1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

T logo
Talent Acquisition ConceptsLinthicum, MD
Are you looking for a Challenge? Looking for an innovative organization and the opportunity to learn and grow professionally? At Terrestris, LLC, we are helping the government create better mission outcomes through better human performance. We are currently seeking an Information Security SME Instructor to develop, deliver, and maintain the Information Security curriculum. This position will have hybrid (subject to change) opportunities and is located Linthicum, MD. In this role you will be expected to: The ideal candidate will provide subject matter expertise in the development, delivery and maintenance of the Information Security Curriculum. This includes working with client program leads, management, technical staff in the design, conversion, development and delivery of training and certification projects, curricula, and products. Complete client Instructor Basic and Intermediate Certification as defined in the client Instructor Certification Manual Demonstrate mastery of Information Security knowledge, skills, and policy Instruct Information Security courses to include basic and advanced instructor- led courses in accordance with the course schedule Serve as a SME in response to student and customer inquiries with respect to Information Security Provide assistance to the Curriculum Manager in all phases of the ADDIE process, to include file management, and extensive course review from cradle to grave Review training material/deliverables and provide recommendations on the accuracy of and relevancy of content of instructor-led eLearning, webinars and performance support tools (i.e. storyboards, instructor guides, participant guides, design plans, and other related material) We're looking for someone who is/has: Bachelor's degree in the field of education from an accredited university. In lieu of a Bachelor's degree, five years of experience as an instructor for adult learners, in formal classroom or via distance learning courses related to DoD Security Policy Experience in Information Security Experience in Microsoft Outlook, Word, and PowerPoint Current TS/SCI security clearance Preferred Qualifications: Five years of work experience in Information Security All qualified applicants will receive consideration for employment without regard to race, color, religion, sexual orientation, gender identity, national origin, disability, age, marital status, ancestry, protected veteran status, or any other protected group or class. DILBERT © 2018 Scott Adams. Used By permission of ANDREWS MCMEEL SYNDICATION. All rights reserved.

Posted 30+ days ago

Centurum logo
CenturumSan Diego, CA

$41 - $53 / hour

The Information System Security Specialist III role encompasses a broad range of information security disciplines, including risk assessment, security architecture development, vulnerability management, compliance adherence, incident response, and cybersecurity. DUTIES AND RESPONSIBILITIES Risk Assessment: Conduct comprehensive risk assessments to identify vulnerabilities and threats to information assets, systems, and networks. Analyze potential impacts and develop mitigation strategies. Security Architecture Development: Design, develop, and implement security architectures, policies, standards, and procedures to protect information assets and systems. Compliance: Ensure compliance with relevant regulatory requirements, industry standards and organizational policies. Develop and maintain documentation to support compliance efforts, such as IATT, IA certification documentation etc. Cybersecurity: Implement and maintain cybersecurity measures to protect against cyber threats, including malware, phishing, ransomware, and other attacks. Stay abreast of emerging threats and vulnerabilities. Documentation: Maintain accurate and up-to-date documentation of security policies, procedures, and controls. Update patches to address vulnerabilities and support preparation and recurring scans/documentations to maintain IATT/ATO. Install, update, and troubleshoot systems/servers. Check system hardware availability, functionality, integrity, and efficiency. Conduct functional and connectivity testing to ensure continuing operability. Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing. Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. Develop and document systems administration standard operating procedures. Ensure the application of security patches for commercial products integrated into system design meets the timelines dictated by the management authority for the intended operational environment. Maintain baseline system security according to organizational policies. Identify and analyze anomalies in network traffic using metadataIsolate and remove malware. Identify applications and operating systems of a network device based on network traffic. REQUIRED SKILLS/YEARS OF EXPERIENCE Minimum of one (1) to three (3) years of experience in information assurance, cybersecurity, or a related field. Relevant certifications such as CompTIA, CISSP, CISM, Security+, or equivalent. Extensive knowledge of information security principles, practices, and technologies. Strong understanding of Department Of navy (DON) Risk Management methodologies and Frameworks (RMF). Proficiency in vulnerability management processes and tools. In-depth knowledge of security architecture and design principles. Examine network topologies to understand data flows through the network. Recommend computing environment vulnerability corrections. Bachelor's degree in Computer Science, Information Systems, or a related field. Demonstrated ability to immediately contribute to the organization's security posture with no supervision or training. Travel Required : 10% Work Location : San Diego, CA This position is required to have and maintain a Secret US DoD security clearance. PREFERRED SKILLS REMARKS Must be able to communicate effectively in English, both verbally and in writing.Must be able to interface effectively with all levels of technical and management personnel. Labor Category - Specialist, Information System Security I Compensation: $41 - $53 an hour.Compensation for positions at Centurum vary depending on a wide range of factors including, but not limited to, location, responsibilities, skill set, and level of experience.EOE M/F/Disability/VeteranWhen responding to this posting please reference job # SD25-75, Information System Security Specialist I (SATCOM) Benefits Full-time employees are eligible for the following benefits enrollment from their date of hire: Health Insurance - Centurum provides insurance for employee and dependent in a comprehensive package. Coverage for vision care is included. This option is available on a cost-sharing basis. Dental Insurance - Available in conjunction with Health Insurance for an additional cost. Provides oral maintenance care for employee and dependent. Basic Life Insurance - Company provided benefit for all full-time employees. Supplemental Life Insurance - Optional life insurance coverage to employees at group rates. Dependant Life Insurance - Optional coverage for dependents at a group rate. Long Term Disability Insurance - Optional coverage available to employees at group rates. Vacation and Sick Leave - Leave accrual is determined by length of service. Holidays - The company observes ten paid holidays each year. Retirement 401(k) Plan - Centurum’s corporate benefits package includes 401K with a company bi-weekly match and a year-end profit sharing company match for all eligible employees. Investments can be made into selected funds under this plan. Centurum is an Equal Opportunity Employer, providing employment opportunities for all persons without discrimination on the basis of race, color, religion, sex, sexual orientation, national origin, age, disability, marital status, citizenship or any other characteristic protected by U.S. law. Centurum makes reasonable accommodations for persons with disabilities. Powered by JazzHR

Posted 1 week ago

Ansible Government Solutions logo
Ansible Government SolutionsTemple, TX
Overview Ansible Government Solutions, LLC (Ansible) is seeking multiple Medical Records Technicians Release of information positions to work with us in support of the Central Texas Veterans Healthcare System located at 1901 Veterans Memorial Blvd, Temple, TX 76504. The schedule is typically Monday-Friday, 8:00am-5:00pm. If you accept employment with Ansible, you must also acknowledge that any assigned schedule is subject to change at the direction of either Ansible or its customers. Ansible is a Service-Disabled Veteran-Owned Small Business (SDVOSB) providing Federal customers with solutions in many arenas. Our customers face wide-ranging challenges in the fields of health care, national security, and information technology. To address these challenges, we employ intelligent and committed staff who take care of our customers’ success as if it is their own. Duties and Responsibilities Process requests for medical records and health information in compliance with privacy regulations (HIPAA, VA policies) Review and verify authorization forms for release of information Ensure timely and accurate release of medical records to authorized parties Maintain confidentiality and security of patient information at all times Communicate with patients, healthcare providers, and third parties regarding information requests Track and manage workload volumes, meeting VA timeliness requirements Address backlogs and support ongoing technician competency through training and auditing practices Document all release of information activities according to VA standards Qualifications and Requirements Experience handling medical records and release of information in a healthcare setting Knowledge of HIPAA and other privacy regulations Familiarity with VA policies and procedures for release of information Strong attention to detail and accuracy Ability to manage workload and meet deadlines Effective communication and customer service skills Commitment to maintaining confidentiality and security of patient information No sponsorship available All candidates must be able to: Sit, stand, walk, lift, squat, bend, twist, and reach above shoulders during the work shift Lift up to 50 lbs from floor to waist Lift up to 20 lbs Carry up to 40 lbs a reasonable distance Push/pull with 30 lbs of force All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Powered by JazzHR

Posted 4 days ago

S logo
SERVISS LLCWashington, DC
About SERVISS At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Information Assurance Professional. Position Summary We are seeking a dynamic and versatile Information Assurance Professional to support a high-impact U.S. Government program. The ideal candidate brings a rare balance of hands-on technical acumen and governance expertise—able to move seamlessly between engineering, architecture, and GRC functions. This role is pivotal in ensuring that systems are not only compliant but also resilient, secure, and aligned with federal risk management frameworks. Key Responsibilities · Serve as a trusted IA advisor, bridging technical engineering efforts with cybersecurity policy, governance, and risk management. · Collaborate with system architects and engineers to design secure solutions that meet compliance and mission requirements. · Support the development, review, and maintenance of key authorization documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms). · Guide system owners and developers through the Risk Management Framework (RMF) process and associated controls (e.g., NIST 800-53, 800-171, CMMC, FedRAMP). · Translate complex technical risks and mitigation strategies into actionable GRC documentation and executive communications. · Conduct system security assessments, gap analyses, and continuous monitoring activities. · Coordinate with cybersecurity operations, incident response, and engineering teams to align IA strategy with operational realities. · Recommend and help implement security architecture improvements based on evolving threat and compliance landscapes. · Track and report on IA posture, risk status, and compliance progress across multiple systems or program areas. Required Qualifications · 10+ years of experience in information assurance, cybersecurity engineering, or GRC. · In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP). · Strong technical foundation with the ability to understand complex systems, architectures, and security configurations. · Excellent verbal and written communication skills, including experience preparing formal security documentation and reports. · Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams. · Bachelor’s degree in Cybersecurity, Computer Science, Engineering, or a related field; or Associate’s degree with 2+ years of additional relevant experience. Preferred Qualifications · Prior experience supporting U.S. federal agencies or DoD environments. · Professional certifications such as CISSP, CISM, CAP, CCSP, or Security+. · Experience with security automation tools and continuous compliance approaches. · Understanding of Zero Trust principles, DevSecOps environments, and modern system architecture. Why Join SERVISS Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way. Freedom to Thrive. · Be part of an exciting company with ground floor opportunities to include equity · Highly competitive compensation and best in class benefits · Opportunities for annual performance bonuses, growth incentives, and profit-sharing · 100% of medical, vision, dental, and life insurance premiums covered by SERVISS · 401(k) retirement plan with company match for the first 6% Note:  This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025. Powered by JazzHR

Posted 30+ days ago

Maania Consultancy Services logo
Maania Consultancy ServicesWashington DC, DC
Required Skills & Qualifications: Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility Minimum of 5 years of work experience in a computer science or cybersecurity-related field Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WeblInspect, Network Mapper (NMAP), and/or similar applications. Powered by JazzHR

Posted 2 days ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we believe security starts with the details. As an Information Systems Security Officer (ISSO), you will support the security posture of critical systems across their lifecycle. From assisting with risk assessments to maintaining compliance documentation, you’ll play a key role in protecting sensitive systems and data. Working alongside experienced ISSMs and ISSEs, you will gain hands-on experience with cybersecurity best practices in a collaborative, mission-driven environment.Independent Software is where innovation meets purpose. You'll join a team that values integrity, learning, and technical excellence. We offer the opportunity to work on impactful projects, grow your cybersecurity expertise, and contribute to real-world missions. With flexible work environments, strong mentorship, and a commitment to professional development, Independent Software is the place to launch or elevate your cybersecurity career. Key Responsibilities: Assist senior ISSOs in implementing and enforcing information systems security policies, standards, and methodologies Support the evaluation of security solutions to ensure they meet requirements for processing classified information Perform configuration management for information system security software, hardware, and firmware Maintain records of system components including servers, routers, switches, firewalls, and related infrastructure Develop and maintain cybersecurity documentation such as System Security Plans (SSPs), Risk Assessment Reports, and accreditation packages Assist in maintaining the operational cybersecurity posture of information systems Track and manage user identification and authentication mechanisms Support vulnerability and risk assessments to assist in system authorization Coordinate with engineers and customers to ensure compliance with IT security policies and NIST RMF Plan and coordinate the implementation of IT security programs and policies Manage and control system changes and assess their security impact Provide daily oversight and direction to contractor ISSOs Interact with customers, IT staff, and executive stakeholders to define and achieve cybersecurity objectives Required Skills and Qualifications: Strong foundational knowledge in IT or cybersecurity principles Experience with or understanding of system hardening, access control, or security policy implementation Ability to prepare, maintain, and review cybersecurity documentation Familiarity with vulnerability assessment and basic risk analysis Clear communication and collaboration skills to support interaction with teams and stakeholders Minimum of ten years of combined work-related experience in IT, cybersecurity, or security authorization · Experience in at least two of the following areas is required: Current security tools Hardware or software security implementation Communication protocols Encryption tools or techniques Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or related technical discipline In lieu of a bachelor’s degree, an additional four years of relevant work experience may be substituted Certifications: Must be compliant with DoD 8570.01-M Minimum certification required: IAM Level I Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

Telophase Corporation logo
Telophase CorporationLanham, MD
Telophase Corporation is seeking a motivated, career and customer-oriented senior Information Systems Security Officer (ISSO) to join our team. The ISSO shall ensure the implementation and maintenance of security controls in accordance with the System Security Plan (SSP) in preparation for NIST RMF and 800-53 based independent security assessments and provide strong leadership in the development of a cyber security validation program for mission systems. Responsibilities: Support adoption and implementation of NIST-based standards across the organization in support of multiple mission system authorization boundaries including Cloud-based workloads Support all steps of NIST RMF with strong background in NIST SP 800-53 Revision 5 and 800-53A Participate in the selection of the organization's common security controls and in determining their suitability for use in the information system Review the 800-53 security and privacy controls regarding their adequacy in protecting the planned or operational information system Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment and Authorization(A&A) packages, and support system authorization activities Implement and enforcing organizational information systems security policies, standards, and methodologies Evaluate security solutions to ensure they meet security requirements for processing unclassified/classified information; perform vulnerability/risk assessment analysis to support certification and accreditation. Red Team operations background such as penetration testing is bonus. Manage changes to the information system and assess the security impact of those changes. Required Skills & Experience: Education: Bachelor's or higher in computer science/ technical discipline preferred or equivalent work experience Years of related experience: 8+ years of experience is required as an ISSO/ ISSM including experience implementing, and enforcing information systems security policies, standards, and methodologies; creating security plans, policies & procedures, SSPs, and Risk Assessment Reports Technical Skills: FISMA, FedRAMP, NIST RMF (Risk Management Framework), NIST 800-53 Revision 5 controls, and strong understanding Security Control Assessment (SCA) processes. Good understanding of Windows and Linux operating systems and architecture. Good knowledge of public cloud providers such as Azure, AWS, and GCP highly desirable Experience with applications for Amazon AWS, Microsoft Azure, GCP or other cloud platforms for large-scale, multi-tenant, SaaS systems highly desirable Experience with security assessments of AWS/Azure/GCP environments preferred Experience with AWS/Azure/GCP service offerings preferred Skills and ideally certifications in public cloud providers (AWS, Azure, GCP) highly desirable Cloud Security experience (AWS/Azure/GCP), including both IaaS and PaaS models preferred Hands-on experience with public cloud services (AWS, Azure, GCP) preferred Hands-on experience in PaaS, SaaS, CI/CD, Docker, Jenkins, Puppet Chef, Ansible, Kubernetes preferred Strong understanding of and experience in AWS / Azure / GCP cloud architecture Experience developing applications for Microsoft Azure, Amazon AWS, Google or other cloud platforms for large-scale, multi-tenant, SaaS systems a bonus Clearance: Must have or be able to attain Public Trust or higher Desired Skills & Experience: Certifications: Cybersecurity certifications, such as CISSP, CISA, CISM, CISA, CEH, GCIH, GCIA, GCFA, GCFE, CDMP, OSCP, OSCE, CDP-DG or similar Work Type: Onsite location on a regular basis with some hybrid telework options. Note for staffing agencies: We are not accepting unsolicited resumes for this position. All inquiries must go through the Telophase team As an Equal Opportunity Employer, it is Telophase’s policy to recruit, hire, and provide opportunities for advancement in all job classifications without regard to race, color, religion, sex, national origin, age, citizenship, marital status, sexual preference, parental status, or disability.   Powered by JazzHR

Posted 30+ days ago

A logo
Action Logistics, IncArlington, TX
Job Overview: We are seeking a qualified Information Systems Auditor to conduct a focused audit of our accounting servers and data backup infrastructure. This role will assess the effectiveness, reliability, and security of our current data backup and recovery processes, ensuring they comply with best practices and support business continuity objectives. The audit will specifically evaluate the backup strategies for our accounting systems, including their implementation, scheduling, monitoring, testing, and restoration capabilities. Key Responsibilities: Conduct a comprehensive audit of the current backup methods and policies for all Accounting-related servers and data repositories. Evaluate existing infrastructure, software, and tools used for backup and recovery, including offsite/cloud-based solutions. Assess the consistency, frequency, and completeness of backup processes, including full, incremental, and differential strategies. Test and validate data restoration procedures at various levels (file, database, server image, and full disaster recovery scenarios). Identify gaps or risks in backup integrity, scheduling, encryption, and retention policies. Review user access and security protocols related to backup data and restoration tools. Document all findings and provide actionable recommendations to improve backup reliability, security, and compliance. Collaborate with IT staff and third-party vendors (if applicable) to validate systems, access logs, and restoration capabilities. Produce a final audit report including an executive summary, technical findings, remediation priorities, and proposed action plan. Qualifications: Bachelor’s degree in Information Systems, Cybersecurity, Computer Science, Accounting Information Systems, or related field. 5+ years of experience in IT audit, systems administration, or cybersecurity with direct involvement in data backup and recovery. Strong understanding of accounting system infrastructures (e.g., Microsoft Dynamics GP). Familiarity with backup solutions (e.g., Datto,  AWS backup) and cloud/offsite backup best practices. Experience with risk assessments and business continuity planning. Certifications such as CISA, CISSP, or CRISC are highly desirable. Strong communication skills, including report writing and presenting findings to senior leadership. Powered by JazzHR

Posted 30+ days ago

Veracity Insurance logo
Veracity InsurancePleasant Grove, UT

$75,000 - $85,000 / year

At Veracity, we aim to be a different kind of insurance partner – one that is free from outside investors, venture capital, or the pressures of a corporate parent. Ours is a culture of empowerment – one that believes in effort, results, and accountability. We believe that transparency fosters trust, trust fosters growth, and that growth drives innovation. Our commitment to rigorous evaluation and relentless execution lead to rapid evolution. We answer only to the small business owners we serve, and this independence allows us to stay focused on what matters most: helping their businesses thrive by providing expert guidance and best-in-class insurance policies. We’re growing fast and want you to be a part of it! We’re seeking a talented, detail-oriented Information Security and Compliance Analyst to join our team. Reporting to the Technical Operations and Information Security Manager, this role is responsible for supporting the organization’s cybersecurity posture by maintaining and enhancing security policies, controls, and monitoring systems, and ensuring compliance with frameworks such as SOC 2 and PCI DSS to protect company and client data. Key Responsibilities Strengthen the organization’s cybersecurity posture by implementing, maintaining, and improving security policies, standards, and technical controls Monitor security tools and system activity to identify, investigate, and escalate potential threats or vulnerabilities Support vulnerability management, including performing scans, tracking remediation, and validating fixes Maintain accurate, audit-ready documentation and coordinate evidence collection for SOC 2, PCI DSS, and other compliance frameworks Support incident response processes, including triage, documentation, and post-incident follow-up Assist with user access reviews, control testing, risk assessments, and security awareness efforts Collaborate with IT, Engineering, and Compliance teams on secure configurations, remediation plans, and cross-functional security initiatives Participate in routine policy, procedure, and control reviews to ensure alignment with regulatory requirements and security best practices Maintain detailed logs and reports of security activities, metrics, and compliance obligations Identify opportunities to strengthen controls, streamline processes, and enhance overall security program maturity Required to perform other duties as requested, directed, or assigned Requirements and Qualifications Bachelor’s degree in information systems, IT, Cybersecurity, or a related field 2–3 years of experience in security compliance, auditing, or governance (SOC 2 experience preferred) Strong integrity, attention to detail, and accountability in handling sensitive or regulated information Proactive problem-solving skills with the ability to anticipate and address risks effectively Strong collaboration and communication skills with experience working across technical and compliance teams Ability to remain composed and effective under pressure, including during audits and security incident Perks Health, dental, and vision plans Amazing work-life balance with 4 weeks of Paid Time Off 10 Paid Company Holidays with 2 floating holidays 401K Programs with employer match Personal assistance programs for support in a healthy personal and work life Why Veracity? Here at Veracity, you’ll be part of a team of trailblazers and visionaries. We’re not just revolutionizing the way people “do” insurance; we are creating a whole new paradigm. Here, you will experience a vibrant and inclusive workplace where your ideas matter! With us, you have a chance to: Engage in groundbreaking projects that are reshaping the insurance landscape Collaborate with a group of dedicated, like-minded professionals Experience a culture that prioritizes growth and development Compensation Range: $75k/yr - $85k/yr We are proud to be an equal-opportunity employer. We are committed to providing equal opportunities to all qualified applicants, regardless of race, color, religion, sex, national origin, disability, or any other legally protected characteristics. If you need accommodation, please let us know during the interview process. Powered by JazzHR

Posted 1 week ago

Kegman Inc logo
Kegman IncMelbourne, FL
Information System Security Officer Kegman Inc. is a Woman-Owned/Service-Disabled Veteran-Owned Small Business headquartered in Melbourne FL that provides engineering and technical support services to U.S. Government clients. We are seeking an Information System Security Officer (ISSO) to join our team at Patrick Space Force Base in Melbourne, FL. NOTE: This is not a remote/telework job. This job requires the selected applicant to have an active U.S. Government-issued security clearance at time of hire and, therefore, requires U.S. citizenship. The ISSO will be involved in all aspects of cybersecurity operations and will partner with program/site leads as well as government staff and mission partners to maintain an effective information security program. This position will document, implement, and assess security controls to perform system monitoring and compliance assessment activities. In addition, this ISSO will provide Risk Management Framework (RMF) support. Responsibilities Work as part of an integrated team to develop and maintain RMF body of evidence documentation (example: System Security Plan, Security Controls Traceability Matrix, Plan of Action and Milestones, ATO’s) using Microsoft products such as Word, Excel, PowerPoint, and Visio. Maintain repositories of all body of evidence documentation for systems under your purview and ensure they are accessible only to properly authorized individuals. Develop and execute security control assessment procedures to verify conformance with control requirements as part of ongoing continuous monitoring and authorization assessment activities. Work in close coordination with system administrators and other cyber team members to ensure systems are operated, maintained, and disposed of in accordance with applicable security policies and procedures and notify the ISSM when changes occur that might impact system authorization posture. Support the CISO, PM, ISSM or ISO in maintaining current authorization to operate, and approval to connect, and in implementing corrective actions identified in the plan of action and milestones. Coordinates, with the CISO, PM, ISSM and AO staffs, development of an IS Configuration Management strategy and monitor any proposed or actual changes to the system and its environment. Ensure all security-related vulnerabilities and deficiencies are documented in the Plan of Action and Milestones (POA&M). Ensure integration of cybersecurity into, and throughout the lifecycle of the IT, on behalf of the ISSM and ISO. Ensure the development and implementation of an effective information security education, training, and awareness program. Ensure configuration management policies and procedures for authorizing use of hardware/software on a system are followed and coordinate any additions, changes or modifications to hardware, software, or firmware with the ISSO/ISSM prior to the addition, change or modification. Ensure software, hardware, and firmware complies with appropriate security configuration guidelines (e.g., security technical implementation guides (STIG)/security requirement guides). Reports security incidents or vulnerabilities to the CISO/ISSM/wing cybersecurity office according to AFI 17-203, Cyber Incident Handling. Basic Qualifications Experience working in information assurance or cybersecurity roles supporting classified DoD environments Working knowledge of NIST 800-53 controls and RMF Experience analyzing and interpreting outputs of various endpoint security, vulnerability, and enumeration tools (example: Tenable Nessus, Security Center, SolarWinds, EndPoint Security Solutions, Vulnerator, SCAP Compliance Checker) Preferred Qualifications Strong interpersonal and written/oral communication skills to coordinate with program/site leads as well as government staff and mission partners Experience working on/with Government contracts Detail-oriented team member who can consistently meet deadlines and is able to work independently as needed Able to multi-task and work with a diverse work group of vendors, executive managers, subcontractors, consultants, and other professionals. Education Bachelor’s degree in Cybersecurity or other related field and 3+ years of experience, or Master’s degree Or DoD 8570 IAM Level I (Security+) or higher baseline certification (CISSP preferred) OTHER: U.S. citizenship required. Must pass a pre-employment drug test. Must have a fully adjudicated (not an interim) U.S. Government-issued security clearance at time of hire. Kegman Inc. is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law. Kegman will abide by the requirements of 41 CFR 60741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. Please be aware many of our positions require an active security clearance. Security clearances are be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment that requires a security clearance will be subject to government security investigation(s) and must meet and maintain eligibility requirements for access to classified information. By submitting your résumé for this position, you understand and agree that Kegman may share your résumé, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions. Kegman maintains a drug-free workplace and performs pre-employment substance abuse testing where permitted by law. Powered by JazzHR

Posted 1 week ago

L logo
Lucayan Technology Solutions LLCTampa, FL
Location: Remote Clearance Required: Public Trust (Minimum Background Investigation – MBI) Employment Type: Full-Time Overview Lucayan Technology Solutions is seeking an experienced Lead Systems Information Engineer to support and lead the technical team responsible for the IRS Microsoft 365 (M365) Cloud Suite platform. The ideal candidate will bring deep expertise in Microsoft cloud technologies, strong leadership capabilities, and experience working within federal government environments requiring strict compliance, privacy, and security controls. Key Responsibilities Lead, manage, and support the technical operations of the IRS Microsoft 365 Cloud Suite environment. Perform system administration, maintenance, integration, troubleshooting, and optimization of M365 services. Oversee implementation and support of Power Platform, including PowerApps, Power BI, and Flow. Conduct security and privacy analysis in alignment with IRS and federal standards. Develop and maintain project documentation, including technical policies, procedures, and system configurations. Serve as the primary technical liaison, collaborating with internal teams, stakeholders, and IRS SMEs to ensure deliverables meet compliance requirements. Provide technical guidance and mentorship to team members. Quickly adapt to IRS-specific processes, security requirements, and compliance frameworks. Required Qualifications Minimum 5 years of experience supporting Microsoft 365 Cloud Suite in a large corporate or government environment. Experience supporting federal government clients or similar high-security environments (IRS experience is a plus). Expertise with Microsoft Power Platform (PowerApps, Power BI, Flow). Strong .NET development skills (C#, ASP.NET MVC, Entity Framework, JavaScript, HTML, CSS). Proficiency in PowerShell scripting for automation and administration. Experience with Exchange, Intune, Azure AD , and other Azure ecosystem tools. Experience with SharePoint Administration and PowerApps model-driven development. Excellent communication, problem-solving, and leadership skills. Security Clearance & Training Requirements Must have or be able to obtain a Public Trust (MBI) clearance. Must complete all IRS-required security, privacy, and compliance training. Preferred Qualifications Prior IRS support experience or familiarity with IRS modernization initiatives. Working knowledge of federal compliance frameworks (NIST, FISMA, Zero Trust, TIC). Microsoft certifications such as: M365 Enterprise Administrator Expert Power Platform Developer / Administrator Azure Administrator or Solutions Architect Experience leading remote technical teams. Work Environment Fully remote position with virtual collaboration across distributed teams. Fast-paced, compliance-driven environment supporting federal agencies. May require occasional off-hours support for maintenance or urgent system needs. Powered by JazzHR

Posted 3 weeks ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we are committed to building secure, mission-driven technology that protects what matters most. As an Information System Security Manager, you will provide expert-level oversight of security operations across complex systems and programs. You will help design, implement, and enforce information security policies that align with organizational goals and regulatory requirements. Your leadership will ensure systems remain secure throughout their lifecycle—from concept through retirement—while collaborating closely with engineers, program managers, and cybersecurity personnel.This role offers the opportunity to shape enterprise cybersecurity practices, lead high-impact security initiatives, and mentor the next generation of security professionals. You will be a key contributor to programs that support critical national priorities Key Responsibilities: Provide management support for the development, coordination, and enforcement of enterprise information assurance programs Oversee the operational security posture for assigned information systems or programs Lead the development and enforcement of system security policies, standards, and procedures Perform risk and vulnerability assessments to support security authorization decisions Provide day-to-day security operations support and oversight for ISSEs and ISSOs Manage and assess the security impact of changes to hardware, software, and firmware Review and manage documentation including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices (SRTMs) Analyze user needs to determine functional and cross-functional security requirements Gather and organize technical information relevant to organizational goals and security posture Facilitate issue resolution through Technical Exchange Meetings and integrated product teams Collaborate with engineering staff to ensure secure systems integration throughout the development lifecycle Serve as the program’s designated ISSM and provide daily oversight to ISSOs Advise and support Program Managers on cybersecurity strategy and program execution Enable the design and implementation of secure IT systems for future enterprise environments Required Skills and Qualifications: Twelve years of professional experience in the field of security authorization Demonstrated experience with current security tools, hardware and software security implementation, communication protocols, and encryption technologies Knowledge of commercial security products, risk management practices, security incident management, and PKI and authorization services Experience developing and managing system security documentation and artifacts Proven ability to manage security across multi-system environments, including secure collaboration with engineering, operations, and leadership teams Strong communication and leadership skills to interact with both technical teams and executive stakeholders Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or a related field from an accredited college or university In lieu of a degree, four additional years of relevant work experience may be substituted Certifications: Compliance with DoD 8570.01-M Minimum certification required: IAM Level II (e.g., CISSP, CAP, CISM) Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

IDS International logo
IDS InternationalArlington, VA
Join our team at IDS Technology as an Information Warfare Exercise Design Specialist and immerse yourself in cutting-edge military exercises focused on Special Operations in the Information Environment. As a leader, you'll use your expertise to bring digital information to life, simulating a near-peer contested information environment to provide warfighters with real-life training. You'll work with US Military and other organizations to develop, plan, and coordinate scenarios, providing instruction, coaching, and subject matter expertise in the human domain and computer and network troubleshooting. With opportunities to travel to exercise sites and provide remote support, this role offers a dynamic and exciting environment to hone your skills and make a meaningful impact. Apply your knowledge of relevant technologies and expertise in SOF, Cyber, PSYOP, Intel, SPACE and Civil Affairs to this unique challenge. Embrace the chance to push the boundaries of Information Advantage, developing innovative solutions and advancing the field. Join us at IDS, where we believe in resolving conflict through innovative approaches and technical solutions.  Why IDS?   IDS believes in resolving conflict and building innovative approaches to do so. Combining operational expertise with an intimate understanding of today’s greatest challenges to bring our customers the technical solutions required for success in a complex and multi-domain world.   Synthetic Internet for Training and Exercises (SITE), a proprietary product of IDS Technology Government Services, is a digital training solution that provides a full-range, free-play, immersive, realistic, and scalable simulated Information Advantage environment where warfighters simultaneously train on full-spectrum cyberspace, Electronic Warfare, and social media analytics during integrated and multi-domain exercises.  Responsibilities:  Become the Subject Matter Expert on the SITE platform.  Maintain current knowledge of relevant technologies and subject areas.  Display subject matter expertise in SOF, Cyber, PSYOP, Intel, or Civil Affairs and its relevance to Multi-Domain Operations and/and Operations in the Information Environment.  Work with our technical team to learn how to build and design websites within SITE that enrich an exercise scenario’s Operational Environment.  Travel to exercise locations as required. Travel and accommodation to/at training locations are provided for the assignment period (typically 1-4 weeks).  Computer and networking troubleshooting with customers, including server connection diagnosis, token authentication errors, and basic user support. Be able to communicate issues to the remote Technical Support Team and Software Developers and manage troubleshooting ticketing from identification to resolution.   Perform research on various social media platforms; develop and incorporate replicated platforms and associated input/outputs into scenario planning, execution, and assessment.  Demonstrate that you know the problems clients are facing in the innovation and growth of Information Advantage with real examples from your experience. Convince customers that there are challenges they may not yet have identified (or at least understood could be solved)   Identify which of our use cases match the client’s pain points, enabling the customer to help compile a list of requirements, capabilities, MOP/MOEs, and improve their experience with SITE.  Surface new product development opportunities and/or issues with current solution & own feedback loop to the product team and roadmap   Monitor KPIs and ARR growth. Prepare reports, briefs, and documents to support event scenario development.  Oversee OPFOR (red) and population (grey) activity on social media and civilian internet activity, ensuring MSEL/scenario development is accurately portrayed online.  Demonstrate a strong understanding of layered effects between Kinetic Operations, Information Operations, Full-spectrum Cyberspace Operations, Electronic Warfare, SIGINT, SPACE, and MILDEC.  Understand and demonstrate the TTPs and concepts of social media weaponization.  Define and develop innovative Information Advantage capabilities that integrate advanced analytics and concepts of operation into the exercise scenario.  Plan and create visual information products that communicate assigned information objectives and illustrate assigned messages to inform OPSGRP and the training audience.  Gather open-source and controlled intelligence to develop a predictive understanding of adversarial strategies, priorities, and overlapping interests.  Plan, develop, and disseminate digital information content into the rotational scenario in a closed internet environment, such as tweets, blogs, news articles, propaganda, Facebook profiles, images, and videos.  Develop and publish Open-Source Enterprise style Daily Social Media Alerts to be used by training units and exercise control groups for scenario development and inclusion in AARs to demonstrate the tangible confluence of the physical and digital environments.  Establish a community and facilitate interaction to identify opportunities for collaboration and sharing.  Create presentations and marketing material to articulate the program.  Required Qualifications:  Active Top-Secret clearance. Those with “SECRET” clearance will be reviewed on a case-by-case basis  Ability to travel up to 50%  Familiarity with Direct Action, Counterterrorism, Unconventional Warfare, Foreign Internal Defense, Psychological Operations, Civil Affairs, Multi-Media Production, and Special Operations Forces.  Experience working with tactical to enterprise-scale clients, especially within USASOC.  Familiarity with exercise planning and management   Preferred Qualifications:  Degree from an accredited college; preferred degree in Computer Science or Information Technology  CompTIA Network+  CompTIA Sec+  Eight (8) years demonstrated experience in an intelligence discipline, civil affairs, ODA, Joint SOF, or psychological operations working in the DoD or IC, or six (6) years demonstrated experience working in a field related to OSINT research, J39X, non-standard communications, cyberspace operations, collection management, or analysis or the exploitation of publicly available information or social media.  Demonstrated working knowledge of computer networking, including Local Area Networks (LAN) and Cloud Networks  Special Operations Forces experience in both intelligence and operations  Computer Skills:  Advanced knowledge of Microsoft Office tools (Word, Excel, and PowerPoint).  Working knowledge of WordPress, VPNs, and HTML  Physical Demands:  Employee must be able to sit at a workstation for extended periods; use hand(s) to handle or feel objects, tools, or controls; reach with hands and arms; talk and hear. Most positions require the ability to work on a desktop or laptop computer for extended periods of time reading, reviewing/analyzing information, and providing recommendations, summaries, and/or reports in written format. Must be able to communicate effectively with others verbally and in writing. Employee may be required to occasionally lift and/or move moderate amounts of weight, typically less than 40 pounds. Regular and predictable attendance is essential.  Must be an effective communicator both verbally and in writing. Most positions require the ability to work on a desktop or laptop computer for extended periods of time. Computer activities include reading, reviewing, and analyzing information and providing recommendations, summaries, and reports in written or verbal format. Additionally, positions require the ability to sit at a workstation for extended periods; use hand(s) to handle or feel objects, tools, or controls; reach with hands and arms; as well as speak and hear.  Employee may be required to occasionally lift and/or move moderate amounts of weight, typically less than 20 pounds, but may vary depending on the position. Regular and predictable attendance is essential. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status, and any other characteristic protected by federal, state, and local law. If you are unable to apply through the portal and need to speak to someone about necessary accommodations to apply, please email accommodation@idsinternational.com and we will follow up with you. Do not submit resumes and applications through this email. Powered by JazzHR

Posted 30+ days ago

L logo
Lucayan Technology Solutions LLCChantilly, VA
📍 Chantilly, VA | 🕒 Full-Time | 🔒 TS/SCI with Polygraph | Onsite Join Our Mission Lucayan Technology LLC is looking for an Information Systems Security Engineer (ISSE) with Space Systems experience to join our growing cybersecurity team in Chantilly, VA. In this role, you will be instrumental in safeguarding mission-critical systems, applying your expertise in ICD 503 compliance, secure systems design, and information assurance engineering. What You’ll Do Conduct information system security engineering throughout the lifecycle, from acquisition to operations. Integrate security requirements into system design and development using systems engineering methodologies. Collaborate with government stakeholders to ensure compliance with ICD 503 certification and accreditation. Provide hands-on expertise with networks, virtualization platforms, and enterprise operating systems. Lead or support technical activities in system integration, configuration management, and testing . Participate in space system security requirement reviews, working groups, and national-level security councils. Prepare and maintain security documentation, including System Security Plans (SSPs), CONOPS, POA&Ms, and configuration management plans . Qualifications Required: Active TS/SCI with Polygraph . Bachelor’s degree in Computer Science, Engineering, or related discipline. 8+ years of experience in information assurance and systems security engineering. Hands-on experience with operating systems (Windows, Linux, Unix, macOS) and virtualization (VMware, Xen, Hyper-V). Demonstrated knowledge of ICD 503 and security accreditation processes. Space systems security engineering experience. One of the following baseline certifications: CISSP, CISM, GCLP, CCSP . Preferred: Master’s degree in Computer Science, Cybersecurity, or related field. Experience with NIST Risk Management Framework (RMF) and continuous monitoring practices. Strong technical project management and leadership experience. Why You Should Join Lucayan At Lucayan Technology LLC, we specialize in cybersecurity, engineering, and program support for mission-critical federal and defense programs. Our engineers play a direct role in protecting national security systems, including space-based platforms and networks . By joining Lucayan, you’ll gain: The opportunity to contribute to high-impact national security missions . A collaborative environment working alongside government and industry experts. Professional growth through training, certifications, and advancement opportunities. A company culture built on integrity, mission-focus, and technical excellence . 👉 Apply today and help us secure the future of national defense and space systems! Powered by JazzHR

Posted 30+ days ago

L logo
Lucayan Technology Solutions LLCChantilly, VA
📍 Chantilly, Virginia | 🕒 Full-Time | 🔒 TS/SCI with Polygraph | Onsite Overview Lucayan Technology LLC is seeking a Cyber Defense IASAE Level II to join our growing team in Chantilly, VA. This role is focused on designing and securing information system architectures for a mission-critical Intelligence Community program. As part of Lucayan’s cybersecurity engineering team, you will play a key role in protecting networks, applications, and systems by applying ICD 503 standards, DoD IA policies , and best practices in cybersecurity architecture. What You’ll Do Design and secure end-to-end information system architectures . Engineer security solutions across networks, applications, and databases. Implement defense-in-depth strategies, including firewalls, VPNs, IDS/IPS, antivirus, switches, routers, and boundary protection . Support system development through ICD 503 certification and accreditation processes. Collaborate with government stakeholders to ensure compliance with NIST and NRO security policies . Integrate security engineering into all phases of the system lifecycle. Do you have what it takes? Requirements: Active TS/SCI with Polygraph . Bachelor’s degree in Computer Engineering, Cybersecurity, INFOSEC, Information Management, or Computer Science. 5+ years of IASAE experience. One of the following certifications: CASP, CSSLP, or CISSP (Associate). Preferred: Experience supporting senior government managers on IA issues. Familiarity with NRO policies and Risk Management Framework (RMF) . End-to-end system security engineering and integration experience. About Lucayan Technology LLC At Lucayan Technology LLC, we deliver mission-focused cybersecurity, engineering, and program management solutions to the Department of Defense and Intelligence Community . Our teams are trusted to safeguard some of the nation’s most sensitive systems, from enterprise networks to space-based platforms. By joining Lucayan, you’ll contribute directly to national security , work in a collaborative environment , and gain access to professional development opportunities that support your career growth. 👉 Apply today to become part of Lucayan’s expert cybersecurity engineering team and help us secure the future of national defense systems. Powered by JazzHR

Posted 30+ days ago

S logo
Summit Federal Services, LLCSalem Winston, NC
Summit Federal Services, LLC (SFS) with headquarters in Oakland, Maryland, is a fast growing woman owned Small Business and HUBZone company with an outstanding record of performance providing more effective and efficient acquisition, business process, training, IT, administrative and security services to multiple federal agencies. SFS/Merito is looking for a Information Systems Security Manager to spearhead their client organizations information security program.  The ISSM will lead the development and implementation of security measures, ensuring compliance with industry regulations, frameworks, and company policies. The ideal candidate will bring expertise in cybersecurity, risk management, and information systems security compliance to protect the organization’s critical assets Location: Winston-Salem, NC, hybrid  (Remote for first 5 months then reports onsite) Job Type:  Contract Reports To:  Corporate Compliance Manager & Facility Security Officer Pay : Based on experience Key Responsibilities: •    Lead the establishment and maintenance of classified networks and operating systems. •    Develop and maintain technical documentation and security policies for IT equipment within open storage areas. •    Determine technical Information Assurance (IA) requirements and conduct cyber risk assessments, including vulnerability analysis and implementation of mitigation solutions in alignment with RMF standards. •    Author and manage security documentation for system authorization, continuous monitoring, and information systems lifecycle management (e.g., Authorization to Operate (ATO), System Security Plan (SSP), Plans of Action and Milestones (POAM). •    Provide guidance and technical expertise in the creation of solutions for complex security problems, requiring deep knowledge of systems security. •    Ensure that security controls are implemented effectively and continuously throughout the information systems lifecycle. •    Utilize cybersecurity tools to provide ongoing security monitoring for infrastructure in accordance with Department of Defense (DoD) requirements. •    Perform system audits, vulnerability risk assessments, and investigations into security incidents or violations related to information assurance. •    Conduct regular training and awareness programs on cybersecurity best practices and risk mitigation strategies for all system users. •    Other duties as required. Basic Qualifications: •    U.S. Citizenship. •    Active Secret Clearance. •    Prior experience as an ISSM or ISSO, with strong familiarity in establishing classified networks and information systems. •    Experience as a COMSEC Custodian and in handling security controls for classified information systems. •    Proficiency in cybersecurity frameworks and risk management practices, including the Risk Management Framework (RMF) and DoD compliance requirements. Preferred Qualifications: •    Relevant certifications such as CISSP, CISM, or Security+ •    Familiarity with cybersecurity tools, auditing processes, and incident response frameworks.   Summit Federal Services, LLC is an equal opportunity employer regardless of race, color, religion, creed, sex, marital status, national origin, disability, age, veteran status, on-the-job injury, sexual orientation, political affiliation or belief. Employment decisions are made without consideration of these or any other factors that employers are prohibited by law from considering. Any discriminatory action can be a cause for disciplinary action. Summit Federal Services, LLC also prohibits discrimination against individuals with disabilities and will reasonably accommodate applicants with a disability, upon request, and will also ensure reasonable accommodation for employees with a disability. Powered by JazzHR

Posted 30+ days ago

T logo
Tetrad Digital Integrity LLCAshburn, VA
Tetrad Digital Integrity (TDI) is a leading-edge cybersecurity firm with a mission to safeguard and protect our customers from increasing threats and vulnerabilities in this digital age. The ISSO plays a critical role in ensuring security compliance, system resilience, and secure modernization of infrastructure and applications. This position requires deep technical expertise in systems engineering, cloud computing, and artificial intelligence (AI) technologies, combined with extensive governance, risk and compliance experience. RESPONSIBILITIES: Provide cybersecurity oversight for major customer applications and general support systems. Apply ISSO expertise across hybrid enterprise environments, including cloud-native platforms (AWS, Azure, Google Cloud Platform), containerized workloads, and virtualized infrastructure. Integrate AI/ML-driven security tools (threat detection, anomaly detection, behavioral analytics, predictive risk modeling) into security operations and compliance frameworks. Develop, draft, review and endorse all information systems security plans and other security authorization artifacts and documents such as: Standards for Security Categorization of Federal Information and Information Systems (FIPS 199) Assessment, E-Authentication Determination, Privacy Threshold Analysis (PTA), Privacy Impact Assessment (PIA), Risk Assessment Plan, System Security Plan (SSP) and Configuration Management Plan and Section 508 of the Rehabilitation Act Plan Plan of Action & Milestones (POA&Ms) Policy waiver and Risk Acceptance request Ensure that assigned systems are operated, maintained, and disposed of in accordance with applicable policies and procedures NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05D), and internal CBP (i.e., Office of Information Technology, Security Operations Division, etc.) security policies and practices Develop, review, maintain, and provide system security documentation for assigned systems, including System Security Plans, Interconnection Security Agreements, Contingency Plans, Plans of Action and Milestones, (POA&M), Waivers, and Exceptions through the DHS FISMA system management tool in use to implement and manage the NIST Risk Management Framework. Complete all activities required by the DHS Ongoing Authorization (OA) Program to transition assigned systems into the DHS OA Program and perform all required actions to maintain system authorization under OA once the system is admitted to the Program Assist the Government with the reporting and management of system level security violations and incidents and technical security evaluation of threats and vulnerabilities involving new/enhanced technology. Provide oversight to vulnerability scanning processes and procedures and security patch management/flaw remediation processes and procedures. Assist with the development of cyber security SOPs, playbooks, work instructions, and other procedures and processes to mature cyber security capabilities with consideration for cloud security architectures and AI-enabled systems. Ensure cloud-based systems and AI applications align with Zero Trust principles and customer policy. Lead technical security evaluations of threats, vulnerabilities, and risks specific to cloud workloads and AI-driven technologies. Support the development of cybersecurity SOPs, playbooks, and AI/automation-enhanced workflows to mature SOC capabilities. QUALIFICATIONS: Must be a US Citizen. Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related discipline (Master’s preferred). 8–12 years of IT/cybersecurity experience (or 6+ years with a Master’s). 5+ years as an ISSO supporting major federal information systems/applications. Strong systems engineering foundation with proven cloud computing expertise (AWS, Azure, GCP, or equivalent). Hands-on experience with AI/ML tools for cybersecurity, such as anomaly detection, automated risk scoring, or AI-driven SOC platforms. Working knowledge of auditing security controls, risk management, and compliance reporting. Superior writing, communication, and critical analysis skills. Deep understanding of Information Assurance, Information Management, and NIST Risk Management Framework (RMF). PREFERED QUALIFICATIONS: ISC2 Certified Information Systems Security Professional (CISSP) ISC2 Certified in Governance, Risk and Compliance (CGRC) ISACA Certified Information Security Manager (CISM) CompTIA Certified Advanced Security Practitioner (CASP+) Cloud certifications (AWS Certified Security, Azure Security Engineer Associate, Google Professional Cloud Security Engineer). Experience designing/assessing AI governance frameworks, bias/risk mitigation, and secure AI model deployment. TDI does business with the federal government, which restricts employment to individuals who are either US citizens or lawful permanent residents of the United States. “TDI is an Equal Opportunity Employer. Employment decisions are made based on individual qualifications, merit, and business needs. We do not discriminate in employment opportunities or practices based on race, color, religion, sex, or national origin, in accordance with applicable federal laws.” Powered by JazzHR

Posted 30+ days ago

Gen3 Technology Consulting logo
Gen3 Technology ConsultingWashington, DC
About us: Gen3 Technology Consulting is an SBA-certified Woman-Owned Small Business (WOSB) providing a diverse set of technology services and solutions to federal and commercial clients. Founded in 2017, Gen3 leverages over 25 years of information technology management and leadership experience to help our clients define, plan, manage, and achieve their strategic vision while protecting their critical IT assets. We attract and retain the highest caliber of talent by supporting an inclusive work environment, cultivating growth and leadership both professionally and personally, and encouraging work-life balance. We strive to make it our priority to be compassionate, family-friendly, respectful, and flexible. About the role: Gen3 seeks an Information Security Analyst to provide advanced cybersecurity analysis supporting Cybersecurity Information Protection Enhancement (CIPEC) program operations, data inventory and tagging policy testing, security assessments, monitoring, and compliance activities. Location: Remote, US Key Responsibilities: Conduct security assessments, Annual Security Compliance Assessments support, risk reviews, and compliance validation. Analyze Data Inventory and Tagging alerts, data movement events, exfiltration patterns, and incident response workflows. Assist with data labeling, sensitivity tagging, and audit trail improvements. Support the development of training, communications, guidance, procedures, and governance documents. Conduct data-flow analysis, document findings, and provide recommendations for improved protection s. Minimum Qualifications: Bachelor of science or engineering in computer science, and/or related fields. 7–10 years cybersecurity analysis experience. At least one of the following certifications or similar: CompTIA Security+, CISSP, CISM, CEH, CISA, or CISM. Familiarity with data loss prevention, data inventory and tagging, SIEM, encryption, identity and access management, and cloud security. Strong skills in documentation, incident analysis, and security operations. *Pending Award What's In It for You (full-time Gen3 employees): Competitive compensation. Comprehensive health, vision, and dental benefits. Generous PTO and 11 days of paid Federal Holidays. $3k annual tuition reimbursement. 401(k) with a matching plan. Pet insurance. Life and AD&D insurance. Short-term and Long-term disability insurance. Employment Eligibility: Eligible to work for any employer in the United States without requiring sponsorship. Most of our positions require a government security clearance, you must be a US Citizen or Green Card holder for consideration. Certain positions require at least three (3) of the past five (5) years of residence in the United States. Other Requirements: A minimum of three (3) out of the past five (5) years of residency in the United States is mandatory. Candidates must possess either an active green card or citizenship. Prospective employees offered a position must have work authorization that does not necessitate employer-sponsored visa sponsorship, both presently and in the future. Those selected for this role may undergo a government security investigation and must meet the eligibility criteria for accessing classified information or be eligible for security clearances. Location: Gen3 is currently focusing its hiring efforts in these states: Alabama, Arizona, Colorado, DC, Florida, Georgia, Kentucky, Maryland, Missouri, North Carolina, New Jersey, New York, Ohio, Oklahoma, Oregon, Pennsylvania, Texas, Virginia, and Wisconsin. Veteran and HubZone-friendly employer. E-Verify Employer. EOE Statement: Gen3 is an equal opportunity employer. We adhere to all federal regulations and ensure that our hiring practices are based solely on merit. We do not discriminate against any applicant based on race, color, sex, sexual orientation, gender identity, religion, national origin, disability, or veteran status. All qualified applicants will receive consideration for employment. Accommodation: Please contact the recruiting team at recruiting@gen3technology.com if you would like to request a reasonable accommodation during the application or interviewing process. Powered by JazzHR

Posted 1 week ago

BTI logo
BTIFort Meade, MD
Business Technology Integrators (BTI) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) with more than 25 years of experience delivering innovative IT solutions to the Federal Government. We specialize in supporting mission-critical programs across defense and federal agencies, with a focus on cybersecurity, program management, and enterprise IT solutions. Position Overview BTI is seeking an experienced Information Systems Security Officer (ISSO) to support the DISA TIBI program. The ISSO will ensure that all information systems meet security requirements and remain compliant with Department of Defense (DoD) and Federal security standards. This role requires hands-on expertise with security frameworks, risk management, and compliance, as well as the ability to work closely with technical teams and government stakeholders. Key Responsibilities Serve as the Information Systems Security Officer (ISSO) for the DISA TIBI program. Ensure compliance with all applicable DoD cybersecurity policies, including RMF (Risk Management Framework). Support accreditation and authorization processes for information systems in accordance with DoD and federal requirements. Develop, update, and maintain security documentation (System Security Plans, POA&Ms, risk assessments, etc.). Monitor information systems for security vulnerabilities and implement appropriate mitigations. Coordinate with Government security officials, system owners, and program leadership to ensure security controls are in place and effective. Provide guidance, assistance, and training on security requirements to technical teams and junior staff. Participate in audits, inspections, and continuous monitoring activities. Required Qualifications Active Secret Clearance (minimum, required). Minimum of 8 years of demonstrated experience as an ISSO supporting a U.S. Government Agency or Department of Defense (DoD). Active CompTIA Security+ certification (must be documented and current). Proven knowledge of DoD cybersecurity requirements, policies, and frameworks (e.g., RMF, NIST, STIGs). Strong communication and collaboration skills with the ability to work across diverse technical and government teams. Experience maintaining security compliance documentation and supporting audits/assessments. Preferred Qualifications Experience supporting DISA or other DoD organizations. Additional cybersecurity certifications such as CISSP, CISM, or CAP. Bachelor’s or Master’s degree in Information Security, Cybersecurity, Computer Science, or a related field. Why Join BTI? Be part of a Service-Disabled Veteran-Owned Small Business dedicated to supporting national security and defense operations. Play a critical role in ensuring cybersecurity compliance for a mission-critical defense program . Collaborate with talented IT and cybersecurity professionals in a supportive team environment. Competitive salary and comprehensive benefits package. Apply today to join BTI as an ISSO and help drive the security success of the DISA TIBI program. Powered by JazzHR

Posted 30+ days ago

Innovatus Technology Consulting logo
Innovatus Technology ConsultingPatuxent River, MD
Job Title: Information Security Analyst, IntermediateCompany: Innovatus Technology ConsultingLocation: Patuxent River, MDSecurity Clearance: TOP SECRET (Required)Job Type: Full-Time About Innovatus Technology Consulting: Innovatus Technology Consulting is a leading provider of innovative IT solutions, specializing in delivering secure, cutting-edge technology services to government and commercial clients. We are committed to safeguarding critical systems and data through advanced cybersecurity practices.Job Summary: We are seeking an experienced Intermediate Information Security Analyst to join our team. The successful candidate will hold an active TOP SECRET security clearance and be responsible for planning, implementing, upgrading, and monitoring security measures to protect computer networks and information. This role involves ensuring robust security controls are in place to safeguard digital assets and critical electronic infrastructure. The analyst may also conduct cyber forensic analysis to respond to cyber threats across hardware and software environments. Key Responsibilities: Plan, implement, and upgrade security measures to protect computer networks, systems, and sensitive information. Monitor and assess security controls to ensure they effectively safeguard digital files and vital electronic infrastructure. Conduct cyber forensic analysis to investigate and respond to cyber threats, incidents, or breaches in hardware and software environments. Identify vulnerabilities and recommend mitigation strategies to enhance network and system security. Collaborate with cross-functional teams to ensure compliance with security policies, standards, and regulations. Stay current with emerging cyber threats, vulnerabilities, and industry best practices to maintain a proactive security posture. Assist in developing and maintaining incident response plans and procedures. Provide detailed reports and documentation on security incidents, forensic findings, and mitigation efforts. Why Join Innovatus Technology Consulting? Opportunity to work on mission-critical projects with a direct impact on national security. Collaborative and innovative work environment with opportunities for professional growth. Competitive salary and comprehensive benefits package including, health, dental, $401k and more. Powered by JazzHR

Posted 30+ days ago

T logo

Information Security SME Instructor

Talent Acquisition ConceptsLinthicum, MD

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Are you looking for a Challenge? Looking for an innovative organization and the opportunity to learn and grow professionally? At Terrestris, LLC, we are helping the government create better mission outcomes through better human performance. We are currently seeking an Information Security SME Instructor to develop, deliver, and maintain the Information Security curriculum. This position will have hybrid (subject to change) opportunities and is located Linthicum, MD.

In this role you will be expected to:

  • The ideal candidate will provide subject matter expertise in the development, delivery and maintenance of the Information Security Curriculum. This includes working with client program leads, management, technical staff in the design, conversion, development and delivery of training and certification projects, curricula, and products. Complete client Instructor Basic and Intermediate Certification as defined in the client Instructor Certification Manual Demonstrate mastery of Information Security knowledge, skills, and policy
  • Instruct Information Security courses to include basic and advanced instructor- led courses in accordance with the course schedule
  • Serve as a SME in response to student and customer inquiries with respect to Information Security
  • Provide assistance to the Curriculum Manager in all phases of the ADDIE process, to include file management, and extensive course review from cradle to grave
  • Review training material/deliverables and provide recommendations on the accuracy of and relevancy of content of instructor-led eLearning, webinars and performance support tools (i.e. storyboards, instructor guides, participant guides, design plans, and other related material)

We're looking for someone who is/has:

  • Bachelor's degree in the field of education from an accredited university. In lieu of a Bachelor's degree, five years of experience as an instructor for adult learners, in formal classroom or via distance learning courses related to DoD Security Policy
  • Experience in Information Security
  • Experience in Microsoft Outlook, Word, and PowerPoint
  • Current TS/SCI security clearance

Preferred Qualifications:

  • Five years of work experience in Information Security

All qualified applicants will receive consideration for employment without regard to race, color, religion, sexual orientation, gender identity, national origin, disability, age, marital status, ancestry, protected veteran status, or any other protected group or class.

DILBERT © 2018 Scott Adams. Used By permission of ANDREWS MCMEEL SYNDICATION. All rights reserved.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall