1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Leidos logo
LeidosWashington DC, District of Columbia

$107,900 - $195,050 / year

The Digital Modernization Sector at Leidos currently has an opening for an Information System Security Officer (MID) supporting the HEITS Contract as part of the Department of Homeland Security (DHS) Insider Threat Program (ITP). This is an exciting opportunity to use your experience to support security accreditation and sustainment activities. The ITP mission is to identify insider threats to the department by utilizing advanced analytics, monitoring, and data correlation which in turn help address and eliminate potential threat actors from compromising the DHS mission in safeguarding the homeland. The selected candidate will be responsible for the following: Provide support for security engineering, and the integration and deployment of security technology to support advanced external threat, insider threat, and cyber operations.The contractor shall resolve concerns or issues related to UAM components within 48 hours and the Government’s request should be acknowledged within 1 hour during normal business hours. Perform weekly, or as directed by the government, vulnerability scans in support of FISMA requirements. For all systems, coordinate with the respective system owner, system administrator or Information System Security Officer (ISSO) to notify them that weekly scanning is to be performed and that the scan results are to be forwarded to the ITP for analysis. Support security assessments by working with the respective system owner, system administrator and/or Information System Security Officer (ISSO) to defining the scope, developing a test plan and rules of engagement document, obtaining necessary government approval, analyzing results, preparing a written report with the findings, impacts, and recommendations, and holding out briefings of findings. Provide a quarterly status of the scan coverage and identify and report on issues with coverage to the government. Perform technical analysis of all scan results and prepare a written report of analysis for the government monthly, as needed, or at the request of the Government. Conduct ITP directed vulnerability scans in support of operational matters (non-scheduled). Support ITP in the baseline compliance aspect of information systems and applications being accredited or reaccredited through the DHS’s certification and accreditation process. Review all ongoing Authority to Operate (ATO), Authority to Connect (ATC) and Interim Authorization to Test (IATT); and brief the status in the Weekly Activity Report. The ISSO shall ensure any open ATO’s, IATT’s, ATC, are documented in the Project Plan and IMS. Develop a schedule for the submission of Assessment & Authorization (A&A) packages for assessment. Government technical representatives may delay that time schedule depending on mission requirements. Maintain all Body of Evidence (BOE) documentation for which they are the prime author for the duration of the contract. The contractor shall collaborate with the Government data center staff to include Government generated documentation in UAM system BOE. The Contractor shall update the documentation to correspond with product updates released in response to software updates and patches. The Contractor shall document all changes to the security posture of the system and provide those documents to the government for review and approval. Basic Qualifications: Bachelors degree and (10)+ years of prior relevant experience or Masters with (8)+ years of prior relevant experience Excellent written and oral communication skills Experienced and adept at developing and maintaining technical documents, analyses, and reports Experienced with preparing and presenting briefings to senior customer management, and customer stakeholders Ability to obtain DHS EOD SCI Preferred Qualifications: Master’s degree from an accredited college or university in IT Management, Engineering, or related field Proven experience (6+ years) in Information Assurance Management Security+ or Similar Certification Extensive experience with the Risk Management Framework (RMF) Extensive experience with ICD-503 Extensive experience developing security accreditation packages and achieving Authorities to Operate (ATOs) Experience supporting security accreditation activities within the Intelligence Community If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares. Original Posting: October 23, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $107,900.00 - $195,050.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Posted 2 days ago

D logo
Denver Health and Hospital AuthorityDenver, Colorado

$20 - $28 / hour

We are recruiting for a motivated Release of Information Specialist - Correctional Care to join our team! We are here for life’s journey. Where is your life journey taking you?Being the heartbeat of Denver means our heart reflects something bigger than ourselves, something that connects us all: Humanity in action, Triumph in hardship, Transformation in health. Department Denver Sheriffs Job Summary Under minimal supervision releases and copies medical records for outside agencies, patients, courts etc. in an established process and procedure, following state and federal laws for legal release of health information. Audits the medical record to ensure completeness and legibility. Pulls medical charts to prepare clinical lines. Files loose paperwork daily and accurately. Maintains the four-part chart accurately. Duties include release of information for medical record requests and answering customer questions via telephone. Provides administrative assistance to the Denver Sheriff Health Services Unit. Maintains a high level of Confidentiality, and a professional relationship with Denver Sheriff Health Service's staff, along with Denver Health.The Correctional Care staff provides care at either Downtown Detention Center or the Denver County Jail. These environments have a higher level of clinical acuity and environmental hazard than inpatient and ambulatory settings based on the nature of the facility. The detention centers employ a high level of security, which impacts daily working conditions, including both personal and institutional safety and clinical operations. Environmental awareness, critical thinking, and decisive, decision-making skills are required in the correctional care setting. Essential Functions : Health Information Requests Receipt and processing of health information requests on a daily basis. Including preparing medical records for various departments based on next day schedule lines. Deliver medical records to health services staff as requested. Working with other facilities for exchange of health information. Processes request and or releases for health information from Internal Affairs, Adult Probation, Social Security Administration, State Hospital, Correctional care facilities, patients, medical facilities, government and entities. Responsible for the consistent, accurate disclosure of authorized protected health information while maintaining confidentiality in accordance with state, federal, HIPAA, Denver Health & Hospital policies, Denver Sheriff Department, NCCHC, and ACA regarding release of information and privacy of patient records Reviews authorizations requested for patient information to ensure all required elements are complete. Confirm regulatory requirements are met and the requesting party authorizing the disclosure is appropriate. Processing not to exceed three business days of receipt for non-continuity of care requests. Performs timely communication to requestor if authorization is not valid, unable to process as received. Ensures the integrity of records released. Prepares risk management and ligation releases. Creates new charts or order charts from other locations as needed. Duties include preparing patient’s charts for copying, ensuring charts are scanned in/out to correct location in tracking system following standard procedures. (45%) Auditing and Document Review Performs audits, purges shelves when charts exceed capacity. Prior to sending charts to warehouse ensure completeness. Reviews each document for accuracy. Detects and corrects chart misfiles. Analysis of health records. Assembled health records are analyzed for deficiencies as defined by state and federal HIM record requirements, and hospital polices. Deficiencies are tagged for completion. Perform audits of the release of information log and completed ROI’s. (25%) Transferring Records Ensure proper protocols for patient transfers are followed for continuum of care. Coordinate with Health Services Staff and Denver Sheriff’s Department to ensure proper documentation on each transfer. (20%) Customer Service Provides customer-friendly assistance to patients, outside health care providers and other customers requesting medical records via various request methods (walk-in/fax/mail/kite.) Place telephone calls from/to other agencies, patients, lawyers, and other correctional care facilities. (10%) Education : High School Diploma or GED Required Work Experience : 1-3 years Two years of clerical experience. A combination of appropriate education and experience may be substituted for the minimum experience requirement. Required Licenses : Knowledge, Skills and Abilities : Ability to interact well with customers. Self motivated, multitasker, detailed oriented. Excellent written and verbal communication skills. Knowledge of terminal-digit filling systems sufficient to maintain records. Knowledge of release of information. Demonstrates knowledge and applicability in complying with State and Federal regulations, HIPPA, Denver Sheriff Department, NCCHC, and ACA regarding release of information and privacy of patient records. Knowledge in the applications of the following: medical record imaging, Microsoft Outlook, and Microsoft Excel. Shift Work Type Regular (0.9 FTE) Salary $20.00 - $27.76 / hr Benefits Outstanding benefits including up to 27 paid days off per year, immediate retirement plan employer contribution up to 9.5%, and generous medical plans Free RTD EcoPass (public transportation) On-site employee fitness center and wellness classes Childcare discount programs & exclusive perks on large brands, travel, and more Tuition reimbursement & assistance Education & development opportunities including career pathways and coaching Professional clinical advancement program & shared governance Public Service Loan Forgiveness (PSLF) eligible employer+ free student loan coaching and assistance navigating the PSLF program National Health Service Corps (NHCS) and Colorado Health Service Corps (CHSC) eligible employer Our Values Respect Belonging Accountability Transparency All job applicants for safety-sensitive positions must pass a pre-employment drug test, once a conditional offer of employment has been made. Denver Health is an integrated, high-quality academic health care system considered a model for the nation that includes a Level I Trauma Center, a 555-bed acute care medical center, Denver’s 911 emergency medical response system, 10 family health centers, 19 school-based health centers, Rocky Mountain Poison & Drug Safety, a Public Health Institute, an HMO and The Denver Health Foundation.As Colorado’s primary, and essential, safety-net institution, Denver Health is a mission-driven organization that has provided billions in uncompensated care for the uninsured. Denver Health is viewed as an Anchor Institution for the community, focusing on hiring and purchasing locally as applicable, serving as a pillar for community needs, and caring for more than 185,000 individuals and 67,000 children a year.Located near downtown Denver, Denver Health is just minutes away from many of the cultural and recreational activities Denver has to offer. Denver Health is an equal opportunity employer (EOE). We value the unique ideas, talents and contributions reflective of the needs of our community. Applicants will be considered until the position is filled.

Posted 4 days ago

Blue Origin logo
Blue OriginSpace Coast, Florida
Application close date: Applications will be accepted on an ongoing basis until the requisition is closed. At Blue Origin, we envision millions of people living and working in space for the benefit of Earth. We’re working to develop reusable, safe, and low-cost space vehicles and systems within a culture of safety, collaboration, and inclusion. Join our team of problem solvers as we add new chapters to the history of spaceflight! - We are a team of collaborators, doers, and problem- solvers who are relentlessly committed to a culture of safety. Join us in lowering the cost of access to space and enabling Blue Origin’s vision of millions of people living and working in space to benefit Earth. As part of a small, passionate, and accomplished team of experts, you will be the primary point of contact for controlling access to Controlled Unclassified Information (CUI) and providing guidance to employees on proper handling procedures. You will provide assistance to define, create, and maintain the documentation for certification and accreditation of information systems in accordance with government requirements for Blue Origin. You will monitor information systems in order to identify potential security weaknesses, recommend improvements to mitigate vulnerabilities, implement changes, and document upgrades. You will also be required to assess the impacts on system modifications and stay up-to-date on technological advances. This position will directly impact the history of space exploration and will require your dedicated commitment and attention to detail to further the cause of safe and repeatable spaceflight. We are looking for someone to apply their technical expertise, leadership skills, and commitment to quality to positively impact safe human spaceflight. Passion for our mission and vision is required! Responsibilities: Manage Controlled Unclassified Information (CUI) access control process Work with Blue Origin Cybersecurity, Enterprise Technology, and Program Management to establish new CUI repositories with the appropriate protections and approvals Maintain the Blue Origin CUI training program and standard operating procedures Main contact for incidents involving CUI, collaborating with customer security teams and the Blue Origin Cybersecurity Operations Center to respond to incidents involving CUI Must be a self-starter and able to work independently Provide mentorship to employees on secure storage, use, and transmission of CUI Update and maintain A&A documentation for RMF, ensuring systems align with security plans. Responsible for monitoring system maintenance, audits, end-of-life tracking, configuration management, and patch management. Support security planning, assessment, risk analysis, and risk management for customer systems and programs. Assist system engineers in the design of security controls for the desired application or system capabilities. Participate in Engineering and Configuration Review Boards and Working Groups to develop secure system solutions. Work with the CPSO to ensure all users have the requisite security clearances, authorizations, need-to-know, and are aware of their security responsibilities before granting access to systems. Apply security-related software to detect malicious code, viruses, insider threats, and intruders (hackers) as needed. Familiarity with RMF, NIST SP 800-171, NISPOM, and Information Assurance needed. Technical expertise in hardware/software security. Maintain awareness of organization-specific security and information technology policies. Qualifications: Requires a Bachelors Degree or equivalent experience in a technology related field and/or minimum of two (2) year’s experience in information assurance and/or IT. Hold certifications specified in DoDM 8140.03 for IAM level 1 and obtain CISSP certification within 6 months. Must be highly organized, able to prioritize tasking as well as multi-task, and willing to work in a team environment. Strong critical thinking/analytical skills, attention to detail, creativity, and a sustained dedication to excellence and quality. The position requires excellent oral and written communication skills. Must be able to work flexible hours. Must hold an active Top Secret Clearance with SCI and have SAP access eligibility (CI Polygraph will be required) Desired: Experience with developing and updating Authorization and Accreditation documentation and system authorization artifacts under the Risk Management Framework (CNSSI 1253/NIST 800-53, etc.). Experience in the use of security related auditing tools in support of RMF requirements. Additional specialized Information Security / Cybersecurity certifications. Previous ISSO and/or System Administration experience. Excellent proficiency with Microsoft Office software suite (Excel, Word, PowerPoint). Previously adjudicated CI Polygraph within the past 2 years. Culture Statement Don’t meet all desired requirements? Studies have shown that some people are less likely to apply to jobs unless they meet every single desired qualification. At Blue Origin, we are dedicated to building an authentic workplace, so if you’re excited about this role but your past experience doesn’t align perfectly with every desired qualification in the job description, we encourage you to apply anyway. You may be just the right candidate for this or other roles. Export Control Regulations Applicants for employment at Blue Origin must be a U.S. citizen or national, U.S. permanent resident (i.e. current Green Card holder), or lawfully admitted into the U.S. as a refugee or granted asylum. Background Check Required for all positions: Blue’s Standard Background Check Required for Certain Job Profiles: Defense Biometric Identification System (DBIDS) background check if at any time the role requires one to be on a military installation Required for Certain Job Profiles: Drivers who operate Commercial Motor Vehicles with a Gross Vehicle Weight (GVW), Gross Vehicle Weight Rating (GVWR) or combination of power unit and trailer that meets or exceeds 10,001 lbs. and/or transports placardable amounts of hazardous materials by ground in any vehicle on a public road while in commerce, may be subject to additional Federal Motor Carrier Safety Regulations including: Driver Qualification Files, Medical Certification (obtained before onboarding), Road Test, Hours of Service, Drug and Alcohol Testing (CDL drivers only), vehicle inspection requirements, CDL requirements (if applicable) and hazardous materials transportation/shipping training. Required for certain Job Profiles: Ability to obtain and maintain Merchant Mariner Credential, which includes pre-employment and random drug testing as well as DOT physical Benefits Benefits include: Medical, dental, vision, basic and supplemental life insurance, paid parental leave, short and long-term disability, 401(k) with a company match of up to 5%, and an Education Support Program. Paid Time Off: Up to four (4) weeks per year based on weekly scheduled hours, and up to 14 company-paid holidays. Dependent on role type and job level, employees may be eligible for benefits and bonuses based on the company's intent to reward individual contributions and enable them to share in the company's results, or other factors at the company's sole discretion. Bonus amounts and eligibility are not guaranteed and subject to change and cancellation. Please check with your recruiter for more details. Equal Employment Opportunity Blue Origin is proud to be an Equal Opportunity/Affirmative Action Employer and is committed to attracting, retaining, and developing a highly qualified and dedicated work force. Blue Origin hires and promotes people on the basis of their qualifications, performance, and abilities. We support the establishment and maintenance of a workplace that fosters trust, equality, and teamwork. We provide all qualified applicants for employment and employees with equal opportunities for hire, promotion, and other terms and conditions of employment, regardless of their race, color, religion, sex, sexual orientation, gender identity, national origin/ethnicity, age, physical or mental disability, genetic factors, military/veteran status, or any other status or characteristic protected by federal, state, and/or local law. Blue Origin will consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state, and local laws, including the Washington Fair Chance Act, the California Fair Chance Act, the Los Angeles Fair Chance in Hiring Ordinance, and other applicable laws. For more information on “Know Your Rights,” please see here . Affirmative Action and Disability Accommodation Applicants wishing to receive information on Blue Origin’s Affirmative Action Plans, or applicants requiring a reasonable accommodation in order to participate in the application and/or interview process, please contact us at EEOCompliance@blueorigin.com . Please note this is a publicly managed inbox. Please do not include any personal medical information in your request. California Applicant Privacy Notice If you are a California resident, please reference the CA Applicant Privacy Notice here .

Posted 1 day ago

Bloomberg Industry Group logo
Bloomberg Industry GroupArlington, Texas
As a Manager of Information Security Compliance, you will support Bloomberg Industry Group’s Governance, Risk, and Compliance (GRC) programs. You will be part of a team that delivers customer trust, vendor risk oversight, and compliance with regulatory and industry standards. This role requires balancing hands-on expertise with enabling cross-functional teams to achieve security and privacy objectives, and serving as a key representative to clients, auditors, and regulators. What you will do: Strategy: Support ownership of the information security compliance roadmap, ensuring alignment with organizational priorities. Act as a trusted advisor to senior leadership, providing insights on security risk, compliance obligations, and emerging regulations. Program Execution: Support all security & privacy compliance efforts including but not limited to, SOC, GDPR, CCPA, privacy by design, etc. Develop, maintain, and enforce internal information security compliance policies, standards, and controls across diverse systems and platforms. Manage the vendor risk management lifecycle: onboarding, due diligence, and ongoing monitoring. Interface with vendors and business leads to clearly understand their risk profile. Represent Information Security in customer security assessments, RFPs, and compliance discussions. Conduct investigations of data security risks and provide consultation to internal and external stakeholders to mitigate risk. Develop and implement companywide information security training and awareness programs. Define and drive risk management and compliance goals for the organization Participate in both internal and external audit activities; aid in compliance audits in support of ISO 27001/2, SOC, etc. Collaborate with teams across the organization to ensure continued compliance to policies and security standards. Innovation & Emerging Risk Monitor and assess risks related to emerging technologies such as Artificial Intelligence, data governance platforms, and cloud-native architectures. Support development of AI governance policies and frameworks that align with regulatory expectations and customer trust requirements. Raise organizational awareness of new and evolving security risks, and ensure controls evolve to address them. You need to have: Bachelor’s Degree or equivalent experience; advanced degree or industry certifications (CISM, CISA, CISSP, ISO 27001 Lead Auditor/Implementer) a plus. 4 years of progressive experience in Risk Management, Compliance, Information Security or Technology Management role. Experience with common Information Security Compliance standards and frameworks (such as, ISO 27001/2, PCI, SOC 1/2/3, and NIST etc.). Demonstrated security assessment, risk analysis, gap analysis, auditing, causal analysis, corrective action planning, and compliance assessment experience. Strong communication and presentation skills, with the ability to influence executives and collaborate with technical teams. Demonstrated success in managing customer trust initiatives, vendor risk processes, and audit readiness. Ability to balance strategic program oversight with hands-on execution when necessary. Equal Opportunity Bloomberg Industry Group maintains a continuing policy of non-discrimination in employment. It is Bloomberg Industry Group’s policy to provide equal opportunity and access for all persons, and the Company is committed to attracting, retaining, developing, and promoting the most qualified individuals without regard to age, ancestry, color, gender identity or expression, genetic predisposition or carrier status, marital status, national or ethnic origin, race, religion or belief, sex, sexual orientation, sexual and other reproductive health decisions, parental or caring status, physical or mental disability, pregnancy or maternity/parental leave, protected veteran status, status as a victim of domestic violence, or any other classification protected by applicable law (“Protected Characteristic”). Bloomberg prohibits treating applicants or employees less favorably in connection with the terms and conditions of employment, in all phases of the employment process, because of one or more Protected Characteristics (“Discrimination”).

Posted 30+ days ago

Guidehouse logo
GuidehouseCharleston, South Carolina
Job Family : IT Cyber Security Travel Required : None Clearance Required : Ability to Obtain Top Secret SCI (TS/SCI) What You Will Do : Individual shall demonstrate a working knowledge of the Risk Management Framework (RMF) process and/or include prior experience with the Defense Information Assurance & Certification Accreditation Process (DIACAP) and/or Cyber Security Service Providers (CSSPs). Individual shall have experience working with Information Assurance tools such as DISA Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS), or Host Based Security System (HBSS) and may be required to hold an Interim Security Control Assessor qualification. Individual shall be familiar with security policies & guidance documents to assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements or CSSP Accreditation. The specialist shall be capable of evaluating security solutions to ensure they meet security requirements for processing up to classified information, and supervise and/or maintain the operational security posture for an information system or program. Personal shall be capable of evaluating security solutions to ensure they meet security requirements for processing up to classified information, and supervise and/or maintain the operational security posture for an information system or program. Individual shall have experience assisting or developing system security policy and ensuring compliance of change management and configuration control processes. What You Will Need : Minimum of THREE (3) years of practical experience demonstrating competency in Cybersecurity, Engineering, Test & Evaluation (T&E) or Assessment & Authorization (A&A)/ Certification & Accreditation (C&A) related field. Three (3) years of experience supporting network and system security support, Cyber Security Service Providers or Cyber Red Teams or equivalents within the DoD or Federal government. Eligibility for TS/SCI Clearance Experience with the following Cyber Areas: Vulnerability Analysis Network Security Monitoring, Incident Response/Forensics, Penetration Test/Red Teaming. Hold Information Assurance Technical (IAT) II certification. Hold at least one of the following Certifications: Certified Information Systems Security Professional CompTIA Advanced Security Practitioner Certified Information Systems Auditor Certified Ethical Hacker What Would Be Nice To Have : Certifications: IAT Level III certification Project Management Professional (PMP) What We Offer : Guidehouse offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace. Benefits include: Medical, Rx, Dental & Vision Insurance Personal and Family Sick Time & Company Paid Holidays Position may be eligible for a discretionary variable incentive bonus Parental Leave and Adoption Assistance 401(k) Retirement Plan Basic Life & Supplemental Life Health Savings Account, Dental/Vision & Dependent Care Flexible Spending Accounts Short-Term & Long-Term Disability Student Loan PayDown Tuition Reimbursement, Personal Development & Learning Opportunities Skills Development & Certifications Employee Referral Program Corporate Sponsored Events & Community Outreach Emergency Back-Up Childcare Program Mobility Stipend About Guidehouse Guidehouse is an Equal Opportunity Employer–Protected Veterans, Individuals with Disabilities or any other basis protected by law, ordinance, or regulation. Guidehouse will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of applicable law or ordinance including the Fair Chance Ordinance of Los Angeles and San Francisco. If you have visited our website for information about employment opportunities, or to apply for a position, and you require an accommodation, please contact Guidehouse Recruiting at 1-571-633-1711 or via email at RecruitingAccommodation@guidehouse.com . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation. All communication regarding recruitment for a Guidehouse position will be sent from Guidehouse email domains including @guidehouse.com or guidehouse@myworkday.com . Correspondence received by an applicant from any other domain should be considered unauthorized and will not be honored by Guidehouse. Note that Guidehouse will never charge a fee or require a money transfer at any stage of the recruitment process and does not collect fees from educational institutions for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring process. If any person or organization demands money related to a job opportunity with Guidehouse, please report the matter to Guidehouse’s Ethics Hotline. If you want to check the validity of correspondence you have received, please contact recruiting@guidehouse.com . Guidehouse is not responsible for losses incurred (monetary or otherwise) from an applicant’s dealings with unauthorized third parties. Guidehouse does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Guidehouse and Guidehouse will not be obligated to pay a placement fee.

Posted 1 day ago

Calnet logo
CalnetFt Meade, Maryland
Description CALNET has a requirement for a Junior Information Systems Security Officer with Top Secret / SCI, Full Scope Polygraph to support an NSA Contract in Ft Meade, MD. Position Description The Junior Information Systems Security Officer shall have the following qualifications. Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Monitors and analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation. Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools. Researches, evaluates, tests, and implements new security software or devices. Implements, enforces, communicates, and develops security policies or plans for data, software applications, hardware, telecommunications, and information systems security education/awareness programs. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems. Desired Skills: Configuration and Document Management Security Policy Security Vulnerability Scanning Tools System Security Plan (SSP) Clearance: Top Secret / SCI Clearance with Full Scope Polygraph Certifications: IAT Level 1 - CompTIA Security+ CE or CompTIA Network+ CE, CEH Education: Bachelor’s Degree in Information Technology or Computer Science or equivalent. Position Number: GW-0040 CALNET, Inc. offers a competitive salary and a generous benefits package. This package includes medical, dental, vision, life, short- and long-term disability insurances, a 401(k)-retirement savings plan, and generous leave time. CALNET, Inc. is an Equal Opportunity Employer. EEO/M/F/D/V www.CALNET.com

Posted 30+ days ago

N logo
National Cooperative Bank. N.A.Hillsboro, Ohio
Oversee and validate the effectiveness of security controls and configuration baselines implemented by first line teams. Regularly review security documentation and operational practices to ensure alignment with regulatory requirements, industry standards, and organizational policies. Recommend improvements to control frameworks and support the development and maintenance of security policies, standards, and procedures. Review and validate reports and metrics provided by first line teams to assess the effectiveness of security solutions and controls. Analyze trends and findings to identify systemic risks or gaps and collaborate with operational teams to ensure timely remediation and continuous improvement. Prepare independent summaries and recommendations for management based on oversight activities. Maintain up-to-date detailed knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors. Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. Assist in the deployment, integration, and initial configuration of all new security solutions and any enhancements to existing security solutions in accordance with standard best operating procedures and the enterprise’s security documents. Assist in investigations of security incidents and problematic activities to help identify root causes and recommend corrective actions. Contribute to the development and delivery of information security awareness training programs for all organizational levels, including new hire orientation and ongoing awareness campaigns. Perform additional responsibilities as assigned to support the overall security objectives of the organization. Participate in the planning and design of enterprise security architecture, under the direction of the Information Security Manager. Assist in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the CISO. Contribute to the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the CISO. Minimum Qualifications: Second year college student focusing on Information Technology or Information Security Two to four years related experience or equivalent combination of education and experience Security related certifications such as: Security +, CISA, CISSP, CRISC, CISM, GRCP, CCSP, CGEIT are strongly desired Eligibility requirements may differ for each benefit or program. National Cooperative Bank, N.A. is an Equal Employment Opportunity Employer (EOE/AA)

Posted 2 weeks ago

CACI logo
CACIAnnapolis Junction, Maryland

$120,800 - $265,800 / year

Information Systems Security Manager – Level 3Job Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: TS/SCI with PolygraphEmployee Type: RegularPercentage of Travel Required: NoneType of Travel:* * * The Opportunity: We are seeking a highly skilled and experienced professional to provide comprehensive management support for an organization's Information Assurance (IA) program. The ideal candidate will play a key role in ensuring the security of information systems by overseeing the proposal, coordination, implementation, and enforcement of security policies, standards, and methodologies. Responsibilities: The candidate will be responsible for managing the operational security posture of an Information System, ensuring compliance with established policies, procedures, and standards. In this role, the candidate will work closely with Information System Security Engineers (ISSEs) and Information System Security Officers (ISSOs) to evaluate security solutions and assess their effectiveness in protecting classified information. The candidate will also manage vulnerability and risk assessments, as well as contribute to security authorization activities, including preparation and review of critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, and Certification and Accreditation (C&A) packages. The successful candidate will oversee configuration management (CM) processes, ensuring that security software, hardware, and firmware are up-to-date and secure. Additionally, they will be responsible for assessing the security impact of system changes and providing support in line with the Risk Management Framework (RMF) and DoD Information Assurance Certification and Accreditation Process (DIACAP). This position offers a unique opportunity to make a significant impact on the overall security of critical information systems and ensure compliance with all regulatory and security requirements. Qualifications: Required: Current Active TS/SCI with POLY Twelve (12) years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Bachelor's degree in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required. In lieu of a Bachelor’s degree, an additional four (4) years of work-related experience may be substituted. DoD 8570 compliance with IAM III is required. The following certifications qualify: CISM, CISSP (or Associate), GSLC, CCISO Desired: Familiarity with Network Security Services and Chief Information Security Officer processes and procedures. This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you’ll be part of a high-performing group dedicated to our customer’s missions and driven by a higher purpose – to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You’ll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground — in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here . The proposed salary range for this position is: $120,800 - $265,800 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.

Posted 4 days ago

Heluna Health logo
Heluna HealthLos Angeles, California
Salary Range: $9,888.12 - $10,678.10 monthly SUMMARY The Data & Analytics Unit is responsible for managing, analyzing, and interpreting healthcare data to support decision-making across the Los Angeles County Department of Health Services (DHS). The unit manages patient care and operational data, using analytics to identify patterns, predict outcomes, and improve service delivery. The unit also ensures data integrity, security, and regulatory compliance. ESSENTIAL FUNCTIONS Builds complex data models for business intelligence solutions consumption and creates dashboards and reports using data visualization tools such as Tableau and Business Objects using those models. Applies transformations, data cleansing, normalization best practices, as well as abstraction and inheritance programming concepts to ensure quality data solutions Responsible for eliciting and documenting user requirements for large, highly complex new systems or system enhancements; ensures functional and technical requirements are fully documented. Translates technical tasks to a non-technical audience. Strong proficiency in ETL (Extract, Transform, Load) processes and tools, data modeling, and data architecture best practices. Proven experience with big data technologies and frameworks (e.g., Hadoop, Spark, Kafka). Deep understanding of cloud-based data platforms such as AWS, Azure, Google BigQuery, Oracle Cloud Infrastructure, etc. Enhance project management processes for enterprise reporting, deep dive analyses, and ad hoc requests leveraging agile framework. Analyze quantitative and qualitative data to uncover trends and insights, and create dashboards, visualizations, and reports for stakeholders. Conduct statistical analyses to support program evaluation and strategic planning. JOB QUALIFICATIONS The ideal candidate for the Senior Information Systems Analyst – Business Intelligence Specialization should possess at least 4+ years of experience in analytics, data management, and data intelligence. The Senior Business Intelligence Analyst is part of the DHS Data & Analytics Unit, who oversees conducting advanced data analyses, responding to complex data requests, and creating data models, dashboards and reports. Strong communication and problem-solving skills are essential to drive collaboration across departments, influence decision-making, and ensure alignment with organizational priorities. Additionally, the ideal candidate should have a proven track record of translating complex data into clear, strategic recommendations and fostering a culture of data-driven decision-making. Education/Experience Bachelor's degree or higher from an accredited institution in Computer Science, Information Technology/Systems or a closely related quantitative field. 4+ years of experience creating complex data models from transactional clinical and operational data for use in interactive business intelligence solutions. Experience using project management tools and templates, and experience using agile methodology and its application to software and data product development. Experience developing a variety of stakeholder materials, including but not limited to dashboard reports, concise stakeholder presentations, and staff training materials/guides. Certificates/Licenses/Clearances Successful clearing through the Live Scan process with the County of Los Angeles. Other Skills, Knowledge, and Abilities Knowledge of JIRA and Smartsheet is a plus 4+ years experience at writing and optimizing Transact-SQL code 4+ years experience with data visualization tools like Tableau and PowerBI, and use of cloud data platforms PHYSICAL DEMANDS Stand: Not applicable Walk: Not applicable Sit: Frequently Handling / Fingerin g: Constantly Reach Outward: Constantly Reach Above Shoulder: Not applicable Climb, Crawl, Kneel, Bend: Not applicable Lift / Carry: Occasionally - Not applicable Push/Pull: Occasionally - Not applicable See: Constantly Taste/ Smell: Not Applicable Not Applicable = Not required for essential functions Occasionally = (0 - 2 hrs/day) Frequently = (2 - 5 hrs/day) Constantly = (5+ hrs/day) WORK ENVIRONMENT Hybrid EEOC STATEMENT It is the policy of Heluna Health to provide equal employment opportunities to all employees and applicants, without regard to age (40 and over), national origin or ancestry, race, color, religion, sex, gender, sexual orientation, pregnancy or perceived pregnancy, reproductive health decision making, physical or mental disability, medical condition (including cancer or a record or history of cancer), AIDS or HIV, genetic information or characteristics, veteran status or military service.

Posted 30+ days ago

Indrasoft logo
IndrasoftWarner Robins, Georgia
Title: Information Assurance II Job Location: Robins Air Force Base, Warner Robins GA 31098 (100 miles south of Atlanta and 16 miles south of Macon). Project Name: 402 SMXG Security Clearance: Top Secret/(SCI) clearance required. IndraSoft, Inc. is seeking a highly qualified Information Assurance II with an active Top Secret/SCI Clearance to work on our project at Robins Air Force Base, GA. The selected candidate will be able to communicate effectively (written/verbal), possess strong interpersonal skills, be self-motivated, and be innovative in a fast-paced environment. Must hold and maintain a valid Top Secret / SCI Security Clearance. The candidate will provide Information System Security Engineering expertise throughout the system’s entire lifecycle in accordance with DoD Information Assurance Certification and Accreditation Process (DIACAP). He/she will conduct security engineering of IA of DoD and Federal Information Systems, which will include developing security requirements, data gathering and documenting system security plans, risk assessments, contingency plans, security test and evaluation plans, and security concepts of operation. Develops, reviews and maintains security policies and standards on commonly deployed systems and generates or reviews DIACAP packages. The candidate must be familiar with a variety of the field’s concepts, practices, and procedures and will rely on his/her experience to plan and accomplish goals. Qualifications: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential Qualifications Required: Associates or Bachelor’s Degree in Information Technology or equivalent experience with 5+ years’ experience performing Information Assurance functions for complex networked systems or no degree with 2 years ISR experience performing information assurance functions. Security+ or other 8570 certification required.5-12 years of Information Assurance experience preferred. Experience with or knowledge of RPASOC, AF DCGS, or FPED systems required.Knowledge of ICD 503 and NIST publications. Experience in continuous monitoring using ACAS and NESSUS scan utility.Familiarity with audit reduction tools. Experience with EITDR, eMASS, and XACTA.Proven expertise in preparing Assessment and Authorization (A&A) packages. Must have experience with ensuring system security requirements are addressed during all phases of the system life cycle.Ability to utilize computer skills to prepare appropriate reports and documents. Familiar with a variety of the field’s concepts, practices and procedures.Ability to lead and direct the work of lower lever IA’s. Able to work in a fast-paced production environment with ability to handle multiple competing tasks and demands simultaneously.Excellent communication, business analytical and problem-solving/trouble shooting skills. Effective Customer Service and management skills/capabilities; including a demonstrated ability to work cross-functionally (internally) and/or externally.Strong English language skills (both written and verbal). Interest in new technologies and the ability to adopt to those new technologies.High level of drive and ability to learn. Ability to lead a team and carry development workload. Candidate MUST HAVE a Top Secret / SCI Security clearance and maintain such clearance. Qualifications Desired: Master’s Degree in Information Assurance or equivalent. 5+ Years’ experience working on DoD programs is highly desired. Essential Functions and Responsibilities: Provide Information System Security Engineering expertise throughout the system’s entire lifecycle in accordance with DoD Information Assurance Certification and Accreditation Process (DIACAP), Certification and Accreditation (C&A) methodologies and DoD Instruction 8570.1-M.Conduct Security Engineering of IA of DoD and Federal Information Systems, which will include developing security requirements, data gathering and documenting system security plans, risk assessments, contingency plans, security test and evaluation plans, security concepts of operations. Develops, reviews, and maintains security policies and standards on commonly deployed systems.Generates and reviews DIACAP packages. Utilize knowledge and expertise in RPASOC, AF DCGS and FPED systems.Contentiously monitor ACAS and NESSUS scan utility. Prepare Assessment and Authorization packages.Ensure all system security requirements are addressed during all phases of the system life cycle.Provide assistance and guidance to Information Assurance I, when needed on more difficult technical problems and tasks.Maintains job knowledge by studying state–of-the-art development tools, programming techniques, and computing equipment, participating in educational opportunities, reading professional publications, maintaining personal networks and participating in professional organizations. About Us At IndraSoft, you will be joining a team of highly qualified individuals who solve today’s challenges, transform to future state, and execute innovate technology solutions for our federal customers. For more than 16 years, we provide cutting-edge solutions in areas of DevSecOps, Cybersecurity, Advanced Data Analytics, emerging Cloud technologies and Enterprise IT to our Defense and Civilian customers. You will be leading our efforts to integrate and innovate technology solutions to solve our clients’ toughest technology problems. EEO Commitment: IndraSoft is an equal employment opportunity/affirmative action employer, we are committed to providing a workplace that is free from discrimination based on race, color, ethnicity, religion, sex, national origin, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, pregnancy, genetic information, or any other status protected by applicable federal, state, local, or international law. These protections also extend to applicants. Follow the links below to find out more; EEO is Law Poster EEO is Law Supplement Pay Transparency Nondiscrimination Provision Accommodations: If you are an individual with a disability and would like to request a reasonable workplace accommodation, please send an email to HR@IndraSoft.com . Indicate the specifics of the assistance needed.

Posted 30+ days ago

O logo
Omega Enterprise SolutionsAnnapolis Junction, Maryland

$120,000 - $178,000 / year

Information System Security Engineer (ISSE) Omega Enterprise Solutions is a Maryland-based, Service-Disabled Veteran-Owned Small Business (SDVOSB) with a special focus on the U.S. Department of Defense (DoD) and Intelligence Community (IC) mission and enabling technologies. We are building a team with shared values and a passion towards our Vision and Mission. Along with providing professional growth opportunities that are innovatively challenging and mission critical to our clients, we emphasize a life-focused everyday approach. We are committed to life-long learning and provide a life-coaching method of management to empower and inspire you to become the best version of yourself in pursuit of a happy, healthy, and fulfilling life. Description The Information System Security Engineer (ISSE) provides security engineering services and guidance for projects, networks and information technology (IT) systems. The ISSE contributes to the design, development, implementation and/or integration of Information Assurance (IA) architectures, systems, or system components. The ISSE employs IA policy and best practices for the protection of data and secure system configuration. The ISSE supports the implementation of security policies and solutions to achieve confidentiality, integrity and availability. The ISSE supports projects to improve security and achieve security authorization through applicable processes such as the NIST Risk Management Framework (RMF) process. Responsibilities Depending upon the ISSE’s role, skill level and system complexity, the ISSE may perform all or some subset of these functions. At the lowest levels the ISSE may work under supervision as a member of a team using established processes to develop, test or improve system security. At the highest levels the ISSE may work independently or in a contractor lead technical role, developing system security architecture and requirements, defining processes and methodologies, and resolving complex technical issues or research problems with government oversight. Qualifications/Certifications: This Position requires an appropriate active Security Clearance and Polygraph. DoD 8570.01-M compliance with Information Assurance Technical (IAT) Level II or Information Assurance Systems Architect and Engineer (IASAE) Level 1 is required. A Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or a related discipline from an accredited college or university and a technical certification such as Security + , or An Associate’s degree in Computer Science, Information Assurance, Information Security System Engineering, or a related discipline from an accredited college or university and a technical certification such as Security + plus two (2) years of general IT experience, or Four (4) years of general IT experience, at least one (1) of which must be information systems security experience. Omega Enterprise Solutions is an equal opportunity employer. All qualified applicants for employment are considered for all positions without regard to race, color, religion, national origin, sex, sexual orientation, gender identity, age, disability, veteran status, or any other protected class. Compensation: $120,000.00 - $178,000.00 per year Our Story We believe that each of us has the opportunity to shape our future and live life to the fullest. Omega’s creation was inspired by our passion to be our best; give our best; and make the biggest difference in all we do. Our story is one of purpose and service, as an individual and a team. Our logo consists of the Greek letter, Omega, which represents our dedication to providing end solutions to our customers as well as a culture that empowers and inspires employees to become the best version of themselves in pursuit of a happy, healthy, and fulfilling life. Omega’s Vision, Mission, and Core Values serve as the cornerstone for our company and culture; colored red for the sacrifices made by those before us and for our own in the service of others. The compass represents staying the course and remaining true to our values in everything we do. Our Mission Guided by our values; inspired by our vision; and driven by our passion for excellence to be the end solution, Omega Enterprise Solutions is committed to providing innovative solutions for the United States Department of Defense and Intelligence Community. We secure mission infrastructure and critical intelligence data in order to protect our nation, our freedom, and our fellow citizens. Our Culture is Key We offer Comprehensive Benefits We value our employees’ hard work and dedication in support of our Vision and Mission. Our benefits reflect our commitment to our employees, their families, and their goals in life. A detailed benefits summary can be found at: Careers – Omega Enterprise Solutions (omegaentsol.com) We are Employee & Life-Focused We seek to build a team with shared values and a passion towards our Vision and Mission. We are dedicated to providing professional growth opportunities that are innovatively challenging and mission critical to our clients. We are committed to life-long learning and provide a life-coaching method of management to empower and inspire employees to become the best version of themselves in pursuit of a happy, healthy, and fulfilling life. We Have Fun outside of work and Celebrate our Success with: · Happy Hours @ Top Golf · Quarterly Team Events · Holiday Events We enjoy and acknowledge the support from our extended Omega family with: · Company Picnics · Sports Events · Local Attractions We Serve the Community to “give-back.”. · AFCEA · The Headstrong Project · Happy Helpers for the Homeless · Cub Scouts – Boy Scouts of America

Posted 30+ days ago

C logo
Children's Hospital and Health SystemMilwaukee, Wisconsin
At Children’s Wisconsin, we believe kids deserve the best. Children’s Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country. We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today. Please follow this link for a closer look at what it’s like to work at Children’s Wisconsin: https://www.instagram.com/lifeatcw/ The person in this role will triage incoming emergency calls from the State of Wisconsin public and health care providers. Provides caller with assessment, evaluation, disposition, and education and prevention information regarding human toxic exposures using medically approved guidelines in computer software systems. Part time: 24 hours per week (0.6 FTE) Mix of Days and PM shifts Weekends - every other Holiday rotation Hybrid work setting Education Registered Nurse (Associate or Bachelor's degree) required OR Pharmacist with Bachelor's degree along with previous clinical or Poison Center experience. Experience Three years of clinical experience in acute, ambulatory care or a pediatric setting preferred. Previous experience in an AAPCC certified Poison Center preferred. Knowledge, Skills and Abilities Successful completion of exam for Certified Specialist in Poison Information (CSPI) after meeting the requirements put forth by the American Association of Poison Control Centers. Incumbent must successfully complete exam within 3 attempts. Licenses and Certifications: One of the following: License RN-Registered Nurse (30) - State of Wisconsin License Pharmacist (40) - State of Wisconsin Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law. Certifications/Licenses: + one of the following: - N/A, License Pharmacist (40) - State of Wisconsin, License RN-Registered Nurse (30) - State of Wisconsin

Posted 1 day ago

Grand Valley State University logo
Grand Valley State UniversityAllendale, Michigan
Summary: The Biology and Geography Departments at Grand Valley State University invite applications for a Geographic Information Systems (GIS) Affiliate Faculty position to begin Fall 2026. Applicants are expected to have at least a master’s degree in Geographic Information Systems, Natural Resources Management, Geography, Environmental Science or a closely related field. The primary responsibility of this position is to teach GIS concepts and analyses at introductory or advanced levels. There may be opportunities to assist university personnel and community partners with GIS projects. Individuals from all backgrounds, including from underrepresented groups, are encouraged to apply. Successful candidates must be able to effectively engage with students, colleagues, and community members with a broad range of backgrounds and experiences. Required Qualifications and Education: Master’s degree in Geographic Information Systems, Natural Resources Management, Geography, Environmental Science or closely related field, with demonstrated GIS applications. Master’s degree must be completed prior to the start of Fall 2026 semester. Potential for successful college-level teaching and impactful instruction at introductory, intermediate, and advanced levels with a commitment to active pedagogy for all learners. Demonstrated experience using and applying GIS to address natural resource management and environmental sustainability issues. Demonstrated experience with ArcGIS Pro software, ArcGIS Online applications, ArcGIS governance, geospatial database management, geospatial data structures, budget and financial management, and organization. Strong communication and interpersonal skills. Commitment to fostering a welcoming and supportive learning environment. Preferred Qualifications and Education: PhD in Geographic Information Systems, Natural Resources Management, Geography, Environmental Science or closely related field. Demonstrated ability and vision to collaborate and build a multidisciplinary initiative in pursuit of enhancing undergraduate education and community partnerships pertaining to applied GIS and natural resource management. Experience managing and facilitating grants, income, endowments, and other revenues secured. Experience enforcing ArcGIS Online content creation protocols and institutional data quality standards, assisting with managing institutional licensing for ArcGIS software and applications, organizing and maintaining institutional repository of spatial data. Responsibilities: Affiliate Faculty are normally expected to teach at least 12 contact hours per semester. The successful candidate will teach introductory, intermediate, or advanced levels of geospatial courses per semester that may include cartography, GIS, remote sensing, webGIS, or other areas of specialization with applications focusing on natural resources and environmental management. This position may include administrative work to support GIS projects with community partners and will come with reassigned time, depending on actual workload. Minimum Starting Salary: $54,000 annually; commensurate with experience. Benefits: Comprehensive benefits package including medical, vision, dental, life insurance, generous employer retirement contributions, wellness resources and tuition waiver effective on date of hire. Department: The departments of Biology and Geography & Sustainable Planning at Grand Valley State University place an emphasis on teaching excellence using engaging pedagogies, active scholarship, and impactful service to the university and community. Faculty in each department uphold the values of a liberal education while providing intensive engagement in the biological sciences. High-impact field and lab experiences and community collaboration are hallmarks of our relevant, interdisciplinary curriculum. There are numerous collaborative opportunities for faculty and students across a wide group of partners within the department, across campus and in the community. Between the 2 departments, students have opportunities to take classes toward a major in Geography with Geospatial Technology emphasis, minor in Geospatial Technology, and earn certificates in GIS & Technology, Environmental Remote Sensing, and Applied GIS in Natural Resources. College: The College of Liberal Arts and Sciences (CLAS) is the largest college at Grand Valley, offering over 50 bachelor’s degrees and a growing number of advanced degrees in the natural and mathematical sciences, the fine arts and humanities, and the social sciences. CLAS is a student-centered learning community that welcomes individuals from various backgrounds and engages in critical inquiry, extending knowledge to enrich and enliven individual and public life. Our faculty are active teacher-scholars committed to offering students an accessible and community-engaged liberal arts and sciences education that prepares them for meaningful careers. There are many opportunities for collaboration within CLAS and across a broad group of partners on and off campus. We are interested in attracting a cohort of new faculty committed to these core values as we seek to foster a community where members from all backgrounds can live, learn, and thrive together. University: Grand Valley State University (GVSU) is a public comprehensive institution located in West Michigan with campuses in Allendale, downtown Grand Rapids, and Holland, plus centers in Detroit, Muskegon and Traverse City. The University attracts over 22,000 undergraduate and graduate students with high quality programs and state-of-the-art facilities and has been nationally recognized for innovativeness and its contribution to students’ social mobility. The greater Grand Rapids metropolitan area has a population of around one million people, is affordable, and offers rich cultural amenities. Grand Valley is located within easy driving distance of Chicago, Detroit, Lake Michigan beaches, and many other superb summer and winter recreational venues. Information can be found at the Community Resources page on Grand Valley State University Human Resources website . How To Apply: Apply online at GVSU Careers . To be considered for the position, applicants must upload the following items to the online application (combined files cannot exceed 5 MB): A cover letter addressing qualifications and your motivation to teach at GVSU Curriculum vitae Teaching philosophy statement Graduate transcripts (unofficial transcripts issued to students are acceptable) Sample(s) of completed or in-progress geospatial projects (e.g., maps, story maps, dashboards, web apps, or others) The online application will allow you to attach these documents electronically, in the same file location . Applicants selected for interviews will be required to submit official transcripts prior to the interview. If you need assistance, email Human Resources at hro@gvsu.edu. Questions about the position may be directed to Dr. Alexandra Locher (lochera@gvsu.edu). Application Deadline: Consideration of applicants will begin on November 10, 2025. The posting may be closed at any time at the discretion of the University thereafter. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Must have the physical stamina to work long hours and/or more than 5 days per week. The requirements listed are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The information contained in this job description is for compliance with the Americans with Disabilities Act as amended by the ADA Amendment Act (2008), Section 504 of the Rehabilitation Act of 1973, and other applicable federal and state laws that prohibit discrimination on the basis of disability. GVSU will provide reasonable accommodations to qualified individuals with disabilities upon request. See www.gvsu.edu/equalopportunity/ . TDD Callers: Call Michigan Relay Center at 711 (in State) or 1-800-833-7833 (out of State). Grand Valley State University is an Antidiscrimination/Equal Opportunity Employer, which includes providing equal opportunity for protected veterans and individuals with disabilities. University policy extends protections to additional identities.

Posted 6 days ago

A logo
AevexHerndon, Virginia
The primary responsibility of this position is to provide research, review, and redact intelligence community equities from various documents (electronically and/or manually), including requests submitted by Defense Counsel to the Office of Military Commissions, Congress and/or Office of Congressional Affairs. The right candidate for this position must have a thorough understanding of reviewing and redacting documents both electronically and/or manually. The individual will be responsible to ensure the quality and accuracy of all documentations being reviewed is compliance and customer satisfaction. This individual must be proficient in EXCEL usage, strong research skills, work well in a team concept, and attention to detail is a must. The right candidate will perform a combination of tasks provided by the customer. The individual will review of products for Freedom of Information Act (FOIA), Privacy Act (PA), and Executive Order Mandatory Declassification Review (EOMDR) programs and Executive Order (EO) 13526 directive will also be using criteria established in EO 13526 (or as amended), FOIA and Privacy Act laws, and review standards of special searches and as internal declassification guidance as provided by the customer. Knowledge of customer culture and requirements strongly desired. Bachelor degree from an accredited institution plus at least 4 years professional experience. Eight (8) years of experience can be substituted in lieu of a degree for a total of twelve (12) years of experience. Must have 6+ full years of experience specific to the skills. Candidate resumes must provide sufficient experience and/or education, knowledge, skills, and abilities to perform the duties of the specific position mentioned above with the Sponsor. Qualifications Excellent communications and interpersonal skills, as well as experience working a team environment Active Top Secret security clearance and Polygraph Analytical skills and detailed oriented Substantive knowledge of general worldwide events Knowledge of Foreign Relations, Freedom of Information Act (FOIA), Privacy Act (PA), and Executive Order Mandatory Declassification Review (EOMDR) programs and Executive Order (EO) 13526 directive Strong work ethic Ability to identify, recommend and implement process improvements Organizational and time management skills Proficiency in on-line tools such as Word, Excel, and Access and Sponsor's electronic databases Multitasking ability, scheduling skills Must have an understanding of security requirements to be able to adhere to them Knowledge of the intelligence community and other government agencies About AEVEX AEVEX, headquartered in Solana Beach, California, supports the U.S. national security mission and partner nation needs around the world by providing full-spectrum aviation, remote sensing, and analysis solutions. The company's capabilities include custom design and engineering; rapid prototyping; sensor integration and sustainment; aircraft modification and certification; flight test instrumentation and support; mission operations service; advanced intelligence data processing, exploitation, and dissemination solutions; and tailored hardware and software mission-system tools. AEVEX uses agile and customized approaches to rapidly define, develop, and deliver specialized solutions for airborne special mission needs for the U.S. Government, partner nations, and commercial businesses. AEVEX has major offices in California, Florida, North Carolina, Ohio, and Virginia. AEVEX provides a full suite of comprehensive benefits, including a 401(k)-retirement plan, comprehensive Medical, Dental, Vision, Disability and Life insurance group coverage with a portion of the premiums paid by the company, professional development funds, and an Employee Assistance Plan (EAP) with counseling, legal help, child and elder care support, among other benefits for qualified employees. Equal Employment Opportunity: AEVEX is an Equal Opportunity employer. We are committed to providing equal employment opportunities to all employees and applicants without regard to race, religious creed, color, sex (including pregnancy, breast feeding and related medical conditions), gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship status, military and veteran status, marital status, age, protected medical condition, genetic information, physical disability, mental disability, or any other protected status in accordance with all applicable federal, state and local laws.

Posted 2 days ago

P logo
PEAK6Chicago, Illinois

$127,200 - $159,000 / year

WHO WE ARE We are PEAK6, a leading investment firm, using technology to find a better way of doing things. The company’s first tech-based solution was developed in 1997 to optimize options trading, and over the past two decades, the same formula has been used across a range of industries, asset classes, and business stages to consistently deliver superior results. Today, PEAK6 seeks transformational opportunities to provide capital and strategic support to entrepreneurs and forward-thinking businesses. PEAK6’s core brands include PEAK6 Capital Management, PEAK6 Strategic Capital, Apex Fintech Solutions, FOCUS, We Insure, Evil Geniuses, Poker Power, Zogo, and Bruce Markets. ABOUT THIS ROLE As a Senior Information Security Engineer , you will be an integral player in designing, implementing, and defending the technologies that protect our diverse and dynamic businesses. Our teams are lean and agile, offering you the unique opportunity to take ownership of critical security systems and make a significant impact across the enterprise. You will be a principal driver in maturing our security posture by leading initiatives to manage and enhance our secure access solutions, while also improving threat detection capabilities within our security analytics environment. You’ll be responsible for: Security Platform Engineering & Operations: Take a lead role in the management, enhancement, and maintenance of critical security infrastructure, including our secure access and SIEM platforms. This involves creating and tuning policies, developing detection logic, managing data ingestion, maintaining integrations, and ensuring consistent performance while acting as a technical lead for troubleshooting. Threat Detection & Incident Response: Serve as a subject matter expert during security incidents, leveraging our security stack to investigate and respond to threats. This includes evaluating common exploits, network attacks, and phishing techniques; performing basic malware analysis; and aligning all activities with our Incident Response Plan and the MITRE ATT&CK framework. Security Architecture & Strategy: Define security measures and reference architecture patterns in collaboration with Systems Architects across the business. Help manage traceability between business objectives and security strategy to continuously improve our security design, development, and deployment processes. Risk Management & Vulnerability Mitigation: Conduct comprehensive analyses to identify business-critical systems and applications. Identify, analyze, and resolve security deficiencies, developing effective risk mitigation measures for our vulnerability and incident management programs and recommending corrective actions. Cloud & Third-Party Security: Contribute to the development of technical guidance and security principles for our cloud technology environments. Evaluate the security risks posed by third-party vendors and services, developing and implementing effective mitigating strategies. Audit & Compliance: Participate in internal audits and security program initiatives to assess our security maturity. Help interpret and apply requirements from applicable standards and regulations (e.g., ISO 27001, NIST) to ensure our technologies and processes adhere to regulatory standards. Project-Based Security Deployment: Actively participate in projects to deploy new security technologies. Documentation & Best Practices: Develop and maintain clear, concise documentation for security systems, policies, and procedures in our internal knowledge base. Champion security best practices across the organization. Proactively Secure Development Lifecycle: Focus on integrating security at every stage of software development to ensure that every release adheres to security best practices. Use tools and practices to identify vulnerabilities early and continuously. Information Security Evangelist: Be an information security leader and a partner within the developer community YOUR EXPERIENCE 5+ years of experience in an Information Security, Network Engineering, or Systems Engineering role with a strong security focus. Relevant security certifications (e.g., CISSP, GIAC, or other cloud/network security credentials). Demonstrated, hands-on experience deploying and managing a leading SASE platform, including its ZTNA, Secure Web Gateway (SWG), and Cloud Access Security Broker (CASB) functions. Strong proficiency with a major SIEM platform (experience with modern, cloud-native platforms is highly preferred). Must have experience with log ingestion, parsing, and engineering detection rules with advanced query languages. Deep understanding of core networking principles (TCP/IP, DNS, BGP, IPsec) and firewall management. Broad experience across multiple IT domains, demonstrating the ability to work effectively in a "small team" environment. Proficiency in a scripting language (e.g., Python, PowerShell) for automation and integration. DevOps and Automation Skills as Nice to Have. Familiarity with CI/CD tools such as Jenkins, GitLab CI, or GitHub Actions is appreciated but not the focus—your goal is not to build or maintain these pipelines but to secure them. Familiarity with other common enterprise security tools, such as: Endpoint Detection and Response (EDR), Identity and Access Management (IAM), vulnerability management solutions, and Mobile Device Management (MDM). Must be available to participate in a 24x7 on-call rotation to support critical production systems and respond to security emergencies as needed. #LI-P6 OUR REWARDS We offer a robust package of employee perks and benefits, including healthcare benefits (medical, dental and vision, EAP), competitive PTO, 401k match, parental leave, and HSA contribution match. We also provide our employees with a paid subscription to the Calm app and offer generous external learning and tuition reimbursement benefits. As a hybrid workforce, we offer our employees the ability to work remotely up to two days a week. Base pay offered may vary depending on job-related knowledge, skills, experience, and office location. This position also may be eligible for a discretionary annual bonus in addition to a range of health & wellness benefits, enhancing your overall compensation package. Base Salary Range $127,200-$159,000 PEAK6 is proud to be an equal opportunity employer that does not discriminate on the basis of race, color, religion, sex (including pregnancy, sexual orientation, and gender identity), national origin, age, disability, veteran status, marital status, or any other protected characteristic. Our hiring practices ensure that all qualified applicants receive fair consideration without regard to these characteristics. PEAK6 is committed to creating an inclusive and accessible workplace for all candidates, including those with disabilities. We are dedicated to ensuring equal employment opportunities and providing reasonable accommodations to qualified individuals with disabilities. If you require reasonable accommodations to participate in the application or interview process, please contact our HR department at hr@peak6.com. We will work with you to provide the necessary accommodations to ensure your full participation in our hiring process. #PEAK6

Posted 1 week ago

O logo
OneLegacy BrandAzusa, California

$56,376 - $64,064 / year

Join Us in Transforming Lives Every Day At OneLegacy, every moment counts. As the nation's largest organ, eye, and tissue recovery organization, we are dedicated to saving lives and sharing hope . Guided by our values of integrity, compassion, stewardship, diversity and inclusion, urgency, innovation and excellence, and collaboration , our team works tirelessly to honor every gift of donation. This is more than a job; it’s an opportunity to make a profound impact on countless lives. Job Type: Full-time; Non-exempt Hours: Two 10-hour and two 12-hour shifts per week. Shifts are PM starting at 4PM. Work Setting: In-person Location: Azusa, CA. Travel: None Summary of Functions: The Donor Information Specialist (DIS) is primarily responsible for the completed review of the organ and/or tissue donor case files in a timely manner and in accordance with OneLegacy policies and procedures and regulatory requirements. The completed review includes but is not limited to obtaining corrections from OneLegacy staff, obtaining required documentation from agencies such as hospitals, ME/Coroner’s offices, processors, laboratories, or other relevant government entities, and confirming that the donor case file is correct, accurate, and complete. The DIS will work in partnership with other departments to communicate culture results to transplant centers. The DIS will enter case information into databases as assigned, which may include Organ Procurement Transplantation Network (OPTN) accuracy and timeliness are a crucial element in this responsibility. The DIS is responsible for ensuring the accuracy of donor information in donor databases. The DIS will work with the Supervisor of Donor Information to meet pre-determined chart completion goals and responsibilities that take priority. Performs all duties and responsibilities in compliance with policies and procedures, regulations as outlined in the Code of Federal Regulations, and other applicable federal, state, and local laws. Duties & Responsibilities: Essential Job Functions: Coordinates Completion of Donor Case Files • 1. Facilitates and maintains primary responsibility for the timely completion of organ and/or tissue donor case files in compliance with OneLegacy Policies and Procedure, processors requirements, and local, state, and federal regulations.• 2. Expedites the donor case file review and the resolution of issues identified on ocular donors by communicating with the ocular tissue processor(s) via daily pending list.• 3. Communicates to transplant centers positive microbiology and pulsatile perfusion cultures in collaboration with the Donor Allocation department. • 4. Communicates to all necessary parties of any positive infectious transmissible disease per OneLegacy policy and procedures.• 5. Submits data entry of donor information to Organ Procurement Transplantation Network (OPTN) and additional agencies as assigned.• 6. Liaisons with tissue processors as assigned. Responds to processor requests (processor pending lists) for outstanding information or corrections to donor case files.• 7. Ensures timely provision of donor related documents, laboratory results and information to processors.• 8. Monitors and tracks recovery staff department’s documentation practices and provide constructive feedback to recovery staff to improve performance.• 9. Obtains medical records, laboratory results, autopsy reports, death certificates, and other required information or documentation necessary to complete the donor case file. Shares information with processors as deemed necessary.• 10. Copies or scans charts as required.• 11. Proposes, creates, implements, and/or maintains systems (i.e., spreadsheets or database) needed to monitor, track, and expedite the completion of the donor case file.• 12. Collaborates with the Center for Disease Control, assist in facilitating sharing of information such as sharing OL at the request of the CDC. Assist in coordinating any additional testing the CDC request.• 13. Work with the various Health Departments that are in our DSA. Provide additional information and report cases as applicable by OL policies and procedures. Donor Records Coordinator Coverage 1. Serves as a back-up Donor Records Coordinator to perform all aspects required for incoming donor chart and associated paperwork processing. Job Qualifications and Requirements: Education: Bachelor’s degree (BS) from an accredited four-year college or university, completion of Surgical Technologist, EMT program, or LVN program with state certification is required. Experience: Two (2+) years recovery experience in organ or tissue banking preferred. • Certification/License: CTBS certification required to be obtained within 2 years of employment.• OneLegacy requires employees to maintain a current California driver’s license and current vehicle insurance based on California minimum insurance coverage standards.• Requirement: Employee must be able to pass a local government agency (coroner’s office) background check.• Equipment: Reliable automotive transportation required Salary Range: $56,376.32-$64,064.00 The above salary range represents a general guideline; however, OneLegacy considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions. Benefits Medical/Dental/Vision Plans –Employer pays 90% of premium cost for employee and their dependents 19 days of PTO 2 Floating Holidays 10 Holidays Life Insurance Supplemental Life Insurance Wellness Plans Employee Assistance Program Pet Insurance Gym Onsite Mileage Reimbursement to applicable positions Tuition Reimbursement Employee Referral Program 403b Retirement Plan with an annual discretionary 8% Employer contribution School Loan Forgiveness

Posted 30+ days ago

I logo
Invisible AgencyAustin, Texas

$6 - $65 / hour

Are you a Computer and Information Systems expert eager to shape the future of AI? Large‑scale language models are evolving from clever chatbots into powerful engines of technical insight and enterprise innovation. With high‑quality training data, tomorrow’s AI can democratize world‑class education, optimize business systems, and streamline workflows for IT professionals everywhere. That training data begins with you—we need your expertise to help power the next generation of AI. We’re looking for Computer and Information Systems specialists who live and breathe software architecture, systems analysis, data management, cloud infrastructure, cybersecurity, database design, and IT project management. You’ll challenge advanced language models on topics like enterprise system integration, information governance, network configuration, cybersecurity frameworks, distributed computing, systems development life cycle (SDLC), and IT compliance—documenting every failure mode so we can harden model reasoning. On a typical day, you will converse with the model on real-world IT scenarios and theoretical systems architecture questions, verify technical accuracy and logical soundness, capture reproducible error traces, and suggest improvements to our prompt engineering and evaluation metrics. A bachelor’s or master’s degree in Computer Information Systems, Information Technology, Computer Science, or a closely related field is ideal; industry certifications (e.g., CompTIA, CISSP, AWS, PMP), enterprise deployment experience, or technical writing projects signal fit. Clear, metacognitive communication—“showing your work”—is essential. Ready to turn your systems expertise into the knowledge base for tomorrow’s AI? Apply today and start teaching the model that will teach the world. We offer a pay range of $6-to- $65 per hour, with the exact rate determined after evaluating your experience, expertise, and geographic location. Final offer amounts may vary from the pay range listed above. As a contractor you’ll supply a secure computer and high‑speed internet; company‑sponsored benefits such as health insurance and PTO do not apply. • Job title: Computer & Information Systems Specialist – AI Trainer• Employment type: Contract• Workplace type: Remote• Seniority level: Mid‑Senior Level

Posted 1 week ago

Dell logo
DellLas Vegas, Nevada

$107,950 - $139,700 / year

Job Posting Information Systems Security Officer (ISSO) at Nellis Airforce Base Today, every organization needs to be digital, powered by data, running in a multi-cloud world, ready to take on anything. Our Consulting team assesses customer’s strategic, organizational and business challenges and uses in-depth industry knowledge to offer technical solutions that apply to future business environment and operational objectives to help our Dell Technologies gain market share and increase efficiency. Join us to do the best work of your career and make a profound social impact as an Information Systems Security Officer (ISSO) on our Consulting Team in Las Vegas, Nevada ( onsite at Nellis Air Force Base ). What you’ll achieve As an Information Systems Security Officer (ISSO) , you’ll play a key role in maintaining the cybersecurity posture of systems used in Test and Evaluation (T&E) activities. You will: Focus on daily cybersecurity operations, ensuring that systems are operated, maintained and secured in accordance with established policies and procedures Generate reports for System Administrator (SysAdmin) and Information Systems Security Engineering (ISSE) implementations Take the first step towards your dream career Every Dell Technologies team member brings something unique to the table. Here’s what we are looking for with this role: Essential Requirements: Active Department of Defense (DoD) Top Secret (TS) Security Clearance; Security+ Certification Expertise in: DoD’s National Institute of Standards and Technology (NIST) Risk Management Framework (Categorization, Control Selection, Implementation, Assessment, Authorization and Continuous Monitoring) IT Service Management and common DoD governance to include Axelos Information Technology Infrastructure Library (ITIL), Control Objectives for Information and Related Technologies (COBIT), The Open Group Architecture Framework (TOGAF) and ISO/IEC 20000 Tenable Security Center for vulnerability assessment, compliance scanning, reporting and analysis with familiarity of Nessus and Nessus Network Monitor Experience with: hardening client, server, appliance, network and storage systems; Security Content Automation Protocol (SCAP) tools i.e., OpenSCAP, Security Technical Implementation Guide (STIG) Viewer, Security Content Automation Protocol (SCC), Evaluate-STIG; applying technical controls; participating in audit/remediation and Risk Management Framework (RMF) processes developing, modifying and interpreting core compliance artifacts to include System Security Plan (SSP), Plan of Action and Milestones (POA&M) and Security Assessment Report (SAR) administering security standards and directives e.g. NIST RMF/CSF/SP 800‑53, DoDI 8500.01/8510.01, DoDD 8570/8140, JSIG and NISPOM utilizing Security Information and Event Management (SIEM) tools i.e., Splunk, McAfee/Trellix ESM, VMware vRealize Log Insight for log collection, analysis, reporting and integration with HBSS/VA systems container i.e., Docker, Kubernetes, Red Hat OpenShift, Podman and orchestration i.e., Ansible, Puppet, Chef tools and technologies creating, managing and deploying patches using Microsoft Endpoint Configuration Manager (ECM) andSystem Center Configuration Manager (SCCM) configuration management and applying best practices, local policies and program governance to streamline review and approval processes managing incident responses in classified environments, including security violations, malware outbreaks, unauthorized access and escalations identifying, filtering, assessing and planning remediation for common vulnerabilities and exposures Familiarity with: McAfee/Trellix Endpoint Security Solutions including offline air-gapped definition updates, policy management, agent deployment and troubleshooting VMware ESXi, vSphere, vRealize LogInsight, Omnissa’s Horizon for Virtual Desktop Infrastructure; understanding of cybersecurity challenges in virtualized environments Excellent interpersonal, written and verbal skills to be able to influence and interact with confidence and credibility at all levels within the Dell Technologies companies, customers, partners and vendor Desirable Requirements: Bachelor’s or master’s degree Compensation Dell is committed to fair and equitable compensation practices. The base salary range for this position is $107,950 – $139,700. Benefits and Perks of working at Dell Technologies Your life. Your health. Supported by your benefits. You can explore the overall benefits experience that awaits you as a Dell Technologies team member — right now at MyWellatDell.com. Who we are We believe that each of us has the power to make an impact. That’s why we put our team members at the center of everything we do. If you’re looking for an opportunity to grow your career with some of the best minds and most advanced tech in the industry, we’re looking for you. Dell Technologies is a unique family of businesses that helps individuals and organizations transform how they work, live and play. Join us to build a future that works for everyone because Progress Takes All of Us. Dell Technologies is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. Read the full Equal Employment Opportunity Policy here .

Posted 5 days ago

Leidos logo
LeidosBethesda, Maryland

$107,900 - $195,050 / year

Leidos’ High Fidelity Simulation Business Area is responsible for architecting and implementing large-scale System of Systems solutions in support of world class simulation, training, and analysis products for the US Navy.You will get to work with state-of-the art technology developing the most sophisticated and “game changing” trainers the US Navy deploys.You will be part of a high powered, collegial, and ethical team, performing vital work that has a major impact within the US Navy.You will be constantly learning new skills and be encouraged and supported to develop the career you want to achieve.The hallmark of Leidos is empowered employees doing meaningful work.Join Leidos for a career, not just a job. Leidos is seeking an energetic, motivated, self-starter for this technically sophisticated and challenginginformation security position, supporting the development of a variety of naval training and simulation systems such as CIAT - Combined Integrated Air and Missile Defense (IAMD) and Anti-Submarine Warfare (ASW) Trainer - YouTube . This position is part of the HFS cyber security team, and is responsible for maintaining and improving the security posture for the information systems that support the development and fielding of a variety of US Naval training systems.You will perform at least the following tasks: Develop and implement cybersecurity plans and goals for the organization. Support, communicate, reinforce and defend the cybersecurity mission, values and culture of the organization. Be responsible for the management of Information Systems (ISs). Maintain the System Security Policy (SSP) and Supplemental SSPs for all information systems within the facility. Create and update the Plan of Actions & Milestone (POA&M) in coordination with the SCA. Provide guidance regarding the implementation of security measures in accordance with the SSP.Perform regular audits of ISs. Analyze vulnerabilities derived from scanning tool results and continuous monitoring tool results. Coordinate with multiple DCSA representatives and ISSOs to ensure compliance with regulations and internal Leidos policies, and to maintain system integrity. Assist with security assessments Coordinate Change and Control Boards and document meeting minutes and subsequent tasks. Provide feedback and approve all changes from the Cybersecurity perspective. Assist with management of Authorization and Assessment processes for multiple authorities to operate across multiple sites. Perform Security Briefings for personnel on Rules, Responsibilities, and Acceptable Use. Required Education: BA/BS degree. Select certifications may be substituted for the education requirement.Candidate must be 8570.1M / 8140 compliant with certifications, preferably CISSP or Associate and RHCSA to correspond to an IA Management Level III designation. Required Experience: • Must have 10+ years experience with, and demonstrate the skills and capabilities to successfully execute the duties and responsibilities of this position• Must have previous ISSM or ISSO experience • Must have Linux operating system experience including but not limited to: Must have basic command line Linux knowledge, comfortable viewing files and knowledgeable about their locations in the file system Must have a solid grasp on scanning and remediating issues on Linux systems • Must be thoroughly familiar with EMASS• Must be a flexible, positive and energetic team player; be able to work in a fast paced environment; adapt to changes tasking; and be able to work with minimal supervision Desired Experience: • Familiarity with Jira, Confluence, Portfolio, Service Desk If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares. Original Posting: July 23, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $107,900.00 - $195,050.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Posted 4 days ago

BETA Technologies logo
BETA TechnologiesRaleigh, NC
At BETA Technologies, we apply our intellectual curiosity, passion for aviation, and commitment to sustainability toward a shared mission of revolutionizing electric aviation. Regardless of the position one holds, each team member brings their talent and desire to positively impact the environment and lives of others in a refreshing, vibrant, and inclusive culture. The Cybersecurity Incident Analyst is the lifeblood of BETA’s Information Security Operations program: pursuing findings from our Security Operations Center (SOC), tracking remediation, identifying opportunities for improvement to BETA’s Information Security posture, and maximizing BETA’s readiness to address information security incidents by resourcing, training, exercising, and continuously improving our incident response (IR) capabilities. How you will contribute to revolutionizing electric aviation: Own one or more functions of BETA’s Information Security Operations program, support the others Triage findings from BETA’s SOC and other sensors, owning resolution where possible and documenting/tracking resolution by others where needed Document and track remediation of vulnerabilities and security-relevant misconfigurations, leading periodic reviews with operators of affected assets to guide resolution Respond to information security incidents throughout BETA’s information environment as a member of our Incident Response Team (IRT) Develop, maintain, and enhance the resources supporting training- and execution of BETA’s Information Security Incident Response Protocol (IRP) Train and exercise the IRP with Team Members who will staff the IRT Collaborate closely with other Digital Infrastructure staff to maximize alignment between security- and operational incident response Contribute reporting to inform periodic (monthly, annual, etc.) enterprise security posture reviews Support audits throughout BETA’s information environment by producing required artifacts Cross-train with other BETA’s Cybersecurity Analysts and understand their workflows sufficiently to provide coverage in the event of their absence Minimum Qualifications: Strong understanding of information security/cybersecurity first principles Professional experience in an information security/cybersecurity role: continuous monitoring or incident response Strong teamwork orientation Aptitude for organizing information for others to access Aptitude for training others Excellent written and verbal communication Strong sense of initiative Above and Beyond Qualifications: Demonstrated ability to interpret security information for non-practitioners Experience developing- and delivering training in a professional setting, both in-person and online Experience with risk-based vulnerability management Experience with malware analysis and response Experience securing IoT/ICS assets Experience leading information security/cybersecurity incident response Experience developing incident response plans or emergency management plans Enthusiasm for training responders through exercises Experience collecting data in support of reporting via web services APIs Academic degree in information security/cybersecurity, SANS GIAC certification (DFIR track, Cyber Defense track) or equivalent, NIMS Incident Command System certification or similar Physical Demands and Work Environment: This role consists primarily of computer work and presentations to small groups in an office environment The wage listed here reflects our best faith estimate for this role. We pay competitively and base compensation on a variety of factors including skills, experience, industry background, and the evolving needs of the role. We remain committed to fair and equitable pay and we're happy to discuss during the interview process. Build electric airplanes with us! We encourage all driven candidates to apply, even if they do not meet every listed qualification. We are an equal opportunity employer. Employment decisions are based on merit, competence and qualifications and will not be influenced in any manner on race, color, religion, age, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, disability, veteran or military status, genetic information, pregnancy, or any other protected characteristic under federal, state, or local law. BETA complies with all applicable federal, state and local non-discrimination laws and does not tolerate discrimination of any kind in our workplace. Employment offers are contingent upon the successful completion of a background check. BETA Technologies participates in E-Verify.

Posted 30+ days ago

Leidos logo

Insider Threat Program Information System Security Officer (MID)

LeidosWashington DC, District of Columbia

$107,900 - $195,050 / year

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

The Digital Modernization Sector at Leidos currently has an opening for an Information System Security Officer (MID) supporting the HEITS Contract as part of the Department of Homeland Security (DHS) Insider Threat Program (ITP). This is an exciting opportunity to use your experience to support security accreditation and sustainment activities. The ITP mission is to identify insider threats to the department by utilizing advanced analytics, monitoring, and data correlation which in turn help address and eliminate potential threat actors from compromising the DHS mission in safeguarding the homeland.

The selected candidate will be responsible for the following:

  • Provide support for security engineering, and the integration and deployment of security technology to support advanced external threat, insider threat, and cyber operations.The contractor shall resolve concerns or issues related to UAM components within 48 hours and the Government’s request should be acknowledged within 1 hour during normal business hours.

  • Perform weekly, or as directed by the government, vulnerability scans in support of FISMA requirements. For all systems, coordinate with the respective system owner, system administrator or Information System Security Officer (ISSO) to notify them that weekly scanning is to be performed and that the scan results are to be forwarded to the ITP for analysis.

  • Support security assessments by working with the respective system owner, system administrator and/or Information System Security Officer (ISSO) to defining the scope, developing a test plan and rules of engagement document, obtaining necessary government approval, analyzing results, preparing a written report with the findings, impacts, and recommendations, and holding out briefings of findings.

  • Provide a quarterly status of the scan coverage and identify and report on issues with coverage to the government.

  • Perform technical analysis of all scan results and prepare a written report of analysis for the government monthly, as needed, or at the request of the Government.

  • Conduct ITP directed vulnerability scans in support of operational matters (non-scheduled).

  • Support ITP in the baseline compliance aspect of information systems and applications being accredited or reaccredited through the DHS’s certification and accreditation process.

  • Review all ongoing Authority to Operate (ATO), Authority to Connect (ATC) and Interim Authorization to Test (IATT); and brief the status in the Weekly Activity Report. The ISSO shall ensure any open ATO’s, IATT’s, ATC, are documented in the Project Plan and IMS.

  • Develop a schedule for the submission of Assessment & Authorization (A&A) packages for assessment. Government technical representatives may delay that time schedule depending on mission requirements.

  • Maintain all Body of Evidence (BOE) documentation for which they are the prime author for the duration of the contract. The contractor shall collaborate with the Government data center staff to include Government generated documentation in UAM system BOE. The Contractor shall update the documentation to correspond with product updates released in response to software updates and patches. The Contractor shall document all changes to the security posture of the system and provide those documents to the government for review and approval.

Basic Qualifications:

  • Bachelors degree and (10)+ years of prior relevant experience or Masters with (8)+ years of prior relevant experience 

  • Excellent written and oral communication skills 

  • Experienced and adept at developing and maintaining technical documents, analyses, and reports

  • Experienced with preparing and presenting briefings to senior customer management, and customer stakeholders

  • Ability to obtain DHS EOD SCI

Preferred Qualifications:

  • Master’s degree from an accredited college or university in IT Management, Engineering, or related field 

  • Proven experience (6+ years) in Information Assurance Management 

  • Security+ or Similar Certification

  • Extensive experience with the Risk Management Framework (RMF)

  • Extensive experience with ICD-503

  • Extensive experience developing security accreditation packages and achieving Authorities to Operate (ATOs)

  • Experience supporting security accreditation activities within the Intelligence Community

If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.

Original Posting:

October 23, 2025

For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $107,900.00 - $195,050.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall