landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

S
Spectrum Comm IncNorfolk, VA
Spectrum is seeking highly qualified Information Assurance Analyst to support our proposal for a new program located in Norfolk, VA. General Experience: Candidates must have a minimum of three (3) years of job-related experience acquired in the field of information assurance and cybersecurity. In addition to job experience, candidates will be required to undergo annual training and continuing education to keep up with the latest developments and best practices in the industry. Furthermore, candidates must meet and maintain the minimum credential requirements as outlined in the Department of Defense (DoD) 8570.01-M, Information Assurance Workforce Improvement Program, and the DoD 8140.01. Requirements Requirements: Responsibilities: Process access requests for enterprise, non-enterprise, and command-specific applications, and maintain the command database of these records. Handle requests for new access tokens, revokes, and re-issues. Process requests for database updates to the command application management system. Manage the cybersecurity budget, including maintaining financial records, developing purchase requests, reviewing compliance of requests, and tracking requests using command-provided applications. Create cybersecurity digital media for the command SharePoint site, plan of the week, and email campaigns to support cybersecurity awareness. Develop, review, and provide guidance on DoN and command cybersecurity programs, standard operating procedures, and instructions. Ensure personnel provided by the contractor meet or exceed the AQL: 100% Compliant requirement. Perform all duties of Task 4, paragraphs 5.1 through 5.7. Develop information systems assurance programs and control guidelines in accordance with the Risk Management Framework (RMF) and the current approved DoD and DoN Assessment and Authorization (A&A) standards. Develop, review, and advise on system Plan of Action and Milestones (POA&M), new/existing cybersecurity policies and instructions, A&A packages, and system security controls. Interface and respond to cybersecurity and A&A requirements from Echelon II/III commands, designated Navy Authorizing Officials (NAO), and designated Functional Authorizing Officials (FAO). Support command cybersecurity inspections and audits, including Command Cyber Readiness Inspections (CCRI) and Inspector General (IG) audits. Serve as a member of the command Configuration Control Board (CCB). Benefits Health Care Plan (Medical, Dental & Vision) Retirement Plan (401k) Life Insurance (Basic, Voluntary & AD&D) Paid Time Off (Vacation, Sick & Public Holidays) Family Leave (Maternity, Paternity) Short Term & Long Term Disability Training & Development Wellness Resources Stock Option Plan

Posted 30+ days ago

Global Chief Information Officer-logo
DentonsBoston, MA
Dentons is designed to be different. We are driven to always be the firm of the future, to challenge the status quo, and to provide holistic business solutions to our clients in new and innovative ways. We are the lightbulb moments. The bold ideas. We are the world's largest global law firm, with 12,000+ people across 80+ countries. Driven by the diverse perspectives of our people, our clients, and our communities, we combine local knowledge with global insight. The Global Chief Information Officer (CIO) will lead the global technology function strategically, define a transformative vision, and provide high-impact leadership across a complex, multi-layered firm. This role is a strategic influencer tasked with aligning technology strategy to the global and regional business priorities and objectives. The Global CIO will champion collaboration across regions, optimize business processes, enable inorganic and organic growth. They will oversee the cost-effective provision of shared services, global platforms, and vendor ecosystems, while ensuring technology security and regulatory compliance. The CIO will also work closely with the members of Global governance bodies (GMC, Global Board etc.) and all the Global Chiefs and in particular the Global Chief Finance Officer to manage complex budgets and billing structures and with the Global Chief Security Officer on technology security. Responsibilities Strategic Vision & Operating Model: Develop and implement a Target Operating Model for the firmwide Technology function(s), including clarifying accountability over governance, funding, and delivery and support frameworks. Create a 5-year technology roadmap aligned with the Global CEO’s strategy and regional priorities. Influence and align regional and global stakeholders to ensure cohesive execution of technology initiatives. Lead and execute transformation efforts enabled by technology, as approved. Shared Services & Global Platforms: Build upon the shared services already provided for the regions. Define and monitor SLAs for shared technologies and services provided to the regions. Oversee the provision and performance of global technology services, digital technologies, applications, and data services. Ensure seamless integration of global platforms. Leadership & Collaboration: Lead and inspire a high-performing Global technology team; and align and inspire Regional IT leaders. Provide guidance on staffing and structuring to build upon and support the shared services delivery model. Foster cross-functional collaboration with practice, business, and security leaders. Vendor & Financial Oversight: Manage Global vendor contracts, billing processes, and performance accountability. Identify opportunities to reduce costs through strategic sourcing. Partner with the Global Chief Finance Officer to navigate procurement and complex budget structures. Security, Compliance & Risk: Collaborate with the Global Chief Security Officer to embed security and regulatory compliance into all technology initiatives and IT operations. Lead efforts to seek and retain compliance of managed technology assets with international cyber security standards including and not limited to ISO27001 and Soc2 Operational Excellence: Institute an IT Service Delivery model (e.g., ITIL) to maximize effectiveness and efficiency. Align tooling, policies, and standards to resolve gaps and drive modernization. Requirements Required Qualifications: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field. Master’s degree in Business Administration (MBA), IT Management, Organizational Leadership, or Strategy; advantageous. Required Experience: 15+ years in IT leadership roles, including: Leading firm-wide digital transformation Managing global IT operations and infrastructure Driving innovation and business process optimization 5+ years in executive-level roles (e.g., CIO, CTO, VP of IT) with direct reporting to C-suite leadership Skills & Knowledge: Mastery of enterprise architecture, cloud platforms, and infrastructure. Knowledge of cybersecurity frameworks and data privacy regulations. Familiarity with AI and other emerging technologies. Experience with IT service management (e.g., ITIL), DevOps, and software development lifecycle. Competencies & Critical Leadership Capabilities: Strategic & Business Knowledge Global Strategy Alignment: Ability to align IT initiatives with both global and regional business strategies. Target Operating Model Design: Expertise in defining and implementing shared service delivery models. Technology Road mapping: Experience developing long-term technology plans (e.g., 5-year strategy). Technical Expertise Enterprise Architecture: Deep understanding of scalable, secure, and compliant systems. Cloud Platforms: Proficiency in Azure, AWS, and hybrid environments. Cybersecurity & Compliance: Familiarity with global regulatory frameworks. Emerging Technologies: Awareness of AI., blockchain, and automation tools. IT Service Management: Experience with ITIL frameworks and service-level agreements (SLAs). Operational & Financial Skills Vendor Management: Ability to negotiate, manage, and evaluate global vendor contracts. Complex Budgeting: Skilled in navigating multi-layered, cross-regional IT budgets and billing structures. Asset & Risk Management: Oversight of IT assets, technical debt reduction, and audit remediation. Leadership & Collaboration Cross-Functional Leadership: Leading global teams and regional IT leaders in a matrixed environment. Stakeholder Engagement: Building trust and alignment across C-suite, regional, and functional leaders. Change Management: Driving transformation with empathy, clarity, and strategic foresight. Security Partnership: Collaborating with the Chief Security Officer to embed security into all IT operations. Communication & Influence Executive Communication: Translating complex technical concepts into business language. Cultural Intelligence: Navigating diverse teams. Client-Centric Mindset: Prioritizing user experience and client outcomes in technology decisions. The above is intended to describe the general content of and requirements for the performance of this job.  It is not to be construed as an exhaustive statement of essential functions, responsibilities or requirements. Benefits Remuneration and benefits package will reflect the successful candidates experience and country where hired.

Posted 1 week ago

S
Spectrum Comm IncFalls Church, VA
Position Overview The Information Systems Security Officer (ISSO) is responsible for ensuring that all IT systems remain compliant with applicable cybersecurity policies, regulations, and standards. This role manages the full lifecycle of system authorizations, risk assessments, and security controls, providing direct support to system owners and IT teams to maintain security accreditation. Key Responsibilities Manage the Risk Management Framework (RMF) process for assigned systems, including security control implementation, assessment, and continuous monitoring. Maintain and update security documentation, including System Security Plans (SSP), Plans of Action and Milestones (POA&M), and incident response procedures. Coordinate and conduct security assessments, vulnerability scans, and compliance reviews. Serve as the primary liaison between cybersecurity personnel, system administrators, and program management regarding system security matters. Enforce organizational security policies and procedures in line with DoD and federal requirements. Support incident response activities, including investigation, reporting, and remediation. Requirements Required Qualifications Bachelor’s degree in cybersecurity, computer science, or related field. 5+ years of experience in information assurance or cybersecurity compliance roles. Strong knowledge of NIST, DoD, and FISMA requirements. Certifications DoD 8570 IAT Level III or IAM Level II certification required (e.g., CISSP, CISM, CAP). Security Requirements Active or interim Secret clearance required at the time of hire. Benefits Health Care Plan (Medical, Dental & Vision) Retirement Plan (401k, IRA) Life Insurance (Basic, Voluntary & AD&D) Paid Time Off (Vacation, Sick & Public Holidays) Family Leave (Maternity, Paternity) Short Term & Long Term Disability Training & Development Wellness Resources Stock Option Plan

Posted 1 week ago

Health Information Management Coder/Coordinator (On - Site)-logo
Reno Behavioral Healthcare HospitalReno, NV
Responsible for assisting in day-to-day operations of the HIM Department. Primary responsibilities include but are not limited to: Answering phone calls; scanning documents; emptying binders Reviews clinical documentation and assign medical codes. Tracking, processing, and evaluating requests for release of information (ROI). Demonstrates knowledge in HIPAA standards Demonstrates knowledge of existing and emerging requirements related to privacy and confidentiality of health information Follows all policies, protocols, and standards of the HIM process Demonstrates the ability to gather data, compile information for the preparation of reports Assigns and sequences ICD10CM/CPT/HCPCS codes to diagnose and procedures for documented information Abstracts all necessary information and assigns codes (ICD10, CPT, HCPCS) Requirements High school diploma, GED or equivalent required Coding Certification required or in school for it Minimum one (1) year administrative experience preferred Previous experience in a psychiatric setting preferred Ability to maintain information as highly confidential Knowledge of applicable laws, standards, and regulations affecting health information systems, specifically in behavioral health service areas. Benefits A full benefits package is available the first of the month following just one month of employment! Medical (three plans to choose from) Dental (two plans to choose from) Vision Life Insurance options, including plans for spouse and children, 401(k), Pet Insurance, Identity Theft insurance, Tuition Reimbursement, Short Term Disability, Long Term Disability and a very generous PTO plan and more!

Posted 30+ days ago

H
H&HNew York, NY
H&H is seeking an experienced CIO to lead our IT strategy, drive innovation, and build a high-performing team. This role will develop and execute an IT roadmap that aligns with business goals, overseeing infrastructure, applications, and services. As a key strategic partner, the CIO will collaborate with leadership, manage IT resources, and enhance technological capabilities. With over 138 years of experience, H&H is a trusted full-service infrastructure engineering firm. Our clients, including infrastructure owners, contractors, and colleagues, rely on us for intricate and innovative engineering solutions. They trust our time-tested ability to manage the entire life cycle of a project, from the study and planning phase through to design and construction. With over 600 talented employees located across 30 offices nationwide, H&H can efficiently and effectively handle assignments of all sizes, types, and delivery methods around the country and across the globe. Responsibilities: Develop and implement IT strategy supporting business growth Oversee IT infrastructure, enterprise applications, and operations Drive business transformation and process optimization Align IT initiatives with business objectives and stakeholders Lead and mentor the IT team, fostering a culture of innovation Ensure system security, data integrity, and IT governance Manage IT budgets, vendors, and technology partnerships Requirements Bachelor's in Computer Science, IT, or related field 20+ years of IT experience, 10+ in leadership, ideally in construction Proven success in business transformation and global IT management Strong leadership, communication, and problem-solving skills Expertise in cloud computing, cybersecurity, and IT service management Preferred: Master’s degree, IT certifications, or experience in engineering/construction Benefits Salary Range- $200,000-$250,000 annually. Salary commensurate with experience. We offer a professional work environment, a competitive salary, a benefits package, and 401(k). EOE M/F/DISABILITY/VETS

Posted 30+ days ago

Chief Information Officer (CIO)-logo
Edison State Community CollegePiqua, OH
Salary: $101,000.00 - $113,000.00 Annually Edison State Community College  invites qualified candidates to apply for the full-time position of Chief Information Officer (CIO). The Chief Information Officer is responsible for oversight and strategic implementation of the organization's information technology (IT) systems and infrastructure. The CIO aligns technology initiatives with the organization's goals and objectives to drive efficiency, innovation, modernization, and growth. This leader is responsible for developing and maintaining a strong culture of customer support service for the institution and provides strategic oversight of the IT department. To be considered, candidates should include cover letter, resume, and list of education/work experience, including job titles in chronological order when completing their online application. Edison State Community College is an EOE/AA Employer. Functional Responsibilities: IT Strategy and Planning: Execute a comprehensive IT strategic plan that aligns with the collegewide strategic plan. Evaluate and prioritize technology investments, ensuring alignment with the organization's short-term and long-term goals. Work with departmental staff, the campus community, and the senior administrative team to plan and implement information technology systems that provide superior support for academic functions and administrative desktop computing, making efficient use of financial and personnel resources. Leadership and Management: Provide strong leadership and management to the IT department, ensuring effective collaboration, communication, and coordination among IT staff and other departments. Foster a culture of customer service, innovation, teamwork, and continuous improvement within the IT organization. Set and manage priorities for the IT division. Supervise recruitment, retention, organization, and professional development of all IT staff in accordance with budgetary objectives and personnel policies. IT Governance and Compliance: Establish and enforce IT governance policies, standards, and procedures to ensure the security, integrity, and availability of information. Stay updated on industry best practices and regulatory requirements to ensure compliance. Assemble and prepare all reports and research as required by local, state, and national agencies for this division. IT Infrastructure and Operations: Oversee the planning, implementation, and maintenance of IT infrastructure. Act as liaison with vendors and managed services providers. Plan, implement, and support systems in a complex education environment. Provide technical direction and leadership to ensure infrastructure and applications are reliable, available, secure, and up to date for the college’s academic and administrative use. Oversee and provide leadership in the development of training related to IT hardware, software, and educational technologies. Digital Transformation: Drive digital transformation initiatives by identifying and leveraging emerging technologies that can enhance business processes, improve customer experience, and promote innovation and modernization across all college departments. Evaluate, implement, and manage software applications and technology solutions to optimize operational efficiency. Vendor and Budget Management: Manage relationships with technology vendors and service providers, negotiate contracts, and ensure the delivery of high-quality services and solutions. Develop and manage the IT budget, ensuring cost-effective allocation of resources and adherence to financial goals. Consolidate vendors and remove duplicate technology solutions in alignment with the IT Strategy Identify opportunities for the appropriate and cost-effective investment of financial resources in IT systems and resources, including staffing, sourcing, purchasing, and in-house development. Risk Management: Identify and mitigate IT-related risks, including cybersecurity threats, data breaches, and system failures. Develop and implement disaster recovery and business continuity plans to ensure the organization's ability to respond to and recover from IT disruptions. Stay abreast of technological advancements, industry trends, and competitive landscapes to identify opportunities for innovation and improvement. Participate in professional networks and attend industry events to expand knowledge and stay informed. Other duties as assigned by the Vice President of College Operations.   Requirements Required Knowledge, Skills, and Personal Qualifications: Exceptional customer service and leadership skills. Excellent written, verbal, interpersonal communication, and management skills. Ability to work effectively with all college constituents and possess the leadership capability necessary to build a highly effective technology division. Experience managing applications including but not limited to ERP, Productivity apps, Monitoring apps etc. Relate to all levels of the user community. Be a team player who motivates and educates other team members. Comprehend complex, technical subjects. Required Experience: 5 years of experience providing direct customer service in an IT-related industry. 5 years of increasingly responsible administrative and supervisory experience in an academic, industrial, or business setting is required, preferably at the community college level. Required Educational Background: Bachelor’s Degree in an Information Technology discipline or related field is required. Master's Degree preferred. College Teaching or IT Training experience highly desired. IT Support experience desired. Supervises Following Staff: Director of IT Services Database and Applications Developer External Managed Services Staff Any other personnel assigned to the division Other: Serve on Committees as assigned. Provide Coverage for special events. Provide evening and weekend coverage as needed. Ability to share on-call 24/7 availability. Benefits The following benefits are available to full-time Administrative employees.  Employees working less than thirty hours a week are ineligible.   Health & Life Insurance Edison State Community College provides excellent medical and dental plans with cost-shared premiums.  The college offers a reimbursement program to share a portion of the employee's out-of-pocket expenses. Each employee receives an accidental death and dismemberment insurance policy. Retirement Benefits Edison State Community College participates in the Ohio Public Employee Retirement System (OPERS). Based upon the Ohio Revised Code, 10% of an Edison State employee's gross salary is deposited into their individual OPERS account.  The college contributes an additional 14% which is not figured into the employee's base salary.    An option for an alternate retirement plan is also available.  Employee and employer contributions would be the same as above. Benefits that are not cost-shared by the college (available for payroll deduction): Vision Supplementary Life Insurance 403(b) Tax Deferred Annuities Vacation Administrative employees receive 4 weeks of vacation each year which begins accruing on the employee's first pay period.  After five years of employment with Edison State the administrative employee will receive 4.5 weeks each year and this once again increases to 5 weeks after ten years of employment with the college. Sick Leave Edison State employees receive 3 weeks of sick leave each year which begins accruing on the employees first pay period. Holiday Pay At the start of their employment employees are eligible to receive pay for the 11 holidays for which the campus is closed. Tuition Waiver Edison State employees receive 100% of their instructional fees waived for any Edison State courses they take.   Dependents (spouse or children) of full time Edison State employees receive the same 100% waiver for Edison State course instructional fees and dependents of part time employees receive a partial waiver. Tuition Reimbursement Edison State offers partial tuition reimbursement for continued education. Health Club Contribution Edison State will pay a portion of an employee's yearly premiums for a health club membership.  Memberships to some local YMCA organizations can be payroll deducted. The college also provides an on-site fitness center to employees, students and the community at no charge.

Posted 30+ days ago

Product Information Assistant Manager-logo
tarte cosmeticsNew York, NY
Job Title: Product Information Assistant Manager Job Summary: The Product Information Assistant Manager is responsible for managing, optimizing, and distributing product data across all relevant systems and internal channels. This role ensures that accurate, consistent, and high-quality product information is maintained to support business operations. Key Responsibilities: • Own and maintain the company’s Product Information Management (PIM) system. • Ensure accurate, complete, and enriched product data across platforms • Collaborate with product development, marketing, regulatory and other teams to gather and standardize product attributes. • Develop and enforce data governance standards, including taxonomy, naming conventions, and product attributes. • Oversee the import, mapping, and syndication of product data across ERP, PIM and third-party channels. • Identify and implement automation tools to streamline product data workflows. • Perform regular audits of product data to ensure compliance and quality standards. • Train internal stakeholders on PIM processes and tools. • Support global product launches and seasonal content refreshes. Desired Skills and Experience: • Bachelor’s degree in Marketing, Information Systems, Business, or a related field. • 3+ years of experience in product information management or related role. • Experience with ERP, preferably SAP or Microsoft NAVision. • Strong understanding of PIM systems • Proficient in Excel and data management tools. • Excellent organizational and communication skills. • Ability to manage cross-functional projects and work with global teams. • Experience working with data governance and taxonomy frameworks. Our Perks: Salary range: $75,000-85,000K (Compensation will depend on a variety of factors, including but not limited to skill level, relevant work experience & education) Medical, dental, vision, 401K plan & access to health & wellness programs Paid vacation, holidays, summer Fridays, birthdays off, volunteer time & more Makeup gratis, employee discount on tarte.com, team give back initiatives Friendly, fun, creative & collaborative work environment

Posted 30+ days ago

D
Desert Parkway Behavioral Healthcare HospitalLas Vegas, NV
The Coder reviews, analyzes, and codes diagnostic and procedural information that determines Medicare, Medicaid, and private insurance payments.  The primary function of this position is to perform ICD-10-CM, CPT and HCPCS coding for reimbursement.  The coding function is a primary source for data and information used in health care today, and promotes provider/patient continuity, accurate database information, and the ability to optimize reimbursement.   KEY RESPONSIBILITIES : Assigns and sequences ICD-10-CM/CPT/HCPCS codes to diagnoses and procedures for documented information. Assures the final diagnoses and operative procedures as stated by the physician are valid and complete. Abstracts all necessary information from health records to identify secondary complications and co-morbid conditions. Abstracts all necessary information and assigns codes (ICD-10, CPT & HCPCS), which most accurately describe each documented diagnosis, special therapy or procedure according to established guidelines. Determines the final diagnoses and procedures stated by the physician or other health care providers are valid and complete. Performs a comprehensive review of the record to assure the presence of all component parts such as: patient and record identification, signatures and dates where required, and other necessary data. Evaluates the record for documentation consistency and adequacy.  Ensures that the final diagnosis accurately reflects the care and treatment rendered.  Reviews the records for compliance with established third-party reimbursement agencies and special screening criteria. Provides educational opportunities with the providers. Notifies the physicians and follows up on the physician queries. Independently uses discretion and judgment to evaluate clinical documentation. Requirements High school degree or equivalent required CCS, CPC, or RHIT credential required or obtained within within 12 months of hire. Two (2) years of coding experience using ICD-10-CM or equivalency preferred. Two (2) years’ health care experience preferred. Maintains confidentiality of patients at all times. Skill in correlating generalized observations/symptoms (vital signs, lab results, medications, etc.) to a stated diagnosis to assign the correct code. Advance knowledge of medical codes involving selection of most accurate and descriptive code. Proficiency with software and/or equipment (Microsoft Office applications including Outlook, Word, Excel and PowerPoint.) Benefits A full benefits package is available the first of the month following just one (1) month of employment! Desert Parkway offers competitive benefits to include: Medical insurance Dental insurance Vision insurance 401K Retirement Plan Healthcare spending account Dependent care spending account PTO Plan with holiday premium pay Discounted cafeteria meal plan Life insurance (including plans for spouse and children) Short- and long-term disability (with additional buy-in opportunities) Pet Insurance Identity Theft Insurance

Posted 30+ days ago

Information and Planning SETA, Top Secret Clearance-logo
Blue Sky InnovatorsArlington, Virginia
Description: Seeking experienced Technical SETA candidates in support of DARPA to provide on-site support in the area of next-generation classified systems development. Successful candidates will provide expert technical advice and guidance to the government on all aspects of secure, multi-domain computing systems. Candidates will support and supervise performers conducting algorithm research and assessment, integration, test, prototype deployment, and transition of software systems for sensing, exchanging information, and planning for digital actions. The candidate will be responsible for coordinating meetings, assessing performer technical progress, projecting performer outcomes, and ensuring that project management best practices are followed by performers. The candidate will prepare and deliver technical reports, briefings, and presentations to government officials and technical stakeholders. Required Qualifications: Bachelor’s degree in Computer Science, Engineering, or a related field (Master's degree preferred). Minimum of 8 years of relevant experience in sensemaking/planning / C2 software, autonomous systems, and/or distributed software systems Substantial experience across one or more of the following fields: Information synthesis, estimation, tracking, and/or probabilistic reasoning algorithms Command and control software Distributed systems, software, and services Software algorithms for intelligent systems, planning, sensing, and orchestration Mission planning software, user interfaces, constraints, resources, and nuances Agent-based software architectures, implementations Distributed system communication and transport mechanisms Goal decomposition and planning algorithms Ability to work with little oversight to achieve team goals Excellent written and verbal communication skills, with the ability to effectively convey complex technical information to both technical and non-technical audiences. A high degree of initiative, excellent organizational skills, attention to detail, and reliability Familiarity with general systems engineering principles for complex systems development. Work performed onsite at DARPA in Arlington, VA in a SCIF environment (no regular telework or remote work) Travel may be required up to 10-20% of the time. Desired Qualifications : Experience operating in complex, contested, non-benign environments. Experience with Clandestine or Covert Operations (Desired) Experience with Cyber Operations (Desired) Experience with Embedded Systems Experience working with Special Access Programs (SAPs)/CAPs. Experience with Agile development methodologies. Clearance: Active Top Secret required. Blue Sky Innovators, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law. If you are a qualified job seeker with a disability or a disabled veteran, you have the right to request an accommodation if you are unable or limited in your ability to use or access http://www.blueskyinnovators.com as a result of your disability. To request an accommodation, please email us at careers@blueskyinnovators.com and provide your name and contact information. Please note: this is only for job seekers with disabilities requesting an accommodation.

Posted 1 week ago

Analyst, Information Security - Training & Awareness-logo
Sony PicturesCulver City, California
We are in the business of creativity… making some of the most beloved film and television of all time for every platform in the world. As the most creative and proudly independent studio, our future is boundless. Sony Pictures Entertainment (SPE) is a division of Sony Corporation, a creative entertainment company built on a foundation of technology. Along with our sister companies, we make movies, television, music and games that engage billions of people, connecting creators and audiences around the globe. We are looking for innovators to join us as we forge the future of entertainment! Summary: The Analyst plays a pivotal role in advancing Sony Pictures Entertainment’s security culture by delivering data-driven insights that inform, validate and improve security culture strategies. This role is responsible for analyzing behavioral data, gathering stakeholder feedback, analyzing program performance metrics and identifying opportunities for improvement. This analyst will work across various data streams, stakeholder feedback, and program performance metrics to provide visibility into the state of security awareness rates, improvement opportunities and escalation timing. They will also be responsible for identifying and recommending new, data-informed paths forward that improve program impact and engagement . Success in this role requires a strong foundation in data analytics, a keen understanding of human behavior in the context of cybersecurity, and the ability to communicate insights clearly through intuitive dashboards and reports. This position supports the broader Information Security mission by ensuring that awareness efforts are measurable, targeted, and continuously evolving to reduce risk and foster a culture of security across the organization. Purpose : Drive data-informed decisions for security awareness and culture programs by analyzing user behaviors, surfacing actionable insights, and measuring both qualitative and quantitative impact. In addition to evaluating effectiveness, this role also identifies new directions for strategy, content, or engagement tactics based on observed trends and behavioral insights. This role is critical in validating the effectiveness of experiments and ensuring the team focuses, selects, and prioritizes initiatives that build on a culture of security. Core Responsibilities Behavioral Data Analysis & CSTA measurements Interprets data from overall learning initiatives and simulations (e.g., click rates, report rates, escalation timing ) . Analyzes LMS engagement and outcomes (completion rates, quiz scores, drop-offs). Tracks human behavior KPIs and provide insights about potential opportunities ( e.g., MFA use, security reporting, secure browsing habits). Designs and analyzes satisfaction and effectiveness surveys for security campaigns , initiatives and trainings . Measures learner satisfaction, relevance, and clarity of content delivery. Correlate CSAT with behavioral data to determine alignment or misalignment between perception and impact. Proactively recommends new paths forward for awareness strategy, engagement, and content direction based on behavioral insights and data trends. Experimentation & Iteration Validation Supports MVP testing by defining success metrics and tracking outcome indicators. Designs A/B tests and pilots to compare effectiveness of formats, messages, or tactics. Communicates through data /metrics when an experiment should be scaled, refined, or retired. Participates in interviews and listening sessions with Lines of Business and internal partners. Documents key themes, unmet needs, recurring pain points, and success signals. Translates stakeholder insights into hypotheses or targeted focus areas for awareness campaigns. Strategic Insight & Data-Informed Direction Identifies and recommends new, data-informed paths forward for awareness strategy, content, and engagement based on behavioral trends and program insights. Connects findings from behavioral data, feedback, and performance metrics to shape future program priorities. Helps evolve the security awareness program by translating insights into actionable, forward-looking opportunities. Vendor & Procurement Support Partners with Procurement on vendor reporting, KPIs, QBRs, and platform evaluations. Tracks satisfaction and adoption across awareness tools (LMS, phishing platforms, simulation vendors/ tools). Aligns vendor performance data with internal cultural and learning metrics. Works closely with Director of Information Security Awareness & Training to identify and assess creative, marketing, and video production vendors for awareness campaigns. Education Requirement: Bachelor’s in Data Science , Data Analytics, Behavioral Science, Business Administration, Information Security , or a related field. Equivalent experience or certifications (e.g., Tableau, Power BI, SQL, xAPI ) may be considered . Relevant Experience /Skills 1 – 3 years of experience is ideal for this role, particularly in areas such as Data Analytics , Insights & Visualization , Security Awareness or Employee Engagement, and Reporting. Candidates should demonstrate a proven ability to analyze behavioral data, drive cultural change, and create impactful dashboards that provide clear visibility into trends and program effectiveness. Coursework or formal training in: Data analysis and visualization (e.g., using Power BI, Tableau, Excel, SQL) Security awareness programs or training design Behavioral analytics or user research Statistical methods, experimentation, or A/B testing methodologies Proficient in Power BI, Tableau, or Looker Studio; comfortable with Excel and SQL. Familiar with xAPI /LRS-based learning analytics, SCORM tracking, and LMS reporting. Build clean, user-friendly, intuitive dashboards and scorecards to track cultural maturity and engagement trends. Additional ideal c ertifications : CompTIA Security+, Certified Information Systems Security Professional (CISSP) Certified Analytics Professional (CAP) Certificates in data science tools (Power BI, Tableau, Looker Studio) LMS administration certifications Ideal Backgrounds Might Include: Data analyst with experience in cybersecurity or employee engagement. Customer experience analyst who understands satisfaction measurement and behavior analytics. The anticipated base salary for this position is $70,000 - $93,000. This role may also qualify for annual incentive and/or comprehensive benefits. The actual base salary offered will depend on a variety of factors, including without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location of the position. Sony Pictures Entertainment is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, age, sexual orientation, gender identity, or other protected characteristics. SPE will consider qualified applicants with arrest or conviction records in accordance with applicable law. To request an accommodation for purposes of participating in the hiring process, you may contact us at SPE_Accommodation_Assistance@spe.sony.com.

Posted 2 weeks ago

Assistant Director, Information Security-logo
Saint Joseph's UniversityPhiladelphia, Pennsylvania
Position Title: Assistant Director, Information Security Time Type: Full time Position Summary and Qualifications: The Assistant Director of Information Security plays a critical leadership role in executing the University’s information security vision and strategy. This position works closely with the Chief Information Security Officer (CISO) to implement and manage technical, policy, and compliance-based initiatives that safeguard University systems, data, and operations. The role is central to security operations, including risk management, incident response, audit coordination, and vendor reviews. The Assistant Director also leads efforts to strengthen the University’s information security awareness and training programs, fosters a culture of shared responsibility, and ensures alignment with institutional goals and regulatory obligations. Essential Duties & Responsibilities: Provides leadership and oversight for the day-to-day operations and technical aspects of the Information Security department, with a primary focus on identity and access management, GRC (governance, risk, and compliance), and network security/operations. Collaborates closely with those responsible for IAM functions in the Applications & Infrastructure division to strategically enhance the security awareness program, ensuring a robust understanding of information security and safe computing practices across the University community. Manages technical support and contributes expertise in overseeing vendor relationships pertaining to information security, including leading the formal review of university contracts with significant technology components. Utilizes and refines the vendor questionnaire process to thoroughly assess each vendor’s overall capabilities, including infrastructure, controls, security practices, regulatory compliance, and ability to safeguard University information assets, providing expert security opinions on vendor suitability. Participates in the investigation and assessment of security incidents, coordinating efforts with technology managers in IT and partnering effectively with the Office of General Counsel. Serves as a point of contact and escalation for security threats, potential breaches, and privacy issues, including sensitive matters involving law enforcement. Engages proactively with internal and external auditors and agencies on security and compliance matters, particularly during incident response scenarios. Partners with the IT Audit Analyst to develop and implement comprehensive strategies for addressing audits, assessments, and broader compliance efforts. Actively participates in the establishment of annual and long-term security and compliance goals for the department. Drives the creation and implementation of detailed security strategies, metrics, and reporting processes to monitor effectiveness and demonstrate progress. Develops, maintains, champions, and enforces robust data management and information security policies, standards, guidelines, and procedures, encompassing those for end users, system and application administrators, service providers, and legal/regulatory compliance. Initiates and develops communication and education initiatives aimed at elevating awareness of information security risks, along with mitigation strategies and protective measures implemented across the university. Engages actively with IT advisory councils, administrative, and academic units through committees, ensuring the cohesive development and consistent application of policies and standards across all technology projects, systems, and services, including privacy, risk management, compliance, and business continuity management. Collaborates extensively with stakeholders to conduct thorough risk assessments and business impact analyses, identifying vulnerabilities and assessing risk exposure. When risks are identified, provide expert recommendations on effective risk management strategies, including acceptance, avoidance, transference, and mitigation techniques to minimize potential impact on the university. Stays abreast of emerging governmental regulatory initiatives, security alerts, and relevant issues that could impact the university environment, proactively assessing their implications. Provides expert guidance, planning, and monitoring for adherence to various industry requirements (e.g., FERPA, HIPAA, PCI), influencing the implementation of relevant systems. Oversees the preparation and submission of required reports to external agencies, ensuring accuracy and timeliness Supervision includes: IT Audit Analyst (1); Network security analyst (1); Graduate Assistant/Student worker as funding permits This role provides direct management, technical guidance, mentorship, and project oversight to junior staff, analysts, and interns. May lead and manage specific security projects or work streams. Minimum Qualifications: ( Education/Training and Experience Required) Bachelor’s degree, preferably in Computer Science, Information Security, or a related field, OR an equivalent combination of education, training, and experience. Minimum of 4 years of progressive professional experience in information technology, with at least 2 years in a dedicated information security role (e.g., Identity and Access Management, Risk Management, Security Operations, Incident Response). At least 1 year of demonstrated direct experience managing people (direct reports ) in a professional capacity. Excellent written, oral communication, and presentation skills, with the ability to articulate complex security concepts clearly and concisely. Proven ability to effectively communicate technical and security information to diverse audiences, from technical teams to executive leadership. Demonstrated experience working with compliance and regulatory matters such as FERPA, PCI, HIPAA, and HEOA. Strong understanding and practical knowledge of NIST, GLBA, and GDPR frameworks. Superior troubleshooting and advanced problem-solving skills, with a track record of resolving complex security issues. Extensive experience in drafting and maintaining comprehensive security policies, standards, and related documentation. Proven ability to work autonomously while also fostering a highly collaborative environment. Demonstrated ability to effectively manage multiple, concurrent work streams and consistently meet internal deadlines in a dynamic environment. Preferred Advanced experience with Microsoft security technologies (Azure Security Center, Microsoft 365 Security, Azure AD IAM, CASB, SSO, MFA solutions). Industry-recognized security certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA). Experience with contract and vendor vetting processes, negotiations, and detailed document reviews from a security perspective. Demonstrated experience collaborating with General/External Counsel and various Law Enforcement agencies on security-related investigations and compliance. Physical Requirements and/or Unusual Work Hours: Will require prolonged periods of work at a computer workstation. Will require occasional evening and weekend hours to address critical issues or project demands. Must be available to respond to emergencies on a 7x24 basis and actively participate in the IT On Call rotation process. Saint Joseph’s University is a private, Catholic, Jesuit institution and we expect members of our community to be knowledgeable about – and to make a positive contribution to – our mission. Saint Joseph’s University is an equal opportunity employer that seeks to recruit, develop and retain a talented and diverse workforce. The University is committed to the diversity of its faculty and staff so that our students, our disciplines and our community as a whole can benefit from the multiple perspectives it offers. The University seeks qualified candidates who share our commitment to equity, diversity and inclusion. EOE Saint Joseph’s University prohibits discrimination on the basis of sex in its programs and activities, including admission and employment, in accordance with Title IX of the Education Amendments of 1972. The Title IX Coordinator is responsible for overseeing compliance with Title IX and other civil rights laws and regulations. To contact the Title IX Coordinator, e-mail titleix@sju.edu, visit Campion Student Center suite 243, or call 610-660-1145. To learn more about the University’s Title IX policies, the process for filing a report or formal complaint of sex discrimination, sexual harassment, or other form of sexual misconduct, and the University’s response to reports and/or formal complaints, please visit www.sju.edu/titleix . Inquiries may also be directed to the Federal agency responsible for enforcing Title IX, the U.S. Department of Education Office for Civil Rights . Pay Transparency & Benefits Overview Please click to read more about the university's approach to pay and benefits transparency. Adjunct instructor compensation can be found in the article. Otherwise, an estimated pay range is listed below. This position's estimated pay range is: $89,850.00 - $102,400.00

Posted 2 weeks ago

Information Systems Security Engineer (ISSE)-logo
CACIHampton, Massachusetts
Information Systems Security Engineer (ISSE) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 25% Type of Travel: Continental US * * * The Opportunity: CACI is seeking an Information Systems Security Engineer (ISSE) to support our Air Force Distributed Ground Systems-Experimental (DGS-X) program at Langley AFB, VA, Robins AFB, GA, and Hanscom AFB, MA. Responsibilities: Provide expert-level security support and guidance to engineering and technical IT-related activities within the organization. Continuously monitor all alert queues, triage security alerts, and conduct incident response and remediation efforts. Provide the technical support to maintain the confidentiality, integrity, and availability of the AF DCGS. Manage the processing of all organizational efforts through the risk management cycle, including closely coordinating and tracking risks, accreditation status, and reporting status across project teams. Work with SCAs and associated teams to improve the security of AF systems by reducing risk postures through the identification of risk reductions and mitigations. Perform Test and Evaluation (T&E); interview system SMEs; validate physical controls; HW/SW lists; topology and TPPS. In addition, document and provide on-site assessments. Perform a QA review of the risk scores and risk assessment reports. Ensure processes, enhancements, and sustainment activities are following NIST 800-53. Provide engineering services to support testing of SW that is enhanced and subsequently integrated into the AF DCGS as part of the sustainment lifecycle. Develop test scripts and conduct testing for the applications sustained within the AF DCGS database. Operational Testing shall ensure the system meets the operational needs of the user community. Throughout test events, the system’s information assurance and interoperability shall be assessed. Identify information assurance control impacts and likelihoods. Prepare a system risk rating and determine risk reduction measures based on information assurance control subject areas. Qualifications: Required: Active TS/SCI security clearance. DoD Directive 8570 IAT II certification (Security+ CE or equivalent). CASP or GSLC preferred. Bachelor’s Degree or higher in computer engineering or in a field related to the computer engineering or computer science disciplines. 3-10 years of RMF & ISSO experience, or an associate’s degree and 4 years of RMF & ISSO experience. Extensive experience in the use of Xacta 360 IA Manager to create System Security Plans (SSP). Working knowledge of Intelligence Community Information Assurance policies and regulations and how they relate to the assessment and authorization process. Experience authoring and maintaining systems security documentation, including documentation of security mitigations and successful completion of the ICD 503 accreditation process. Experience navigating the security and accreditation process to include Assessment & Authorization (A&A) of an IT system to Authority to Operate (ATO). Knowledge and experience in generating appropriate security documentation to receive proper accreditation and correcting security shortfalls as they are identified through agency-sponsored reviews. Experience with quality data collection techniques. Specific knowledge of AF DCGS RMF processes. Desired: Experience in at least two (2) of the following areas: Knowledge of Xacta 360 and Xacta.io Governance, Risk, and Compliance (GRC) automation software. Hardware/software security implementation, to include Secure Technical Implementation Guides (STIGs), Secure Content Automation Protocol (SCAP), Evaluate-STIG, ACAS/Nessus Vulnerability and Compliance Scanning tools. Air Force Intelligence Community (AF IC) Policies, Plans, and Procedures. ITIL v4 Foundation certification. This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you’ll be part of a high-performing group dedicated to our customer’s missions and driven by a higher purpose – to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You’ll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground — in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here . Since this position can be worked in more than one location, the range shown is the national average for the position. The proposed salary range for this position is: $75,200-$158,100 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.

Posted 3 days ago

Manager of Infrastructure - Information Systems - Full-Time-logo
Kern MedicalBakersfield, California
Kern Medical has been a community cornerstone since its founding in 1867. Today, we are an acute care teaching center with 222 beds, offering the only advanced trauma care between Fresno and Los Angeles. Kern Medical offers a range of primary, specialty, and multi-specialty services including high-risk pregnancy care, inpatient psychiatric services integrated with county mental health programs, and a growing network of outpatient clinics providing personalized patient-centered wellness care. Kern Medical cares for 15,500 inpatients and 125,000 clinic patients a year. Career Opportunities within Kern Medical include many benefits such as: New Hire Premium : +6% of base rate of pay, matched up to 6% if contributed to Deferred Compensation Plan. A Comprehensive Benefits Package : includes Holidays, Paid Time Off, Retirement, Medical, Dental, Vision and Life Insurance. Position : Manager of Infrastructure Definition The IT Infrastructure Manager reports to the Chief Technology Officer and will serve as the lead technology administrator for enterprise technologies including network, voice, compute, and storage. Essential Functions Lead IT projects, including the design and deployment of new IT systems and services Monitor performance of information technology systems to determine cost and productivity levels, and to make recommendations for improving the IT infrastructure Help define IT infrastructure strategy, architecture, and processes Manage staff responsible for infrastructure technologies including network, voice, server, storage, and security. Analyze business requirements by partnering with key stakeholders across the organization to develop solutions for IT needs Assess vendors and develop test strategies for new hardware and software Troubleshoot hardware and software issues related to internal IT Employment Standards: Education: Preferred Bachelor’s degree in Information Technology, Computer Science, Information Systems, or a related field, etc.; two (2) plus years of experience in a position that had the same or similar primary duties. OR Associates Degree or Certification in technical discipline (e.g. Information Technology, Computer Science, or a related field), education, information technology, business administration, or a related healthcare or IS field with two years of experience in a position that had the same or similar primary duties. OR Without a college degree, five (5) years plus of blended work experience. Experience: Firm grasp on IT infrastructure and operations best practices Excellent working knowledge of computer systems, security, network and systems administration, databases and data storage systems, and phone systems Strong critical thinking and decision-making skills Project management and/or project team leadership. Change management and process improvement leadership. Supplemental: All Kern Medical employees are designated “Disaster Service Workers” through state and local laws (CA Government Code Sec. 3100-3109 and Ordinance Code Title 2 - Administration, Ch. 2.66 Emergency Services.) As Disaster Service Workers, all county employees are expected to remain at work, or to report for work as soon as practicable following a significant emergency or disaster. If position responsibilities require driving a personal vehicle, then possession of a current valid California Driver’s License and adherence to the Kern County Hospital Authority Vehicle Use and Driving Standard Policy (ENG-EC-119) is required. If position responsibilities require driving a vehicle owned, leased or rented by Kern Medical, then possession of a current valid California Driver’s license, a signed authorization for Release of Drivers Record Information and adherence to the Kern County Hospital Authority Vehicle Use and Driving Standard Policy (ENG-EC-119) is required.

Posted 3 weeks ago

A
ARKA Group, L.P.Danbury, Connecticut
ARKA Group L.P. (“ARKA”) is an advanced technologies company serving the U.S. military, intelligence community, and commercial space industry delivering next-generation solutions to support the national security space enterprise. Built on more than six decades of excellence, ARKA brings modern approaches and a culture of innovation to the challenges of today. Join the ARKA team to learn how Beyond Begins Here. Discover your next career opportunity now! Position Overview: We are looking for an experienced, motivated, and hands on Information System Security Engineer for the ARKA enterprise. This analyst will report to the Senior Manager of Information Assurance (IA) while providing program support on a multitude of levels. Working in unison with the IA, Information Technology, and Security teams you will be responsible for the overall security of the ARKA corporate network. Ensuring compliance with applicable NIST standards, government, company, and customer regulations this analyst will be instrumental in the future of the ARKA enterprise. This position can be performed remotely or at one of our main locations to include Colorado Springs, CO, Danbury, CT, Melbourne, FL, Ypsilanti, MI or Northern Virginia. Responsibilities: Assist in the selection, development, and implementation of a scalable enterprise IT Security program for a geographically diverse, continuously growing organization Assist in the development of enterprise-wide IT security policy to align the organizational IT security posture with business objectives and regulatory requirements Conduct security impact analysis for proposed changes to organizational IT baselines Provide subject matter expertise on topics relevant to current and future corporate network operations, including zero-trust, industry standards on security best practices (NIST, MITRE, DevOps, cloud security, data classification) Assist in the continuous monitoring of the organization's systems and data to ensure privacy and security objectives are met Collaborate with IT and development teams via ITIL ticketing systems to monitor, analyze, and resolve Information Security tickets in timely resolution Support the organizations insider threat prevention and threat hunting program by identifying lacking areas of visibility and unmitigated vectors of risk Support continuous monitoring and incident response efforts, including preparation activities, playbook development, and ad-hoc tabletop exercises Maintain a well-managed repository of audit documentation which supports internal processes and demonstrates compliance with regulatory requirements Provide regular reporting to internal and external government customer and program management in the form of meetings, standardized deliverables, reports, presentations Independently identify and recommend technical solutions for discovered risks on the corporate network Required Qualifications: BS Degree in relevant field- Information Management, Systems Security, Cyber Security, etc. Relevant industry certifications that demonstrate proficiency in security, cloud technologies, IT auditing, or other DoD Approved 8570 Baseline Certifications Experience with technologies such as Azure Active Directory, Virtualization/Orchestrated Containerization, Linux based systems, Cisco ISE, Palo Alto Networks, RedHat Linux, Windows, Oracle Database, Amazon Web Services, Azure Cloud Services, Microsoft 365, network devices, etc. A strong knowledge of risk based advanced IT auditing in a dynamic and changing environment in compliance with known security frameworks such as RMF, CMMC, and/or CSF Experience working with vulnerability assessment tools such as Nessus to assist in IT system hardening according to STIGs, CIS Benchmarks, and/or vendor recommendations as well as risk mitigation Experience working with GRC tools such as Xacta, EMass, and/or SNOW Self-starter with minimal supervision with the ability to multitask Attention to detail and follow-through when completing tasks Ability to plan, schedule, and arrange activities in accomplishing objectives Ability to develop and implement solutions to a variety of complex problems Excellent written, verbal, and presentation skills Willing to work extended hours, in a fast paced, deadline driven environment Ability to display tact, discretion, and diplomacy in dealing with all levels of employees Preferred Qualifications: Knowledge of one or more general-use programming languages (Bash, Python, Powershell) and demonstrated proficiency building out scalable applications Experience supporting government contractors and federal subjects Experience proposing technical material to managerial leadership in a fashion that’s concise, digestible, and well-explained Demonstration of continuous education which represents the modern technology and threat landscape through research, homelabbing, certifications, and work-supporting projects Location: Ypsilanti, MI Ypsilanti is artistic, genuine, and original. A college town and city located on the Huron River in Washtenaw County. Ypsilanti is all about community and making families new to the area feel right at home. From educational opportunities and local museums for all ages, to accessible healthcare and transportation it’s a wonderful location. It’s well known for its historical museums, parks, and historic districts as well as home to Eastern Michigan University. The University of Michigan and Michigan State University also are great institutions! Ann Arbor is close by and has many things, including a bustling university town, culinary hotspot, and a tech hub with a walkable downtown that includes world-class arts and culture. Located in southeast Michigan's Lower Peninsula, Ann Arbor lies at the center of a greater collection of communities in Washtenaw County. With so many thriving communities nearby, Ann Arbor has become a cultural melting pot and urban oasis. What We Offer: Comprehensive medical/vision/dental insurance packages Company contributions to qualified HSA accounts 401k retirement plan with industry leading company contributions 3 weeks of vacation accrual per year plus time off for sick leave and unscheduled life events 13 paid holidays Upfront tuition assistance for approved degree programs Annual bonus program based on company and employee performance Company paid life insurance, AD&D, Short-Term and Long-Term disability insurance 4 weeks paid Parental Leave Employee assistance program (EAP) EHS/Environmental Requirements: This job operates alongside a professional office environment. While performing the duties of this job, the employee routinely is required to use hands to keyboard, communicate, listen to, and interpret instructions and remain stationary for extended periods of the time. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job. Applicants are invited to apply for a reasonable accommodation to perform the essential duties of the job. To apply, send a request to staffing@arka.org or contact 203-797-5000 and press 2 for Human Resources. ITC & Security Clearance Requirements: This position requires U.S. citizenship in support of contract requirements. Additionally, if you are a dual citizen (a citizen of the U.S. and another country), the Company must obtain approval for you to have access to the information required for this position. You will not be able to begin employment until such approval is obtained and this may take several months. Visa Restrictions: No visa sponsorship is available for this position. Pre-employment Screenings: Employment with any ARKA companies in the U.S. is contingent upon satisfactory completion of several pre-employment requirements to include a credit check, background check, and drug screen.

Posted 2 weeks ago

Adjunct, Geographic Information Systems-logo
Monmouth UniversityWest Long Branch, New Jersey
Monmouth University is seeking applicants for an Adjunct Professor of Geographic Information Systems in the History and Anthropology department. Part-time Adjunct Faculty members typically teach 3-6 credits per semester, with class schedules determined based on departmental needs and candidate availability. Courses are taught in person at the West Long Branch campus. Adjunct positions remain posted continuously to expand the university’s pool of qualified adjunct faculty. Screening of applications will commence when an open position becomes available. This is an in-person, on campus, non-remote position. For additional information about the program, please visit the GIS webpage. Duties and Responsibilities: Teach 3-6 credits during the semester. Develop and deliver course lectures, discussions and assignments in accordance with the curriculum and learning objectives. Provide time during the week to meet with students outside of class. Foster a positive and inclusive learning environment conducive to student engagement and academic success. Develop and administer projects and exams to evaluate student learning outcomes and provide grades in a timely manner. Provide timely feedback and guidance to students to support their learning and development. Enrichment Statement: Monmouth University values diversity and invites applications from underrepresented groups who will enrich the teaching and service missions of the university. Minimum Qualifications: Master’s degree or higher in Geographic Information Systems or related field. Advanced skills in the use of ESRI’s ArcGIS suite of software . Preferred Qualifications: Background in mapping technologies for coastal and marine planning a plus Additional Application Material Required: Monmouth University requires all applications and supporting documents to be submitted via the university’s career portal. In addition to the application, candidates must upload the following documents. Applications will not be considered complete for review until all required documents are uploaded. Resume or Curriculum Vitae Cover Letter Contact Information for Three Professional References First Letter of Recommendation Second Letter of Recommendation Optional Documents: None Special Instructions to Applicants: We encourage candidates to include information in the cover letter that addresses their approach to teaching and their plans to advance diversity, equity, and inclusion in their position at Monmouth University. Questions regarding this search should be directed to: Maryanne Rhett, Ph.D. at mrhett@monmouth.edu or 732-263-5768 Note to Applicants: Adjunct positions remain posted continuously to expand the university’s pool of qualified adjunct faculty. Screening of applications will commence when an open position becomes available. Should a position become available, you will receive an email advising you of the next steps. Working at Monmouth University perks: Employee Assistance Program (EAP) Employee Tuition Remission Employee elective deferrals to TIAA, 403(b) plan On campus, Fitness Center – free membership To view a full list of benefits, visit our benefits page at: Employee Benefits Information | Human Resources | Monmouth University Department: History And Anthropology Work Schedule: varies Total Weeks Per Year: 14 Expected Salary: $1,000 per credit Union: N/A Job Posting Close Date N/A

Posted 4 days ago

O
Old Republic National Title Insurance CompanyTampa, Florida
Job Description: SUMMARY : The candidate will have shared responsibility for implementing and maintaining company’s security strategies and services while providing, security guidance based on industry standards and best practices. *This position is located out of our Tampa, FL corporate office. 2 days a week in office are required* EXPERTISE: This position is staffed by employees who have sufficient educational background and/or experience to maintain and support assigned information security technologies with general leadership oversight. RESPONSIBILITIES: Provision, manage, monitor, test, and decommission security tools and applications. Attend and lead small project meetings and enforce best practices. Apply specialized security technical knowledge. Evaluate, plan and implement security projects. Remain current on assigned security tools and applications and apply skilled understanding of troubleshooting. Document and resolve moderately complex problems. Report progress to leaders. Monitor and analyze Identity security incidents, and provide recommendations for remediation Other duties as assigned or required. EXPERIENCE: IT security risks and mitigation strategies. Security Incident Response Security frameworks, including ISO and NIST. Company IT and HR policies. Various IT security-related regulatory requirements. IT security logging and monitoring strategies. Deployment and use of sophisticated IT security monitoring tools. EDUCATION: Bachelor's degree in computer science, Information Systems, or other related field; or has 2-5 years of relevant experience. TECHNICAL SKILLS: Analytical ability Analyzing Security System Logs, Security Tools, and Data Communicating Up, Down, and Across All Levels of the Organization Creating, Modifying, and Updating Security Information Event Management (SIEM) Deep Understanding of Risk Management Frameworks Discovering Vulnerabilities in Information Systems Evaluating and Deconstructing Malware Software Familiarity with Security Regulations and Standards Implement and Maintain Security Frameworks for Existing and New Systems Maintaining Security Records of Monitoring and Incident Response Activities Monitoring Compliance with Information Security Policies and Procedures Network and System Administration Experience Responding to Requests for Specialized Cyber Threat Reports Performing Cyber and Technical Threat Analyses Performing Security Monitoring Producing Situational and Incident-Related Reports Providing Host-Based Forensics Providing Timely and Relevant Security Reports Responding to Security Events Supporting and Managing Security Services #LI-MB1 Benefits may include: Comprehensive medical, prescriptions, dental and vision plans 401(k) plan with a discretionary company match Shareholder Purchase and Reinvestment Plan Basic life and accidental death and dismemberment insurance premium paid by the company Voluntary supplemental life insurance for employees, spouses and dependent children Fertility and Family Building Benefits Paid Disability benefits Paid time off programs 11 Company paid holidays per year Flexible spending account Health savings account (available to High Deductible Health Plan participants only) Employee Assistance Program Educational Assistance Program Voluntary benefits, such as Critical Illness, Hospital Indemnity, Pet Insurance and Accident Insurance Title insurance policies and certain escrow services for the employee’s primary personal residence at no charge Transportation benefit plan for mass transit, parking and vanpool, in several markets Note: If you currently are employed by Old Republic Title (or one of its wholly owned affiliated companies) please get in touch with your human resources representative regarding the application process. For California applicants, please click the following link to view our CCPA Applicant Notice Old Republic Title is an Equal Opportunity Employer

Posted 3 days ago

H
Hancock Whitney BankNew Orleans, Louisiana
Thank you for your interest in our company! To apply, click on the button above. You will be required to create an account (or sign in with an existing account). Your account will provide you access to your application information. The email address used in establishing your account will be used to correspond with you throughout the application process. Please be sure and check the spam folder. You may review, modify, or update your information by visiting and logging into your account. JOB FUNCTION / SUMMARY: Manages the use, importance, quality, reliability and integrity of data by partnering with all areas of the organization to facilitate the integration of information into long term informational strategy. Manages Business Information with responsibility for content and data design, quality management, integration, and outsourcing, as well as data access and metadata management. Responsible for data life cycle control, allowing for traceability from data origination to exploitation. Partners with information technology to define new tables/fields/data sources to support customer and reporting requirements. ESSENTIAL DUTIES & RESPONSIBILITIES: Provide proactive leadership in identifying and developing projects involving or improving data management, quality and processing. Identify and resolve data gaps within information repository, and track resolutions to production. Apply architectural concepts to design technological solutions that meet customer, operational and reporting data requirements, leveraging existing technologies when possible, and ensure that new solutions are designed for optimal usefulness. Assist in the definition, creation and distribution of enterprise business intelligence reporting. Create intake process for new data requests and data enhancements, establish priority/ranking for requests and obtain buy-in from principal stakeholders, and create a consistent development, testing, and release cycle for promotion of new data measures to production environments. Identify new informational development opportunities across the enterprise and assist in creating high level documentation for review and prioritization at the Informational Governance Committee though a strategic partnership with the EPO when necessary. Participates in approved prioritized projects and informational requests that create enterprise information to be included in long term informational repository (One Version Platform). Manage data and information delivery processes and development to ensure inclusion in long term informational strategy. Ensure proper reconciliation and validation processes are followed that certify data feeds from source into information repository (One Version Platform), within the information repository (One Version Platform) itself, and into Informational Reporting. Assist in identification of data gaps, and manage projects to resolve gaps in core data, leading ongoing mapping design, development and validation as necessary. Ensure proper documentation and maintenance of data dictionaries for all data sources, including data, measures, KPIs necessary for reporting and analytics. Identify and assist in the development of reference and master data as needed to support long term informational strategy. Develop necessary process, procedures and documentation to streamline information identification and inclusion in long term informational strategy. Act as subject matter expert on financial, customer, and other data & systems; maintain knowledge of current BI tools, methods and best practices, and recommend and implement process improvements. Other duties and special projects as assigned. SUPERVISORY RESPONSIBILITIES: Carries out supervisory responsibilities in accordance with the organization's policies, procedures and applicable laws; Provides guidance and oversight to and is responsible for the coordination and evaluation of the assigned team. Responsibilities may include interviewing, hiring and training associates; planning, assigning and directing work; performance management; associate compensation; approving expense reports; addressing concerns and resolving problems. MINIMUM REQUIRED EDUCATION, EXPERIENCE & KNOWLEDGE: Bachelor’s degree in Business, Finance, or related field required Master’s degree preferred 7 years of experience in bank reporting, profitability systems or related experience required An equivalent combination of education, training, and experience may be considered Advanced understanding of banking, financial services, and/or investment industry Advanced understanding of financial reporting and analytics. Advanced understanding of reporting tools and platforms. Advanced understanding of database and information warehousing ESSENTIAL MENTAL & PHYSICAL REQUIREMENTS: Ability to travel if required to perform the essential job functions Ability to work under stress and meet deadlines Ability to operate related equipment to perform the essential job functions Ability to read and interpret a document if required to perform the essential job functions Ability to lift/move/carry approximately 10 pounds if required to perform the essential job functions. If the employee is unable to lift/move/carry this weight and can be accommodated without causing the department/division an “undue hardship” then the employee must be accommodated; hence omitting lifting/moving/carrying as a physical requirement. Equal Opportunity/Affirmative Action Employers. All qualified applicants will receive consideration for employment without regard to race, color, religious beliefs, national origin, ancestry, citizenship, sex, gender, sexual orientation, gender identity, marital status, age, physical or mental disability or history of disability, genetic information, status as a protected veteran, disabled veteran, or other protected characteristics as required by federal, state and local laws.

Posted 2 weeks ago

Regional Information Security Officer, North America-logo
Coca-ColaAtlanta, Georgia
Location(s): United States of America City/Cities: Atlanta Travel Required: 00% - 25% Relocation Provided: No Job Posting End Date: August 19, 2025 Shift: Job Description Summary: Position Overview: The Regional Information Security Officer (RISO) -- North America, at The Coca-Cola Company will be a part of the Regional Cybersecurity team under the Global Cybersecurity function. In this role, you will drive initiatives to improve the security posture of the Company's operating unit (OU), production plants, subsidiaries, and franchise bottlers in North America. The successful candidate will deliver this mission by understanding the Global Cybersecurity strategy and roadmap and executing it through collaboration across Global Cybersecurity internal functions, Technology Services, Company franchise leadership, and franchise bottler technology teams, to deliver measurable results for The Coca-Cola System. The successful delivery of your responsibilities will ensure that the North American business , wholly-owned entities, and our key bottling partners are equipped with the necessary cybersecurity programs, services, and solutions to securely achieve their business goals. The position will work cross functionally within our networked organization and global System, and reports to the Global Lead of the Regional Cybersecurity Team, with clear networked relationships to OU and Functional leadership in this geography. Function Related Activities/Key Responsibilities Operating Unit Support Develop and maintain relationships with key IT and business leadership and stakeholders across the supported operating unit. Understand and support key business and IT strategies across your supported operating units. Understand and communicate key Global Cybersecurity activities across your supported operating unit(s), such as cybersecurity awareness, third party risk, and incident response . Specifically, be an extension of the Global Cybersecurity team and coordinate similar activities in your geography to help bridge time zones. Organize local security summits in your geography, along with global security summits organized by the Global Cybersecurity team. Promote company security requirements and guidelines to IT stakeholders and ensure they have the knowledge to apply them appropriately. Understand and support the delivery of key applications and programs within your supported operating units. Corporate Liaison Develop and maintain relationships with key IT and business leadership and stakeholders across the enterprise. Understand and support key business and IT strategies across the enterprise and facilitate alignment across your supported OUs. Facilitate collaboration of leadership and subject matter experts across the enterprise and within your supported OUs. Franchise Bottler Engagement Develop and maintain relationships with key cyber security and technology leadership at bottlers and partners in your geography. Understand and support the business and IT strategies at each bottler in your geography. Assist bottlers and partners in your geography with the development of their cybersecurity roadmap and the overall improvement in their cyber security program . Assist bottlers and partners in your geography to develop and implement security policies and frameworks for securing emerging technologies such as for AI-driven solutions, considering issues such as data privacy, model vulnerabilities, explainability, and adversarial attacks. Participate as an active member of the system cybersecurity subcommittee to support delivering cybersecurity initiatives to improve bottlers across the System. Education Requirements: Bachelor’s Degree in Appropriate Field Required. Relevant industry certification preferred – CISSP, CISA, CRISC and/or CISM . AWS Associate or Professional Certifications and/or MCSE: Cloud Platform and Infrastructure. AI- and Privacy-related certifications. Related Work Experience: 8 to 12 years of work experience in cybersecurity, technology governance, risk, compliance , and cloud security , AI, or relevant related field. Audit and control experience with information technology audit practices, procedures, and methodologies . H ands-on experience with security frameworks such as NIST, CIS, ISO or COBIT. Experience as an IT auditor or risk advisor for a professional services firm, or in industry, will be an advantage . Strong experience in Cloud Security (e.g., AWS, Azure, Google Cloud Platform) and OT Security (e.g., industrial control systems, SCADA). Technical experience designing, implementing, and/or supporting enterprise technology solutions. Technical experience identifying and mitigating risk using comprehensive security controls and technologies. Proven expertise in AI security, particularly Generative AI and Agentic AI, including understanding of secure AI development practices and their associated risks , ethical considerations, and regulatory requirements. Understanding of general privacy concepts and regulatory requirements within North America . Ability to communicate with and influence senior management and technical subject matter experts. Excellent communication and presentation skills, as well as the ability to present to various levels of IT and business leadership. Functional Skills: Manage or take part in cross-functional teams to promote technology strategies, analyze and evaluate products, or perform pilot and first implementations of new technologies to integrate modern technologies into the Company's Global infrastructure. Develop or deliver standards-related training or architecture updates (e.g., hardware, methodology , software packages, business data, security, retention, delivery methods and tools) to stakeholders (e.g., stewards, custodians, SAP power users, application teams) to ensure standards compliance and quality master data. Orchestrate the deployment of resources (e.g., people, infrastructure, financial, informational) from Coca-Cola (e.g., client, internal service providers) and third parties in order to ensure successful project completion. Create a communications plan (e.g., memos, letters, plan review meetings, status lists) to ensure frequent, accurate and timely communication to all stakeholders and to solidify commitment to the project plan. Prepare overall implementation plans, including a detailed schedule of all activities (e.g., data conversions, cutover activities, security assignments, training, testing) and the assignment of appropriate resources , to move the application into a production environment. The Coca-Cola Company will not offer sponsorship for employment status (including, but not limited to, H1-B visa status and other employment-based nonimmigrant visas) for this position. Accordingly, all applicants must be currently authorized to work in the United States on a full-time basis and must not require The Coca-Cola Company's sponsorship to continue to work legally in the United States. Skills: Artificial Intelligence Technologies, Cloud Security, Collaboration, Communication, Compliance, IT Governance, Risk Analysis, Risk Management, Security Risk Management Pay Range: $167,000 - $187,000 Base pay offered may vary depending on geography, job-related knowledge, skills, and experience. A full range of medical, financial, and/or other benefits, dependent on the position, is offered. Annual Incentive Reference Value Percentage: 30 Annual Incentive reference value is a market-based competitive value for your role. It falls in the middle of the range for your role, indicating performance at target. Our Purpose and Growth Culture: We are taking deliberate action to nurture an inclusive culture that is grounded in our company purpose, to refresh the world and make a difference. We act with a growth mindset, take an expansive approach to what’s possible and believe in continuous learning to improve our business and ourselves. We focus on four key behaviors – curious, empowered, inclusive and agile – and value how we work as much as what we achieve. We believe that our culture is one of the reasons our company continues to thrive after 130+ years. Visit Our Purpose and Vision to learn more about these behaviors and how you can bring them to life in your next role at Coca-Cola. We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state or local protected class. When we collect your personal information as part of a job application or offer of employment, we do so in accordance with industry standards and best practices and in compliance with applicable privacy laws.

Posted 1 week ago

C
Cambridge International Systems IncNorfolk, VA
When you join the Cambridge team, you are part of a skilled and talented global community that is united by a set of core values: commitment, integrity, and perseverance. Join our team and help us confront today’s most threatening and complex obstacles! Cambridge International Systems, Inc. has a full-time Information Assurance Specialist opportunity available based in Norfolk, Virginia. Qualified candidates for this job must possess a current DoD TS/SCI security clearance. This position is contingent upon contract award. Anticipated start date August 2025. ROLE RESPONSIBILTIES Provides technical and programmatic Information Assurance Services to NASA customers in support of network and information security systems.  Designs, develops and implements security requirements within the organization’s mission. Prepares documentation from information obtained from customer using accepted NIST SP800-53 guidelines. Provides Authorization and Accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments.  Develops and completes system security plans and contingency plans.  Recommends system enhancements to improve security deficiencies.  Develops mitigations, document risks, and continually assesses system risk. Tracks system vulnerabilities and manages remediation/tracks remediation progress.  Provides information assurance support for the development and implementation of security controls to meet new and evolving security requirements. Applies knowledge of IT Security and computer systems expertise in support of tasks relating to risk management, operational monitoring, threat identification, and vulnerability management. Solid expertise applying NIST Risk Management Framework and NIST SP800-53 Working under only general direction, provides technical solutions to a wide range of difficult problems. Independently determines and develops approach to solutions. Demonstrates a high level of communications and customer relationship skills and expertise in collaboration with representatives of other organizations. Required QUALIFICATIONS Experience implementing or assessing security controls within an information system. Works under general supervision, providing solutions to technical problems of moderate scope/complexity. DoD 8570 IAM Level 1Certification such as CAP, Security+, CISM, Cloud+, GSLC, etc. required. Bachelor's Degree (or higher) with 5+ yrs of experience, required. Must possess an active DoD TS/SCI security clearance. Must be proficient in using different technologies such as computers and other tools and systems pertinent to the position. TRAVEL REQUIREMENTS In rare occasions, overnight travel may be required. PHYSICAL ENVIRONMENT AND WORKING CONDITIONS Cambridge International Systems complies with Temporary Duty Station (TDY)/Outside Continental United States (OCONUS) vaccination requirements.  If this position requires OCONUS travel (listed above), Vaccine Recommendations by AOR | Health.mil lists applicable current vaccination requirements by location. Office setting: Must be able to work in an office environment, sitting at a desk, looking at a computer for most of the workday. Work is physically comfortable; the employee has discretion about sitting, walking, standing, etc. May be required to travel short distances to offices/conference rooms and buildings on site.  BENEFITS AND PERKS Cambridge International Systems is committed to investing in our employees and their future by providing them with competitive compensation, career development opportunities, comfortable working conditions, and a comprehensive benefits package, some of which are listed below: Medical, dental, vision, Life/AD&D/STD/LTD insurance 401(k) matching and immediate vesting Paid time off and holidays Generous tuition & training assistance program Relocation assistance Sign-on bonuses Referral bonuses Performance-based bonuses Community involvement & outreach Wellness program Employee Assistance Program (EAP) Tickets at Work Refer to a friend If you know someone who may be interested, please share this posting.  We are a growing team and there may be more opportunities like this one here at Cambridge International Systems! MORE ABOUT US At Cambridge, we recognize innovation and agility grow through diverse collaboration. Our team is comprised of unique individuals, and it is our policy to provide equal opportunity in recruiting, hiring, training, and promoting individuals in all job categories without regard to race, color, religion, national origin, gender, age, disability, genetic information, veteran status, sexual orientation, gender identity, or any other protected class or category as may be defined by federal, state, or local laws or regulations. It is our firm intent to support equal employment opportunity and affirmative action in keeping with applicable federal, state, and local laws and regulations. If you are a qualified individual with a disability or a disabled veteran requiring assistance with the application process, please visit  https://cbridgeinc.com/accessibility/  for information on how to request assistance.   Powered by JazzHR

Posted 3 weeks ago

Information Technologist (Full-time)-logo
Academy Of ScholarsDecatur, GA
The Academy of Scholars, an ever-growing private Christian elementary school in Decatur, Georgia, is seeking a full-time  Information Technologist . The successful candidate will maintain the IT objectives and policies at the school level by providing on-site end user computing support, including investigating, troubleshooting, and resolving hardware, software, network, and instructional technology incidents. The candidate will be responsible for driving the school’s technology to a new level while at the same time improving and maintaining customer support. The ideal candidate is a reliable, skilled multi-tasker that can thrive in a fast-paced environment committed to consistently setting expectations and meeting deadlines.   This position requires good collaborative skills and the ability to communicate efficiently and effectively with internal customers as well as external customers such as vendors.   The position requires that all work be performed correctly, within acceptable time limits and when planned with only general supervision. *****Proven experience with Windows 10/11, Apple/Mac Devices and ChromeBooks Duties & Responsibilities Provides technical support to clients in the form of answering questions, troubleshooting to isolate, and diagnosing and correcting abnormal situations and problems Ensure all documentation is properly maintained and updated in a timely manner. Provides timely verbal and written communications with clients, vendors, and staff; as well as maintaining the school website, and assisting with electronic communications such as newsletters. Monitoring and maintaining network connections to connected devices such as printers, switches, servers, and wireless access points. Expectations Excellent analytical and problem-solving skills. Multi-tasking with the ability to adjust to needs which arise while providing quick resolution to problems. Strong verbal and written communication skills. Must be customer service and detail oriented. Qualifications Minimum of 5 years experience in a closely related position providing technical support, troubleshooting, and escalations for a school environment. Experience Proven experience with Windows 10/11, Apple/Mac Devices, Android Tablets and Chromebooks. Enterprise Management and Administration along with practical knowledge Google MDM Infrastructure including Firewall, Switches, and Apps (Google MDM experience is a Plus) Proven knowledge of Google for Education, Canvas LMS, Pearson Realize, Freckle, Seesaw and other related cloud-based school software packages is a Plus. Microsoft Office 365 (Teams is a Plus) Server Hardware Knowledge of Centralized Service Tools for Auditing, Helpdesk, and Asset Management Certification:  Apple or Microsoft Technology and/or CompTIA certification(s) preferred Google Admin Certification or equivalent experience preferred Education: BS degree in Information Technology, Computer Science, Engineering, a relevant field or equivalent experience Experience:  A minimum of 5-7 years of demonstrated relevant experience include providing end user support in an enterprise level organization, administering a Chromebook, Windows or Mac computing environment, Mobile Device Management, and/or implementation of WAN/LAN environments Working in academic environment: 2 years (Preferred) Administering Chromebook: 2 years (Preferred) Apple/Mac device: 2 years (Preferred) Google Education: 2 years (Preferred) Mobile Device Management: 2 years (Preferred) WordPress: 2 years (Preferred) Powered by JazzHR

Posted 3 weeks ago

S

Information Assurance Analyst

Spectrum Comm IncNorfolk, VA

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Spectrum is seeking highly qualified Information Assurance Analyst to support our proposal for a new program located in Norfolk, VA.

General Experience:

  • Candidates must have a minimum of three (3) years of job-related experience acquired in the field of information assurance and cybersecurity.
  • In addition to job experience, candidates will be required to undergo annual training and continuing education to keep up with the latest developments and best practices in the industry.
  • Furthermore, candidates must meet and maintain the minimum credential requirements as outlined in the Department of Defense (DoD) 8570.01-M, Information Assurance Workforce Improvement Program, and the DoD 8140.01.

Requirements

Requirements:

Responsibilities:

  • Process access requests for enterprise, non-enterprise, and command-specific applications, and maintain the command database of these records.
  • Handle requests for new access tokens, revokes, and re-issues.
  • Process requests for database updates to the command application management system.
  • Manage the cybersecurity budget, including maintaining financial records, developing purchase requests, reviewing compliance of requests, and tracking requests using command-provided applications.
  • Create cybersecurity digital media for the command SharePoint site, plan of the week, and email campaigns to support cybersecurity awareness.
  • Develop, review, and provide guidance on DoN and command cybersecurity programs, standard operating procedures, and instructions.
  • Ensure personnel provided by the contractor meet or exceed the AQL: 100% Compliant requirement.
  • Perform all duties of Task 4, paragraphs 5.1 through 5.7.
  • Develop information systems assurance programs and control guidelines in accordance with the Risk Management Framework (RMF) and the current approved DoD and DoN Assessment and Authorization (A&A) standards.
  • Develop, review, and advise on system Plan of Action and Milestones (POA&M), new/existing cybersecurity policies and instructions, A&A packages, and system security controls.
  • Interface and respond to cybersecurity and A&A requirements from Echelon II/III commands, designated Navy Authorizing Officials (NAO), and designated Functional Authorizing Officials (FAO).
  • Support command cybersecurity inspections and audits, including Command Cyber Readiness Inspections (CCRI) and Inspector General (IG) audits.
  • Serve as a member of the command Configuration Control Board (CCB).

Benefits

  • Health Care Plan (Medical, Dental & Vision)
  • Retirement Plan (401k)
  • Life Insurance (Basic, Voluntary & AD&D)
  • Paid Time Off (Vacation, Sick & Public Holidays)
  • Family Leave (Maternity, Paternity)
  • Short Term & Long Term Disability
  • Training & Development
  • Wellness Resources
  • Stock Option Plan

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall