landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Information/Cybersecurity Engineer (Clearance Required)-logo
Nexxis SolutionsAnnapolis Junction, MD
Nexxis Solutions  is supporting current and near-term efforts to provide information and system security engineering, life cycle solutions, system security testing, risk assessment, and continuous monitoring. We are looking for candidates to provide Cybersecurity expertise to systems and projects to ensure that the appropriate security features and safeguards are designed, integrated, and implemented for all information systems. We are currently looking for cleared professionals in the following areas: Security Controls Assessor (SCA) ISSE/ISSM/ISSO DevSecOps Engineer IT Security IA System Administrator Security Engineer Cybersecurity Network Analyst (CSNA) Splunk Engineer/Administrator Penetration Tester Others… General Overview Be part of a team helping ensure proper level of security for customer software systems and network. Duties will include protecting system boundaries, keeping computer systems and network devices hardened against attacks and securing highly sensitive data. Possessing deep and wide expertise in the security space as well as having a background in security and/or systems engineering will be critical in these roles. Responsibilities vary by role but may include any of the following: Organize computer security architecture and develop detailed cyber security designs Review, develop and implement security measures for the protection of computer systems, networks and information Define system security requirements and prepare reports on your results Review and document standard operating procedures and protocols Configure and troubleshoot security infrastructure devices Create technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks Perform support and consulting of the company's personnel about security incidents and measures Prepare detailed reports including assessment-based findings, outcomes and propositions for further system security enhancement Degree Requirements: A B.S. in Cybersecurity, Information Technology, or a related field is required for most positions. A Master's or Ph.D. in Cybersecurity, IT, or a related field is a plus but not required for most positions.  (Some positions may consider additional years of experience in lieu of degree.) Certification Requirements: Most positions require DoD 8570.01-m (level 2 or above) compliance. A minimum of Security+ strongly preferred; CISSP or above required for some opportunities. Experience Requirements: Available positions range from entry level to 20+ years of experience. Clearance Requirements: A current TS/SCI clearance with appropriate level Polygraph is required. Nexxis Solutions offers competitive salary and comprehensive benefits package  (including paid time off, medical/dental/vision insurance, 401k and more).  Entry level: $90-120k;  Mid-level: $120-180k;  Senior level: $150-230k* Most positions offer minimal if any telework More benefit d etails can be found here:  Nexxis Solutions Benefits Overview * S alary ranges represent a general guideline.  Nexxis Solutions considers several factors when determining compensation including but not limited to: scope and responsibilities of the position; candidate's experience, education/certifications, skills; and current market conditions. Equal Employment Opportunity Policy Nexxis Solutions provides equal employment opportunities to all qualified individuals without regard to race, color, religion, age, sex, pregnancy, national origin, disability status, genetic information, military or veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Nexxis takes allegations of discrimination, harassment, and retaliation seriously, and will promptly investigate when such behavior is reported. If you have a disability and would like to request an accommodation in order to apply for a position with Nexxis Solutions, please contact us at 410-875-7980 or recruiting(at)nexxissolutions.com. Applicants have rights under Federal Employment Laws. You can find links to these notices here.

Posted 30+ days ago

T
Triaplex, Inc.Fort Meade, MD
Triaplex, Inc. is looking for an Information Systems Security Engineer  to join our team. This position will support and influence a number of software and system deployments. Familiarity or prior experience as a Systems Administrator or Systems Engineer is desired to enhance the engineer's perspective on customer needs and requirements. Key Responsibilities Utilize Risk Management Framework (RMF) process and procedures to assist system development and accreditation. Interpret Security Directives, Policies, Publications, and Regulations. Provide guidance on applying security directives and policies to Systems Engineers, System Administration, and System Owners.  Review and vailidate system Vulnerability Scans  Collaborate with System owners to flush out, implement, and verify security requirements to ensure compliance. Required Qualifications Bachelor's degree in a technical discipline from an accredited college or university At least 10 years' previous experience as an ISSO, ISSE/ISSM in the cybersecurity field Five years' additional relevant experience may be substituted for a Bachelor's degree. TS/SCI with polygraph Required Technical Certifications: DoD 8570.01 IASAE LvL 2 Compliant Certification CISSP Certification Desired Skillsets Experience with NIST 800-53 security control implementations, policies, and self testing Experience with RMF policies and procedures specific to mission customers.

Posted 30+ days ago

Senior Information Security Analyst-logo
DLA PiperReston, VA
DLA Piper is, at its core, bold, exceptional, collaborative and supportive. Our people are the backbone, heart and soul of our firm. Wherever you are in your professional journey, DLA Piper is a place you can engage in meaningful work and grow your career. Let's see what we can achieve. Together. Summary The Senior Information Security Analyst is responsible for identifying, investigating, and addressing both internal and external threats. This position requires a deep understanding of various threats, attacks, and malware to develop effective detection and protection measures for the enterprise. The position will collaborate with the IT department to maintain security controls, which includes tuning detection systems, updating control policies, and automating processes. Additionally, this role involves directly managing relationships with our security operations vendors and providing technical leadership and mentorship to a team of security analysts. This position plays a critical role in driving initiatives for advanced threat detection, incident response, and vulnerability management, which are vital for maintaining a proactive and robust security posture. The ideal candidate will combine extensive technical expertise in Security Operations (SecOps) with proven leadership skills, enabling them to enhance our security strategy and effectively respond to the evolving threat landscape. Location This position can be based out of our Atlanta, Austin, Baltimore, Chicago, Reston, or Washington, DC office. Responsibilities Mentoring and guiding Information Security Analysts. Responsible for evaluating the effectiveness of and improving various information security program functions at the Firm. Reviewing Security Incident and Event Management (SIEM) systems, which includes regular reporting of metrics and summaries regarding ongoing investigations and ticket tracking, Performing alert triage, which involves investigating and analyzing security incidents, identifying root causes, and developing appropriate mitigation strategies. Ensuring effective Endpoint Threat Detection, including EDR capabilities, traditional antivirus, asset management, and familiarity with baseline and configuration management tools. Managing Next Generation Firewalls and/or Intrusion Detection/Prevention Systems (IDS/IPS). Engaging in Threat Hunting and utilizing Threat Intelligence. Utilizing malware sandbox technologies and interpreting the results. Overseeing Incident Response tools, processes, and capabilities. Possessing experience or a deep understanding of vulnerability and configuration management. Conducting independent project work. Desired Skills Communication Skills: Proficient in both verbal and written communication, with the ability to convey technical information to non-technical audiences. Analytical Skills: Strong analytical abilities with a keen attention to detail, essential for identifying and addressing security events. SIEM Proficiency: Skilled in identifying, triaging, and analyzing security events using Security Information and Event Management systems. Incident Response Knowledge: Deep understanding of incident response processes and methodologies. Scripting Experience: Familiarity with scripting languages to automate security operations and enhance the incident response process. Attacker Methodology: Demonstrated understanding of the methodologies used by attackers, which supports proactive defense measures. Intrusion Detection: Solid grasp of intrusion detection systems, AI-based attack detection and prevention strategies, and SOC (Security Operations Center) operations. Cloud Security: Knowledge of cloud infrastructure and security considerations in a cloud environment. Core Infrastructure Knowledge: Familiarity with core infrastructure components such as DNS, Active Directory, and Exchange. Security Tools Experience: Prior experience with security tools like Microsoft Defender, CrowdStrike, and Palo Alto Networks is desirable. Professional Services Background: Experience in professional services sectors such as legal, finance, or consulting is preferred. These competencies are critical for effectively managing security operations and responding to incidents in a dynamic environment. Minimum Education Bachelor's Degree in Information Security, Cybersecurity or similar fields. Preferred Education Master's Degree in Information Security, Cybersecurity or similar fields. Certificates Professional-level industry certification (e.g. CISSP, GIAC, SANS, etc.) preferred. Minimum Years of Experience 7 years of experience working within Cybersecurity field Essential Job Expectations While the specific job requirements of a DLA Piper position may vary depending upon scope of the job and area of specialty, there are certain universal requirements that are expected of all DLA Piper employees, which include but are not limited to: Effectively communicate, verbally and in writing, with clients, lawyers, business professionals, and third parties. Produce deliverables, answer phone calls, and reply to correspondence in an efficient and responsive manner. Provide timely, accurate, and quality work product. Successfully meet deadlines, expectations, and perform work duties as required. Foster positive work relationships. Comply with all firm policies and practices. Engage in both physical and sedentary activity, such as (a) working at a computer for extended periods of time, including on-screen reading and typing; (b) participating in digital/virtual conference calls; (c) participating in meetings as needed. Ability to work under pressure and manage competing demands in a fast-paced environment. Perform all other duties, tasks or projects as assigned. Our employees are expected to embrace and uphold our firm values as a part of our DLA Piper culture. We are committed to excellence in how we represent our clients and develop our people. Physical Demands Sedentary work: Exerting up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects, including the human body. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met. Work Environment The individual selected for this position may have the opportunity for a hybrid work arrangement comprised of remote and in-office work, the requirement for which will be determined in coordination with the hiring manager or supervisor and may be modified in the firm's discretion in the future. Disclaimer The purpose of this job description is to provide a concise statement of the work elements and to organize and present the information in a standardized way. It is not intended to describe all the elements of the work that may be performed by every individual in this classification, nor should it serve as the sole criteria for personnel decisions and actions. The job duties, requirements, and expectations for this position may be modified at the Firm's discretion at any time. This job description does not change the at-will nature of employment. Application Process Applicants must apply directly online instead of sending application materials via email. Accommodation Reasonable accommodations may be made upon request to permit individuals with a disability to perform the essential functions and responsibilities of the position or to participate in the job selection process. If you have a request for an accommodation during the application process, please contact careers@us.dlapiper.com. Agency applications will not be considered. No immigration sponsorship is available for this position. The firm's expected hiring range for this position is $92,637 - $134,438 per year depending on the candidate's geographic market location. The compensation offered for employment will also be dependent on other factors including the candidate's experience, skills, educational and professional background, and overall qualifications. We offer a comprehensive package of benefits including medical/dental/vision insurance, and 401(k). #LI-KS1 #LI-Hybrid DLA Piper is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Job applicant poster viewing center.

Posted 30+ days ago

S
Spectrum Comm IncNorfolk, VA
Spectrum is seeking highly qualified Information Assurance Analyst to support our proposal for a new program located in Norfolk, VA. General Experience: Candidates must have a minimum of three (3) years of job-related experience acquired in the field of information assurance and cybersecurity. In addition to job experience, candidates will be required to undergo annual training and continuing education to keep up with the latest developments and best practices in the industry. Furthermore, candidates must meet and maintain the minimum credential requirements as outlined in the Department of Defense (DoD) 8570.01-M, Information Assurance Workforce Improvement Program, and the DoD 8140.01. Requirements Requirements: Responsibilities: Process access requests for enterprise, non-enterprise, and command-specific applications, and maintain the command database of these records. Handle requests for new access tokens, revokes, and re-issues. Process requests for database updates to the command application management system. Manage the cybersecurity budget, including maintaining financial records, developing purchase requests, reviewing compliance of requests, and tracking requests using command-provided applications. Create cybersecurity digital media for the command SharePoint site, plan of the week, and email campaigns to support cybersecurity awareness. Develop, review, and provide guidance on DoN and command cybersecurity programs, standard operating procedures, and instructions. Ensure personnel provided by the contractor meet or exceed the AQL: 100% Compliant requirement. Perform all duties of Task 4, paragraphs 5.1 through 5.7. Develop information systems assurance programs and control guidelines in accordance with the Risk Management Framework (RMF) and the current approved DoD and DoN Assessment and Authorization (A&A) standards. Develop, review, and advise on system Plan of Action and Milestones (POA&M), new/existing cybersecurity policies and instructions, A&A packages, and system security controls. Interface and respond to cybersecurity and A&A requirements from Echelon II/III commands, designated Navy Authorizing Officials (NAO), and designated Functional Authorizing Officials (FAO). Support command cybersecurity inspections and audits, including Command Cyber Readiness Inspections (CCRI) and Inspector General (IG) audits. Serve as a member of the command Configuration Control Board (CCB). Benefits Health Care Plan (Medical, Dental & Vision) Retirement Plan (401k) Life Insurance (Basic, Voluntary & AD&D) Paid Time Off (Vacation, Sick & Public Holidays) Family Leave (Maternity, Paternity) Short Term & Long Term Disability Training & Development Wellness Resources Stock Option Plan

Posted 30+ days ago

Global Chief Information Officer-logo
DentonsBoston, MA
Dentons is designed to be different. We are driven to always be the firm of the future, to challenge the status quo, and to provide holistic business solutions to our clients in new and innovative ways. We are the lightbulb moments. The bold ideas. We are the world's largest global law firm, with 12,000+ people across 80+ countries. Driven by the diverse perspectives of our people, our clients, and our communities, we combine local knowledge with global insight. The Global Chief Information Officer (CIO) will lead the global technology function strategically, define a transformative vision, and provide high-impact leadership across a complex, multi-layered firm. This role is a strategic influencer tasked with aligning technology strategy to the global and regional business priorities and objectives. The Global CIO will champion collaboration across regions, optimize business processes, enable inorganic and organic growth. They will oversee the cost-effective provision of shared services, global platforms, and vendor ecosystems, while ensuring technology security and regulatory compliance. The CIO will also work closely with the members of Global governance bodies (GMC, Global Board etc.) and all the Global Chiefs and in particular the Global Chief Finance Officer to manage complex budgets and billing structures and with the Global Chief Security Officer on technology security. Responsibilities Strategic Vision & Operating Model: Develop and implement a Target Operating Model for the firmwide Technology function(s), including clarifying accountability over governance, funding, and delivery and support frameworks. Create a 5-year technology roadmap aligned with the Global CEO’s strategy and regional priorities. Influence and align regional and global stakeholders to ensure cohesive execution of technology initiatives. Lead and execute transformation efforts enabled by technology, as approved. Shared Services & Global Platforms: Build upon the shared services already provided for the regions. Define and monitor SLAs for shared technologies and services provided to the regions. Oversee the provision and performance of global technology services, digital technologies, applications, and data services. Ensure seamless integration of global platforms. Leadership & Collaboration: Lead and inspire a high-performing Global technology team; and align and inspire Regional IT leaders. Provide guidance on staffing and structuring to build upon and support the shared services delivery model. Foster cross-functional collaboration with practice, business, and security leaders. Vendor & Financial Oversight: Manage Global vendor contracts, billing processes, and performance accountability. Identify opportunities to reduce costs through strategic sourcing. Partner with the Global Chief Finance Officer to navigate procurement and complex budget structures. Security, Compliance & Risk: Collaborate with the Global Chief Security Officer to embed security and regulatory compliance into all technology initiatives and IT operations. Lead efforts to seek and retain compliance of managed technology assets with international cyber security standards including and not limited to ISO27001 and Soc2 Operational Excellence: Institute an IT Service Delivery model (e.g., ITIL) to maximize effectiveness and efficiency. Align tooling, policies, and standards to resolve gaps and drive modernization. Requirements Required Qualifications: Bachelor’s degree in Computer Science, Information Systems, Engineering, or related field. Master’s degree in Business Administration (MBA), IT Management, Organizational Leadership, or Strategy; advantageous. Required Experience: 15+ years in IT leadership roles, including: Leading firm-wide digital transformation Managing global IT operations and infrastructure Driving innovation and business process optimization 5+ years in executive-level roles (e.g., CIO, CTO, VP of IT) with direct reporting to C-suite leadership Skills & Knowledge: Mastery of enterprise architecture, cloud platforms, and infrastructure. Knowledge of cybersecurity frameworks and data privacy regulations. Familiarity with AI and other emerging technologies. Experience with IT service management (e.g., ITIL), DevOps, and software development lifecycle. Competencies & Critical Leadership Capabilities: Strategic & Business Knowledge Global Strategy Alignment: Ability to align IT initiatives with both global and regional business strategies. Target Operating Model Design: Expertise in defining and implementing shared service delivery models. Technology Road mapping: Experience developing long-term technology plans (e.g., 5-year strategy). Technical Expertise Enterprise Architecture: Deep understanding of scalable, secure, and compliant systems. Cloud Platforms: Proficiency in Azure, AWS, and hybrid environments. Cybersecurity & Compliance: Familiarity with global regulatory frameworks. Emerging Technologies: Awareness of AI., blockchain, and automation tools. IT Service Management: Experience with ITIL frameworks and service-level agreements (SLAs). Operational & Financial Skills Vendor Management: Ability to negotiate, manage, and evaluate global vendor contracts. Complex Budgeting: Skilled in navigating multi-layered, cross-regional IT budgets and billing structures. Asset & Risk Management: Oversight of IT assets, technical debt reduction, and audit remediation. Leadership & Collaboration Cross-Functional Leadership: Leading global teams and regional IT leaders in a matrixed environment. Stakeholder Engagement: Building trust and alignment across C-suite, regional, and functional leaders. Change Management: Driving transformation with empathy, clarity, and strategic foresight. Security Partnership: Collaborating with the Chief Security Officer to embed security into all IT operations. Communication & Influence Executive Communication: Translating complex technical concepts into business language. Cultural Intelligence: Navigating diverse teams. Client-Centric Mindset: Prioritizing user experience and client outcomes in technology decisions. The above is intended to describe the general content of and requirements for the performance of this job.  It is not to be construed as an exhaustive statement of essential functions, responsibilities or requirements. Benefits Remuneration and benefits package will reflect the successful candidates experience and country where hired.

Posted 1 week ago

Information Systems Security Engineer (ISSE)-logo
CACIHampton, Massachusetts
Information Systems Security Engineer (ISSE) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 25% Type of Travel: Continental US * * * The Opportunity: CACI is seeking an Information Systems Security Engineer (ISSE) to support our Air Force Distributed Ground Systems-Experimental (DGS-X) program at Langley AFB, VA, Robins AFB, GA, and Hanscom AFB, MA. Responsibilities: Provide expert-level security support and guidance to engineering and technical IT-related activities within the organization. Continuously monitor all alert queues, triage security alerts, and conduct incident response and remediation efforts. Provide the technical support to maintain the confidentiality, integrity, and availability of the AF DCGS. Manage the processing of all organizational efforts through the risk management cycle, including closely coordinating and tracking risks, accreditation status, and reporting status across project teams. Work with SCAs and associated teams to improve the security of AF systems by reducing risk postures through the identification of risk reductions and mitigations. Perform Test and Evaluation (T&E); interview system SMEs; validate physical controls; HW/SW lists; topology and TPPS. In addition, document and provide on-site assessments. Perform a QA review of the risk scores and risk assessment reports. Ensure processes, enhancements, and sustainment activities are following NIST 800-53. Provide engineering services to support testing of SW that is enhanced and subsequently integrated into the AF DCGS as part of the sustainment lifecycle. Develop test scripts and conduct testing for the applications sustained within the AF DCGS database. Operational Testing shall ensure the system meets the operational needs of the user community. Throughout test events, the system’s information assurance and interoperability shall be assessed. Identify information assurance control impacts and likelihoods. Prepare a system risk rating and determine risk reduction measures based on information assurance control subject areas. Qualifications: Required: Active TS/SCI security clearance. DoD Directive 8570 IAT II certification (Security+ CE or equivalent). CASP or GSLC preferred. Bachelor’s Degree or higher in computer engineering or in a field related to the computer engineering or computer science disciplines. 3-10 years of RMF & ISSO experience, or an associate’s degree and 4 years of RMF & ISSO experience. Extensive experience in the use of Xacta 360 IA Manager to create System Security Plans (SSP). Working knowledge of Intelligence Community Information Assurance policies and regulations and how they relate to the assessment and authorization process. Experience authoring and maintaining systems security documentation, including documentation of security mitigations and successful completion of the ICD 503 accreditation process. Experience navigating the security and accreditation process to include Assessment & Authorization (A&A) of an IT system to Authority to Operate (ATO). Knowledge and experience in generating appropriate security documentation to receive proper accreditation and correcting security shortfalls as they are identified through agency-sponsored reviews. Experience with quality data collection techniques. Specific knowledge of AF DCGS RMF processes. Desired: Experience in at least two (2) of the following areas: Knowledge of Xacta 360 and Xacta.io Governance, Risk, and Compliance (GRC) automation software. Hardware/software security implementation, to include Secure Technical Implementation Guides (STIGs), Secure Content Automation Protocol (SCAP), Evaluate-STIG, ACAS/Nessus Vulnerability and Compliance Scanning tools. Air Force Intelligence Community (AF IC) Policies, Plans, and Procedures. ITIL v4 Foundation certification. This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you’ll be part of a high-performing group dedicated to our customer’s missions and driven by a higher purpose – to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You’ll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground — in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here . Since this position can be worked in more than one location, the range shown is the national average for the position. The proposed salary range for this position is: $75,200-$158,100 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.

