1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

A logo
AERMOR LLCNorfolk, VA
Location: Norfolk, VA Clearance: Secret Position Type: Full-Time AERMOR is seeking an Information System Security Specialist III to provide advanced cybersecurity and information assurance support to ensure the protection, compliance, and accreditation of information systems. This role requires hands-on expertise with Risk Management Framework (RMF), information assurance tools, and security evaluation processes to support Authority to Operate (ATO) requirements. The Specialist will oversee and maintain security postures, evaluate security solutions, and ensure compliance with applicable federal and DoD cybersecurity policies and standards. This is not a remote position. Responsibilities: Apply cybersecurity, engineering, and Test & Evaluation (T&E) knowledge to support security planning and execution. Demonstrate working knowledge of the Risk Management Framework (RMF) process; experience with DIACAP is also applicable. Utilize Information Assurance tools such as: DISA Enterprise Mission Assurance Support Service (eMASS) and Assured Compliance Assessment Solution (ACAS). Assist with the preparation and maintenance of process artifacts, traceability documents, and compliance evidence to support ATO requirements. Evaluate security solutions to verify compliance with security requirements for processing up to classified information. Supervise and/or maintain the operational security posture of assigned information systems and programs. Develop or assist in developing system security policies. Ensure compliance with change management and configuration control processes. May be required to hold Interim Security Control Assessor qualification. Required Experience: Bachelor’s degree with 5 years of practical experience, OR High School/GED with 7 years of practical experience. Demonstrated competency in Cybersecurity, Engineering, Test & Evaluation (T&E), or Assessment & Authorization (A&A)/ Certification & Accreditation (C&A). Familiarity with security policies, standards, and guidance documents. Strong background in RMF, DIACAP, and related security compliance processes. Experience with eMASS, ACAS, and other security assessment tools. Must hold Information Assurance Technical (IAT) III certification. Powered by JazzHR

Posted 4 weeks ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:    Information Systems Technician I – DB2/SQL Analyst Division:      Data Center Services Union:          IFT Location:    501 S Second St, Springfield, IL – Sangamon County Salary:         Range $4,962 to $9,512 monthly, commensurate with experience Benefits:       https://cms.illinois.gov/benefits/stateemployee.html Overview: Serves as a technical expert in an assigned area of database design, participates in the utilization of advanced programming languages and systems and programming techniques.  Duties and Responsibilities: Under direction of senior staff creates and maintains the necessary data files to support both production and test environments when developing projects such for areas such as, but not limited to, Driver Services, Vehicle Services, Business Services, etc. Under direction of senior staff, develops, designs and implements database structures to support user departments such as, but not limited to Driver Services, Vehicle Services, Business Services, etc. Prepares and maintains documentation for the data file structures/design. Under direction of senior staff, assures the adherence for the standardization of data names within data files that correspond with data names defined in the Data Dictionary/Data Directory. Under direction of senior staff, coordinates with personnel from Systems & Programming, transaction processing specialist and Production Assurance the implementation of new database changes from a test environment into a production environment. Utilizing vendor supplied database tools, monitors the status of data files for changes, growth, etc. Maintains user contact by attending meetings to gain better understanding of user requirements in areas such as, but not limited to, Vehicles Services, Drivers Services, etc. Performs other duties as required or assigned. Education and Experience: Requires knowledge, skill, and mental development equivalent to completion of one year of college, with coursework in the computer science field OR 1.5 years of technical systems and programming experience OR any equivalent combination of education and experience. Knowledge, Skills and Abilities: Requires elementary knowledge of Information Technology concepts and principles, the theories and functions of computer systems, and the principles and techniques of Information Technology documentation. Requires elementary knowledge of hardware and software, languages, and procedures to provide assigned technical and analytical support services. Requires elementary knowledge of accounting and statistical theories, methods and practices. Requires working knowledge of the devices for capturing data and the means available for receiving and transmitting data from remote locations to a computer. Requires working knowledge of the principles and techniques of computer system documentation. Requires ability to effectively participate in and profit from formal and in-service training programs. Requires ability to analyze data logically. Requires ability to maintain satisfactory working relationships with others. Requires the ability to follow oral and/or written instructions and to carry out routine operations, once established, without further instructions. Requires sufficient oral and written communication skills for effective engagement with colleagues and internal users/customers. Requires awareness and adherence to organizational standards for security, privacy and ethics. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Required to lift, carry and push/pull up to 50 lbs. Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume, or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).     Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability . Powered by JazzHR

Posted 30+ days ago

C logo
cFocus Software IncorporatedSpringfield, VA
The ISSO serves as the principal advisor to the DHS Geospatial Information Infrastructure (GII) System Owner. This position provides security guidance, oversight, and technical expertise based on Department of Homeland Security (DHS) directives, policies, and standards. The ISSO ensures that security controls are implemented, maintained, and compliant with all DHS security requirements and the GII Security Plan (SP) . The ISSO operates under the authority of the System Owner (SO) , a government employee, and is responsible for ensuring the continuous monitoring, assessment, and documentation of system security across all environments supporting DHS geospatial systems. Key Responsibilities Serve as the principal security advisor to the GII System Owner. Ensure implementation and maintenance of security controls in accordance with DHS policies and the GII Security Plan. Perform Information Security Continuous Monitoring (ISCM) , including: Automated security management and credentialed scans. Review and adjudication of findings from continuous monitoring and mitigation activities. Support assessment, authorization, certification, and accreditation activities (ATO/ATC). Execute Plan of Actions and Milestones (POA&M) and remediation processes per DHS MD 4300A. Update the Contingency Plan annually , execute it, and report on outcomes. Review Change Control Board (CCB) submissions for security compliance. Create and update (but not finalize) key artifacts, such as: Memorandum of Agreements (MOAs) Interconnection Security Agreements (ISAs) Privacy Threshold Assessments (PTAs) Privacy Impact Assessments (PIAs) Respond to Information Security Vulnerability Management (ISVM) notifications. Monitor and report on system security posture, ensuring compliance with DHS Sensitive System Policy (MD 4300A). Support DHS cyber investigation and data call responses related to system security. Ensure compliance with Federal Information Security Modernization Act (FISMA) and DHS directives. Required Experience The SOW specifies that the ISSO must meet or exceed the GTSS 3.0 “Information System Security Officer” labor category standards. While the document does not include the exact GTSS labor category details, these positions typically require: Minimum of 7–10 years of IT security or cybersecurity experience. At least 3–5 years of experience specifically as an ISSO or in an equivalent federal security compliance role. Required Certifications The ISSO must be qualified and credentialed in alignment with DHS 4300A Sensitive Systems Policy , which implies one or more of the following certifications (based on DHS and DoD 8570.01-M standards): Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Authorization Professional (CAP) CompTIA Security+ CE GIAC Security Essentials (GSEC) Required Tools & Technologies The ISSO role requires familiarity and practical experience with: DHS ISCM tools (e.g., Swimlane, Tenable/Nessus, Splunk, or equivalent SIEM tools). Vulnerability Management Systems (for ISVM response). Change Management Systems (e.g., ServiceNow, Jira). Plan of Action & Milestone (POA&M) tracking and reporting tools. Compliance Frameworks: NIST SP 800-37, 800-53, 800-137, FISMA. Documentation & Reporting Tools: Microsoft Office Suite, Confluence, or DHS-provided templates. Cloud Environments: AWS (federal GovCloud), ESRI Geospatial Cloud integration, and DHS enterprise networks. Powered by JazzHR

Posted 30+ days ago

L logo
Lucayan Technology Solutions LLCTampa, FL
Location: Tampa, FL (Onsite) Employment Type: Full-Time, Regular Department: Intelligence Operations and Analysis Security Clearance: Secret clearance required; active TS/SCI preferred Hours: Standard duty hours, Monday–Friday (mission support may require flexibility, evenings, or weekends) About Us At Lucayan Technology Solutions LLC , we deliver secure, innovative solutions in support of national defense and intelligence missions. As a trusted government contracting partner, we provide top-tier technology and intelligence services that safeguard our nation. Our team is mission-driven, and we are committed to building careers that matter. Job Summary Lucayan Technology Solutions is seeking an Information Environment Analyst to support social media and information operations programs in Tampa, FL. This role involves conducting online and social media research, applying cultural and linguistic expertise, and supporting Military Information Support Operations (MISO). The analyst will monitor regional information environments, identify key communicators and narratives, and deliver assessments that inform operational planning and senior decision-making. Key Responsibilities Conduct online and social media research to identify regional issues, ideological trends, and influencers . Support planning and execution of internet-based MISO and information operations . Apply cultural and linguistic expertise to analyze and interpret online content. Develop and deliver briefings, multimedia reports, and written products for senior decision-makers. Monitor emerging information technologies and platforms and recommend improvements. Provide open-source intelligence (OSINT) support to mission partners. Collaborate with DoD, IC, and interagency stakeholders to synchronize operations. Work Environment Onsite position located in Tampa, FL . Fast-paced, mission-critical environment supporting U.S. defense operations. Must be comfortable working in multicultural and dynamic settings . Less than 10% travel required. Minimum Qualifications Clearance: Active Secret clearance required Eligible for TS/SCI (active TS/SCI preferred). Citizenship: U.S. Citizenship required. Education: Bachelor’s degree in International Relations, Communications, Information Technology, or related discipline (or equivalent experience). Experience: 3+ years of experience in social media analysis, OSINT, or information operations. Strong written and verbal communication skills. Proficiency in Microsoft Office Suite. Required Certifications None required. Training in OSINT, social media analytics, or MISO support preferred. Preferred Qualifications Prior experience with Military Information Support Operations (MISO) . Department of Defense or military background. Experience presenting intelligence products to senior leaders. Employment Details Seniority Level: Mid-Level Employment Type: Full-Time, Regular Job Function: Social Media Research, OSINT, Intelligence Operations Industry: Defense & Space, Government Contracting Travel: Less than 10% Why Lucayan? At Lucayan Technology Solutions , you’ll join a mission-focused team working at the intersection of intelligence, social media, and information operations. We value our people as the key to our success and provide opportunities to grow professionally while making a direct impact on national security. Apply Now to leverage your expertise in information environment analysis where it matters most. Powered by JazzHR

Posted 30+ days ago

BTI logo
BTIAlbany, NY
Business Technology Integrators (BTI) is seeking a Lead Information Desk Supervisor to oversee the Information Desk operations at the Stratton VA Medical Center in Albany, NY. The Supervisor will manage Information Desk personnel and ensure that veterans, families, visitors, and employees receive prompt, courteous, and accurate assistance in alignment with the VA’s values of service, respect, and commitment. This position requires leadership, strong communication skills, and the ability to maintain operational excellence in a healthcare facility environment. Responsibilities Supervision & Staffing Oversee all Information Desk personnel and daily desk operations. Ensure coverage during all required hours: Monday – Friday: 7:00 AM – 7:00 PM Saturday – Sunday: 8:00 AM – 6:00 PM Ensure trained backup personnel are available to cover absences, breaks, and emergencies. Performance Monitoring & Training Monitor staff interactions to ensure compliance with the Quality Assurance Surveillance Plan (QASP) standards for accuracy, responsiveness, courtesy, and professionalism. Provide coaching, mentoring, and corrective feedback to staff as needed. Ensure all personnel complete required On-the-Job Training (OJT) and remain familiar with facility layout, departmental operations, and emergency procedures. Emergency Preparedness Ensure personnel are trained and prepared to respond effectively during emergencies, including medical crises, facility evacuations, and communication disruptions . Act as a point of escalation during incidents to ensure rapid and effective response. Reporting & Issue Tracking Review logs of reported issues related to switchboard, telephones, and paging communications. Track problem resolution and coordinate with the VA Police and Project Manager for follow-up and corrective action. Maintain accurate records of daily desk activities and operational reports. Customer Service & Representation Ensure veterans, families, and visitors receive clear and courteous information, directions, and assistance. Foster a professional and welcoming environment that reflects the VA’s values of service, respect, and commitment. Qualifications Prior supervisory or lead experience in a customer service, information desk, healthcare, or communications environment . Strong interpersonal, leadership, and coaching skills with the ability to manage and motivate staff. Ability to work under pressure, adapt to changing conditions, and manage stressful situations calmly and effectively. Knowledge of facility operations, communications systems (telephone, paging, radios), and VA Medical Center procedures (preferred). Excellent problem-solving, organizational, and documentation skills. Must complete at least one full week of OJT to ensure readiness for supervisory responsibilities. About BTI Business Technology Integrators (BTI) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) with over 25 years of experience providing innovative solutions to the Federal Government. BTI is committed to supporting our nation’s veterans by delivering professional services with integrity, respect, and excellence. Powered by JazzHR

Posted 30+ days ago

T logo
Tetrad Digital Integrity LLCAshburn, VA
Tetrad Digital Integrity (TDI) is a leading-edge cybersecurity firm with a mission to safeguard and protect our customers from increasing threats and vulnerabilities in this digital age. The ISSO plays a critical role in ensuring security compliance, system resilience, and secure modernization of infrastructure and applications. This position requires deep technical expertise in systems engineering, cloud computing, and artificial intelligence (AI) technologies, combined with extensive governance, risk and compliance experience. RESPONSIBILITIES: Provide cybersecurity oversight for major customer applications and general support systems. Apply ISSO expertise across hybrid enterprise environments, including cloud-native platforms (AWS, Azure, Google Cloud Platform), containerized workloads, and virtualized infrastructure. Integrate AI/ML-driven security tools (threat detection, anomaly detection, behavioral analytics, predictive risk modeling) into security operations and compliance frameworks. Develop, draft, review and endorse all information systems security plans and other security authorization artifacts and documents such as: Standards for Security Categorization of Federal Information and Information Systems (FIPS 199) Assessment, E-Authentication Determination, Privacy Threshold Analysis (PTA), Privacy Impact Assessment (PIA), Risk Assessment Plan, System Security Plan (SSP) and Configuration Management Plan and Section 508 of the Rehabilitation Act Plan Plan of Action & Milestones (POA&Ms) Policy waiver and Risk Acceptance request Ensure that assigned systems are operated, maintained, and disposed of in accordance with applicable policies and procedures NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05D), and internal CBP (i.e., Office of Information Technology, Security Operations Division, etc.) security policies and practices Develop, review, maintain, and provide system security documentation for assigned systems, including System Security Plans, Interconnection Security Agreements, Contingency Plans, Plans of Action and Milestones, (POA&M), Waivers, and Exceptions through the DHS FISMA system management tool in use to implement and manage the NIST Risk Management Framework. Complete all activities required by the DHS Ongoing Authorization (OA) Program to transition assigned systems into the DHS OA Program and perform all required actions to maintain system authorization under OA once the system is admitted to the Program Assist the Government with the reporting and management of system level security violations and incidents and technical security evaluation of threats and vulnerabilities involving new/enhanced technology. Provide oversight to vulnerability scanning processes and procedures and security patch management/flaw remediation processes and procedures. Assist with the development of cyber security SOPs, playbooks, work instructions, and other procedures and processes to mature cyber security capabilities with consideration for cloud security architectures and AI-enabled systems. Ensure cloud-based systems and AI applications align with Zero Trust principles and customer policy. Lead technical security evaluations of threats, vulnerabilities, and risks specific to cloud workloads and AI-driven technologies. Support the development of cybersecurity SOPs, playbooks, and AI/automation-enhanced workflows to mature SOC capabilities. QUALIFICATIONS: Must be a US Citizen. Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related discipline (Master’s preferred). 8–12 years of IT/cybersecurity experience (or 6+ years with a Master’s). 5+ years as an ISSO supporting major federal information systems/applications. Strong systems engineering foundation with proven cloud computing expertise (AWS, Azure, GCP, or equivalent). Hands-on experience with AI/ML tools for cybersecurity, such as anomaly detection, automated risk scoring, or AI-driven SOC platforms. Working knowledge of auditing security controls, risk management, and compliance reporting. Superior writing, communication, and critical analysis skills. Deep understanding of Information Assurance, Information Management, and NIST Risk Management Framework (RMF). PREFERED QUALIFICATIONS: ISC2 Certified Information Systems Security Professional (CISSP) ISC2 Certified in Governance, Risk and Compliance (CGRC) ISACA Certified Information Security Manager (CISM) CompTIA Certified Advanced Security Practitioner (CASP+) Cloud certifications (AWS Certified Security, Azure Security Engineer Associate, Google Professional Cloud Security Engineer). Experience designing/assessing AI governance frameworks, bias/risk mitigation, and secure AI model deployment. TDI does business with the federal government, which restricts employment to individuals who are either US citizens or lawful permanent residents of the United States. “TDI is an Equal Opportunity Employer. Employment decisions are made based on individual qualifications, merit, and business needs. We do not discriminate in employment opportunities or practices based on race, color, religion, sex, or national origin, in accordance with applicable federal laws.” Powered by JazzHR

Posted 30+ days ago

Gen3 Technology Consulting logo
Gen3 Technology ConsultingWashington, DC
About us: Gen3 Technology Consulting is an SBA-certified Woman-Owned Small Business (WOSB) providing a diverse set of technology services and solutions to federal and commercial clients. Founded in 2017, Gen3 leverages over 25 years of information technology management and leadership experience to help our clients define, plan, manage, and achieve their strategic vision while protecting their critical IT assets. We attract and retain the highest caliber of talent by supporting an inclusive work environment, cultivating growth and leadership both professionally and personally, and encouraging work-life balance. We strive to make it our priority to be compassionate, family-friendly, respectful, and flexible. About the role: Gen3 seeks an Information Security Analyst to provide advanced cybersecurity analysis supporting Cybersecurity Information Protection Enhancement (CIPEC) program operations, data inventory and tagging policy testing, security assessments, monitoring, and compliance activities. Location: Remote, US Key Responsibilities: Conduct security assessments, Annual Security Compliance Assessments support, risk reviews, and compliance validation. Analyze Data Inventory and Tagging alerts, data movement events, exfiltration patterns, and incident response workflows. Assist with data labeling, sensitivity tagging, and audit trail improvements. Support the development of training, communications, guidance, procedures, and governance documents. Conduct data-flow analysis, document findings, and provide recommendations for improved protection s. Minimum Qualifications: Bachelor of science or engineering in computer science, and/or related fields. 7–10 years cybersecurity analysis experience. At least one of the following certifications or similar: CompTIA Security+, CISSP, CISM, CEH, CISA, or CISM. Familiarity with data loss prevention, data inventory and tagging, SIEM, encryption, identity and access management, and cloud security. Strong skills in documentation, incident analysis, and security operations. *Pending Award What's In It for You (full-time Gen3 employees): Competitive compensation. Comprehensive health, vision, and dental benefits. Generous PTO and 11 days of paid Federal Holidays. $3k annual tuition reimbursement. 401(k) with a matching plan. Pet insurance. Life and AD&D insurance. Short-term and Long-term disability insurance. Employment Eligibility: Eligible to work for any employer in the United States without requiring sponsorship. Most of our positions require a government security clearance, you must be a US Citizen or Green Card holder for consideration. Certain positions require at least three (3) of the past five (5) years of residence in the United States. Other Requirements: A minimum of three (3) out of the past five (5) years of residency in the United States is mandatory. Candidates must possess either an active green card or citizenship. Prospective employees offered a position must have work authorization that does not necessitate employer-sponsored visa sponsorship, both presently and in the future. Those selected for this role may undergo a government security investigation and must meet the eligibility criteria for accessing classified information or be eligible for security clearances. Location: Gen3 is currently focusing its hiring efforts in these states: Alabama, Arizona, Colorado, DC, Florida, Georgia, Kentucky, Maryland, Missouri, North Carolina, New Jersey, New York, Ohio, Oklahoma, Oregon, Pennsylvania, Texas, Virginia, and Wisconsin. Veteran and HubZone-friendly employer. E-Verify Employer. EOE Statement: Gen3 is an equal opportunity employer. We adhere to all federal regulations and ensure that our hiring practices are based solely on merit. We do not discriminate against any applicant based on race, color, sex, sexual orientation, gender identity, religion, national origin, disability, or veteran status. All qualified applicants will receive consideration for employment. Accommodation: Please contact the recruiting team at recruiting@gen3technology.com if you would like to request a reasonable accommodation during the application or interviewing process. Powered by JazzHR

Posted 1 week ago

BTI logo
BTIFort Meade, MD
Business Technology Integrators (BTI) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) with more than 25 years of experience delivering innovative IT solutions to the Federal Government. We specialize in supporting mission-critical programs across defense and federal agencies, with a focus on cybersecurity, program management, and enterprise IT solutions. Position Overview BTI is seeking an experienced Information Systems Security Officer (ISSO) to support the DISA TIBI program. The ISSO will ensure that all information systems meet security requirements and remain compliant with Department of Defense (DoD) and Federal security standards. This role requires hands-on expertise with security frameworks, risk management, and compliance, as well as the ability to work closely with technical teams and government stakeholders. Key Responsibilities Serve as the Information Systems Security Officer (ISSO) for the DISA TIBI program. Ensure compliance with all applicable DoD cybersecurity policies, including RMF (Risk Management Framework). Support accreditation and authorization processes for information systems in accordance with DoD and federal requirements. Develop, update, and maintain security documentation (System Security Plans, POA&Ms, risk assessments, etc.). Monitor information systems for security vulnerabilities and implement appropriate mitigations. Coordinate with Government security officials, system owners, and program leadership to ensure security controls are in place and effective. Provide guidance, assistance, and training on security requirements to technical teams and junior staff. Participate in audits, inspections, and continuous monitoring activities. Required Qualifications Active Secret Clearance (minimum, required). Minimum of 8 years of demonstrated experience as an ISSO supporting a U.S. Government Agency or Department of Defense (DoD). Active CompTIA Security+ certification (must be documented and current). Proven knowledge of DoD cybersecurity requirements, policies, and frameworks (e.g., RMF, NIST, STIGs). Strong communication and collaboration skills with the ability to work across diverse technical and government teams. Experience maintaining security compliance documentation and supporting audits/assessments. Preferred Qualifications Experience supporting DISA or other DoD organizations. Additional cybersecurity certifications such as CISSP, CISM, or CAP. Bachelor’s or Master’s degree in Information Security, Cybersecurity, Computer Science, or a related field. Why Join BTI? Be part of a Service-Disabled Veteran-Owned Small Business dedicated to supporting national security and defense operations. Play a critical role in ensuring cybersecurity compliance for a mission-critical defense program . Collaborate with talented IT and cybersecurity professionals in a supportive team environment. Competitive salary and comprehensive benefits package. Apply today to join BTI as an ISSO and help drive the security success of the DISA TIBI program. Powered by JazzHR

Posted 30+ days ago

Innovatus Technology Consulting logo
Innovatus Technology ConsultingPatuxent River, MD
Job Title: Information Security Analyst, IntermediateCompany: Innovatus Technology ConsultingLocation: Patuxent River, MDSecurity Clearance: TOP SECRET (Required)Job Type: Full-Time About Innovatus Technology Consulting: Innovatus Technology Consulting is a leading provider of innovative IT solutions, specializing in delivering secure, cutting-edge technology services to government and commercial clients. We are committed to safeguarding critical systems and data through advanced cybersecurity practices.Job Summary: We are seeking an experienced Intermediate Information Security Analyst to join our team. The successful candidate will hold an active TOP SECRET security clearance and be responsible for planning, implementing, upgrading, and monitoring security measures to protect computer networks and information. This role involves ensuring robust security controls are in place to safeguard digital assets and critical electronic infrastructure. The analyst may also conduct cyber forensic analysis to respond to cyber threats across hardware and software environments. Key Responsibilities: Plan, implement, and upgrade security measures to protect computer networks, systems, and sensitive information. Monitor and assess security controls to ensure they effectively safeguard digital files and vital electronic infrastructure. Conduct cyber forensic analysis to investigate and respond to cyber threats, incidents, or breaches in hardware and software environments. Identify vulnerabilities and recommend mitigation strategies to enhance network and system security. Collaborate with cross-functional teams to ensure compliance with security policies, standards, and regulations. Stay current with emerging cyber threats, vulnerabilities, and industry best practices to maintain a proactive security posture. Assist in developing and maintaining incident response plans and procedures. Provide detailed reports and documentation on security incidents, forensic findings, and mitigation efforts. Why Join Innovatus Technology Consulting? Opportunity to work on mission-critical projects with a direct impact on national security. Collaborative and innovative work environment with opportunities for professional growth. Competitive salary and comprehensive benefits package including, health, dental, $401k and more. Powered by JazzHR

Posted 30+ days ago

C logo
cFocus Software IncorporatedDahlgren, VA
cFocus Software seeks a Sr. Information Management Specialist to join our program supporting the Department of Defense (DoD). This position is remote. This position requires the ability to obtain a Secret clearance. Qualifications: Six (6) years of professional experience in a broad-base Automatic Data Processing (ADP) services environment This position requires a DoD IAM III level certification Duties: Develop, implement, and maintain information and records management policies, processes, and systems in alignment with DoD and Navy regulations. Oversee the organization, classification, and lifecycle management of digital and physical information assets. Ensure compliance with Department of the Navy (DON) and National Archives and Records Administration (NARA) records retention schedules. Support data governance and configuration management efforts to maintain data integrity and traceability. Coordinate with IT and cybersecurity teams to ensure the protection of classified and sensitive information. Manage the creation, maintenance, and disposition of records in accordance with approved Navy information management procedures. Implement metadata standards, tagging, and indexing strategies to facilitate efficient data retrieval and analysis. Support audit and inspection readiness activities related to records and information management compliance. Train and mentor staff on information management procedures, security protocols, and document control systems. Maintain and update document repositories and electronic filing systems to ensure accessibility and compliance. Develop reports and metrics to track compliance, data quality, and information lifecycle activities. Serve as the subject matter expert (SME) for information management, providing guidance to stakeholders and leadership. Collaborate with program managers and contracting officers to ensure contract deliverables and documentation are properly archived and retrievable. Participate in continuous improvement initiatives to enhance information sharing, collaboration, and data governance capabilities. Ensure secure and compliant handling, transmission, and storage of controlled unclassified and classified information. Powered by JazzHR

Posted 30+ days ago

VISTRADA logo
VISTRADANew York, NY

$150,000 - $200,000 / year

Chief Information Security Officer (CISO) Vistrada is looking to hire strong Chief Information Security Officers (CISO). The CISO will provide strategic cybersecurity guidance and oversight to Vistrada clients by leading and managing their cybersecurity programs to help protect their infrastructure, data, people, and customers. Candidates should have extensive knowledge of cybersecurity best practices, industry standards, and regulations. They should also have strong communication, leadership, and project management skills, as well as the ability to work collaboratively with internal and external stakeholders. Job Responsibilities and Common Duties Include: Apply consultative and leadership skills to build high rapport with clients and team members. Provide expert security advisory, compliance and security program oversight, oversee security/compliance assessments, and prepare high-quality reports (including gap analysis, POAM, recommendations, and remediation planning). Lead and manage a team of security analyst(s) providing oversight, direction, expertise, and mentoring. Provide virtual chief information security officer services. Support clients on a fractional owner model. Act as an extension of client’s information security management and governance function. Develop, implement, and oversee information security programs. Assess, identify requirements for, and make recommendations on security controls and technologies. Develop security roadmaps and plans of action. Vendor and third-party risk management program support and due diligence. Develop business continuity and incident response plans. Focus on key performance indicators, metrics, security dashboards. Assist With Business Development. Work with potential new clients to understand and define business and technology needs, provide subject matter expertise to answer client’s questions and concerns, and identify and align services with client’s needs. Support statements of work, identify resource requirements, assumptions, estimates, and assist with responses to Requests for Proposals (RFPs). Identify client’s security and technology needs and identify business development opportunities as outcomes of assessment activities. Develop expert level content, participate in panel discussions and public speaking events, and attend conference exhibitor opportunities. Architect high quality security solutions to the needs of clients.   Perform other duties that may be assigned by management.  Required Experience / Skills: 10+ years of CISO experience working in related field(s). Expert knowledge of cybersecurity frameworks and regulations including: NIST, ISO, CMMC, PCI, COBIT, DFARS, HIPAA, etc. Hands-on incident response coordination and oversight experience. Strong understanding of IT Risk and components, including application, infrastructure, network, and vendors. Bachelor’s degree in Computer Science, Accounting, MIS, or comparable work experience. Develop and present management level materials to effectively communicate and message to stakeholders. Relevant certifications such as CISA, CISM, or CISSP, or similar experience. The annual pay range for this role is $150,000 - 200,000. Company Background:   Vistrada is a business, technology and management services firm dedicated to helping clients plan, design and implement initiatives supporting Cybersecurity, Business Transformation, Integrated Risk Management, and Managed Services. Vistrada provides seasoned expertise and a flexible team structure allowing agility and responsiveness to support client’s evolving needs. Our company operates nationally today with resources centered around NYC, Albany NY, Austin TX, Chicago, IL and Salt Lake City, UT. We have many resources who operate remotely and onsite as needed in a wider geography. Our business organization has four verticals and multiple cross competencies headed by leaders with more than 20+ years of experience on average Powered by JazzHR

Posted 30+ days ago

C logo
Cambridge International Systems IncPhiladelphia, PA
Information System Security Officer – Top Secret Clearance | Philadelphia, PA Cambridge International Systems, Inc. Join a dynamic global team united by shared values: commitment, integrity, and perseverance. At Cambridge, you’ll work alongside top talent worldwide, tackling some of today’s most complex and critical challenges in defense and security. We are currently seeking an Information System Security Officer to support operations in Philadelphia, PA. This is a full-time, CONUS position requiring an active DoD Top Secret clearance. This position is contingent upon contract award in October 2025. What You’ll Do Serve as an ISSO supporting RMF compliance and cybersecurity for DoD systems. Implement and monitor security controls, ensuring adherence to NIST 800-53 and DoD policies. Conduct vulnerability assessments, threat analyses, and continuous monitoring using tools like ACAS, STIG Viewer, and eMASS. Support incident response activities, including isolating assets, collecting data, and reporting findings. Maintain RMF documentation (SSPs, POA&Ms, RARs) and ensure system accreditation packages remain current. Collaborate with system owners, administrators, and the ISSM to sustain system security posture. Track, report, and resolve cybersecurity findings while preparing for audits and inspections. What You’ll Bring Required Qualifications: Education & Experience: Bachelor’s degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university Technical Expertise: Six (6) years of experience implementing and coordinating cybersecurity policies across organizational levels, ensuring compliance with DoD and federal standards. Proven expertise conducting vulnerability assessments, threat analyses, and risk mitigation activities. Demonstrated ability to support cyber incident response — including isolating affected assets, performing initial investigations, collecting data, and providing detailed status reports. Certifications: Meets DoD IAM Level II baseline requirements — holding one or more of the following: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP OS/CE Qualification: As directed by Privileged Access Agreement and DFARS 252.239-7001 requirements. Must have a current and active DoD Top Secret security clearance. Proficient with modern IT tools and infrastructure technologies Travel & Passport Some overnight stays possible. Work Environment Compliance with vaccination and medical requirements for TDY/OCONUS roles as per Vaccine Recommendations by AOR | Health.mil . Office setting: Primarily an office-based role in Philadelphia, PA Standard desk/computer work with flexibility for walking and movement on site Must be able to work in an office environment, sitting at a desk, looking at a computer for most of the workday. Work is physically comfortable; the employee has discretion about sitting, walking, standing, etc. May be required to travel short distances to offices/conference rooms and buildings on site. Background & Security Employment is contingent upon successful background investigation Drug screening may be required for federal contract compliance Benefits & Perks We believe in investing in our team—both professionally and personally: Medical, dental, vision, life, accident, and critical illness insurance 401(k) immediate vesting and match Paid time off and company holidays Generous tuition & training support Relocation assistance Sign-on and performance-based bonuses Employee referral program Access to Tickets at Work, EAP, wellness initiatives, and more Join Us If you're driven by mission, technology, and teamwork—we want to hear from you. Cambridge is growing, and this position is just one of many opportunities on our global team. Know someone perfect for the role? Referrals are welcome—both employees and non-employees may qualify for a bonus. Apply today and help shape the future of secure cloud computing for national security. About Cambridge International Systems At Cambridge, innovation grows through diversity. We are proud to be an equal opportunity employer, committed to creating an inclusive and supportive work environment for all. Learn more at www.cbridgeinc.com . Powered by JazzHR

Posted 30+ days ago

M logo
Mantis Security CorporationReston, VA
Mantis Security is a leading specialty firm of high caliber talent who specialize in Cyber Operations, Cyber Defense, Information Assurance, Software Development, DevSecOps, Security Engineering, and Cloud Engineering. We enable and protect our nation's most important IT assets and invest in the long-term career development of every employee! We are currently looking for the next ISSO to join our team of experts! What you will be doing: Mantis Security is seeking for immediate placement a highly qualified and technical Information Systems Security Officer (ISSO) to lead the Assessment and Authorization (A&A) for multiple analytic mission systems. The ISSO must be proficient in standard A&A activities, and will generate and maintain the complete security body of evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF). The ISSO will work with the software engineers and cloud engineers to ensure applications and systems are developed to meet required security controls, as well as to promote proper security configuration. The candidate should possess 8570 IAT Level II baseline certifications and have working knowledge of the Risk Management Framework (RMF), along with other Intelligence Community (IC) and DoD policy and guidance (ICD 503, CNSSI-1253, etc.). All candidates must have current TS/SCI eligibility with the ability to obtain a CI polygraph to be considered. Duties Include: Support to the Assessment and Authorization (A&A) and all Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems Work with software engineers, DevOps engineers, release managers, and project management to follow A&A and ATO processes, and ensure Minimum Viable Product (MVP) and full releases are compliant and meet security requirements for continuous delivery to an AWS production environment Ensure validity and accuracy review of all associated security documentation Create and maintain System Security Plan (SSP), Security CONOPS, Security Test Plan (STP) and Security Test Procedures, document and maintain implementation details of NIST 800-53 security controls Plans and performs security functional testing, creates and maintains STPs, supports security assessments Utilize Xacta to maintain Security Body of Evidence (BoE) files and to work through the A&A process for each system release cycle Provide guidance on the application of security policy, identifying security requirements, providing technical guidance for the satisfaction of requirements, reviewing and determining the adequacy of required documentation Manage the plan of action and milestones (POA&Ms) by working with project managers and engineers to develop schedules and engineering actions that mitigate open findings Monitor and audit operational systems for proper use Must have: Bachelor’s degree with 9 years of experience, or Master’s degree with 7 years of experience, or no degree with 13 years of experience DoD 8570 IAT Level II certification requirements (one of CCNA Security, CySA+, GICSP, GSEC, Security+ CE, or SSCP) Must have current TS/SCI eligibility or Active TS/SCI Must be able to obtain a CI polygraph Nice to have: Proficiency with Xacta IA Manager (or Xacta 360) We believe that our strength is in our employees. We offer employees the chance to work with great people on projects of high importance and are committed to providing the best culture that foster’s technical innovation and personal growth. To help our staff achieve a productive work-life balance, we offer a full range of highly competitive benefits for our employees and their families. For more information visit our website at https://www.mantissecurity.com Powered by JazzHR

Posted 3 weeks ago

M logo
MetroSysChicago, IL
About the Role MetroSys is seeking a skilled Information Security Engineer II to support and lead efforts around vulnerability management within a dynamic, enterprise-scale environment. This individual will be instrumental in identifying and addressing security vulnerabilities across systems, networks, and applications. The ideal candidate brings a deep understanding of vulnerability scanning tools, remediation prioritization, and collaborative risk mitigation strategies. You will work closely with cross-functional teams to enhance the organization’s security posture and help ensure compliance with industry standards. If you thrive in fast-paced environments and are passionate about cybersecurity, this is an exciting opportunity to grow and make an impact. Key Responsibilities Lead the end-to-end vulnerability management lifecycle : scanning, analysis, prioritization, reporting, and remediation tracking. Perform regular vulnerability assessments and support remediation efforts in collaboration with infrastructure and application teams. Track and assess emerging threats and zero-day vulnerabilities using vendor bulletins and threat intelligence feeds. Generate reports and dashboards to communicate risk posture and mitigation progress to technical and executive stakeholders. Maintain and optimize vulnerability scanning tools to ensure full visibility and accurate detection across the environment. Assist in security incident response involving known or suspected exploited vulnerabilities. Support regulatory and compliance audits (e.g., PCI, NIST, HIPAA ) by providing documentation and metrics. Continuously improve processes, documentation, and tooling in the vulnerability management program. Qualifications Bachelor's degree in Computer Science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in information security, with a strong emphasis on vulnerability management. Hands-on experience with scanning tools (e.g., Tenable, Qualys, Rapid7). Solid understanding of network architecture , operating systems (Linux, Windows), and web applications . Familiarity with CVSS scoring , risk modeling, and remediation prioritization frameworks. Ability to work with scripting or automation tools (Python, PowerShell, Bash) is a plus. Excellent communication and problem-solving skills; ability to clearly explain security findings to non-security audiences. Experience with compliance frameworks such as PCI DSS, NIST, HIPAA , or ISO 27001 . Relevant certifications are a plus (e.g., CISSP, Security+, LFCS, RHCSA ). Powered by JazzHR

Posted 30+ days ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we believe security starts with the details. As an Information Systems Security Officer (ISSO), you will support the security posture of critical systems across their lifecycle. From assisting with risk assessments to maintaining compliance documentation, you’ll play a key role in protecting sensitive systems and data. Working alongside experienced ISSMs and ISSEs, you will gain hands-on experience with cybersecurity best practices in a collaborative, mission-driven environment.Independent Software is where innovation meets purpose. You'll join a team that values integrity, learning, and technical excellence. We offer the opportunity to work on impactful projects, grow your cybersecurity expertise, and contribute to real-world missions. With flexible work environments, strong mentorship, and a commitment to professional development, Independent Software is the place to launch or elevate your cybersecurity career. Key Responsibilities: Assist senior ISSOs in implementing and enforcing information systems security policies and standards Support the evaluation of security solutions for classified environments Perform basic configuration management for security software, hardware, and firmware Maintain records for systems including upgrades, firewalls, routers, switches, and other network components Develop and maintain required cybersecurity documentation such as System Security Plans (SSPs), Risk Assessment Reports, and other accreditation packages Assist in daily security operations and maintaining the system’s operational cybersecurity posture Track and manage user access control and authentication mechanisms Support vulnerability and risk assessments to enable system authorization Coordinate with engineers and customers to ensure compliance with IT security policies and NIST RMF Help manage and control system changes and assess their security impact Interact with system owners, customers, and IT staff to support cybersecurity objectives Required Skills and Qualifications: Strong foundational knowledge in IT or cybersecurity principles Experience with or understanding of system hardening, access control, or security policy implementation Ability to prepare, maintain, and review cybersecurity documentation Familiarity with vulnerability assessment and basic risk analysis Clear communication and collaboration skills to support interaction with teams and stakeholders Minimum of five years of combined work-related experience in IT, cybersecurity, or security authorization · Experience in at least two of the following areas is required: Current security tools Hardware or software security implementation Communication protocols Encryption tools or techniques Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or related technical discipline In lieu of a bachelor’s degree, an additional four years of relevant work experience may be substituted Certifications: Must be compliant with DoD 8570.01-M Minimum certification required: IAM Level I Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

i-Tech Support logo
i-Tech SupportOrlando, FL
Virtual Chief Information Officer (vCIO) Team: Business Alignment Role Summary The vCIO role is integral to the success of both clients and the MSP. The vCIO works to understand each client's business, technology use, and strategic goals to recommend solutions that enhance operational efficiency. By collaborating with the Managed Services Team, the vCIO aligns client technologies with industry standards through benchmarking, technology roadmaps, and strategic budgeting. This position requires balancing business acumen and technical expertise to optimize systems, reduce risk, and support growth. The vCIO also plays a crucial role in client retention through consistent engagement, satisfaction management, and identifying opportunities for additional professional services. Key Responsibilities 1. Client Engagement and Strategic Planning Initiate and manage MSP client relationships through onboarding and ongoing engagements. Establish and lead client steering committees and conduct Quarterly Business Review (QBR) meetings. Create and present technology roadmaps and budgets aligned with business goals. 2. Operational Excellence and Process Management Follow established Business Alignment (BA) processes and ensure smooth inter-departmental coordination. Use MSP tools for visibility, reporting, and management of client environments. Improve service metrics like tickets per endpoint per month (TPE/M) and average resolution time. 3. Technology Risk Management and Lifecycle Consulting Educate clients on cyber-risk management and implement strategies for protection. Manage technology lifecycle to ensure systems remain current and efficient. Advocate for appropriate upgrades and services, explaining needs and costs. 4. Communication and Team Collaboration Maintain transparent communication with clients and internal teams. Participate in meetings like Noise Abatement Process (NAP), Standards Committee, and Preflight Check-ins. Promote company values and contribute to the organization's culture. Accountability / KPIs Process Development & Optimization: Continuously refine BA processes. KPI Management: Track and report team metrics. QBR Engagement: Monitor scheduled and completed QBRs. Client Interaction: Evaluate engagement and satisfaction. Proposal Performance: Track proposal success rates. Competencies Business Acumen & Communication: Strong business insight and communication. Technical Proficiency: Expertise in relevant technologies with continuous learning. Organizational Skills: Efficient workflow and coordination. Task Management: Prioritization and multitasking under deadlines. Strategic Recommendations: Deliver impactful technology alignment insights. Qualifications Education: Bachelor's degree or equivalent experience. Technical Passion: Certifications or demonstrated expertise in technology. Business & Financial Acumen: Understanding ROI, P&L, TCO, and business models. Proven Track Record: Achievement of goals with strong client satisfaction and leadership. Benefits We offer comprehensive medical, dental, and vision insurance with competitive plan options We provide basic life insurance and long-term disability for all our employees 401k program with employer match to help you invest in your future Paid parental leave to support you and your family 22 paid days off (15 PTO + 7 National Holidays) Company issued laptop Company paid training as necessary Opportunities for professional development and growth Access to cutting-edge technology and resources

Posted 30+ days ago

T logo
Talent Acquisition ConceptsLinthicum, MD
Are you looking for a Challenge? Looking for an innovative organization and the opportunity to learn and grow professionally? At Terrestris, LLC, we are helping the government create better mission outcomes through better human performance. We are currently seeking an Information Security SME Instructor to develop, deliver, and maintain the Information Security curriculum. This position will have hybrid (subject to change) opportunities and is located Linthicum, MD. In this role you will be expected to: The ideal candidate will provide subject matter expertise in the development, delivery and maintenance of the Information Security Curriculum. This includes working with client program leads, management, technical staff in the design, conversion, development and delivery of training and certification projects, curricula, and products. Complete client Instructor Basic and Intermediate Certification as defined in the client Instructor Certification Manual Demonstrate mastery of Information Security knowledge, skills, and policy Instruct Information Security courses to include basic and advanced instructor- led courses in accordance with the course schedule Serve as a SME in response to student and customer inquiries with respect to Information Security Provide assistance to the Curriculum Manager in all phases of the ADDIE process, to include file management, and extensive course review from cradle to grave Review training material/deliverables and provide recommendations on the accuracy of and relevancy of content of instructor-led eLearning, webinars and performance support tools (i.e. storyboards, instructor guides, participant guides, design plans, and other related material) We're looking for someone who is/has: Bachelor's degree in the field of education from an accredited university. In lieu of a Bachelor's degree, five years of experience as an instructor for adult learners, in formal classroom or via distance learning courses related to DoD Security Policy Experience in Information Security Experience in Microsoft Outlook, Word, and PowerPoint Current TS/SCI security clearance Preferred Qualifications: Five years of work experience in Information Security All qualified applicants will receive consideration for employment without regard to race, color, religion, sexual orientation, gender identity, national origin, disability, age, marital status, ancestry, protected veteran status, or any other protected group or class. DILBERT © 2018 Scott Adams. Used By permission of ANDREWS MCMEEL SYNDICATION. All rights reserved.

Posted 30+ days ago

Centurum logo
CenturumSan Diego, CA

$41 - $53 / hour

The Information System Security Specialist III role encompasses a broad range of information security disciplines, including risk assessment, security architecture development, vulnerability management, compliance adherence, incident response, and cybersecurity. DUTIES AND RESPONSIBILITIES Risk Assessment: Conduct comprehensive risk assessments to identify vulnerabilities and threats to information assets, systems, and networks. Analyze potential impacts and develop mitigation strategies. Security Architecture Development: Design, develop, and implement security architectures, policies, standards, and procedures to protect information assets and systems. Compliance: Ensure compliance with relevant regulatory requirements, industry standards and organizational policies. Develop and maintain documentation to support compliance efforts, such as IATT, IA certification documentation etc. Cybersecurity: Implement and maintain cybersecurity measures to protect against cyber threats, including malware, phishing, ransomware, and other attacks. Stay abreast of emerging threats and vulnerabilities. Documentation: Maintain accurate and up-to-date documentation of security policies, procedures, and controls. Update patches to address vulnerabilities and support preparation and recurring scans/documentations to maintain IATT/ATO. Install, update, and troubleshoot systems/servers. Check system hardware availability, functionality, integrity, and efficiency. Conduct functional and connectivity testing to ensure continuing operability. Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing. Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. Develop and document systems administration standard operating procedures. Ensure the application of security patches for commercial products integrated into system design meets the timelines dictated by the management authority for the intended operational environment. Maintain baseline system security according to organizational policies. Identify and analyze anomalies in network traffic using metadataIsolate and remove malware. Identify applications and operating systems of a network device based on network traffic. REQUIRED SKILLS/YEARS OF EXPERIENCE Minimum of one (1) to three (3) years of experience in information assurance, cybersecurity, or a related field. Relevant certifications such as CompTIA, CISSP, CISM, Security+, or equivalent. Extensive knowledge of information security principles, practices, and technologies. Strong understanding of Department Of navy (DON) Risk Management methodologies and Frameworks (RMF). Proficiency in vulnerability management processes and tools. In-depth knowledge of security architecture and design principles. Examine network topologies to understand data flows through the network. Recommend computing environment vulnerability corrections. Bachelor's degree in Computer Science, Information Systems, or a related field. Demonstrated ability to immediately contribute to the organization's security posture with no supervision or training. Travel Required : 10% Work Location : San Diego, CA This position is required to have and maintain a Secret US DoD security clearance. PREFERRED SKILLS REMARKS Must be able to communicate effectively in English, both verbally and in writing.Must be able to interface effectively with all levels of technical and management personnel. Labor Category - Specialist, Information System Security I Compensation: $41 - $53 an hour.Compensation for positions at Centurum vary depending on a wide range of factors including, but not limited to, location, responsibilities, skill set, and level of experience.EOE M/F/Disability/VeteranWhen responding to this posting please reference job # SD25-75, Information System Security Specialist I (SATCOM) Benefits Full-time employees are eligible for the following benefits enrollment from their date of hire: Health Insurance - Centurum provides insurance for employee and dependent in a comprehensive package. Coverage for vision care is included. This option is available on a cost-sharing basis. Dental Insurance - Available in conjunction with Health Insurance for an additional cost. Provides oral maintenance care for employee and dependent. Basic Life Insurance - Company provided benefit for all full-time employees. Supplemental Life Insurance - Optional life insurance coverage to employees at group rates. Dependant Life Insurance - Optional coverage for dependents at a group rate. Long Term Disability Insurance - Optional coverage available to employees at group rates. Vacation and Sick Leave - Leave accrual is determined by length of service. Holidays - The company observes ten paid holidays each year. Retirement 401(k) Plan - Centurum’s corporate benefits package includes 401K with a company bi-weekly match and a year-end profit sharing company match for all eligible employees. Investments can be made into selected funds under this plan. Centurum is an Equal Opportunity Employer, providing employment opportunities for all persons without discrimination on the basis of race, color, religion, sex, sexual orientation, national origin, age, disability, marital status, citizenship or any other characteristic protected by U.S. law. Centurum makes reasonable accommodations for persons with disabilities. Powered by JazzHR

Posted 1 week ago

Ansible Government Solutions logo
Ansible Government SolutionsTemple, TX
Overview Ansible Government Solutions, LLC (Ansible) is seeking multiple Medical Records Technicians Release of information positions to work with us in support of the Central Texas Veterans Healthcare System located at 1901 Veterans Memorial Blvd, Temple, TX 76504. The schedule is typically Monday-Friday, 8:00am-5:00pm. If you accept employment with Ansible, you must also acknowledge that any assigned schedule is subject to change at the direction of either Ansible or its customers. Ansible is a Service-Disabled Veteran-Owned Small Business (SDVOSB) providing Federal customers with solutions in many arenas. Our customers face wide-ranging challenges in the fields of health care, national security, and information technology. To address these challenges, we employ intelligent and committed staff who take care of our customers’ success as if it is their own. Duties and Responsibilities Process requests for medical records and health information in compliance with privacy regulations (HIPAA, VA policies) Review and verify authorization forms for release of information Ensure timely and accurate release of medical records to authorized parties Maintain confidentiality and security of patient information at all times Communicate with patients, healthcare providers, and third parties regarding information requests Track and manage workload volumes, meeting VA timeliness requirements Address backlogs and support ongoing technician competency through training and auditing practices Document all release of information activities according to VA standards Qualifications and Requirements Experience handling medical records and release of information in a healthcare setting Knowledge of HIPAA and other privacy regulations Familiarity with VA policies and procedures for release of information Strong attention to detail and accuracy Ability to manage workload and meet deadlines Effective communication and customer service skills Commitment to maintaining confidentiality and security of patient information No sponsorship available All candidates must be able to: Sit, stand, walk, lift, squat, bend, twist, and reach above shoulders during the work shift Lift up to 50 lbs from floor to waist Lift up to 20 lbs Carry up to 40 lbs a reasonable distance Push/pull with 30 lbs of force All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Powered by JazzHR

Posted 4 days ago

S logo
SERVISS LLCWashington, DC
About SERVISS At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Information Assurance Professional. Position Summary We are seeking a dynamic and versatile Information Assurance Professional to support a high-impact U.S. Government program. The ideal candidate brings a rare balance of hands-on technical acumen and governance expertise—able to move seamlessly between engineering, architecture, and GRC functions. This role is pivotal in ensuring that systems are not only compliant but also resilient, secure, and aligned with federal risk management frameworks. Key Responsibilities · Serve as a trusted IA advisor, bridging technical engineering efforts with cybersecurity policy, governance, and risk management. · Collaborate with system architects and engineers to design secure solutions that meet compliance and mission requirements. · Support the development, review, and maintenance of key authorization documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms). · Guide system owners and developers through the Risk Management Framework (RMF) process and associated controls (e.g., NIST 800-53, 800-171, CMMC, FedRAMP). · Translate complex technical risks and mitigation strategies into actionable GRC documentation and executive communications. · Conduct system security assessments, gap analyses, and continuous monitoring activities. · Coordinate with cybersecurity operations, incident response, and engineering teams to align IA strategy with operational realities. · Recommend and help implement security architecture improvements based on evolving threat and compliance landscapes. · Track and report on IA posture, risk status, and compliance progress across multiple systems or program areas. Required Qualifications · 10+ years of experience in information assurance, cybersecurity engineering, or GRC. · In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP). · Strong technical foundation with the ability to understand complex systems, architectures, and security configurations. · Excellent verbal and written communication skills, including experience preparing formal security documentation and reports. · Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams. · Bachelor’s degree in Cybersecurity, Computer Science, Engineering, or a related field; or Associate’s degree with 2+ years of additional relevant experience. Preferred Qualifications · Prior experience supporting U.S. federal agencies or DoD environments. · Professional certifications such as CISSP, CISM, CAP, CCSP, or Security+. · Experience with security automation tools and continuous compliance approaches. · Understanding of Zero Trust principles, DevSecOps environments, and modern system architecture. Why Join SERVISS Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way. Freedom to Thrive. · Be part of an exciting company with ground floor opportunities to include equity · Highly competitive compensation and best in class benefits · Opportunities for annual performance bonuses, growth incentives, and profit-sharing · 100% of medical, vision, dental, and life insurance premiums covered by SERVISS · 401(k) retirement plan with company match for the first 6% Note:  This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025. Powered by JazzHR

Posted 30+ days ago

A logo

Information System Security Specialist III

AERMOR LLCNorfolk, VA

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Location: Norfolk, VAClearance: Secret Position Type: Full-TimeAERMOR is seeking an Information System Security Specialist III to provide advanced cybersecurity and information assurance support to ensure the protection, compliance, and accreditation of information systems. This role requires hands-on expertise with Risk Management Framework (RMF), information assurance tools, and security evaluation processes to support Authority to Operate (ATO) requirements. The Specialist will oversee and maintain security postures, evaluate security solutions, and ensure compliance with applicable federal and DoD cybersecurity policies and standards.This is not a remote position. Responsibilities:
  • Apply cybersecurity, engineering, and Test & Evaluation (T&E) knowledge to support security planning and execution.
  • Demonstrate working knowledge of the Risk Management Framework (RMF) process; experience with DIACAP is also applicable.
  • Utilize Information Assurance tools such as: DISA Enterprise Mission Assurance Support Service (eMASS) and Assured Compliance Assessment Solution (ACAS).
  • Assist with the preparation and maintenance of process artifacts, traceability documents, and compliance evidence to support ATO requirements.
  • Evaluate security solutions to verify compliance with security requirements for processing up to classified information.
  • Supervise and/or maintain the operational security posture of assigned information systems and programs.
  • Develop or assist in developing system security policies.
  • Ensure compliance with change management and configuration control processes.
  • May be required to hold Interim Security Control Assessor qualification.
Required Experience:
  • Bachelor’s degree with 5 years of practical experience, OR High School/GED with 7 years of practical experience.
  • Demonstrated competency in Cybersecurity, Engineering, Test & Evaluation (T&E), or Assessment & Authorization (A&A)/ Certification & Accreditation (C&A).
  • Familiarity with security policies, standards, and guidance documents.
  • Strong background in RMF, DIACAP, and related security compliance processes.
  • Experience with eMASS, ACAS, and other security assessment tools.
  • Must hold Information Assurance Technical (IAT) III certification.

Powered by JazzHR

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall