landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Network Based System Analyst/Cyber Information Technologies Requirements Manager-logo
Network Based System Analyst/Cyber Information Technologies Requirements Manager
Node.DigitalArlington, VA
Network-Based System Analyst /Cyber Information Technologies Requirements Manager Location: Arlington, VA Must have an active Secret Security Clearance Node provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based, and cloud-based cybersecurity analysis capabilities. Team personnel provide front-line response for digital forensics/incident response (DFIR) and proactively hunt for malicious cyber activity. We are seeking a Cyber Information Technologies Requirements Manager to support this customer's Engineering & Operations Services (EOS) mission. Responsibilities: - In collaboration with stakeholders, generate, prioritize, analyze, and validate detailed customer IT requirements. Determine whether those requirements are related to current CISA IT efforts and capabilities or constitute new requirements. Articulate the scope and function of existing capabilities and services to customers. - Obtaining and aggregating aspects of unstructured and unorganized customer requirements, such as ideas and needs articulated in emails, chat messages, spoken during calls and meetings, and included in various types of documentation. - Hosting and leading structured facilitation sessions to generate requirements with customers and technical staff. - Leveraging IT knowledge and skillsets, be able to “fill in gaps” and produce a comprehensive written requirement deliverable and define a “definition of done”. Conduct technical feasibility and resource analysis of those requirements. • For requirements related to current CISA efforts, be able to explain to customers the technical details of current capabilities offered by CISA, CSD, Threat Hunt (TH), and Engineering & Operations Services (EOS). Confer with the applicable POCs and utilize IT and INFOSEC knowledge to determine an appropriate course of action for delivering specific IT requirements (e.g., may require a submission into the EOS change management process or other action). Be able to recommend efficiencies and optimization of existing capabilities to meet customer requirements. • For new requirements, confer with appropriate experts across CISA, including personnel internal to EOS and TH, and external to TH, – such as ME, CB, OTD, and OCIO. Obtain concurrence and approval from stakeholders, then submit those requirements to the EOS Requirements Management process. Track the submission and if determined to be necessary, submit it into the TH ReqMan process or other CISA processes. - Completing steps in standard requirements management plans that focus on all stages of a project lifecycle. - Regularly interface with stakeholders such as developers, engineers, network administrators, and customers to monitor the progress and delivery of requirements. - Providing technical IT consultation on capabilities and products being built. - Trace requirements to work items and tasks, facilitate and conduct initial user acceptance testing if requested, document feedback and needed modifications, and validate the completion of those requirements. Revise requirements as needed. - Document requirements that are completed and/or unable to be met, and include key metrics such as the level of resources and time needed to complete those deliverables. Retain the documents in designated repositories. - Utilize the designated EOS Requirements Management platform (Jira/Confluence) to input, track, and display all requirements within the assigned project/portfolio and/or stakeholder. - Attend regular meetings - such as daily syncs - with EOS staff, project teams, and customers, and be able to articulate updates, planned daily activities, and completed accomplishments. Provide routine updates to the EOS federal staff and stakeholders on work deliverables. During meetings, interface with key stakeholders and transcribe notes for further evaluation and action. - -Time permitting, the resource may be tasked to assist with modifying the underlying TECHMAN form fields and associated SOPs to enhance customer support. Requirements Required Skills/Clearances: - U.S. Citizenship - Active DoD Secret clearance, TS/SCI is preferred - Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability - 8+ years of direct relevant experience in cyber systems engineering - Knowledge in various IT fields that include but are not limited to systems and networking engineering, technical analytics, threat hunt incident response/ hunt deployment tools, cloud technologies, and databases. - Experience with and technical understanding of cybersecurity attack-mitigation techniques and cybersecurity architectures - Experience with Systems Engineering Lifecycle (SELC) processes and practices, Change Management practices, requirements management, traceability, and associated tools - Possesses or quickly develops a comprehensive understanding of Government Information Security policies, regulations, and guidelines - Must be able to work collaboratively across agencies and physical locations. - Knowledge and experience with Scaled Agile Framework (SAFe) or similar lean Agile framework - Agile Systems Engineering and/or development experience - DevSecOps or DevOps experience Desired Skills: - Experience and/or familiarity with architectural views, including operational, technical standards, and system/services views, and business, data, applications, and technology architectures using applicable standards (e.g., DODAF, FEAF) - Experience and/or familiarity with software and system lifecycle methodologies (e.g, ISO, CMMI, ITIL, Agile, SAFe) - Experience with requirements management tools (DOORS preferred) - Experience and/or familiarity with the Risk Management Framework (RMF) and security and privacy controls (NIST 800-37 and NIST 800-53) - DHS experience. Required Education: BS Systems Engineering, Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 10 years of network investigations experience. Desired Certifications: - DoD 8570.1 IAT Level II - Certified Systems Engineering Professional (CSEP) - SAFe certification (SA, SP, SSM/SASM, RTE, POPM, SPD, ASE, or SPC) Company Overview: Node.Digital is an independent Digital Automation & Cognitive Engineering company that integrates best-of-breed technologies to accelerate business impact. Our Core Values help us in our mission. They include: OUR CORE VALUES Identifying the~RIGHT PEOPLE~and developing them to their full capabilities Our customer’s “Mission” is our “Mission”. Our~MISSION FIRST~approach is designed to keep our customers fully engaged while becoming their trusted partner We believe in~SIMPLIFYING~complex problems with a relentless focus on agile delivery excellence Our mantra is “~Simple*Secure*Speed~” in the delivery of innovative services and solutions. Benefits We are proud to offer competitive compensation and benefits packages to include: Medical Dental Vision Basic Life Long-Term Disability Health Savings Account 401K Three weeks of PTO 10 Paid Holidays Pre-Approved Online Training

Posted 30+ days ago

Health Information Management Coder/Coordinator (On - Site)-logo
Health Information Management Coder/Coordinator (On - Site)
Reno Behavioral Healthcare HospitalReno, NV
Responsible for assisting in day-to-day operations of the HIM Department. Primary responsibilities include but are not limited to: Answering phone calls; scanning documents; emptying binders Reviews clinical documentation and assign medical codes. Tracking, processing, and evaluating requests for release of information (ROI). Demonstrates knowledge in HIPAA standards Demonstrates knowledge of existing and emerging requirements related to privacy and confidentiality of health information Follows all policies, protocols, and standards of the HIM process Demonstrates the ability to gather data, compile information for the preparation of reports Assigns and sequences ICD10CM/CPT/HCPCS codes to diagnose and procedures for documented information Abstracts all necessary information and assigns codes (ICD10, CPT, HCPCS) Requirements High school diploma, GED or equivalent required Coding Certification required or in school for it Minimum one (1) year administrative experience preferred Previous experience in a psychiatric setting preferred Ability to maintain information as highly confidential Knowledge of applicable laws, standards, and regulations affecting health information systems, specifically in behavioral health service areas. Benefits A full benefits package is available the first of the month following just one month of employment! Medical (three plans to choose from) Dental (two plans to choose from) Vision Life Insurance options, including plans for spouse and children, 401(k), Pet Insurance, Identity Theft insurance, Tuition Reimbursement, Short Term Disability, Long Term Disability and a very generous PTO plan and more!

Posted 2 days ago

Chief Information Officer-logo
Chief Information Officer
H&HNew York, NY
H&H is seeking an experienced CIO to lead our IT strategy, drive innovation, and build a high-performing team. This role will develop and execute an IT roadmap that aligns with business goals, overseeing infrastructure, applications, and services. As a key strategic partner, the CIO will collaborate with leadership, manage IT resources, and enhance technological capabilities. With over 138 years of experience, H&H is a trusted full-service infrastructure engineering firm. Our clients, including infrastructure owners, contractors, and colleagues, rely on us for intricate and innovative engineering solutions. They trust our time-tested ability to manage the entire life cycle of a project, from the study and planning phase through to design and construction. With over 600 talented employees located across 30 offices nationwide, H&H can efficiently and effectively handle assignments of all sizes, types, and delivery methods around the country and across the globe. Responsibilities: Develop and implement IT strategy supporting business growth Oversee IT infrastructure, enterprise applications, and operations Drive business transformation and process optimization Align IT initiatives with business objectives and stakeholders Lead and mentor the IT team, fostering a culture of innovation Ensure system security, data integrity, and IT governance Manage IT budgets, vendors, and technology partnerships Requirements Bachelor's in Computer Science, IT, or related field 20+ years of IT experience, 10+ in leadership, ideally in construction Proven success in business transformation and global IT management Strong leadership, communication, and problem-solving skills Expertise in cloud computing, cybersecurity, and IT service management Preferred: Master’s degree, IT certifications, or experience in engineering/construction Benefits Salary Range- $200,000-$250,000 annually. Salary commensurate with experience. We offer a professional work environment, a competitive salary, a benefits package, and 401(k). EOE M/F/DISABILITY/VETS

Posted 30+ days ago

Information/Cybersecurity Engineer (Clearance Required)-logo
Information/Cybersecurity Engineer (Clearance Required)
Nexxis SolutionsAnnapolis Junction, MD
Nexxis Solutions  is supporting current and near-term efforts to provide information and system security engineering, life cycle solutions, system security testing, risk assessment, and continuous monitoring. We are looking for candidates to provide Cybersecurity expertise to systems and projects to ensure that the appropriate security features and safeguards are designed, integrated, and implemented for all information systems. We are currently looking for cleared professionals in the following areas: Security Controls Assessor (SCA) ISSE/ISSM/ISSO DevSecOps Engineer IT Security IA System Administrator Security Engineer Cybersecurity Network Analyst (CSNA) Splunk Engineer/Administrator Penetration Tester Others… General Overview Be part of a team helping ensure proper level of security for customer software systems and network. Duties will include protecting system boundaries, keeping computer systems and network devices hardened against attacks and securing highly sensitive data. Possessing deep and wide expertise in the security space as well as having a background in security and/or systems engineering will be critical in these roles. Responsibilities vary by role but may include any of the following: Organize computer security architecture and develop detailed cyber security designs Review, develop and implement security measures for the protection of computer systems, networks and information Define system security requirements and prepare reports on your results Review and document standard operating procedures and protocols Configure and troubleshoot security infrastructure devices Create technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks Perform support and consulting of the company's personnel about security incidents and measures Prepare detailed reports including assessment-based findings, outcomes and propositions for further system security enhancement Degree Requirements: A B.S. in Cybersecurity, Information Technology, or a related field is required for most positions. A Master's or Ph.D. in Cybersecurity, IT, or a related field is a plus but not required for most positions.  (Some positions may consider additional years of experience in lieu of degree.) Certification Requirements: Most positions require DoD 8570.01-m (level 2 or above) compliance. A minimum of Security+ strongly preferred; CISSP or above required for some opportunities. Experience Requirements: Available positions range from entry level to 20+ years of experience. Clearance Requirements: A current TS/SCI clearance with appropriate level Polygraph is required. Nexxis Solutions offers competitive salary and comprehensive benefits package  (including paid time off, medical/dental/vision insurance, 401k and more).  Entry level: $90-120k;  Mid-level: $120-180k;  Senior level: $150-230k* Most positions offer minimal if any telework More benefit d etails can be found here:  Nexxis Solutions Benefits Overview * S alary ranges represent a general guideline.  Nexxis Solutions considers several factors when determining compensation including but not limited to: scope and responsibilities of the position; candidate's experience, education/certifications, skills; and current market conditions. Equal Employment Opportunity Policy Nexxis Solutions provides equal employment opportunities to all qualified individuals without regard to race, color, religion, age, sex, pregnancy, national origin, disability status, genetic information, military or veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Nexxis takes allegations of discrimination, harassment, and retaliation seriously, and will promptly investigate when such behavior is reported. If you have a disability and would like to request an accommodation in order to apply for a position with Nexxis Solutions, please contact us at 410-875-7980 or recruiting(at)nexxissolutions.com. Applicants have rights under Federal Employment Laws. You can find links to these notices here.

Posted 30+ days ago

Information Systems Security Engineer - Clearance Required-logo
Information Systems Security Engineer - Clearance Required
Triaplex, Inc.Fort Meade, MD
Triaplex, Inc. is looking for an Information Systems Security Engineer  to join our team. This position will support and influence a number of software and system deployments. Familiarity or prior experience as a Systems Administrator or Systems Engineer is desired to enhance the engineer's perspective on customer needs and requirements. Key Responsibilities Utilize Risk Management Framework (RMF) process and procedures to assist system development and accreditation. Interpret Security Directives, Policies, Publications, and Regulations. Provide guidance on applying security directives and policies to Systems Engineers, System Administration, and System Owners.  Review and vailidate system Vulnerability Scans  Collaborate with System owners to flush out, implement, and verify security requirements to ensure compliance. Required Qualifications Bachelor's degree in a technical discipline from an accredited college or university At least 10 years' previous experience as an ISSO, ISSE/ISSM in the cybersecurity field Five years' additional relevant experience may be substituted for a Bachelor's degree. TS/SCI with polygraph Required Technical Certifications: DoD 8570.01 IASAE LvL 2 Compliant Certification CISSP Certification Desired Skillsets Experience with NIST 800-53 security control implementations, policies, and self testing Experience with RMF policies and procedures specific to mission customers.

Posted 30+ days ago

Senior Principal Information Systems Security Engineer-logo
Senior Principal Information Systems Security Engineer
Concurrent Technologies CorporationColumbia, MD
Senior Principal Information Systems Security Engineer Concurrent Technologies Corporation Client Site – Columbia, MD area Minimum Clearance Required:   TS/SCI with Fullscope Poly Clearance Level Must Be Able to Obtain:  TS/SCI with Fullscope Poly CTC stays ahead of the latest technology advancements so we can help solve our clients' toughest challenges. As a part of the Information Technology (IT) Division, you will be strengthening our team of world-class experts aimed at providing our clients with the most effective solutions. Our expertise in achieving missions is unmatched, and we continue to have a major positive impact throughout the Department of Defense (DoD), Intelligence Community (IC), and beyond. Our IT solutions are at work in high-level, high-priority areas of the DoD and U.S. Government agencies. We are leaders in artificial intelligence and machine learning, cloud architecture and security, cross domain solutions, cybersecurity, edge node technology, synthetic environments, and more. We are honored to be a trusted provider of cutting-edge and customized solutions to our clients for decades. Our experts are leading the rapidly evolving IT industry with innovative work in a variety of disciplines, including DevSecOps, which underpins many of our efforts. With CTC's IT Division, you become part of a dedicated team committed to advancing the ever-growing possibilities in IT and meeting our clients' challenges with up-to-the-minute, customized, and powerful solutions. Key Responsibilities: To protect the interests of national security, cyber incidents must be coordinated among and across DoD organizations and sources outside the Department of Defense, and critical infrastructure and critical infra­structure sector Information Sharing and Analysis Centers (ISACs) via Tier I, Tier II, and Tier III support. CND response services include the actions taken to report, analyze, coordi­nate, and respond to any event or cyber incident for the purpose of mitigating any adverse operational or technical impact. Cyber incident reporting includes a well-defined framework for the timely reporting of any cyber event or incident. The report provides an accurate, meaningful, and complete understanding of the cyber incident from initial detection to analysis and remediation. This information feeds into the User-Defined Operational Picture, which provides local, intermediate, and DoD wide situational awareness of CND actions and their impact. Cyber incident analysis identifies several critical elements of an incident to determine and characterize its possible effects on DoD information networks, operational missions, and other defense programs. This activity relies on effective acquisition, preser­vation, and timely reporting of cyber incident data. Cyber incident response includes the coordinated development and imple­mentation of courses of action (CO As) that focus on containment, eradication, and recovery. At the same time, it ensures the acquisition and preservation of data required for tactical analysis, strategic analysis, and/or LE investigations. Basic Qualifications: Bachelor's Degree from an accredited college or university in Computer Science or related discipline and 12 years of directly related experience or a Master's degree and 10 years of directly related experience, or a PhD and 8 years of directly related experience. Fourteen (14) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government is required The Information Systems Security Engineer shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking  operations. Reviews certification and accreditation (C&A) documentation, pro viding feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain  solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control DoD 8570 compliance with IASAE Level 2 (i.e. CISSP) is required Preferred Qualifications: Cybersecurity degree AWS Experience Why CTC? Our teams at CTC are passionate and thrive on collaboration in a team environment When we encounter a difficult problem, we have a variety of talented and diverse employees that work together to solve the toughest challenges Competitive salary and benefits package Although our work at CTC is extremely important, we also recognize the need for our employees to maintain a proper mix of work and personal life Visit www.ctc.com to learn more Benefits: The starting salary range for this position has been established as $184,000 – $240,000 Medical Insurance and Prescription Dental Insurance Vision Insurance Life and AD&D Insurance Short-Term/Long-Term Disability Insurance Employee Assistance Program (EAP) Voluntary Critical Illness and Accident Insurance Tuition Reimbursement Assistance Paid Leave Paid Holidays Bereavement Leave Retirement Plan The Concurrent Technologies Corporation pay range for this job level is a general guideline and not a guarantee of compensation or salary. Join us! CTC offers exceptional career growth, cutting edge technology, educational opportunities, and recognition for quality work. https://concurrent-technologies-corporation.breezy.hr/ Staffing Requisition: SR# 2025-0047 “We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, protected veteran status, or any other characteristic protected by law.”

Posted 30+ days ago

Information Systems Security Manager-logo
Information Systems Security Manager
ZetierArlington, VA
Zetier seeks a technically proficient Information Systems Security Officer (ISSO) or Information Systems Security Manager (ISSM) to support and lead security management with a hands-on approach focused on automation and enabling highly sensitive operations. Candidates must demonstrate experience and passion for implementing technical automation, including Compliance-as-Code and Infrastructure-as-Code, with familiarity in supporting low-level systems programming. Required: Deep expertise with cybersecurity frameworks (NIST, RMF, STIG) Hands-on scripting and automation (Python, Ansible, PowerShell) Proven track record developing and implementing automation solutions (Compliance-as-Code, Infrastructure-as-Code) Experience directly contribute to cybersecurity tooling and processes Able to support teams in low-level development (C/C++, drivers) Effective communication skills for collaboration across teams Active U.S. Security Clearance Desired: Previous role as an ISSO, ISSM, or senior cybersecurity manager in a highly technical environment Experience with container orchestration and automation tools (Docker, Kubernetes) Familiarity with network security tools and techniques (iptables, OpenVPN, Wireguard) Experienced in systems software development (Linux/Windows drivers) Experience with cloud technologies (AWS, Terraform) Certifications: CISSP, CCSP, or equivalent industry certifications Zero Trust architectures and advanced security strategies Position available in Arlington, VA (hybrid friendly). Zetier is proud to be an Equal Opportunity Employer. We celebrate diversity and do not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis protected by law. All employment is decided on the basis of merit, qualifications, and business need.

Posted 3 weeks ago

Information System Security Officer (ISSO)-logo
Information System Security Officer (ISSO)
Tactibit Technologies LLCSuitland, MD
Tactibit Technologies provides innovative information technology, cybersecurity, and cloud support services to the Federal Government. We support some of the nation's most critical and demanding projects including satellite operations, critical infrastructure, and search and rescue. We are a diverse team of hands-on professionals dedicated to solving problems and developing innovative solutions in support of our customers' critical missions.  Our success is dependent on our inclusive, collaborative environment with a shared commitment to excellence in everything we do.   About the Information System Security Officer position We are looking for a talented cybersecurity professional to join our team in Suitland, MD.  You will provide information security support for NOAA's satellite operations missions.  You will help develop and maintain effective security and risk management programs on complex government information systems.  As an Information System Security Officer, you will be expected to maintain security documentation, communicate and oversee policy changes, and plan and report on security-related initiatives. We expect you to have a passion for cybersecurity and improving overall security posture.  You should have a desire to work with satellite data and products for the public and government. Besides, you should be able to perform well working in a team, along with system administrators, engineers and scientists. This position is located at a government facility in Suitland, MD.  The position is eligible for a flexible work arrangement.     Information System Security Officer responsibilities are: Write and maintain core security documentation including System Security Plans and Contingency Plans Plan, manage, and oversee Plans of Actions and Milestone (POA&Ms) Coordinate security efforts and improvements with stakeholders including system administrators and operations teams Monitor and oversee vulnerability management program including vulnerability scanning, timely patch management, and reporting Coordinate security assessment efforts including Security Controls Assessments (SCAs), penetration testing, and risk assessments Gather technical artifacts to demonstrate the effectiveness of implemented security controls Serve as a principal staff advisor to the System Owner (SO) on all matters involving the security of the information system Plan, manage, and coordinate annual system assessment and authorization activities, to include continuous monitoring Coordinate incident response, continuity of operations, and similar activities Create and maintain documents including Standard Operating Procedures Information System Security Officer requirements are: 8+ years of cybersecurity experience CISSP or equivalent certification Experience with Federal government environments and concepts including NIST Risk Management Framework, NIST SP 800-53 security controls, and DISA Security Technical Implementation Guides (STIGs) Strong problem solving skills and ability to work under pressure BS degree in Computer Science, Cybersecurity, or other related area Must be a US Citizen and eligible to obtain a security clearance Desired Qualifications are: Prior experience functioning as Information System Security Officer on federal government systems Experience with issue tracking and configuration management systems and processes Additional industry certifications such as GIAC certifications, Security+, and others Experience with vulnerability management tools including Tenable Nessus Experience with continuous monitoring and log management tools including ArcSight, BigFix, ePolicy Orchestrator, and similar tools Active Secret security clearance

Posted 30+ days ago

Product Information Assistant Manager-logo
Product Information Assistant Manager
tarte cosmeticsNew York, NY
Job Title: Product Information Assistant Manager Job Summary: The Product Information Assistant Manager is responsible for managing, optimizing, and distributing product data across all relevant systems and internal channels. This role ensures that accurate, consistent, and high-quality product information is maintained to support business operations. Key Responsibilities: • Own and maintain the company’s Product Information Management (PIM) system. • Ensure accurate, complete, and enriched product data across platforms • Collaborate with product development, marketing, regulatory and other teams to gather and standardize product attributes. • Develop and enforce data governance standards, including taxonomy, naming conventions, and product attributes. • Oversee the import, mapping, and syndication of product data across ERP, PIM and third-party channels. • Identify and implement automation tools to streamline product data workflows. • Perform regular audits of product data to ensure compliance and quality standards. • Train internal stakeholders on PIM processes and tools. • Support global product launches and seasonal content refreshes. Desired Skills and Experience: • Bachelor’s degree in Marketing, Information Systems, Business, or a related field. • 3+ years of experience in product information management or related role. • Experience with ERP, preferably SAP or Microsoft NAVision. • Strong understanding of PIM systems • Proficient in Excel and data management tools. • Excellent organizational and communication skills. • Ability to manage cross-functional projects and work with global teams. • Experience working with data governance and taxonomy frameworks. Our Perks: Salary range: $75,000-85,000K (Compensation will depend on a variety of factors, including but not limited to skill level, relevant work experience & education) Medical, dental, vision, 401K plan & access to health & wellness programs Paid vacation, holidays, summer Fridays, birthdays off, volunteer time & more Makeup gratis, employee discount on tarte.com, team give back initiatives Friendly, fun, creative & collaborative work environment

Posted 1 week ago

Information Assurance Compliance Specialist-logo
Information Assurance Compliance Specialist
Resource Management Concepts, Inc.Crane, IN
**This position is contingent on contract award** RMC is hiring Information Assurance Compliance Specialists to support our Navy customer in Crane, Indiana. The Information Assurance Compliance Specialist will oversee, evaluate, and support the documentation, validation, and accreditation processes required to ensure new and existing information technology (IT) systems meet organizational Information Assurance (IA) and security requirements. This role is critical in ensuring risk is appropriately managed and compliance is maintained from both internal and external perspectives for the U.S. Navy and other Department of Defense (DoD) customers. Key Responsibilities Oversee and support the documentation, validation, and accreditation of IT systems to ensure compliance with IA and security requirements. Ensure appropriate risk treatment, compliance, and assurance monitoring from both internal and external perspectives. Collaborate with technical teams to identify, assess, and mitigate risks to information systems. Maintain and update security documentation, including System Security Plans (SSPs), Risk Assessment Reports, and Plan of Action & Milestones (POA&M). Support the continuous monitoring of IT systems to ensure ongoing compliance with DoD and organizational policies. Liaise with auditors, inspectors, and external agencies as needed to facilitate assessments and accreditations. Stay current with evolving DoD, Navy, and industry standards and best practices in information assurance and cybersecurity. Provide subject matter expertise in Specialty Area 61 (Information Assurance Compliance). Requirements Required Qualifications ·         Bachelor’s Degree from an accredited university, or one of the following: CNSSI 4012/4013/4014/4015/4016 Certificate, NDU CISO certificate; or Successful completion of at least one of the following military training courses: NEC 2780 (CIN: A-531-0022), NEC 2779 (CIN: A-531-0009), NEC 2781 (CIN: A-531-0045), (or DoD Service equivalent). Minimum of 3 years relevant experience. Certifications:  At least one of the following: CCNA CAP Security+ (CE) ENSA An active DoD SECRET clearance is required to start. The applicant selected may be subject to a security investigation and must meet eligibility requirements for access to classified information. Preferred Skills & Competencies In-depth understanding of DoD Risk Management Framework (RMF) and related accreditation processes. Strong knowledge of IA compliance standards (e.g., NIST, CNSSI, DoD directives). Experience supporting Navy or DoD IT systems and environments. Excellent written and verbal communication skills. Strong analytical, problem-solving, and organizational abilities. Ability to work effectively in a dynamic, team-oriented environment. Benefits At RMC, we're committed to your career growth! RMC differentiates itself from other firms through its investment in our employees. We invest our resources to train, certify, educate, and build our employees. RMC can offer you a great place to work with a small company feel and give you the experience, tuition assistance, and certifications that will take your career to the next level. This also includes a competitive paid vacation package with 11 paid federal holidays. Additionally, we also offer high-quality, low-deductible healthcare plans, pet insurance, and a competitive 401K package. Salary at RMC is determined by various factors, including but not limited to location, a candidate's specific combination of education, knowledge, skills, competencies, and experience, as well as contract-specific requirements. The current salary range for this position will be $55,000 to $100,000 (annually).

Posted 3 weeks ago

Information System Security Officer (ISSO)-logo
Information System Security Officer (ISSO)
Aetos SystemsHuntsville, AL
Who We Are! Aetos Systems, Inc. was founded in early 2007 to provide a unique work experience. Employees are the foundation of our business. Our leaders work hard every day to empower and support our employees in the development of their careers, giving back to their community and providing their expertise and innovations to our customers - solving real world business problems. Our culture focuses on our people -- our strongest asset -- ensuring they have an environment to provide best-in-class service and solutions to our customers. We always strive to do the right thing. Have you imagined working for a dynamic small business where you are heard, highly regarded and able to do what you love all in one package? This is your opportunity! Join now! Job Summary The Information System Security Officer (ISSO) serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief Information Security Officer (CISO) or Information System Security Manager (ISSM) regarding the security of information systems. This subject matter expert is responsible for ensuring the consistent implementation and maintenance of security controls to safeguard systems from unauthorized modification, disclosure, or destruction. The ISSO provides strategic guidance, supports compliance efforts, and evaluates the effectiveness of security procedures, making recommendations for continuous improvement. Responsibilities may include: Advise the Information System Owner, Business Process Owner, and CISO/ISSM on all technical and non-technical matters related to system security. Ensure that all required security controls are implemented and maintained throughout the system lifecycle. Direct and enforce procedures to cost-effectively protect information systems from both intentional and unintentional threats. Provide guidance to internal teams on the physical and digital protection of information system assets. Monitor and assess system security posture and prepare reports evaluating the effectiveness of current controls. Make informed recommendations for improving data security practices and adopting new protective procedures. Support compliance with applicable federal regulations, agency policies, and security frameworks. Requirements Required Minimum Education Education should be consistent with experience. Relevant experience and professional certifications can outweigh the need for a formal college degree Required Years of Experience Requires 8-10+ years of relevant experience; final job level (Senior or SME) will be determined based on skills and qualifications Required Skills, Qualifications, Technical Experience, etc. Fully Adjudicated Top Secret (TS) Security Clearance or greater Microsoft Windows, Active Directory Understanding of NIST 800 series publications and Federal Information Security Management Act (FISMA) compliance Preferred Skills, Qualifications, Technical Experience, etc. VMWare vSphere 7 experience Cisco Networking Dell Server, and SAN Storage hardware experience Familiarity with system accreditation and authorization and the FBI’s ATO processes Experience evaluating, documenting, and managing NIST 800-53 control implementations Experience with GRC tools (RiskVision, Xacta and JCAM) Microsoft Windows Server Hybrid Administrator Associate VMware Data Center Virtualization (VCP-DCV), Cisco Certified Network Professional (CCNP) Certified Information Systems Security Professional (CISSP) NIST NICE Work Roles - Systems Administration (IO-WRL-005); Network Administration (IO-WRL-004); Systems Authorization (OG-WRL-13) Benefits What we offer: Competitive salaries Education and professional development assistance Multiple healthcare benefit packages & 24/7 virtual on-demand doctors’ visits 401K Dave Ramsey’s SmartDollar Financial Wellness program Civic Leave – time off to support your favorite charity or community Paid time off for personal leave and holidays

Posted 30+ days ago

Information Security Analyst-logo
Information Security Analyst
Lyra Technology GroupNashville, TN
Information Security Subject Matter Expert, Lyra Technology Group Lyra Technology Group is looking for a full-time Information Security SME to join the team at one of our operating companies, ImageQuest in Franklin, TN. The Information Security SME will work to protect the client's data, infrastructure, reputation, and compliance with industry-applicable regulations by supporting the execution of the established Information Security Program. As a subject matter expert, the Information Security SME works to ensure the client's business remains compliant by gathering data, preparing reports, and preparing correct documentation. This role provides critical documentation support of information security operations in the areas of: Vendor Management, Security Awareness, and Cybersecurity Health Checks. A bit about Lyra… Lyra Technology Group is a private equity-backed holding company that invests and operates industry leading technology service businesses. Our companies are operated independently by exceptional management teams. Companies that join our group retain the employees, name, and culture that have made them successful. As a platform of Evergreen Services Group, we never divest from businesses we partner with and approach every decision with the goal of driving sustainable and healthy growth over the long term. A bit about ImageQuest… ImageQuest provides best-in-class IT services, IT consulting, IT support, and IT compliance and cybersecurity services to clients in Nashville, TN. Our Cloud Computing services are carefully designed solutions that keep your team productive, secure, and compliant - wherever they work. Our Cloud Computing solutions can reduce or eliminate your IT capital expenses, give what equipment you do have a longer life, and covert IT expenses into a predictable monthly cost. Your work as the Information Security Subject Matter Expert (SME), includes several comp onents: • Support the implementation of information security programs by pulling detailed and accurate data to allow for creation of timely and correct client reports. • Collect data and prepare professional client-facing reports using ImageQuest approved presentation guidelines. • Manage vendor relationships to ensure all data is received from client and their vendors to build vendor profile, gather reports, and complete preliminary documentation review for completeness and accuracy before submitting for risk rationale and final vendor executive summary package. • Assist with internal process documentation to ensure procedures are up to date at all time. • Work to gain and maintain strong regulatory knowledge (i.e.: HIPAA, GLBA, etc.) along with a well-organized repository of reference information to refer to as needed. • For accounts with a Professional Services Agreement (PSA) in place, support information security operations with special projects as needed such as: o Transcribe incident response table-top exercises ensuring all details are captured accurately. o Investigate and resolve tedious and complex documentation issues with patience and diligence. o Administrative and technical projects assigned. • Vendor Management o Conduct non-banking client vendor reviews, ensuring all documentation is current and compliant with company standards, and create summary for presentation to client. o For banking clients: Assist in gathering due-diligence documentation for assessments and audits. o Set up Vendor Profiles in Nvendor, complete with primary contact and fourth-party vendors. o Review SOC reports and complete Executive Summaries. o Extract User Entity Controls and work with vendor owner (relationship manager) to complete. o Prepare questions, follow up with vendors, and document their responses in preparation of handing off to Lead Advisor. o Conduct Vendor Performance Review process with Relationships Managers. • Security Awareness o Work with Lead Advisor to support client's ongoing Security Awareness Training Program. o Extract data from client's KnowBe4 consoles to create comprehensive regularly scheduled reports. o Review established training program for gaps in learning and make recommendations to Lead Advisor. o Implement training program by setting up ongoing campaigns, smart groups, and phishing tests. o Monitor client's KnowBe4 console and interact with KnowBe4 to resolve any issues on behalf of client. o Notify clients of users who are past due on their training to increase completion rates. • Cybersecurity Health Checks o Assist with internal health check data entry and management tasks to ensure the accuracy and completeness of information. o Pull, gather, and compile data for Health Check reports, ensuring all information is up-to-date and accurate. o Review Health Check reports to ensure cyber security initiatives are consistently followed (e.g., user access, patch reports, removing terminated employees from groups, etc.) and alert information security advisor of discrepancies. Our ideal Information Security Subject Matter Expert (SME), has the following qualifications: • Bachelor's degree in English, Communications, Information Security, or a relevant technical and writing experience. • Strong communication skills with excellent, professional writing skills required. • Proven experience in information security, data management, or a similar role a plus. • Patient and thorough with a keen eye for pattern recognition within data sets. • Excellent organizational skills with strong attention-to-detail. • Excellent listening skills, with the ability to understand and interpret technical information. • Strong analytical and reading comprehension with a proven ability to exercise initiative, judgment, and discretion. • Ability to multitask without errors and function well in a high-paced environment. • Positive attitude with willingness to learn and adapt to new tools and technologies. • Basic familiarity with Microsoft Office product family. • Experience with KnowBe4 consoles and information security documentation a plus The targeted base compensation for this role is $55,000-65,000 per year and will operate out of the Franklin, TN office on a hybrid basis. If you're motivated by meaningful client relationships, strategic selling, and a dynamic work environment—we want to hear from you. Apply today to join the ImageQuest team and help deliver technology solutions that drive real business value!

Posted 3 weeks ago

Information Security Engineer-logo
Information Security Engineer
Palantir TechnologiesNew York, NY
A World-Changing Company Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more. The Role As an Information Security Engineer, you are responsible for the security of Palantir’s people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general. Our ideal candidate works well on a team, is highly motivated, and enjoys solving problems and taking on new challenges. In this role, you’ll be the first line of defense for protecting Palantir. Your team is responsible for the 24/7 prevention, detection, and investigation of security events and active attacks across our entire infrastructure. Your work will directly impact the success of Palantir's mission as you seek to make it challenging for our adversaries and protect our global network. Core Responsibilities Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats. Develop alerting and detection strategies to identify malicious or anomalous behavior. Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics. Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications. Investigate enterprise-wide operations to uncover sophisticated and undetected threats. Partner closely with other members of the Information Security team to lead changes in the company's network defense posture. What We Value Broad exposure to multiple security subject areas, including a strong background in forensics or threat intelligence. Deep exposure in Incident Response or Detection Engineering. Desire to further the information security community through substantive contributions (e.g. conference talks, blog posts, public tool development, etc.). Strong working knowledge of TCP/IP networking and common protocols. What We Require Extensive security experience (3+ years) in at least one major platform (e.g. AWS, Azure, Windows, OS X, Linux, etc.). Proficiency in Python (preferred), PowerShell, or similar. Active TS/SCI security clearance or eligibility to obtain a security clearance. Salary The estimated salary range for this position is estimated to be $135,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives. Further note that total compensation for this position will be determined by each individual’s relevant qualifications, work experience, skills, and other factors. This estimate excludes the value of any potential sign-on bonus; the value of any benefits offered; and the potential future value of any long-term incentives. Our benefits aim to promote health and wellbeing across all areas of Palantirians’ lives. We work to continuously improve our offerings and listen to our community as we design and update them. The list below details our available benefits and some of the perks that can be enjoyed as an employee of Palantir Technologies. Benefits • Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance • Employees are automatically covered by Palantir’s basic life, AD&D and disability insurance • Commuter benefits • Relocation assistance • Take what you need paid time off, not accrual based • 2 weeks paid time off built into the end of each year (subject to team and business needs) • 10 paid holidays throughout the calendar year • Supportive leave of absence program including time off for military service and medical events • Paid leave for new parents and subsidized back-up care for all parents • Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation • Stipend to help with expenses that come with a new child • Employees can enroll in Palantir’s 401k plan Life at Palantir We want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region. In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the state in which you are employed. If the posting is specified as Onsite, you are required to work from an office. If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are proud to be an Equal Opportunity Employer for all, including but not limited to Veterans and those with disabilities. Palantir is committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process , please reach out and let us know how we can help.

Posted 30+ days ago

Information System Security Manager (ISSM), Public Sector-logo
Information System Security Manager (ISSM), Public Sector
Scale AIWashington, DC
Our Security team works on operational issues at the leading edge of machine learning technology. You will join a creative and solutions-oriented team collaborating with internal teams at Scale and externally with our customers. Scale is looking for an experienced security and compliance professional to support Assessment and Authorization and agency audit activities for Scale’s products that are offered in the US Government and global Public Sector space. We are looking for relentlessly curious, deliberately open-minded, and action-oriented generalists who can design effective legal advice, internal policies, and operational processes while employing an empathetic interpersonal style. If you enjoy solving novel and challenging problems and building strong teams and relationships while doing it, we’d love to hear from you! You will: Lead public sector security compliance projects and audits (FedRAMP HIGH, DoD Cloud Computing SRG IL4/IL5/IL6 , NIST 800-53 rev 5, NIST 800-171/CMMC, Risk Management Framework) Collaborate with product, engineering, security, operations, people operations, and legal to implement new technical, administrative, and operational controls Work with 3PAOs and federal government AOs to achieve compliance certifications and reports ​​Ensure the implementation, oversight, monitoring, and maintenance of security configurations, practices, and procedures  Serve as a liaison between system owners and other security personnel, ensuring that selected security controls are effectively implemented and maintained throughout the lifecycle of projects Act as a liaison between system owners and other security personnel to facilitate effective communication and collaboration Develop, maintain, review, and update system security documentation on a continuous basis  Conduct required vulnerability scans and develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities. Manage risks by coordinating correction or mitigation actions and tracking the completion of POAMs  Coordinate system owner concurrence for correction or mitigation actions and monitor security controls to maintain security Authorized To Operate (ATO) Upload security control evidence to the Governance, Risk, and Compliance (GRC) application (eMASS or Xacta) to support security control implementation during the monitoring phase Lead Risk Management Assessment and Authorization (A&A) processes for deployments Perform Cloud system risk assessments, enhance process workflows, and develop new processes Implement all applicable manual Security Technical Implementation Guides (STIGs), vendor hardening guides and ensuring timely installation of all available patches Create and maintain ATO packages Lead security compliance reviews for new products, changes, and features Proactively evaluate and advise the business on new and evolving certification programs, requirements, and technologies Develop and provide training to improve the security awareness and knowledge for all employees and contractors Required: Active US Top Secret security clearance with minimum IAT Level 2 certification (Security +, CASP, or similar)  Ideally you’d have: Experience implementing and maintaining some of the following frameworks and standards: FedRAMP, DoD Cloud Computing SRG, NIST 800-171, NIST 800-53, CMMC, NIST 800-53. STIG/RMF policy knowledge & implementation, including validating compliance via ACAS and other relevant tests. Experience in project management and taking projects from conception to launch An ability to translate between business and technical risk and communicate clearly to leadership Excellent organizational and communications skills Understanding of cybersecurity controls for cloud service providers Knowledge of AWS and other government authorized cloud services 5+ years of security compliance or technology audit related experience Nice-to-haves: Bachelor’s degree in accounting, information systems, computer science, or a related field Compensation packages at Scale for eligible roles include base salary, equity, and benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position, determined by work location and additional factors, including job-related skills, experience, interview performance, and relevant education or training. Scale employees in eligible roles are also granted equity based compensation, subject to Board of Director approval. Your recruiter can share more about the specific salary range for your preferred location during the hiring process, and confirm whether the hired role will be eligible for equity grant. You’ll also receive benefits including, but not limited to: Comprehensive health, dental and vision coverage, retirement benefits, a learning and development stipend, and generous PTO. Additionally, this role may be eligible for additional benefits such as a commuter stipend. The base salary range for this full-time position in the location of Washington DC is: $165,600 — $198,720 USD PLEASE NOTE:  Our policy requires a 90-day waiting period before reconsidering candidates for the same role. This allows us to ensure a fair and thorough evaluation of all applicants. About Us: At Scale, we believe that the transition from traditional software to AI is one of the most important shifts of our time. Our mission is to make that happen faster across every industry, and our team is transforming how organizations build and deploy AI.  Our products power the world's most advanced LLMs, generative models, and computer vision models. We are trusted by generative AI companies such as OpenAI, Meta, and Microsoft, government agencies like the U.S. Army and U.S. Air Force, and enterprises including GM and Accenture. We are expanding our team to accelerate the development of AI applications. We believe that everyone should be able to bring their whole selves to work, which is why we are proud to be an inclusive and equal opportunity workplace. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability status, gender identity or Veteran status.  We are committed to working with and providing reasonable accommodations to applicants with physical and mental disabilities. If you need assistance and/or a reasonable accommodation in the application or recruiting process due to a disability, please contact us at accommodations@scale.com. Please see the United States Department of Labor's Know Your Rights poster for additional information. We comply with the United States Department of Labor's Pay Transparency provision .  PLEASE NOTE: We collect, retain and use personal data for our professional business purposes, including notifying you of job opportunities that may be of interest and sharing with our affiliates. We limit the personal data we collect to that which we believe is appropriate and necessary to manage applicants’ needs, provide our services, and comply with applicable laws. Any information we collect in connection with your application will be treated in accordance with our internal policies and programs designed to protect personal data. Please see our privacy policy for additional information.

Posted 30+ days ago

Senior Associate, Information Assurance Services-logo
Senior Associate, Information Assurance Services
AprioNew York, NY
Work with a nationally ranked CPA and advisory firm that is passionate for what's next. Aprio has 30 U.S. office locations, one in the Philippines and more than 2,100 team members that speak 60+ languages across the globe. By bringing together proven expertise, deep understanding, and strategic foresight for fast-growing industries, Aprio ensures clients are prepared for wherever life or business may take them. Discover a top-rated culture, vast growth opportunities and your next big career move with Aprio. Join Aprio's Information Assurance Services team and you will help clients maximize their opportunities. Aprio is a progressive, fast-growing firm looking for a Senior Associate to join their dynamic team. Aprio's Information Assurance practice supports the delivery of attestation and consulting services for multiple clients in data and tech-based industries such as credit reporting and analytics, payment card services, healthcare IT, and cloud services. The business model and methodologies are focused on risk management and adding value to clients in all services provided. Aprio’s IAS group utilizes sound business practices and technical expertise (rather than working off checklists) to enable clients to identify, mitigate, and monitor the most technical risks associated with their technology use. Responsibilities: Client Service: Planning and leading client meetings, walk-through reviews of clients control procedures and processes; delivery and presentation of client deliverables. Developing and leading the performance of, testing of clients’ security, privacy and other information risk management related controls. Directing the execution of testing of clients’ internal controls, testing of clients’ internal controls and review of internal control testing executed by other team members. Supporting clients in problem identification and resolution. Performing assessments and testing against leading information security and privacy standards and frameworks, including ISO 27001, Trust Services Criteria, PCI DSS, NIST CSF, GDPR, HITRUST and others. Leading and supporting preparation of client reporting deliverables; e.g., gap and risk assessments, SOC reporting, GDPR assessments, ISO 27001 certifications, etc. Practice Development: Collaborating with other team members to streamline internal processes and procedures to improve client service and efficiencies. Sales and Marketing: Participate in meetings with new prospects and/or new service opportunities with existing clients. Support preparation of sales proposals. Team Building: Interviewing potential candidates. Being a mentor and/or coach to other team members. Support in the development and delivery of training. Qualifications: One or more industry relevant certifications or wiliness to obtain relevant certification(s) within two years of employment. Certifications can include: CEH, CISA, CRISC, CIPP, CISSP, CISM, QSA, ISO/IEC 27001, or PCI ISA. Education and Experience: Undergraduate Degree required: preferably in MIS/IS or related concentration – minimum 3.3 GPA. Graduate Degree preferred): preferably in MIS, IS or Accounting Information Systems. 2-4 years relevant work experience. Strong communication skills; verbal and written, with the ability to produce excellent written reports and audit documentation. Commitment to continual learning and development. Commitment to exceptional client service and creative problem-solving ability with a consultancy mindset. Flexible, self-starter with the ability to interact with various levels of client and firm management. Understanding of information technology risks and internal controls. Ability to write test procedures and execute tests of controls. Understanding of Service Organization Control, PCI, ISO, HITRUST and/or similar information technology control frameworks. Ability to travel up to 40%. Ability to manage personal schedule and to lead multiple projects, tasks and deadlines. Project and focus areas within the Information Assurance Services practice include: Service Organization Control (SOC) Reporting (e.g., SOC 1 and SOC 2) Payment Card Industry Data Security Standard (PCI DSS) ISO Standards (e.g., ISO 27001/27002, 22301 GDPR HITRUST Risk Assessments Risk Management Cyber Threats and Cybersecurity Agreed Upon Procedures Internal Audit Co-Sourcing EI3PA The salary range for this opportunity is stated above. As such, an actual salary may fall closer to one or the other end of the range, and in certain circumstances, may wind up being outside of the listed salary range. The application window is anticipated to close on August 21st and may be extended as needed. Why work for Aprio: Whether you are just starting out, looking to advance into management or searching for your next leadership role, Aprio offers an opportunity to grow with a future-focused, innovative firm. Perks/Benefits we offer for full-time team members: - Medical, Dental, and Vision Insurance on the first day of employment - Flexible Spending Account and Dependent Care Account - 401k with Profit Sharing - 9+ holidays and discretionary time off structure - Parental Leave – coverage for both primary and secondary caregivers - Tuition Assistance Program and CPA support program with cash incentive upon completion - Discretionary incentive compensation based on firm, group and individual performance - Incentive compensation related to origination of new client sales - Top rated wellness program - Flexible working environment including remote and hybrid options What’s in it for you: - Working with an industry leader : Be part of a high-growth firm that is passionate for what’s next. - An awesome culture: Thirty-one fundamental behaviors guide our culture every day ensuring we always deliver an exceptional team-member and client experience. We call it the Aprio Way. This shared mindset creates lasting relationships between team members and with clients. - A great team: Work with a high-energy, passionate, caring and ambitious team of professionals in a collaborative culture. - Entrepreneurship : Have the freedom to innovate and bring your ideas to help us grow to become the CPA firm of choice nationally. - Growth opportunities : Grow professionally in an environment that fosters continuous learning and advancement. - Competitive compensation : You will be rewarded with competitive compensation, industry-leading benefits and a flexible work environment to enjoy work/life balance. EQUAL OPPORTUNITY EMPLOYER Aprio is an Equal Opportunity Employer encouraging diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race; color; religion; national origin; sex; pregnancy; sexual orientation; gender identity and/or expression; age; disability; genetic information, citizenship status; military service obligations or any other category protected by applicable federal, state, or local law. Aprio, LLP and Aprio Advisory Group, LLC, operate in an alternative business structure, with Aprio Advisory Group, LLC providing non-attest tax and consulting services, and Aprio, LLP providing CPA firm services.

Posted 4 weeks ago

Information System Security Officer, Journeyman (Top Secret)-logo
Information System Security Officer, Journeyman (Top Secret)
Resource Management Concepts, Inc.Patuxent River, MD
Resource Management Concepts, Inc. (RMC) provides high-quality, professional services to government and commercial sectors. Our mission is to deliver exceptional management and technology solutions supporting the protection and preservation of the people and environment of the United States of America. RMC is hiring an Information Security Analyst for the role of Information Security Systems Officer (ISSO) to support our NAVAIR customer in Patuxent River, MD. The selected applicant will perform a variety of Information Assurance and Risk Management Framework (RMF) activities, including but not limited to: Serving as an ISSO for a designated NAVAIR program. Managing Day-to-Day cybersecurity activities. Perform duties of the Risk Management Framework (RMF) ISSO role, including: Developing platform RMF authorization packages. Preparing/Updating RMF documentation. Preparing IATTs and Use Case MFRs as required to support development and testing. Preparing for CyberSafe authorization in parallel with the system authorizations. Establishing Cybersecurity policies IAW security control implementations. Implementing a Cybersecurity Plan. Performing asset and vulnerability management via VRAM reporting. Performing vulnerability assessments and system authorization activities through collaboration with SMEs (System Administrators, Network Admins, Lab Managers, Program Managers, and ISSMs). Performing system security assessments. Evaluating and reporting software IAW DITPR/DADMS requirements. The applicant must be knowledgeable and proficient in the following: Risk Management Framework (RMF) processes. Cybersecurity/A&A tools (i.e., eMASS, eMASSter, STIG Viewer, SCAP Compliance Checker (SCC), VRAM, and Visio). IT systems and subsystems. Project management. Written and verbal communications. Teamwork and collaboration. The applicant must be familiar with working on classified systems (i.e., SIPRNet) within secure environments. Requirements A BA/BS degree and three (3) to ten (10) years of relevant experience are required. A Journeyman level candidate typically performs all functional duties independently. A High School diploma/GED and two (2) years of additional experience performing work related to the labor category functional description may be substituted for an Associate’s Degree. An Associate’s Degree plus four (4) years of additional experience performing work related to the labor category functional description may be substituted for a Bachelor’s Degree. The selected applicant must have the ability to work independently and as part of a team in NAVAIR environments.  The applicant must meet the certification and clearance requirements established IAW the DoD Manual 8570-1M. The applicant must have one of the following certifications to start: CAP / CGRC CASP+ CE GSLC An active DoD Top Secret clearance is required to start.  The applicant may be subjected to a security investigation and must meet eligibility requirements for access to classified information. Benefits At RMC, we're committed to your career growth! RMC differentiates itself from other firms through its investment in our employees. We invest our resources to train, certify, educate, and build our employees. RMC can offer you a great place to work with a small company feel and give you the experience, tuition assistance, and certifications that will take your career to the next level. This also includes a competitive paid vacation package with 11 paid federal holidays. We also offer high-quality, low-deductible healthcare plans, pet insurance, and a competitive 401K package. Salary at RMC is determined by various factors, including but not limited to location, a candidate's specific combination of education, knowledge, skills, competencies, and experience, as well as contract-specific requirements. The salary range for this position is $115,000 - $145,000. #LI-LL1

Posted 1 week ago

Information Assurance Analyst-logo
Information Assurance Analyst
Spectrum Comm IncNorfolk, VA
Spectrum is seeking highly qualified Information Assurance Analyst to support our proposal for a new program located in Norfolk, VA. General Experience: Candidates must have a minimum of three (3) years of job-related experience acquired in the field of information assurance and cybersecurity. In addition to job experience, candidates will be required to undergo annual training and continuing education to keep up with the latest developments and best practices in the industry. Furthermore, candidates must meet and maintain the minimum credential requirements as outlined in the Department of Defense (DoD) 8570.01-M, Information Assurance Workforce Improvement Program, and the DoD 8140.01. Requirements Requirements: Responsibilities: Process access requests for enterprise, non-enterprise, and command-specific applications, and maintain the command database of these records. Handle requests for new access tokens, revokes, and re-issues. Process requests for database updates to the command application management system. Manage the cybersecurity budget, including maintaining financial records, developing purchase requests, reviewing compliance of requests, and tracking requests using command-provided applications. Create cybersecurity digital media for the command SharePoint site, plan of the week, and email campaigns to support cybersecurity awareness. Develop, review, and provide guidance on DoN and command cybersecurity programs, standard operating procedures, and instructions. Ensure personnel provided by the contractor meet or exceed the AQL: 100% Compliant requirement. Perform all duties of Task 4, paragraphs 5.1 through 5.7. Develop information systems assurance programs and control guidelines in accordance with the Risk Management Framework (RMF) and the current approved DoD and DoN Assessment and Authorization (A&A) standards. Develop, review, and advise on system Plan of Action and Milestones (POA&M), new/existing cybersecurity policies and instructions, A&A packages, and system security controls. Interface and respond to cybersecurity and A&A requirements from Echelon II/III commands, designated Navy Authorizing Officials (NAO), and designated Functional Authorizing Officials (FAO). Support command cybersecurity inspections and audits, including Command Cyber Readiness Inspections (CCRI) and Inspector General (IG) audits. Serve as a member of the command Configuration Control Board (CCB). Benefits Health Care Plan (Medical, Dental & Vision) Retirement Plan (401k) Life Insurance (Basic, Voluntary & AD&D) Paid Time Off (Vacation, Sick & Public Holidays) Family Leave (Maternity, Paternity) Short Term & Long Term Disability Training & Development Wellness Resources Stock Option Plan

Posted 30+ days ago

Chief Data and Information Officer (CDIO)-logo
Chief Data and Information Officer (CDIO)
Concurrent Technologies CorporationJohnstown, PA
Chief Data and Information Officer (CDIO) Concurrent Technologies Corporation Johnstown, PA Minimum Clearance Required:  None Clearance Level Must Be Able to Obtain:  None Employee Background Check Required Position Overview: The Chief Data and Information Officer is a strategic leadership role, responsible for developing and driving our IT infrastructure and enterprise data strategy to support organizational goals. The Chief Data and Information Officer will collaborate with cross-functional leaders to align data initiatives with business priorities, lead data and IT innovations, and ensure regulatory compliance across the enterprise. Key Responsibilities: 1. Strategic Leadership: Develop and implement a unified IT infrastructure with a comprehensive data management strategy that enhances operational efficiency and supports data-driven decision-making. Lead the organization's modernization efforts by identifying emerging trends and technologies as they pertain to IT and data management. 2. Data Governance and Compliance: Develop and enforce data governance policies, standards, and procedures to ensure compliance with DFARS, NIST SP 800-171, CMMC, and other relevant regulations. Chair an IT & Data Management Committee to solicit requirements from across the organization and prioritize initiatives to make recommendations to Executive Management. Drive initiatives to maintain high levels of data quality, IT security, and privacy. Foster a data-driven culture by promoting advanced analytics, dashboarding, and reporting capabilities across business units. 3. Data Architecture and Integration: Lead the design and implementation of data strategy in collaboration with IT to align with technological advancements and business needs. Oversee data integration efforts to ensure seamless flow and accessibility of information across systems. Promote the use of advanced analytics, machine learning, and AI to drive decision-making and innovation. 4. Information Technology and Cybersecurity: Manage the organization's cybersecurity and IT infrastructure. Integrate digital engineering principles to optimize data processes, enhance analytics capabilities, and streamline decision-making workflows. 5. Team Leadership and Development: Build and mentor a high-performing team of data and IT professionals. Foster a culture of collaboration, innovation, and continuous learning. Partner with business leaders to identify key performance indicators (KPIs) and deliver actionable insights. Basic Qualifications: Bachelor's degree in computer science, Information Systems, Data Science, or a related field; Master's degree preferred. 10+ years of experience in IT, data management, data governance, or analytics. Including 5+ years in an enterprise leadership role. Experience managing data assets and government contracts in compliance with DFARS, NIST, CMMC, and other relevant government regulations. Proven track record of establishing and leading enterprise-wide IT and data initiatives resulting in business growth. Deep understanding of cloud-based data platforms, data architecture, data integration, and enterprise IT environments. Key Competencies: Strategic thinking and problem-solving. Strong business acumen and ability to align IT and data initiatives with organizational goals. Exceptional collaboration and team-building skills. Demonstrated commitment to fostering a data-driven culture through initiatives that promote data literacy and innovation across all levels of the organization. Technical background to enable ability to innovate and drive our Enterprise Architecture. Why CTC? Our teams at CTC are passionate and thrive on collaboration in a team environment. When we encounter a difficult problem, we have a variety of talented and diverse employees that work together to solve the toughest challenges. Competitive salary and benefits package. Although our work at CTC is extremely important, we also recognize the need for our employees to maintain a proper mix of work and personal life. Visit  www.ctc.com  to learn more! Join us!  CTC offers exceptional career growth, cutting edge technology, educational opportunities, and recognition for quality work. https://concurrent-technologies-corporation.breezy.hr/ Staffing Requisition:  SR# 2025-0060 “We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, protected veteran status, or any other characteristic protected by law.”

Posted 3 weeks ago

Information Security Compliance Specialist-logo
Information Security Compliance Specialist
Tactibit Technologies LLCSuitland, MD
Tactibit Technologies provides innovative information technology, cybersecurity, and cloud support services to the Federal Government. We support some of the nation's most critical and demanding projects including satellite operations, critical infrastructure, and search and rescue. We are a diverse team of hands-on professionals dedicated to solving problems and developing innovative solutions in support of our customers' critical missions.  Our success is dependent on our inclusive, collaborative environment with a shared commitment to excellence in everything we do.   About the Information Security Compliance Specialist position We are looking for a talented cybersecurity professional to join our team in Suitland, MD.  You will provide information security support for NOAA's satellite operations missions.  You will help develop and maintain effective security and risk management programs on complex government information systems.  As an Information Security Compliance Specialist, you will be expected to document security control implementations, maintain a variety of security documents, and monitor the effectiveness of the overall security program.   We expect you to have a passion for cybersecurity and attention to detail.  You should have a desire to work with satellite data and products for the public and government. Besides, you should be able to perform well working in a team, along with system administrators, engineers and scientists. This position is located at a government facility in Suitland, MD.  The position is eligible for a flexible work arrangement.     Information Security Compliance Specialist responsibilities are: Provide overall cybersecurity program support to the Information System Security Officer (ISSO) and System Owner (SO)  Provide security documentation support including documenting the implementation details of security controls in System Security Plans Identify and recommend technical or policy changes to improve security Plan, coordinate, and review technical artifacts to demonstrate the effectiveness of security controls Support security control assessments, penetration tests, and similar testing efforts by coordinating with stakeholders, communicating project plans, and providing guidance to technical and non-technical staff Write and maintain core security documentation including System Security Plans and Contingency Plans Plan, manage, and oversee Plans of Actions and Milestone (POA&Ms) Coordinate security efforts and improvements with stakeholders including system administrators and operations teams Monitor and report on vulnerability management program effectiveness including vulnerability scanning and patch management Coordinate responses to data calls, audits, and other external requests Coordinate security assessment efforts including Security Controls Assessments (SCAs), penetration testing, and risk assessments Plan, manage, and coordinate annual system assessment and authorization activities, to include continuous monitoring Information Security Compliance Specialist requirements are: 3+ years of cybersecurity experience Experience with Federal government environments and concepts including NIST Risk Management Framework, NIST SP 800-53 security controls, and DISA Security Technical Implementation Guides (STIGs) Strong problem solving skills and ability to work under pressure Strong written and verbal communication skills Ability to understand and explain complex security concepts and requirements to a variety of technical and non-technical personnel BS degree in Computer Science, Cybersecurity, or other related area Must be a US Citizen and eligible to obtain a security clearance Desired Qualifications are: Experience with government security assessment and management tools such as CSAM Experience with the NIST Risk Management Framework  Experience with issue tracking and configuration management systems and processes Industry certifications such as CISSP, GIAC certifications, Security+, and others Experience with vulnerability management tools including Tenable Nessus Experience with continuous monitoring and log management tools including ArcSight, BigFix, ePolicy Orchestrator, and similar tools Active Secret security clearance

Posted 30+ days ago

Public Information Coordinator-logo
Public Information Coordinator
People Performance ResourcesDallas, TX
Who we are: At the Child Poverty Action Lab CPAL, we believe every child deserves a life filled with opportunity. CPAL operates as an unofficial Research and Development lab for Dallas, using data to rethink public systems and equipping community partners at the neighborhood level to be successful in collectively achieving our mission to reduce childhood poverty in Dallas by 50% within a single generation. CPAL works across five key areas to reduce child poverty - Benefits Delivery, Maternal Health, Housing, Criminal Justice and Public Safety. These five “big bets” are rooted in a growing body of evidence that connects experiences in childhood to economics in adulthood. Three key principles underpin CPAL's approach: Design for scale: Child poverty is a problem of massive scale and requires the magnitude of government resources to fund solutions of equal scale. CPAL brings together the leaders of nine Dallas public agencies with a collective annual operating budget of over $10 billion to align local resources and take collective action on promising interventions. Center on evidence: CPAL develops and applies evidence-based outcomes frameworks on child poverty alleviation programs. Data is used to determine where to develop interventions and to evaluate if those interventions are working. CPAL equips our partners and community leaders to use data so they can make better decisions. Power with community expertise: By empowering community based organizations, residents, families, or frontline teams with tools, resources, and access to leaders, CPAL builds a broad coalition for sustainable efforts to combat child poverty. Overview of Position: The Public Information Coordinator plays a vital role in advancing CPAL's mission to drive data-informed, community-centered solutions to cut poverty. This position leads the organization's efforts to acquire key data and records from local and state governmental agencies under the Texas Public Information Act and similar laws. The ideal candidate will be a resourceful and detail-oriented professional who thrives on uncovering hard-to-find information and ensuring transparency in public systems. Why We Need You: Timely, accurate information is the foundation of CPAL's work. Whether we're fighting to improve maternal health outcomes or expand access to quality, affordable housing, our ability to act depends on access to high-quality public data. This role ensures that data needs are met through strategic, well-executed public information requests—so our team can make the strongest data-driven decisions. What You Will Do: Public Information Strategy & Execution : Draft, submit, and manage public information (open records) requests to local and state governmental entities. Track request status, timelines, and deliverables, and conduct consistent follow-up to ensure timely responses. Review, organize, and analyze documents received from agencies; escalate issues when necessary. Maintain a centralized database of requests, agency contacts, outcomes, and response histories. Internal Collaboration & Prioritization : Work closely with CPAL's data and analytics team to pass off data for warehousing. Work closely with the public affairs and Big Bet teams to understand data needs and prioritize information requests accordingly. Identify trends in data needs and recommend proactive strategies for recurring or anticipated requests. Compliance & Government Relations : Stay informed on relevant laws and procedures, particularly the Texas Public Information Act and local regulations. Build and maintain professional relationships with agency records officers and legal contacts. Flag legal or procedural concerns in responses (e.g., redactions, delays) and support follow-up actions such as appeals or clarifications. Qualifications: Required : Bachelor's degree or equivalent experience in public policy/public affairs, communications, legal studies, or a related field. 1–3 years of experience managing public records requests, legal/regulatory research, or public-sector data collection. Strong written and verbal communication skills. Demonstrated attention to detail, persistence, and ability to manage multiple timelines. Ability to manage confidential or sensitive data with integrity and professionalism. Familiarity with the Texas Public Information Act or similar open records laws. Preferred : Experience working with data related to public health, education, criminal justice, housing, or human services. Prior experience working with public agencies or established relationships with relevant departments. Compensation and Benefits: Competitive salary commensurate with experience. Health, dental, and vision insurance. Retirement savings plan with employer match. Generous paid time off and holidays.

Posted 4 weeks ago

Node.Digital logo
Network Based System Analyst/Cyber Information Technologies Requirements Manager
Node.DigitalArlington, VA
Apply

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Network-Based System Analyst /Cyber Information Technologies Requirements Manager

Location: Arlington, VA

Must have an active Secret Security Clearance

Node provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based, and cloud-based cybersecurity analysis capabilities. Team personnel provide front-line response for digital forensics/incident response (DFIR) and proactively hunt for malicious cyber activity.

We are seeking a Cyber Information Technologies Requirements Manager to support this customer's Engineering & Operations Services (EOS) mission.

Responsibilities:

- In collaboration with stakeholders, generate, prioritize, analyze, and validate detailed customer IT requirements. Determine whether those requirements are related to current CISA IT efforts and capabilities or constitute new requirements. Articulate the scope and function of existing capabilities and services to customers.

- Obtaining and aggregating aspects of unstructured and unorganized customer requirements, such as ideas and needs articulated in emails, chat messages, spoken during calls and meetings, and included in various types of documentation.

- Hosting and leading structured facilitation sessions to generate requirements with customers and technical staff.

- Leveraging IT knowledge and skillsets, be able to “fill in gaps” and produce a comprehensive written requirement deliverable and define a “definition of done”. Conduct technical feasibility and resource analysis of those requirements.

• For requirements related to current CISA efforts, be able to explain to customers the technical details of current capabilities offered by CISA, CSD, Threat Hunt (TH), and Engineering & Operations Services (EOS). Confer with the applicable POCs and utilize IT and INFOSEC knowledge to determine an appropriate course of action for delivering specific IT requirements (e.g., may require a submission into the EOS change management process or other action). Be able to recommend efficiencies and optimization of existing capabilities to meet customer requirements.

• For new requirements, confer with appropriate experts across CISA, including personnel internal to EOS and TH, and external to TH, – such as ME, CB, OTD, and OCIO. Obtain concurrence and approval from stakeholders, then submit those requirements to the EOS Requirements Management process. Track the submission and if determined to be necessary, submit it into the TH ReqMan process or other CISA processes.

- Completing steps in standard requirements management plans that focus on all stages of a project lifecycle.

- Regularly interface with stakeholders such as developers, engineers, network administrators, and customers to monitor the progress and delivery of requirements.

- Providing technical IT consultation on capabilities and products being built.

- Trace requirements to work items and tasks, facilitate and conduct initial user acceptance testing if requested, document feedback and needed modifications, and validate the completion of those requirements. Revise requirements as needed.

- Document requirements that are completed and/or unable to be met, and include key metrics such as the level of resources and time needed to complete those deliverables. Retain the documents in designated repositories.

- Utilize the designated EOS Requirements Management platform (Jira/Confluence) to input, track, and display all requirements within the assigned project/portfolio and/or stakeholder.

- Attend regular meetings - such as daily syncs - with EOS staff, project teams, and customers, and be able to articulate updates, planned daily activities, and completed accomplishments. Provide routine updates to the EOS federal staff and stakeholders on work deliverables. During meetings, interface with key stakeholders and transcribe notes for further evaluation and action. - -Time permitting, the resource may be tasked to assist with modifying the underlying TECHMAN form fields and associated SOPs to enhance customer support.

Requirements

Required Skills/Clearances:

- U.S. Citizenship

- Active DoD Secret clearance, TS/SCI is preferred

- Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability

- 8+ years of direct relevant experience in cyber systems engineering

- Knowledge in various IT fields that include but are not limited to systems and networking engineering, technical analytics, threat hunt incident response/ hunt deployment tools, cloud technologies, and databases.

- Experience with and technical understanding of cybersecurity attack-mitigation techniques and cybersecurity architectures

- Experience with Systems Engineering Lifecycle (SELC) processes and practices, Change Management practices, requirements management, traceability, and associated tools

- Possesses or quickly develops a comprehensive understanding of Government Information Security policies, regulations, and guidelines

- Must be able to work collaboratively across agencies and physical locations.

- Knowledge and experience with Scaled Agile Framework (SAFe) or similar lean Agile framework

- Agile Systems Engineering and/or development experience

- DevSecOps or DevOps experience

Desired Skills:

- Experience and/or familiarity with architectural views, including operational, technical standards, and system/services views, and business, data, applications, and technology architectures using applicable standards (e.g., DODAF, FEAF)

- Experience and/or familiarity with software and system lifecycle methodologies (e.g, ISO, CMMI, ITIL, Agile, SAFe)

- Experience with requirements management tools (DOORS preferred)

- Experience and/or familiarity with the Risk Management Framework (RMF) and security and privacy controls (NIST 800-37 and NIST 800-53)

- DHS experience.

Required Education:

BS Systems Engineering, Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 10 years of network investigations experience.

Desired Certifications:

- DoD 8570.1 IAT Level II

- Certified Systems Engineering Professional (CSEP)

- SAFe certification (SA, SP, SSM/SASM, RTE, POPM, SPD, ASE, or SPC)

Company Overview:

Node.Digital is an independent Digital Automation & Cognitive Engineering company that integrates best-of-breed technologies to accelerate business impact.

Our Core Values help us in our mission. They include:

OUR CORE VALUES

Identifying the~RIGHT PEOPLE~and developing them to their full capabilities

Our customer’s “Mission” is our “Mission”. Our~MISSION FIRST~approach is designed to keep our customers fully engaged while becoming their trusted partner

We believe in~SIMPLIFYING~complex problems with a relentless focus on agile delivery excellence

Our mantra is “~Simple*Secure*Speed~” in the delivery of innovative services and solutions.

Benefits

We are proud to offer competitive compensation and benefits packages to include:

  • Medical
  • Dental
  • Vision
  • Basic Life
  • Long-Term Disability
  • Health Savings Account
  • 401K
  • Three weeks of PTO
  • 10 Paid Holidays
  • Pre-Approved Online Training