Posted 3 days ago

Manager of Infrastructure - Information Systems - Full-Time-logo
Kern MedicalBakersfield, California
Kern Medical has been a community cornerstone since its founding in 1867. Today, we are an acute care teaching center with 222 beds, offering the only advanced trauma care between Fresno and Los Angeles. Kern Medical offers a range of primary, specialty, and multi-specialty services including high-risk pregnancy care, inpatient psychiatric services integrated with county mental health programs, and a growing network of outpatient clinics providing personalized patient-centered wellness care. Kern Medical cares for 15,500 inpatients and 125,000 clinic patients a year. Career Opportunities within Kern Medical include many benefits such as: New Hire Premium : +6% of base rate of pay, matched up to 6% if contributed to Deferred Compensation Plan. A Comprehensive Benefits Package : includes Holidays, Paid Time Off, Retirement, Medical, Dental, Vision and Life Insurance. Position : Manager of Infrastructure Definition The IT Infrastructure Manager reports to the Chief Technology Officer and will serve as the lead technology administrator for enterprise technologies including network, voice, compute, and storage. Essential Functions Lead IT projects, including the design and deployment of new IT systems and services Monitor performance of information technology systems to determine cost and productivity levels, and to make recommendations for improving the IT infrastructure Help define IT infrastructure strategy, architecture, and processes Manage staff responsible for infrastructure technologies including network, voice, server, storage, and security. Analyze business requirements by partnering with key stakeholders across the organization to develop solutions for IT needs Assess vendors and develop test strategies for new hardware and software Troubleshoot hardware and software issues related to internal IT Employment Standards: Education: Preferred Bachelor’s degree in Information Technology, Computer Science, Information Systems, or a related field, etc.; two (2) plus years of experience in a position that had the same or similar primary duties. OR Associates Degree or Certification in technical discipline (e.g. Information Technology, Computer Science, or a related field), education, information technology, business administration, or a related healthcare or IS field with two years of experience in a position that had the same or similar primary duties. OR Without a college degree, five (5) years plus of blended work experience. Experience: Firm grasp on IT infrastructure and operations best practices Excellent working knowledge of computer systems, security, network and systems administration, databases and data storage systems, and phone systems Strong critical thinking and decision-making skills Project management and/or project team leadership. Change management and process improvement leadership. Supplemental: All Kern Medical employees are designated “Disaster Service Workers” through state and local laws (CA Government Code Sec. 3100-3109 and Ordinance Code Title 2 - Administration, Ch. 2.66 Emergency Services.) As Disaster Service Workers, all county employees are expected to remain at work, or to report for work as soon as practicable following a significant emergency or disaster. If position responsibilities require driving a personal vehicle, then possession of a current valid California Driver’s License and adherence to the Kern County Hospital Authority Vehicle Use and Driving Standard Policy (ENG-EC-119) is required. If position responsibilities require driving a vehicle owned, leased or rented by Kern Medical, then possession of a current valid California Driver’s license, a signed authorization for Release of Drivers Record Information and adherence to the Kern County Hospital Authority Vehicle Use and Driving Standard Policy (ENG-EC-119) is required.

Posted 3 weeks ago

A
ARKA Group, L.P.Danbury, Connecticut
ARKA Group L.P. (“ARKA”) is an advanced technologies company serving the U.S. military, intelligence community, and commercial space industry delivering next-generation solutions to support the national security space enterprise. Built on more than six decades of excellence, ARKA brings modern approaches and a culture of innovation to the challenges of today. Join the ARKA team to learn how Beyond Begins Here. Discover your next career opportunity now! Position Overview: We are looking for an experienced, motivated, and hands on Information System Security Engineer for the ARKA enterprise. This analyst will report to the Senior Manager of Information Assurance (IA) while providing program support on a multitude of levels. Working in unison with the IA, Information Technology, and Security teams you will be responsible for the overall security of the ARKA corporate network. Ensuring compliance with applicable NIST standards, government, company, and customer regulations this analyst will be instrumental in the future of the ARKA enterprise. This position can be performed remotely or at one of our main locations to include Colorado Springs, CO, Danbury, CT, Melbourne, FL, Ypsilanti, MI or Northern Virginia. Responsibilities: Assist in the selection, development, and implementation of a scalable enterprise IT Security program for a geographically diverse, continuously growing organization Assist in the development of enterprise-wide IT security policy to align the organizational IT security posture with business objectives and regulatory requirements Conduct security impact analysis for proposed changes to organizational IT baselines Provide subject matter expertise on topics relevant to current and future corporate network operations, including zero-trust, industry standards on security best practices (NIST, MITRE, DevOps, cloud security, data classification) Assist in the continuous monitoring of the organization's systems and data to ensure privacy and security objectives are met Collaborate with IT and development teams via ITIL ticketing systems to monitor, analyze, and resolve Information Security tickets in timely resolution Support the organizations insider threat prevention and threat hunting program by identifying lacking areas of visibility and unmitigated vectors of risk Support continuous monitoring and incident response efforts, including preparation activities, playbook development, and ad-hoc tabletop exercises Maintain a well-managed repository of audit documentation which supports internal processes and demonstrates compliance with regulatory requirements Provide regular reporting to internal and external government customer and program management in the form of meetings, standardized deliverables, reports, presentations Independently identify and recommend technical solutions for discovered risks on the corporate network Required Qualifications: BS Degree in relevant field- Information Management, Systems Security, Cyber Security, etc. Relevant industry certifications that demonstrate proficiency in security, cloud technologies, IT auditing, or other DoD Approved 8570 Baseline Certifications Experience with technologies such as Azure Active Directory, Virtualization/Orchestrated Containerization, Linux based systems, Cisco ISE, Palo Alto Networks, RedHat Linux, Windows, Oracle Database, Amazon Web Services, Azure Cloud Services, Microsoft 365, network devices, etc. A strong knowledge of risk based advanced IT auditing in a dynamic and changing environment in compliance with known security frameworks such as RMF, CMMC, and/or CSF Experience working with vulnerability assessment tools such as Nessus to assist in IT system hardening according to STIGs, CIS Benchmarks, and/or vendor recommendations as well as risk mitigation Experience working with GRC tools such as Xacta, EMass, and/or SNOW Self-starter with minimal supervision with the ability to multitask Attention to detail and follow-through when completing tasks Ability to plan, schedule, and arrange activities in accomplishing objectives Ability to develop and implement solutions to a variety of complex problems Excellent written, verbal, and presentation skills Willing to work extended hours, in a fast paced, deadline driven environment Ability to display tact, discretion, and diplomacy in dealing with all levels of employees Preferred Qualifications: Knowledge of one or more general-use programming languages (Bash, Python, Powershell) and demonstrated proficiency building out scalable applications Experience supporting government contractors and federal subjects Experience proposing technical material to managerial leadership in a fashion that’s concise, digestible, and well-explained Demonstration of continuous education which represents the modern technology and threat landscape through research, homelabbing, certifications, and work-supporting projects Location: Ypsilanti, MI Ypsilanti is artistic, genuine, and original. A college town and city located on the Huron River in Washtenaw County. Ypsilanti is all about community and making families new to the area feel right at home. From educational opportunities and local museums for all ages, to accessible healthcare and transportation it’s a wonderful location. It’s well known for its historical museums, parks, and historic districts as well as home to Eastern Michigan University. The University of Michigan and Michigan State University also are great institutions! Ann Arbor is close by and has many things, including a bustling university town, culinary hotspot, and a tech hub with a walkable downtown that includes world-class arts and culture. Located in southeast Michigan's Lower Peninsula, Ann Arbor lies at the center of a greater collection of communities in Washtenaw County. With so many thriving communities nearby, Ann Arbor has become a cultural melting pot and urban oasis. What We Offer: Comprehensive medical/vision/dental insurance packages Company contributions to qualified HSA accounts 401k retirement plan with industry leading company contributions 3 weeks of vacation accrual per year plus time off for sick leave and unscheduled life events 13 paid holidays Upfront tuition assistance for approved degree programs Annual bonus program based on company and employee performance Company paid life insurance, AD&D, Short-Term and Long-Term disability insurance 4 weeks paid Parental Leave Employee assistance program (EAP) EHS/Environmental Requirements: This job operates alongside a professional office environment. While performing the duties of this job, the employee routinely is required to use hands to keyboard, communicate, listen to, and interpret instructions and remain stationary for extended periods of the time. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job. Applicants are invited to apply for a reasonable accommodation to perform the essential duties of the job. To apply, send a request to staffing@arka.org or contact 203-797-5000 and press 2 for Human Resources. ITC & Security Clearance Requirements: This position requires U.S. citizenship in support of contract requirements. Additionally, if you are a dual citizen (a citizen of the U.S. and another country), the Company must obtain approval for you to have access to the information required for this position. You will not be able to begin employment until such approval is obtained and this may take several months. Visa Restrictions: No visa sponsorship is available for this position. Pre-employment Screenings: Employment with any ARKA companies in the U.S. is contingent upon satisfactory completion of several pre-employment requirements to include a credit check, background check, and drug screen.

Posted 2 weeks ago

 Information Systems Security Manager (ISSM) - (DoD Secret)-logo
RacknerDayton, OH
Title:  Information Systems Security Manager (ISSM) Location: Dayton, OH Clearance: Active Secret Clearance About this role: Rackner is seeking a Information Systems Security Manager (ISSM)  to support the AFRL/RG (AFWERX) Technical Operations Branch. AFWERX is the innovation arm of the Department of the Air Force (DAF) and accelerates agile and affordable capability transitions by teaming innovative technology developers with Airman and Guardian talent. The innovation arm of the Department of the Air Force and powered by the Air Force Research Laboratory (AFRL) supports both internal and external (federal and industry partners) users across multiple CONUS locations through client hardware support (NIPR, DREN) and cloud-based (e.g. IaaS, PaaS, SaaS) applications. Additionally, the program's Technical Operations Branch provides Risk Management Framework (RMF) and cybersecurity support to the different AFWERX divisions (i.e. AFVentures, Spark, Prime), including Flight Test Program Management (FTPM) support to both manned and unmanned flight tests. We are looking for experience with: Bachelor of Arts (BA)/Bachelor of Science (BS) and 10 years of experience, three (3) of which must be in the DoD OR 15 years of directly related experience with proper certifications as described below., five (5) of which must be in the DoD Must have at least one of the following certifications (DoD 8570 IAM II or IAM III certified): CAP CASP+ CE CISM CISSP (or Associate) GSLC CCISO HCISPP Highly preferred to be Google Cloud Security Engineer, Google Workspace Engineer, and/or Google Cloud Architect certified What will make you successful: Knowledge of Information Systems Security and risk management processes and requirements per the Risk Management Framework (RMF), to include building, managing, and submitting RMF packages in support of IT platforms, cloud/web-based applications, traditional applications, or embedded IT systems Assist with S&T Protection Plan efforts to include: Identifying and validating security requirements Providing guidance to ensure the protection of technologies and information of various classification levels. Develop or evaluate program, project, or technology area security risk assessments and analyses, and provide mitigation plans. Provide security oversight for all aspects of technology control and S&T protection planning Development of certification and accreditation documents Provide support as a technical security advisor to internal and external entities on matters affecting overall protection architecture Who We Are: Rackner is a software consultancy that builds cloud-native solutions for startups, enterprises, and the public sector. We are an energetic, growing consultancy with a passion for solving big problems for both startups and enterprises. We enable digital transformation for large organizations through the newest in distributed technologies as we are laser focused on end-to-end application development, DevSecOps, AI/ML and systems architecture and our methodology focuses on cloud-first and cost-effective innovation. Our customers hail from a diverse, ever growing list of industries. Additional Info/Benefits Rackner embraces  and promotes employee development and training and covers the cost of certifications relevant to a position and the technologies/services provided .  Fitness/Gym membership eligibility, weekly pay schedule and employee swag, snacks & events are offered as well! 401K with 100% matching up to 6% Highly competitive PTO Great health insurance with large network of providers Medical/Dental/Vision Life Insurance, and short & long term disability Industry-Leading Weekly Pay Schedule Home office & equipment plan     #ISSM #InformationSystemsSecurityManager #DoD #secret #AFWERX #DAF #agile #AFRL #NIPR #DREN #IaaS #PaaS #SaaS #IoC #TechnicalOperationsBranch #RiskManagementFramework #RMF #cybersecurity #FlightTestProgramManagement #FTPM #AFVentures #Spark #Prime #DoDIATIII #googlecloud #gcp

Posted 30+ days ago

Adjunct, Geographic Information Systems-logo
Monmouth UniversityWest Long Branch, New Jersey
Monmouth University is seeking applicants for an Adjunct Professor of Geographic Information Systems in the History and Anthropology department. Part-time Adjunct Faculty members typically teach 3-6 credits per semester, with class schedules determined based on departmental needs and candidate availability. Courses are taught in person at the West Long Branch campus. Adjunct positions remain posted continuously to expand the university’s pool of qualified adjunct faculty. Screening of applications will commence when an open position becomes available. This is an in-person, on campus, non-remote position. For additional information about the program, please visit the GIS webpage. Duties and Responsibilities: Teach 3-6 credits during the semester. Develop and deliver course lectures, discussions and assignments in accordance with the curriculum and learning objectives. Provide time during the week to meet with students outside of class. Foster a positive and inclusive learning environment conducive to student engagement and academic success. Develop and administer projects and exams to evaluate student learning outcomes and provide grades in a timely manner. Provide timely feedback and guidance to students to support their learning and development. Enrichment Statement: Monmouth University values diversity and invites applications from underrepresented groups who will enrich the teaching and service missions of the university. Minimum Qualifications: Master’s degree or higher in Geographic Information Systems or related field. Advanced skills in the use of ESRI’s ArcGIS suite of software . Preferred Qualifications: Background in mapping technologies for coastal and marine planning a plus Additional Application Material Required: Monmouth University requires all applications and supporting documents to be submitted via the university’s career portal. In addition to the application, candidates must upload the following documents. Applications will not be considered complete for review until all required documents are uploaded. Resume or Curriculum Vitae Cover Letter Contact Information for Three Professional References First Letter of Recommendation Second Letter of Recommendation Optional Documents: None Special Instructions to Applicants: We encourage candidates to include information in the cover letter that addresses their approach to teaching and their plans to advance diversity, equity, and inclusion in their position at Monmouth University. Questions regarding this search should be directed to: Maryanne Rhett, Ph.D. at mrhett@monmouth.edu or 732-263-5768 Note to Applicants: Adjunct positions remain posted continuously to expand the university’s pool of qualified adjunct faculty. Screening of applications will commence when an open position becomes available. Should a position become available, you will receive an email advising you of the next steps. Working at Monmouth University perks: Employee Assistance Program (EAP) Employee Tuition Remission Employee elective deferrals to TIAA, 403(b) plan On campus, Fitness Center – free membership To view a full list of benefits, visit our benefits page at: Employee Benefits Information | Human Resources | Monmouth University Department: History And Anthropology Work Schedule: varies Total Weeks Per Year: 14 Expected Salary: $1,000 per credit Union: N/A Job Posting Close Date N/A

Posted 4 days ago

Senior Manager, Information Security-logo
Graduate Management Admission CouncilReston, Virginia
Graduate Management Admission Council (GMAC™) is a mission-driven organization, with a vision to be the global leader in ensuring every talented person can benefit from the best business education for them. The organization’s priority is to heighten its impact in promoting graduate management education and attracting a qualified and diverse candidate pool from around the world. The Senior Manager, Information Security plays a critical role in safeguarding GMAC’s IT systems and applications. This role leads both internal and external resources to ensure the organization’s evolving security needs are met. As a key member of the IT Operations team, the Senior Manager helps shape architectural design by collaborating with colleagues in IT Operations to assess system risks and make recommendations to the Director, IT Operations. The role also partners closely with Legal and other stakeholders to provide strategic guidance on data governance, privacy, risk, and compliance - ensuring that our systems and practices align with business goals and regulatory expectations. Key Responsibilities: Identify requirements and manage the creation, implementation, documentation, and ongoing maintenance of IT security policies and procedures, aligning them with the strategic direction of the business. Coordinate security awareness program; manage communications and compliance across the organization; report results to Director, IT Operations on an annual basis. Manage security incident response plan and procedures; manage incident response activities in the event that a security incident is identified Build and oversee a threat and vulnerability management program, including network and systems security testing and reporting to management. Coordinate operational activities, as necessary, with other security and privacy functions within GMAC, including Legal (data privacy), GMAT Operations (test security), and HR/Administration (personnel/facilities). Manage the selection, development, documentation, and deployment of IT security management and monitoring systems and tools. Evaluate and recommend IT security systems, architectures and AI practices. Assist in planning, testing, implementation, and review of hardware and software upgrades and modifications, including patches, Microsoft upgrades and, hardware modifications. Act as a security consultant or lead on IT and data privacy/security projects. Serve as liaison with GMAC service providers and vendors on IT security related matters Coordinate annual 3rd party assessment of information systems. Develop and manage the IT asset security classification program. Assist in developing and implementing a formal security awareness training program for all personnel. Other responsibilities and duties, as assigned. Minimum Requirements: Bachelor’s degree in related field (e.g., MIS or CS); Or equivalent combination of education, skills, and experience. 5 years’ experience in the field of information technology and information security. CISSP certification. Experience with Microsoft OS and TCP/IP network security. In depth and demonstrated knowledge of LAN/WAN technologies, network protocol analysis, firewalls, intrusion detection systems, encryption and VPN technology, and security tools. Knowledge of computer viruses and computer security incident troubleshooting procedures. Knowledge of relevant security and compliance frameworks, standards and regulations. Strong project management skills and understanding how to manage the priorities of multiple stakeholders in a complex environment. Ability to guide others in resolving complex issues of significance to the organization. Exceptional organizational, project planning, and time management skills. Ability to work independently with minimal supervision and in a team setting, and across external and internal stakeholder groups. Excellent verbal and written communication skills; Strong attention to detail, with a keen focus on quality. Ability to interact successfully with all levels of technical and non-technical staff. Strong analytical skills. Comfort with multi-tasking. Ability to work in-office and remotely according to GMAC’s hybrid work environment. The physical demands and work environment characteristics described are representative of those that must be met by an employee to successfully perform the essential functions of this job . Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Desired Skills/Experience: 10+ years’ experience in the field of information technology and information security. PMP and/or GCPM certification. SANS GIAC certified, CCNA, CCSP, MCSE: Security, MCSA: Security, and CompTIA+ Security certifications a plus. A motivated self-starter and strong problem solver. Professional demeanor with excellent customer service and team player orientation. Capable of working in a fast-paced, dynamically changing and team-oriented environment. Ability to find innovative solutions while working with existing resources. GMAC’s value proposition offers our talented employees the ideal climate for innovation, and colleagues who are motivated and proactive, with diverse backgrounds and approaches. As a global organization, we understand and appreciate the benefits of myriad cultural perspectives. GMAC is wholly committed to recruiting, developing, and retaining a diverse group of talented people, and providing equal employment opportunities to all employees and applicants without regard to the basis of actual or perceived race, creed, color, religion, national origin, ancestry, age, disability, sex (including pregnancy, childbirth, and related medical conditions), marital status, veteran status, sexual orientation, gender identity, genetic information, or any other characteristic protected by applicable federal, state or local laws. FLSA Status: Exempt Report to: Director, IT Operations GMAC’s value proposition offers our talented employees the ideal climate for innovation, and colleagues who are motivated and proactive, with diverse backgrounds and approaches. As a global organization, we understand and appreciate the benefits of myriad cultural perspectives. GMAC is wholly committed to recruiting, developing, and retaining a diverse group of talented people, and providing equal employment opportunities to all employees and applicants without regard to the basis of actual or perceived race, creed, color, religion, national origin, ancestry, age, disability, sex (including pregnancy, childbirth, and related medical conditions), marital status, veteran status, sexual orientation, gender identity, genetic information, or any other characteristic protected by applicable federal, state or local laws.

Posted 1 week ago

Information Systems Security Officer (ISSO)-logo
KentroTampa, Florida
Description Thank you for considering IT Concepts dba Kentro, where innovation drives opportunity and collaboration leads to success. Our dynamic community of experts is fully committed to advancing our customers' missions, fostering professional growth, and making a positive impact on our communities. Our transition to Kentro in 2025 reflects a rich legacy built upon the foundation of IT Concepts. Rather than leaving ITC behind, we confidently embrace a future centered around the Core of More . By joining our supportive community, you will find that Kentro is dedicated to your personal and professional development. Together, we can drive meaningful change, spark innovation, and achieve extraordinary milestones. Kentro is hiring a dedicated and experienced Information Systems Security Officer (ISSO) to join our team supporting a critical Zero Trust (ZT) surge initiative for U.S. Special Operations Command (USSOCOM). As the ISSO, you will be a leader responsible for the overall cybersecurity of designated programs, systems, or enclaves within the USSOCOM ZT environment. You will play a pivotal role in the initial Iplan creation and the subsequent multi-year ZT implementation and operational efforts, ensuring robust security posture, compliance, and risk management. This position directly maps to the DoD 8140 Information Systems Security Manager - ISSM (Work Role ID: 722), Intermediate level, requiring strong leadership, comprehensive cybersecurity knowledge, and expertise in DoD security policies and frameworks. Responsibilities: Lead and manage all aspects of the Zero Trust Implementation Plan (Iplan) development project for USSOCOM's Greenfield (SOCRATES) and Brownfield (SOFNET-U/S) environments, ensuring delivery within an aggressive 7-week initial surge timeline and supporting subsequent ZT efforts. Develop and maintain comprehensive project plans, including scope, schedule, budget, resources, risks, and communication plans. Directly manage a team of 8+ technical experts, fostering a collaborative and high-performance environment. Coordinate with USSOCOM stakeholders, technical teams, and external partners to define requirements, manage expectations, and ensure project alignment with strategic ZT goals, including the DoD CIO ZT PfMO's 91 target activities by FY27 and 61 advanced activities by FY33. Oversee the application of ZT assessment tools (e.g., Leidos ZTRL) and frameworks (e.g., CACI ZT Playbook) to inform Iplan development. Develop and implement methods to monitor and measure project risk, compliance, and assurance efforts throughout the project lifecycle. Ensure all project deliverables, including Iplans, Bill of Materials (BOM), transition plans, and training plans, meet quality standards and customer requirements. Manage project scope, identify potential risks and issues, and develop effective mitigation and resolution strategies. Facilitate project meetings, including kick-offs, status updates, stakeholder briefings, and formal In-Progress Reviews (IPRs). Oversee the preparation of key project reports, including weekly status reports, risk registers, and progress updates for government stakeholders. Ensure security best practices and relevant DoD/USSOCOM policies are followed throughout the project. Support the integration of information security requirements and supply chain risk management (SCRM) considerations into project planning and execution. Act as a primary stakeholder in the underlying IT operational processes and functions that support the ZT services, providing direction and monitoring significant activities. Manage internal relationships with IT process owners supporting the ZT services, assisting with the definition and agreement of Operating Level Agreements (OLAs) where applicable. Provide ongoing optimization, problem-solving support, and recommendations for possible improvements and upgrades related to the ZT project management process. Location: On-site in Tampa, FL Requirements Bachelor of Science (BS) degree in Information Technology, Cybersecurity, Computer Science, Engineering, or a related field. A minimum of seven (7+) years of related work experience in IT project management, with a significant focus on cybersecurity projects CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager). Conditional Alternative: PMP (Project Management Professional) AND ITIL v4 Foundation WITH CompTIA Security+ CE or a higher-level CompTIA certification (e.g., CySA+, CASP+). Proven ability to manage complex IT and cybersecurity projects from initiation through completion, including scope, schedule, budget, risk, and resource management. Strong understanding of Zero Trust Architecture (ZTA) principles, concepts, capabilities, and implementation strategies within a DoD context. Comprehensive knowledge of computer networking concepts, protocols, and network security methodologies. In-depth knowledge of risk management processes (e.g., methods for assessing and mitigating risk per RMF and other frameworks) and supply chain risk management (SCRM) standards and practices. Familiarity with system life cycle management (SLCM) principles, including software security, usability, and secure acquisition processes. Knowledge of IT architectural concepts and frameworks, including cloud computing service models (SaaS, IaaS, PaaS) and deployment models (private, public, hybrid). Ability to identify measures or indicators of system performance and the actions needed to improve or correct performance relative to project goals. Understanding of IT acquisition/procurement requirements and experience ensuring security practices are embedded throughout the acquisition lifecycle. Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity and information technology. Familiarity with organizational process improvement concepts (e.g., CMMI) and service management frameworks (e.g., ITIL). Demonstrated ability to lead and motivate project teams, manage stakeholder relationships effectively, and resolve conflicts. Excellent written and verbal communication skills, with the ability to present complex technical information to both technical and non-technical audiences. Knowledge of specific operational impacts of cybersecurity lapses and the importance of a resilient security posture. Experience with USSOCOM, SOF environments, or other DoD agencies is a significant advantage. Clearance: Active Top Secret clearance with SCI is required. Must meet updated ID requirements: https://www.gsa.gov/technology/it-contract-vehicles-and-purchasing-programs/federal-credentialing-services/get-appointment-help/bring-required-documents If you do not currently meet the ID requirements outlined, you must be willing and able to update your current forms of ID in a timely manner to complete the suitability process successfully. Benefits The Company We believe in generating success collaboratively, enabling long-term mission success, and building trust for the next challenge. With you as our partner, let’s solve challenges, think innovatively, and maximize impact. As a valued member of our team, you have the unique opportunity to work in a diverse range of technology and business career paths, all while supporting our nation and delivering innovative technology solutions. We are a close community of experts that pride ourselves on creating an environment defined by teamwork, dedication, and excellence. We hold three ISO certifications (27001:2013, 20000-1:2011, 9001:2015) and two CMMI ML 3 ratings (DEV and SVC). Industry Recognition Growth | Inc 5000’s Fastest Growing Private Companies, DC Metro List Fastest Growing; Washington Business Journal: Fastest Growing Companies, Top Performing Small Technology Companies in Greater D.C. Culture | Northern Virginia Technology Council Tech 100 Honoree; Virginia Best Place to Work; Washington Business Journal: Best Places to Work, Corporate Diversity Index Winner – Mid-Size Companies, Companies Owned by People of Color; Department of Labor’s HireVets for our work helping veterans transition; SECAF Award of Excellence finalist; Victory Military Friendly Brand; Virginia Values Veterans (V3); Cystic Fibrosis Foundation Corporate Breath Award Benefits We offer competitive benefits package including paid time off, healthcare benefits, supplemental benefits, 401k including an employer match, discount perks, rewards, and more. We invest in our employees – Every employee is eligible for education reimbursement for certifications, degrees, or professional development. Reimbursement amounts may fluctuate due to IRS limitations. We want you to grow as an expert and a leader and offer flexibility for you to take a course, complete a certification, or other professional growth and networking. We are committed to supporting your curiosity and sustaining a culture that prioritizes commitment to continuous professional development. We work hard; we play hard. Kentro is committed to incorporating fun into every day. We dedicate funds for activities – virtual and in-person – e.g., we host happy hours, holiday events, fitness & wellness events, and annual celebrations. In alignment with our commitment to our communities, we also host and attend charity galas/events. We believe in appreciating your commitment and building a positive workspace for you to be creative, innovative, and happy. Commitment Equal Opportunity Employment & VEVRAA Kentro is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state or local law. Kentro is strongly committed to compliance with VEVRAA and other applicable federal, state, and local laws governing equal employment opportunity. We have developed comprehensive policies and procedures to ensure our hiring practices align with these requirements. As part of our VEVRAA compliance efforts, Kentro has established an equal opportunity plan outlining our commitment to recruiting, hiring, and advancing protected veterans. This plan is regularly reviewed and updated to ensure its effectiveness. We encourage protected veterans to self-identify during the application process. This information is strictly confidential and will only be used for reporting and compliance purposes as required by law. Providing this information is voluntary and will not impact your employment eligibility. Our commitment to equal employment opportunity extends beyond legal compliance. We are dedicated to fostering an inclusive workplace where all employees, including protected veterans, are treated with dignity, respect, and fairness. How to Apply To apply to Kentro Positions- Please click on the: “Apply for this Job” button at the bottom of this Job Description or the button at the top: “Application.” Please upload your resume and complete all the application steps. You must submit the application for Kentro to consider you for a position. If you need alternative application methods, please email careers@kentro.us and request assistance. Accommodations To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable Accommodations may be made to enable qualified individuals with disabilities to perform the essential functions. If you need to discuss reasonable accommodations, please email careers@kentro.us . #LI-SB1 #kentro

Posted 2 weeks ago

Information assurance and security  engineer-logo
AHU TechnologiesWashington, District of Columbia
Experience in identifying gaps in existing architectures. Experience in designing security architectures to mitigate threats. Knowledge of computer networking concepts and protocols (e.g. TCP/IP, DNS) and network security methodologies. Knowledge of network access, identity, and access management (e.g. public key infrastructure, Oauth, OpenID, SAML, SPML). Knowledge of capabilities and applications of network equipment including routers, switches, servers, transmission media, and related hardware. Knowledge of remote access technology concepts. Knowledge of application firewall concepts and functions (e.g. single point of authentication enforcement, data anonymization, DLP scanning, SSL security). Work experience in cybersecurity designs for systems, networks, and multi-level security requirements or requirements for processing multiple classification levels of data. Knowledge of risk management processes and experience in conducting risk assessments. Familiarity with the application of privacy principles to organizational requirements. Knowledge of identity and access management methods. Experience with Windows, Unix, and Linux operating systems. Knowledge of business continuity and disaster recovery operation plans. Flexible work from home options available. Compensation: $130.00 - $140.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 30+ days ago

Director, Human Resources Information Systems-logo
KyndrylDallas, North Carolina
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role The Director, HR Information Systems will provide operational excellence and strategic, proactive support of the delivery and execution of Kyndryl’s HR technical strategy. This position will be leading or involved in managing complex, people-centered HR Transformation programs to include the transformation of Workday capabilities, Service Now enhancements and Payroll transformation. In this role, you will have the opportunity to participate in other work within the HR Transformation team’s responsibility, including digital transformation, special projects, and employment-related programs. Additionally, you will have the opportunity to: Lead a team of Product Owners and have individual accountability for Owning & communicating product vision for Workday, Service Now, and other HR Tools across the HR functional areas to define, recommend, prioritize, and implement solutions aligning to strategic goals. Work closely with stakeholders and internal technology partners and include industry best practices to architect technology solutions needed to drive alignment of business needs and lead discussions to arrive at mutually agreeable solution options and integrations. Establish project management discipline and governance processes to support initiatives end to end from project planning through testing to delivery to ensure a successful end-user experience for all new deployments and on-going maintenance of Workday and integrations. Work with technical resources to maintain platform health and look for continuous improvement options, as well as assist with troubleshooting/resolution of escalated product issues. Create and maintain product and release requirements backlog. Work with the global process owners to negotiate and prioritize enhancements rolled out to the organization as well as continue to monitor the security, efficiency and effectiveness of the Workday solution when compared to Kyndryl’s strategic vision for operations, risk, controls, and security profile. Build and maintain a strong working relationship with the HR Centers of Excellence leadership to which you are assigned and other business leaders. Align business priorities and make trade-off decisions across multiple collaborator concerns. Balance priorities between strategic new development against ongoing production support. Coordinate and lead testing efforts while contributing to the employee experience with end-user focus, collaboration, and transparency Recognize available options and select the appropriate course of action for continuous improvement of solutions and delivery processes with the highest business value. Proactively identify, resolve, or bring up issues, concerns, and impediments to get the project developed with efficiency and maximum effectiveness Act as the conduit between Technology and business partners to keep the project moving. Provide final sign-off for projects. Serve as an escalation resource for Tier 2 & 3 issues. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior Administrator to Architect. We have training and upskilling programs that you find anywhere else, including hands-on experience, learning opportunities, and the change to certify in all four major platforms. One of the benefits of Kyndryl is that we work with customers in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Kyndryl currently does not require employees to be fully vaccinated against COVID-19, however, if you are hired to work at a client, customer, or partner location, you may be required to show proof of vaccination to align with their respective COVID-19 vaccination policies. Those who believe they are eligible may apply for a medical or religious accommodation prior to the start of employment. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills, Experience and Circumstances: Minimum of 10 years experience as a Product Owner, Consultant or Business Analyst in the HRIS space across a variety of disciplines. 7+ years Workday, ServiceNow and/or HR Systems experience with an in depth understanding of the product and business processes related to various functional areas within Workday, including understanding of E2E Workday integration points. 5+ years leading Consulting teams focused on Systems Implementation. Global experience with other HR Applications and vendors in the HR Technology tech stack including Service Now. Experience with Product Roadmap development and influencing key collaborators for consensus on business priorities. Ability to facilitate complex discussions. Project Management experience with focus on design, facilitating development, testing and delivery. Demonstrates abilities and/or a proven record of success working in a consultative capacity on Human Capital technology projects. A driver, decision maker, and effective team collaborator. Ability to acquire crucial information and key objectives. Organized, self-motivated, highly adaptable, and have a strong desire to embrace change. Outstanding leadership and motivational skills - possessing a willingness to empower as well as inspire commitment and positive attitude in the team Ability and/or experience to work independently as well as in a team environment through collaboration and consultation skills while working with individuals from all backgrounds and organizational levels and across functional areas What We Offer: Competitive salary and benefits package. Opportunities for professional growth and development. A dynamic and inclusive work environment. The chance to work with a leading global IT services company. Compensation The compensation range for the position in the U.S. is $150,720 to $286,200 based on a full-time schedule. Your actual compensation may vary depending on your geography, job-related skills and experience. For part time roles, the compensation will be adjusted appropriately. The pay or salary range will not be below any applicable state, city or local minimum wage requirement. There is a different applicable compensation range for the following work locations: California: $165,720 to $343,560 Colorado: $150,720 to $286,200 New York City: $180,720 to $343,560 Washington: $165,720 to $314,880 Washington DC: $165,720 to $314,880 This position will be eligible for Kyndryl’s discretionary annual bonus program, based on performance and subject to the terms of Kyndryl’s applicable plans. You may also receive a comprehensive benefits package which includes medical and dental coverage, disability, retirement benefits, paid leave, and paid time off. Note: If this is a sales commission eligible role, you will be eligible to participate in a sales commission plan in lieu of the annual discretionary bonus program. Applications will be accepted on a rolling basis. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Know Your Rights: Workplace Discrimination is Illegal Pay Transparency Nondiscrimination Provision Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 3 weeks ago

T
The Elevance Health CompaniesAtlanta, Georgia
Anticipated End Date: 2025-08-25 Position Title: Pharmacy Financial Analyst, Cost of Care - Business Information Consultant Job Description: Pharmacy Financial Analyst, Cost of Care - Business Information Consultant Location: This role requires associates to be in-office 1 day per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Alternate locations may be considered if candidates reside within a commuting distance from an office. Please note that per our policy on hybrid/virtual work, candidates not within a reasonable commuting distance from the posting location(s) will not be considered for employment, unless an accommodation is granted as required by law. Work Hours: Monday - Friday, 8:00am - 5:00pm The Pharmacy Financial Analyst, Cost of Care - Business Information Consultant is responsible for serving as an expert in data analysis, coordinating, analyzing, reporting, and developing recommendations on data related to Pharmacy cost of care, pharmacy trends, and other Medicare book of business’ related issues/metrics. How you will make an impact: Creates and maintains databases to track business performance. Models, analyzes, and interprets complex pharmacy data to identify cost drivers and trend patterns within the Medicare Part D Individual and Group markets Identifies and evaluates cost-saving opportunities, translating business issues into data-driven insights and decision-support tools. May require taking business issue and devising best way to develop appropriate diagnostic and/or tracking data that will translate business requirements into usable decision support tools. Presents actionable findings and strategic recommendations to senior leadership to support business initiatives. Provides analytic consultation to other business areas, leadership or external customers. Data analysis and reporting encompasses a much higher level of complexity. Analyzes data and summarizes performance using summary statistical procedures. May make recommendations based upon data analysis. Minimum Requirements: Requires a BS/BA degree in related field and a minimum of 5 years experience; or any combination of education and experience which would provide an equivalent background. Preferred Skills, Capabilities and Experiences: Pharmacy or Healthcare analytics experience HIGHLY preferred. Experience with relational databases and knowledge of query tools and statistical software HIGHLY Preferred. Minimum of 3 years’ experience with SAS and/or SQL HIGHLY preferred. Ability to manipulate large sets of data preferred. Intermediate level of Excel is HIGHLY preferred. Power BI experience is a plus Strong analytical, organizational, presentation, and problem solving skills preferred. Medicare Part D experience is preferred. Actuarial background is a plus Job Level: Non-Management Exempt Workshift: 1st Shift (United States of America) Job Family: RDA > Business/Health Info Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health. Who We Are Elevance Health is a health company dedicated to improving lives and communities – and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve. How We Work At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success - for our consumers, our associates, our communities and our business. We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few. Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process. The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws. Elevance Health is an Equal Employment Opportunity employer, and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact elevancehealthjobssupport@elevancehealth.com for assistance. Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.

Posted 1 week ago

Analyst, Information Security - Training & Awareness-logo
Sony PicturesCulver City, California
We are in the business of creativity… making some of the most beloved film and television of all time for every platform in the world. As the most creative and proudly independent studio, our future is boundless. Sony Pictures Entertainment (SPE) is a division of Sony Corporation, a creative entertainment company built on a foundation of technology. Along with our sister companies, we make movies, television, music and games that engage billions of people, connecting creators and audiences around the globe. We are looking for innovators to join us as we forge the future of entertainment! Summary: The Analyst plays a pivotal role in advancing Sony Pictures Entertainment’s security culture by delivering data-driven insights that inform, validate and improve security culture strategies. This role is responsible for analyzing behavioral data, gathering stakeholder feedback, analyzing program performance metrics and identifying opportunities for improvement. This analyst will work across various data streams, stakeholder feedback, and program performance metrics to provide visibility into the state of security awareness rates, improvement opportunities and escalation timing. They will also be responsible for identifying and recommending new, data-informed paths forward that improve program impact and engagement . Success in this role requires a strong foundation in data analytics, a keen understanding of human behavior in the context of cybersecurity, and the ability to communicate insights clearly through intuitive dashboards and reports. This position supports the broader Information Security mission by ensuring that awareness efforts are measurable, targeted, and continuously evolving to reduce risk and foster a culture of security across the organization. Purpose : Drive data-informed decisions for security awareness and culture programs by analyzing user behaviors, surfacing actionable insights, and measuring both qualitative and quantitative impact. In addition to evaluating effectiveness, this role also identifies new directions for strategy, content, or engagement tactics based on observed trends and behavioral insights. This role is critical in validating the effectiveness of experiments and ensuring the team focuses, selects, and prioritizes initiatives that build on a culture of security. Core Responsibilities Behavioral Data Analysis & CSTA measurements Interprets data from overall learning initiatives and simulations (e.g., click rates, report rates, escalation timing ) . Analyzes LMS engagement and outcomes (completion rates, quiz scores, drop-offs). Tracks human behavior KPIs and provide insights about potential opportunities ( e.g., MFA use, security reporting, secure browsing habits). Designs and analyzes satisfaction and effectiveness surveys for security campaigns , initiatives and trainings . Measures learner satisfaction, relevance, and clarity of content delivery. Correlate CSAT with behavioral data to determine alignment or misalignment between perception and impact. Proactively recommends new paths forward for awareness strategy, engagement, and content direction based on behavioral insights and data trends. Experimentation & Iteration Validation Supports MVP testing by defining success metrics and tracking outcome indicators. Designs A/B tests and pilots to compare effectiveness of formats, messages, or tactics. Communicates through data /metrics when an experiment should be scaled, refined, or retired. Participates in interviews and listening sessions with Lines of Business and internal partners. Documents key themes, unmet needs, recurring pain points, and success signals. Translates stakeholder insights into hypotheses or targeted focus areas for awareness campaigns. Strategic Insight & Data-Informed Direction Identifies and recommends new, data-informed paths forward for awareness strategy, content, and engagement based on behavioral trends and program insights. Connects findings from behavioral data, feedback, and performance metrics to shape future program priorities. Helps evolve the security awareness program by translating insights into actionable, forward-looking opportunities. Vendor & Procurement Support Partners with Procurement on vendor reporting, KPIs, QBRs, and platform evaluations. Tracks satisfaction and adoption across awareness tools (LMS, phishing platforms, simulation vendors/ tools). Aligns vendor performance data with internal cultural and learning metrics. Works closely with Director of Information Security Awareness & Training to identify and assess creative, marketing, and video production vendors for awareness campaigns. Education Requirement: Bachelor’s in Data Science , Data Analytics, Behavioral Science, Business Administration, Information Security , or a related field. Equivalent experience or certifications (e.g., Tableau, Power BI, SQL, xAPI ) may be considered . Relevant Experience /Skills 1 – 3 years of experience is ideal for this role, particularly in areas such as Data Analytics , Insights & Visualization , Security Awareness or Employee Engagement, and Reporting. Candidates should demonstrate a proven ability to analyze behavioral data, drive cultural change, and create impactful dashboards that provide clear visibility into trends and program effectiveness. Coursework or formal training in: Data analysis and visualization (e.g., using Power BI, Tableau, Excel, SQL) Security awareness programs or training design Behavioral analytics or user research Statistical methods, experimentation, or A/B testing methodologies Proficient in Power BI, Tableau, or Looker Studio; comfortable with Excel and SQL. Familiar with xAPI /LRS-based learning analytics, SCORM tracking, and LMS reporting. Build clean, user-friendly, intuitive dashboards and scorecards to track cultural maturity and engagement trends. Additional ideal c ertifications : CompTIA Security+, Certified Information Systems Security Professional (CISSP) Certified Analytics Professional (CAP) Certificates in data science tools (Power BI, Tableau, Looker Studio) LMS administration certifications Ideal Backgrounds Might Include: Data analyst with experience in cybersecurity or employee engagement. Customer experience analyst who understands satisfaction measurement and behavior analytics. The anticipated base salary for this position is $70,000 - $93,000. This role may also qualify for annual incentive and/or comprehensive benefits. The actual base salary offered will depend on a variety of factors, including without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location of the position. Sony Pictures Entertainment is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, age, sexual orientation, gender identity, or other protected characteristics. SPE will consider qualified applicants with arrest or conviction records in accordance with applicable law. To request an accommodation for purposes of participating in the hiring process, you may contact us at SPE_Accommodation_Assistance@spe.sony.com.

Posted 2 weeks ago

Assistant Director, Information Security-logo
Saint Joseph's UniversityPhiladelphia, Pennsylvania
Position Title: Assistant Director, Information Security Time Type: Full time Position Summary and Qualifications: The Assistant Director of Information Security plays a critical leadership role in executing the University’s information security vision and strategy. This position works closely with the Chief Information Security Officer (CISO) to implement and manage technical, policy, and compliance-based initiatives that safeguard University systems, data, and operations. The role is central to security operations, including risk management, incident response, audit coordination, and vendor reviews. The Assistant Director also leads efforts to strengthen the University’s information security awareness and training programs, fosters a culture of shared responsibility, and ensures alignment with institutional goals and regulatory obligations. Essential Duties & Responsibilities: Provides leadership and oversight for the day-to-day operations and technical aspects of the Information Security department, with a primary focus on identity and access management, GRC (governance, risk, and compliance), and network security/operations. Collaborates closely with those responsible for IAM functions in the Applications & Infrastructure division to strategically enhance the security awareness program, ensuring a robust understanding of information security and safe computing practices across the University community. Manages technical support and contributes expertise in overseeing vendor relationships pertaining to information security, including leading the formal review of university contracts with significant technology components. Utilizes and refines the vendor questionnaire process to thoroughly assess each vendor’s overall capabilities, including infrastructure, controls, security practices, regulatory compliance, and ability to safeguard University information assets, providing expert security opinions on vendor suitability. Participates in the investigation and assessment of security incidents, coordinating efforts with technology managers in IT and partnering effectively with the Office of General Counsel. Serves as a point of contact and escalation for security threats, potential breaches, and privacy issues, including sensitive matters involving law enforcement. Engages proactively with internal and external auditors and agencies on security and compliance matters, particularly during incident response scenarios. Partners with the IT Audit Analyst to develop and implement comprehensive strategies for addressing audits, assessments, and broader compliance efforts. Actively participates in the establishment of annual and long-term security and compliance goals for the department. Drives the creation and implementation of detailed security strategies, metrics, and reporting processes to monitor effectiveness and demonstrate progress. Develops, maintains, champions, and enforces robust data management and information security policies, standards, guidelines, and procedures, encompassing those for end users, system and application administrators, service providers, and legal/regulatory compliance. Initiates and develops communication and education initiatives aimed at elevating awareness of information security risks, along with mitigation strategies and protective measures implemented across the university. Engages actively with IT advisory councils, administrative, and academic units through committees, ensuring the cohesive development and consistent application of policies and standards across all technology projects, systems, and services, including privacy, risk management, compliance, and business continuity management. Collaborates extensively with stakeholders to conduct thorough risk assessments and business impact analyses, identifying vulnerabilities and assessing risk exposure. When risks are identified, provide expert recommendations on effective risk management strategies, including acceptance, avoidance, transference, and mitigation techniques to minimize potential impact on the university. Stays abreast of emerging governmental regulatory initiatives, security alerts, and relevant issues that could impact the university environment, proactively assessing their implications. Provides expert guidance, planning, and monitoring for adherence to various industry requirements (e.g., FERPA, HIPAA, PCI), influencing the implementation of relevant systems. Oversees the preparation and submission of required reports to external agencies, ensuring accuracy and timeliness Supervision includes: IT Audit Analyst (1); Network security analyst (1); Graduate Assistant/Student worker as funding permits This role provides direct management, technical guidance, mentorship, and project oversight to junior staff, analysts, and interns. May lead and manage specific security projects or work streams. Minimum Qualifications: ( Education/Training and Experience Required) Bachelor’s degree, preferably in Computer Science, Information Security, or a related field, OR an equivalent combination of education, training, and experience. Minimum of 4 years of progressive professional experience in information technology, with at least 2 years in a dedicated information security role (e.g., Identity and Access Management, Risk Management, Security Operations, Incident Response). At least 1 year of demonstrated direct experience managing people (direct reports ) in a professional capacity. Excellent written, oral communication, and presentation skills, with the ability to articulate complex security concepts clearly and concisely. Proven ability to effectively communicate technical and security information to diverse audiences, from technical teams to executive leadership. Demonstrated experience working with compliance and regulatory matters such as FERPA, PCI, HIPAA, and HEOA. Strong understanding and practical knowledge of NIST, GLBA, and GDPR frameworks. Superior troubleshooting and advanced problem-solving skills, with a track record of resolving complex security issues. Extensive experience in drafting and maintaining comprehensive security policies, standards, and related documentation. Proven ability to work autonomously while also fostering a highly collaborative environment. Demonstrated ability to effectively manage multiple, concurrent work streams and consistently meet internal deadlines in a dynamic environment. Preferred Advanced experience with Microsoft security technologies (Azure Security Center, Microsoft 365 Security, Azure AD IAM, CASB, SSO, MFA solutions). Industry-recognized security certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA). Experience with contract and vendor vetting processes, negotiations, and detailed document reviews from a security perspective. Demonstrated experience collaborating with General/External Counsel and various Law Enforcement agencies on security-related investigations and compliance. Physical Requirements and/or Unusual Work Hours: Will require prolonged periods of work at a computer workstation. Will require occasional evening and weekend hours to address critical issues or project demands. Must be available to respond to emergencies on a 7x24 basis and actively participate in the IT On Call rotation process. Saint Joseph’s University is a private, Catholic, Jesuit institution and we expect members of our community to be knowledgeable about – and to make a positive contribution to – our mission. Saint Joseph’s University is an equal opportunity employer that seeks to recruit, develop and retain a talented and diverse workforce. The University is committed to the diversity of its faculty and staff so that our students, our disciplines and our community as a whole can benefit from the multiple perspectives it offers. The University seeks qualified candidates who share our commitment to equity, diversity and inclusion. EOE Saint Joseph’s University prohibits discrimination on the basis of sex in its programs and activities, including admission and employment, in accordance with Title IX of the Education Amendments of 1972. The Title IX Coordinator is responsible for overseeing compliance with Title IX and other civil rights laws and regulations. To contact the Title IX Coordinator, e-mail titleix@sju.edu, visit Campion Student Center suite 243, or call 610-660-1145. To learn more about the University’s Title IX policies, the process for filing a report or formal complaint of sex discrimination, sexual harassment, or other form of sexual misconduct, and the University’s response to reports and/or formal complaints, please visit www.sju.edu/titleix . Inquiries may also be directed to the Federal agency responsible for enforcing Title IX, the U.S. Department of Education Office for Civil Rights . Pay Transparency & Benefits Overview Please click to read more about the university's approach to pay and benefits transparency. Adjunct instructor compensation can be found in the article. Otherwise, an estimated pay range is listed below. This position's estimated pay range is: $89,850.00 - $102,400.00

Posted 2 weeks ago

Enterprise Information Architect-logo
Sargento FoodsPlymouth, Wisconsin
Your Story. The Enterprise Information Architect (EIA) plays a critical role in shaping how information flows, connects, and adds value across the enterprise. The EIA will serve as the principal architect of enterprise-wide data availability, ensuring that information is not only technically integrated but also contextually aligned with business decision-making needs across domains. Operating within a food manufacturing environment, the EIA must account for traceability, lot tracking, shelf-life data, nutritional details, and a three-tier supply chain. This individual contributor partners closely with data and analytics, finance, sales, marketing, manufacturing, quality, and supply chain teams to ensure that information architecture bridges strategic goals with execution. Your Passion. Our Culture. At Sargento, you work for a company you believe in, with a family of people who believe in you. Our culture stems from a simple premise: Hire good people and treat them like family. At Sargento, you can make decisions based on how they affect people as well as the long-term health of our company. You will be encouraged to make a meaningful difference in the community, in the company and in your career. With diverse experiences and tools to learn and develop, you can transform your aspirations into reality. If you’re ready for the right place to belong and grow your career, you can find it here. Benefits that set us apart. Comprehensive medical including Fertility, Adoption benefits, Dental, and Vision Insurance Flexible Work Week Hybrid work schedule – Onsite Tuesday – Thursday with the option to work remotely Monday and Friday Compressed work week – Option of ½ day Friday Onsite Health & Wellness Center Employer 401K contribution in the top 1% of the nation Relocation Assistance Tuition Assistance Access to Employee Store What You Do. Develop and maintain enterprise reference models, taxonomies, and data designs that accommodate food-specific requirements. Define metadata, semantic layers, and information flow standards that enhance data quality, regulatory compliance, and business usability across systems. Architect scalable integration patterns for transactional systems and analytics environments. Embed architectural guardrails and reusable patterns into agile delivery teams to accelerate time-to-value while maintaining data integrity and compliance. Collaborate with supply-chain stakeholders to model supplier data, commodity pricing, and upstream/downstream dependencies. Collaborate with sales, marketing, and finance teams to define data structures that support forecasting, financial planning, and revenue growth management. Architect information flows across internal systems and external data sources (e.g., IRI, POS/e-commerce data from customers, supplier feeds) to enable consistent analytics and informed decision-making. Serve as a technical thought partner to the Data Governance team—contributing to lineage, classification, and policy alignment without owning governance directly. Actively participate in SAFe ceremonies (PI planning, demos, retrospectives) as part of the ESA enabling team, shaping enabler epics and architectural runway. Translate strategic information needs into actionable design artifacts; create and maintain high-quality documentation and diagrams. Mentor solution architects, analysts, and data stewards in information architecture principles, tooling, and best practices—building a culture of data fluency and architectural thinking. Your Education and Experience. Bachelor’s degree in Computer Science, Information Systems, Data Science, or a related field required. Preferred certifications: TOGAF, Certified Data Management Professional (CDMP), DAMA, or related credentials. 5+ years of information or data architecture experience. Strong foundation in data and analytics architecture, with demonstrated ability to create and deliver IA reference models and design artifacts. Experience working cross-functionally with business and technology teams. Familiarity with core enterprise systems and cloud platforms (e.g., SAP S/4HANA, Snowflake or similar cloud data platforms). Experience supporting data integration, governance alignment, and metadata-driven design in complex environments. Hands-on experience with EA/modeling tools (LeanIX, Lucid Chart, Visio). Preferred Skills & Experience Candidates with any of the following will be prioritized: Experience in a regulated food & beverage or related CPG manufacturing environment, including knowledge of FDA data requirements (e.g., FSMA, nutritional labeling). Exposure to manufacturing systems integration, such as MES, WMS, or LIMS platforms. Background with sales and marketing data, including third-party sources (e.g., IRI, Nielsen), POS/e-commerce data, or supplier data pipelines. Familiarity with forecasting, financial planning, or trade promotion/RGM systems (e.g., Anaplan, SAP TPM, OneStream). Understanding of commodity pricing models or supplier data management in supply-chain contexts. Hands-on experience with metadata/cataloging tools (Collibra, Alation, Purview). Soft Skills & Attributes Influential and persuasive communicator across business, manufacturing, and technical audiences. Comfortable operating in ambiguity while able to bring structure to loosely defined problems. Strategic thinker who connects vision to execution and dives into technical details when needed. Strong written, visual, and verbal communication skills, including architectural storytelling. Organized and proactive with the ability to break down large efforts into accountable, prioritized work. Our Story. With over 2,400+ employees and net sales of $1.8 billion, Sargento Foods is a family-owned company that has been a leader in cheese for more than 70 years. We created the world’s first, successful pre-packaged sliced and shredded natural cheeses. Sargento is based in Plymouth, Wisconsin, where we manufacture and market shredded, sliced and snack natural cheese products, as well as ingredients and sauces. Sargento is known for the exceptional quality of our products and for product design, packaging and merchandising innovations that have transformed our industry. To learn more about our culture and values, please visit our website at https://careers.sargento.com/us/en. #LI-MR1

Posted 30+ days ago

O
Old Republic National Title Insurance CompanyTampa, Florida
Job Description: SUMMARY : The candidate will have shared responsibility for implementing and maintaining company’s security strategies and services while providing, security guidance based on industry standards and best practices. *This position is located out of our Tampa, FL corporate office. 2 days a week in office are required* EXPERTISE: This position is staffed by employees who have sufficient educational background and/or experience to maintain and support assigned information security technologies with general leadership oversight. RESPONSIBILITIES: Provision, manage, monitor, test, and decommission security tools and applications. Attend and lead small project meetings and enforce best practices. Apply specialized security technical knowledge. Evaluate, plan and implement security projects. Remain current on assigned security tools and applications and apply skilled understanding of troubleshooting. Document and resolve moderately complex problems. Report progress to leaders. Monitor and analyze Identity security incidents, and provide recommendations for remediation Other duties as assigned or required. EXPERIENCE: IT security risks and mitigation strategies. Security Incident Response Security frameworks, including ISO and NIST. Company IT and HR policies. Various IT security-related regulatory requirements. IT security logging and monitoring strategies. Deployment and use of sophisticated IT security monitoring tools. EDUCATION: Bachelor's degree in computer science, Information Systems, or other related field; or has 2-5 years of relevant experience. TECHNICAL SKILLS: Analytical ability Analyzing Security System Logs, Security Tools, and Data Communicating Up, Down, and Across All Levels of the Organization Creating, Modifying, and Updating Security Information Event Management (SIEM) Deep Understanding of Risk Management Frameworks Discovering Vulnerabilities in Information Systems Evaluating and Deconstructing Malware Software Familiarity with Security Regulations and Standards Implement and Maintain Security Frameworks for Existing and New Systems Maintaining Security Records of Monitoring and Incident Response Activities Monitoring Compliance with Information Security Policies and Procedures Network and System Administration Experience Responding to Requests for Specialized Cyber Threat Reports Performing Cyber and Technical Threat Analyses Performing Security Monitoring Producing Situational and Incident-Related Reports Providing Host-Based Forensics Providing Timely and Relevant Security Reports Responding to Security Events Supporting and Managing Security Services #LI-MB1 Benefits may include: Comprehensive medical, prescriptions, dental and vision plans 401(k) plan with a discretionary company match Shareholder Purchase and Reinvestment Plan Basic life and accidental death and dismemberment insurance premium paid by the company Voluntary supplemental life insurance for employees, spouses and dependent children Fertility and Family Building Benefits Paid Disability benefits Paid time off programs 11 Company paid holidays per year Flexible spending account Health savings account (available to High Deductible Health Plan participants only) Employee Assistance Program Educational Assistance Program Voluntary benefits, such as Critical Illness, Hospital Indemnity, Pet Insurance and Accident Insurance Title insurance policies and certain escrow services for the employee’s primary personal residence at no charge Transportation benefit plan for mass transit, parking and vanpool, in several markets Note: If you currently are employed by Old Republic Title (or one of its wholly owned affiliated companies) please get in touch with your human resources representative regarding the application process. For California applicants, please click the following link to view our CCPA Applicant Notice Old Republic Title is an Equal Opportunity Employer

Posted 3 days ago

Information and Planning SETA, Top Secret Clearance-logo
Blue Sky InnovatorsArlington, Virginia
Description: Seeking experienced Technical SETA candidates in support of DARPA to provide on-site support in the area of next-generation classified systems development. Successful candidates will provide expert technical advice and guidance to the government on all aspects of secure, multi-domain computing systems. Candidates will support and supervise performers conducting algorithm research and assessment, integration, test, prototype deployment, and transition of software systems for sensing, exchanging information, and planning for digital actions. The candidate will be responsible for coordinating meetings, assessing performer technical progress, projecting performer outcomes, and ensuring that project management best practices are followed by performers. The candidate will prepare and deliver technical reports, briefings, and presentations to government officials and technical stakeholders. Required Qualifications: Bachelor’s degree in Computer Science, Engineering, or a related field (Master's degree preferred). Minimum of 8 years of relevant experience in sensemaking/planning / C2 software, autonomous systems, and/or distributed software systems Substantial experience across one or more of the following fields: Information synthesis, estimation, tracking, and/or probabilistic reasoning algorithms Command and control software Distributed systems, software, and services Software algorithms for intelligent systems, planning, sensing, and orchestration Mission planning software, user interfaces, constraints, resources, and nuances Agent-based software architectures, implementations Distributed system communication and transport mechanisms Goal decomposition and planning algorithms Ability to work with little oversight to achieve team goals Excellent written and verbal communication skills, with the ability to effectively convey complex technical information to both technical and non-technical audiences. A high degree of initiative, excellent organizational skills, attention to detail, and reliability Familiarity with general systems engineering principles for complex systems development. Work performed onsite at DARPA in Arlington, VA in a SCIF environment (no regular telework or remote work) Travel may be required up to 10-20% of the time. Desired Qualifications : Experience operating in complex, contested, non-benign environments. Experience with Clandestine or Covert Operations (Desired) Experience with Cyber Operations (Desired) Experience with Embedded Systems Experience working with Special Access Programs (SAPs)/CAPs. Experience with Agile development methodologies. Clearance: Active Top Secret required. Blue Sky Innovators, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law. If you are a qualified job seeker with a disability or a disabled veteran, you have the right to request an accommodation if you are unable or limited in your ability to use or access http://www.blueskyinnovators.com as a result of your disability. To request an accommodation, please email us at careers@blueskyinnovators.com and provide your name and contact information. Please note: this is only for job seekers with disabilities requesting an accommodation.

Posted 1 week ago

Nexxis Solutions logo

Information/Cybersecurity Engineer (Clearance Required)

Nexxis SolutionsAnnapolis Junction, MD

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Nexxis Solutions is supporting current and near-term efforts to provide information and system security engineering, life cycle solutions, system security testing, risk assessment, and continuous monitoring. We are looking for candidates to provide Cybersecurity expertise to systems and projects to ensure that the appropriate security features and safeguards are designed, integrated, and implemented for all information systems.

We are currently looking for cleared professionals in the following areas:

    • Security Controls Assessor (SCA)
    • ISSE/ISSM/ISSO
    • DevSecOps Engineer
    • IT Security
    • IA System Administrator
    • Security Engineer
    • Cybersecurity Network Analyst (CSNA)
    • Splunk Engineer/Administrator
    • Penetration Tester
    • Others…

General Overview

Be part of a team helping ensure proper level of security for customer software systems and network. Duties will include protecting system boundaries, keeping computer systems and network devices hardened against attacks and securing highly sensitive data.

Possessing deep and wide expertise in the security space as well as having a background in security and/or systems engineering will be critical in these roles.

Responsibilities vary by role but may include any of the following:

  • Organize computer security architecture and develop detailed cyber security designs
  • Review, develop and implement security measures for the protection of computer systems, networks and information
  • Define system security requirements and prepare reports on your results
  • Review and document standard operating procedures and protocols
  • Configure and troubleshoot security infrastructure devices
  • Create technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Perform support and consulting of the company's personnel about security incidents and measures
  • Prepare detailed reports including assessment-based findings, outcomes and propositions for further system security enhancement

Degree Requirements: A B.S. in Cybersecurity, Information Technology, or a related field is required for most positions. A Master's or Ph.D. in Cybersecurity, IT, or a related field is a plus but not required for most positions. 

(Some positions may consider additional years of experience in lieu of degree.)

Certification Requirements: Most positions require DoD 8570.01-m (level 2 or above) compliance. A minimum of Security+ strongly preferred; CISSP or above required for some opportunities.

Experience Requirements: Available positions range from entry level to 20+ years of experience.

Clearance Requirements: A current TS/SCI clearance with appropriate level Polygraph is required.

Nexxis Solutions offers competitive salary and comprehensive benefits package (including paid time off, medical/dental/vision insurance, 401k and more). 

  • Entry level: $90-120k; Mid-level: $120-180k; Senior level: $150-230k*
  • Most positions offer minimal if any telework
  • More benefit details can be found here: Nexxis Solutions Benefits Overview

* Salary ranges represent a general guideline.  Nexxis Solutions considers several factors when determining compensation including but not limited to: scope and responsibilities of the position; candidate's experience, education/certifications, skills; and current market conditions.

Equal Employment Opportunity Policy

Nexxis Solutions provides equal employment opportunities to all qualified individuals without regard to race, color, religion, age, sex, pregnancy, national origin, disability status, genetic information, military or veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Nexxis takes allegations of discrimination, harassment, and retaliation seriously, and will promptly investigate when such behavior is reported.

If you have a disability and would like to request an accommodation in order to apply for a position with Nexxis Solutions, please contact us at 410-875-7980 or recruiting(at)nexxissolutions.com.


Applicants have rights under Federal Employment Laws. You can find links to these notices here.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall