engineering solutions for identity credential and access management for Zero Trust implementation across enterprise systems. Design and maintain an enterprise-wide identity and access management strategy aligned with DoD Zero Trust principles, NIST 800-207, and DoD ICAM Reference Design. Lead integration of federated identity, single sign-on (SSO), and multi-factor authentication (MFA) across cloud and on-prem environments. Develop and maintain policies, standards, and reference architectures to enforce least-privilege and attribute-based access control (ABAC). Conduct the implementation of Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. Collaborate with cybersecurity, network, and cloud teams to align ICAM solutions with Zero Trust pillars (identity, device, network, application, and data). Ensure compliance with DoD 8140/8570, RMF, FedRAMP, and other applicable frameworks. Lead proof-of-concepts (POCs) and technology evaluations for emerging identity Requirements: Active DoD TS/SCI Clearance Bachelor’s degree in Computer Science, Information Systems, Cybersecurity, or related field (Master’s preferred). 55+ years of experience in enterprise identity and access management architecture Demonstrated expertise with Zero Trust frameworks and DoD ICAM standards. Hands-on experience with SAML, OAuth2.0, OpenID Connect, PKI, and certificate management. Experience with DoD enterprise solutions such as Radiant Logic, Okta, Ping Identity, SailPoint, ForgeRock, Microsoft Entra ID (Azure AD), or equivalent. Deep knowledge of Privileged Access Management and Identity Governance & Administration solutions. Strong understanding of DoD cybersecurity compliance frameworks (RMF, NIST SP 800-53, 800-207, 8140/8570). IAM / DoD Certification IAT Level II (e.g., Security+ CE, SSCP, GSEC) Preferred: Advanced Certs (Preferred)CISSP, ISSAP, ISSEP, ISSMP, CISM, CAP Experience supporting DoD or Federal government environments. Familiarity with Zero Trust Network Access (ZTNA) and continuous authentication models. Strong communication skills with ability to brief senior leadership and interface with stakeholders. Ability to lead teams in complex, multi-vendor environments. EEO Commitment All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.

Posted 30+ days ago

Booz Allen Hamilton logo
Booz Allen HamiltonLorton, Virginia
Information Systems Security Officer The Opportunity: Everyone knows security needs to be “baked in” to a system architecture but you know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your cyber engineering skills to design and develop secure systems for defense clients? We’re looking for an engineer who can create solutions for defense clients that will withstand even the most advanced cyber threats. As an information systems security officer ( ISSO ) at Booz Allen, you’ll coordinate work with internal and external teams to identify the right mix of tools and techniques to translate your client’s IT needs and future goals into a plan that will enable secure and effective solutions. We need to come up with the best solutions, so you’ll investigate new techniques, break free from the legacy model, and go where the industry is going. You’ll lead the team through a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs. This is a chance to make a difference in the security of critical infrastructure. Your technical expertise will be vital as you help customers overcome their most difficult challenges and broaden your skillset while building peace of mind in a critical infrastructure. Work with us as we protect and advance our defense clients' mission needs. Join us. The world can’t wait. You Have: 5+ years of experience leading and implementing the Assessment and Authorization process under Risk Management Framework for new and existing information systems 3+ years of experience reviewing assessment reports and assisting projects in identifying security risks, including technical and non-technical, and developing effective mitigation strategies, including Plan of Action and Milestones 3+ years of experience managing ATO packages in eMASS or Xacta Knowledge of supporting the development or modification of System Security Plans, security requirements, and supporting documentation for the Assessment and Authorization process Ability to ensure all products and administrative documentation is completed and maintained, including for continuity and historical reference Ability to design, develop, and implement network security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation Secret clearance HS diploma or GED DoD 8570 IAM I Certification such as Security+ Certification Nice If You Have: Experience developing SSP or ATO packages for systems deployed in a DoD cloud environment TS / SCI clearance Bachelor's degree in CS, Cybersecurity, or a technical field DoD 8570 IAM III – CISSP Certification Amazon Web Service ( AWS ) , Micro sof t Azure, or Google Cloud Service Provider Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; Secret clearance is required. Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page. Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $86,800.00 to $198,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date. Identity Statement As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud. Work Model Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely. If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility. If this position is listed as onsite, you’ll work with colleagues and clients in person, as needed for the specific role. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.

Posted 1 day ago

Ryan Specialty logo
Ryan SpecialtyChicago, Illinois
Position Summary We are seeking a highly skilled and experienced Director of Information Security Engineering to join our team. Reporting to the CISO, this role is critical in ensuring the security and integrity of our organization’s information systems. The Director will lead a diverse team of security engineers and have oversight of the SOC, focusing on delivering key information security projects, contributing to the development of the security roadmap, tools maturity, technical strategy, M&A activities, and cloud security initiatives. Strong project management skills are essential to keep security initiatives aligned and on schedule. The ideal candidate will have a strong background in information security, leadership, and strategic planning. What will your job entail? Job Responsibilities: Lead a team of Enterprise Security engineers in developing, implementing and maintaining the enterprise security program. Provide strategic direction and oversight for cloud security architecture design and implementation. Utilize strong project management skills to keep all security initiatives aligned and on schedule. Collaborate with the Director of Governance, Risk, and Compliance to provide technical leadership for M&A activities and compliance with global regulations and industry standards. Work with the SOC lead to ensure effective daily operations, timely detection, response, and mitigation of security incidents. Ensure managed security services providers meet contractual requirements, organizational standards and SLAs. Conduct regular security assessments and audits to identify vulnerabilities, recommend improvements, and ensure the availability, efficacy, and continuous enhancement of enterprise security tools. Review and recommend security technologies, tools, and services based on security, financial, and operational metrics. Implement security best practices and integration strategies for enterprise architectures, ensuring data privacy and compliance. Collaborate with engineering teams, product managers, and business partners to provide secure cloud solutions. Participate in product selection and technical design discussions to influence requirements and mentor engineers. Identify organizational priorities, technical objectives, and design strategies to deliver business value and resolve blockers. Align security architecture processes with business, technology, and threat drivers. Increase efficiency and usability of security tools through automation and integration. Stay current with the latest security trends, threats, and technology solutions. Ensure compliance with relevant regulations and industry standards. Provide regular reports and updates to the CISO and senior management. Work Experience and Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Minimum of 10 years of experience in information security, with at least 5 years managing enterprise security engineering teams. Experience in cloud computing (e.g., applications security, infrastructure security, storage security, platforms security and data security) Strong leadership and team management skills, with a track record of leading hard-working engineering teams and the ability to work effectively with multi-functional teams. Excellent communication, collaboration, and strong problem-solving skills, with the ability to adapt to a fast-paced, evolving environment. Demonstrated project management skills to keep initiatives aligned and on schedule. Strong knowledge of security frameworks and standards (e.g., NIST CSF, ISO 27001). Relevant certifications such as CISSP, CISM, or equivalent are highly desirable. Ryan Specialty is an Equal Opportunity Employer. We are committed to building and sustaining a diverse workforce throughout the organization. Our vision is an inclusive and equitable workplace where all employees are valued for and evaluated on their performance and contributions. Differences in race, creed, color, religious beliefs, physical or mental capabilities, gender identity or expression, sexual orientation, and many other characteristics bring together varied perspectives and add value to the service we provide our clients, trading partners, and communities. This policy extends to all aspects of our employment practices, including but not limited to, recruiting, hiring, discipline, firing, promoting, transferring, compensation, benefits, training, leaves of absence, and other terms, conditions, and benefits of employment. How We Support Our Teammates Ryan Specialty seeks to offer our employees a comprehensive and best-in-class benefits package that helps them — and their family members — achieve their physical, financial, and emotional well-being goals. In addition to paid time off for company holidays, vacation, sick and personal days, Ryan offers paid parental leave, mental health services and more. The target salary range for this position is $144,000.00 - $180,000.00 annually. The wage range for this role considers many factors, such as training, transferable skills, work experience, licensure and certification, business needs, and market demands. The pay range is subject to change and may be modified in the future. Full-time roles are eligible for bonuses and benefits. For additional information on Ryan Specialty Total Rewards, visit our website https://benefits.ryansg.com/. We provide individuals with disabilities reasonable accommodations to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment in accordance with applicable law. Please contact us to request an accommodation at HR@Ryansg.com The above is intended to describe this job's general requirements. It is not to be construed as an exhaustive statement of duties, responsibilities, or physical requirements. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.

Posted 2 days ago

S logo

Information Associate, Full Time

Saint Luke's Health System Kansas CityKansas City, MO

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Job Description

Saint Luke's Hospital in Kansas City is seeking an Information Associate to join our team. You will serve as an integral member of the primary patient care team by performing administrative tasks. This position is responsible for performing clerical and patient facing duties to maintain an organized healthcare office and allow medical staff to focus on patient care.

Shift Details: 3 12 hour shifts- 8:00am-8:30pm, Saturday Shifts are required

Responsibilities:

  • Answers phone calls

  • Greets patients and visitors

  • Coordinates department communication within the unit between ancillary departments and with supervisory and management team

  • Admits patients

  • Administers and maintains patient records

  • Breaks down medical charts for record keepings

  • Coordinates billing

  • Maintains unit inventory

We are looking for someone that is excited about working with people and has a positive attitude. The ideal candidate has strong customer service skills, willingness to work, is adaptable and eager to learn. This position will require you to work autonomously as well as with a team.

Job Requirements

Applicable Experience:

Less than 1 year

Job Details

Full Time

Day (United States of America)

The best place to get care. The best place to give care. Saint Luke's 12,000 employees strive toward that vision every day. Our employees are proud to work for the only faith-based, nonprofit, locally owned health system in Kansas City. Joining Saint Luke's means joining a team of exceptional professionals who strive for excellence in patient care. Do the best work of your career within a highly diverse and inclusive workspace where all voices matter.

Join the Kansas City region's premiere provider of health services. Equal Opportunity Employer.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall