1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

C logo
cFocus Software IncorporatedDahlgren, VA
cFocus Software seeks a Sr. Information Management Specialist to join our program supporting the Department of Defense (DoD). This position is remote. This position requires the ability to obtain a Secret clearance. Qualifications: Six (6) years of professional experience in a broad-base Automatic Data Processing (ADP) services environment This position requires a DoD IAM III level certification Duties: Develop, implement, and maintain information and records management policies, processes, and systems in alignment with DoD and Navy regulations. Oversee the organization, classification, and lifecycle management of digital and physical information assets. Ensure compliance with Department of the Navy (DON) and National Archives and Records Administration (NARA) records retention schedules. Support data governance and configuration management efforts to maintain data integrity and traceability. Coordinate with IT and cybersecurity teams to ensure the protection of classified and sensitive information. Manage the creation, maintenance, and disposition of records in accordance with approved Navy information management procedures. Implement metadata standards, tagging, and indexing strategies to facilitate efficient data retrieval and analysis. Support audit and inspection readiness activities related to records and information management compliance. Train and mentor staff on information management procedures, security protocols, and document control systems. Maintain and update document repositories and electronic filing systems to ensure accessibility and compliance. Develop reports and metrics to track compliance, data quality, and information lifecycle activities. Serve as the subject matter expert (SME) for information management, providing guidance to stakeholders and leadership. Collaborate with program managers and contracting officers to ensure contract deliverables and documentation are properly archived and retrievable. Participate in continuous improvement initiatives to enhance information sharing, collaboration, and data governance capabilities. Ensure secure and compliant handling, transmission, and storage of controlled unclassified and classified information. Powered by JazzHR

Posted 30+ days ago

VISTRADA logo
VISTRADANew York, NY

$150,000 - $200,000 / year

Chief Information Security Officer (CISO) Vistrada is looking to hire strong Chief Information Security Officers (CISO). The CISO will provide strategic cybersecurity guidance and oversight to Vistrada clients by leading and managing their cybersecurity programs to help protect their infrastructure, data, people, and customers. Candidates should have extensive knowledge of cybersecurity best practices, industry standards, and regulations. They should also have strong communication, leadership, and project management skills, as well as the ability to work collaboratively with internal and external stakeholders. Job Responsibilities and Common Duties Include: Apply consultative and leadership skills to build high rapport with clients and team members. Provide expert security advisory, compliance and security program oversight, oversee security/compliance assessments, and prepare high-quality reports (including gap analysis, POAM, recommendations, and remediation planning). Lead and manage a team of security analyst(s) providing oversight, direction, expertise, and mentoring. Provide virtual chief information security officer services. Support clients on a fractional owner model. Act as an extension of client’s information security management and governance function. Develop, implement, and oversee information security programs. Assess, identify requirements for, and make recommendations on security controls and technologies. Develop security roadmaps and plans of action. Vendor and third-party risk management program support and due diligence. Develop business continuity and incident response plans. Focus on key performance indicators, metrics, security dashboards. Assist With Business Development. Work with potential new clients to understand and define business and technology needs, provide subject matter expertise to answer client’s questions and concerns, and identify and align services with client’s needs. Support statements of work, identify resource requirements, assumptions, estimates, and assist with responses to Requests for Proposals (RFPs). Identify client’s security and technology needs and identify business development opportunities as outcomes of assessment activities. Develop expert level content, participate in panel discussions and public speaking events, and attend conference exhibitor opportunities. Architect high quality security solutions to the needs of clients.   Perform other duties that may be assigned by management.  Required Experience / Skills: 10+ years of CISO experience working in related field(s). Expert knowledge of cybersecurity frameworks and regulations including: NIST, ISO, CMMC, PCI, COBIT, DFARS, HIPAA, etc. Hands-on incident response coordination and oversight experience. Strong understanding of IT Risk and components, including application, infrastructure, network, and vendors. Bachelor’s degree in Computer Science, Accounting, MIS, or comparable work experience. Develop and present management level materials to effectively communicate and message to stakeholders. Relevant certifications such as CISA, CISM, or CISSP, or similar experience. The annual pay range for this role is $150,000 - 200,000. Company Background:   Vistrada is a business, technology and management services firm dedicated to helping clients plan, design and implement initiatives supporting Cybersecurity, Business Transformation, Integrated Risk Management, and Managed Services. Vistrada provides seasoned expertise and a flexible team structure allowing agility and responsiveness to support client’s evolving needs. Our company operates nationally today with resources centered around NYC, Albany NY, Austin TX, Chicago, IL and Salt Lake City, UT. We have many resources who operate remotely and onsite as needed in a wider geography. Our business organization has four verticals and multiple cross competencies headed by leaders with more than 20+ years of experience on average Powered by JazzHR

Posted 30+ days ago

C logo
Cambridge International Systems IncPhiladelphia, PA
Information System Security Officer – Top Secret Clearance | Philadelphia, PA Cambridge International Systems, Inc. Join a dynamic global team united by shared values: commitment, integrity, and perseverance. At Cambridge, you’ll work alongside top talent worldwide, tackling some of today’s most complex and critical challenges in defense and security. We are currently seeking an Information System Security Officer to support operations in Philadelphia, PA. This is a full-time, CONUS position requiring an active DoD Top Secret clearance. This position is contingent upon contract award in October 2025. What You’ll Do Serve as an ISSO supporting RMF compliance and cybersecurity for DoD systems. Implement and monitor security controls, ensuring adherence to NIST 800-53 and DoD policies. Conduct vulnerability assessments, threat analyses, and continuous monitoring using tools like ACAS, STIG Viewer, and eMASS. Support incident response activities, including isolating assets, collecting data, and reporting findings. Maintain RMF documentation (SSPs, POA&Ms, RARs) and ensure system accreditation packages remain current. Collaborate with system owners, administrators, and the ISSM to sustain system security posture. Track, report, and resolve cybersecurity findings while preparing for audits and inspections. What You’ll Bring Required Qualifications: Education & Experience: Bachelor’s degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university Technical Expertise: Six (6) years of experience implementing and coordinating cybersecurity policies across organizational levels, ensuring compliance with DoD and federal standards. Proven expertise conducting vulnerability assessments, threat analyses, and risk mitigation activities. Demonstrated ability to support cyber incident response — including isolating affected assets, performing initial investigations, collecting data, and providing detailed status reports. Certifications: Meets DoD IAM Level II baseline requirements — holding one or more of the following: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP OS/CE Qualification: As directed by Privileged Access Agreement and DFARS 252.239-7001 requirements. Must have a current and active DoD Top Secret security clearance. Proficient with modern IT tools and infrastructure technologies Travel & Passport Some overnight stays possible. Work Environment Compliance with vaccination and medical requirements for TDY/OCONUS roles as per Vaccine Recommendations by AOR | Health.mil . Office setting: Primarily an office-based role in Philadelphia, PA Standard desk/computer work with flexibility for walking and movement on site Must be able to work in an office environment, sitting at a desk, looking at a computer for most of the workday. Work is physically comfortable; the employee has discretion about sitting, walking, standing, etc. May be required to travel short distances to offices/conference rooms and buildings on site. Background & Security Employment is contingent upon successful background investigation Drug screening may be required for federal contract compliance Benefits & Perks We believe in investing in our team—both professionally and personally: Medical, dental, vision, life, accident, and critical illness insurance 401(k) immediate vesting and match Paid time off and company holidays Generous tuition & training support Relocation assistance Sign-on and performance-based bonuses Employee referral program Access to Tickets at Work, EAP, wellness initiatives, and more Join Us If you're driven by mission, technology, and teamwork—we want to hear from you. Cambridge is growing, and this position is just one of many opportunities on our global team. Know someone perfect for the role? Referrals are welcome—both employees and non-employees may qualify for a bonus. Apply today and help shape the future of secure cloud computing for national security. About Cambridge International Systems At Cambridge, innovation grows through diversity. We are proud to be an equal opportunity employer, committed to creating an inclusive and supportive work environment for all. Learn more at www.cbridgeinc.com . Powered by JazzHR

Posted 30+ days ago

M logo
Mantis Security CorporationReston, VA
Mantis Security is a leading specialty firm of high caliber talent who specialize in Cyber Operations, Cyber Defense, Information Assurance, Software Development, DevSecOps, Security Engineering, and Cloud Engineering. We enable and protect our nation's most important IT assets and invest in the long-term career development of every employee! We are currently looking for the next ISSO to join our team of experts! What you will be doing: Mantis Security is seeking for immediate placement a highly qualified and technical Information Systems Security Officer (ISSO) to lead the Assessment and Authorization (A&A) for multiple analytic mission systems. The ISSO must be proficient in standard A&A activities, and will generate and maintain the complete security body of evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF). The ISSO will work with the software engineers and cloud engineers to ensure applications and systems are developed to meet required security controls, as well as to promote proper security configuration. The candidate should possess 8570 IAT Level II baseline certifications and have working knowledge of the Risk Management Framework (RMF), along with other Intelligence Community (IC) and DoD policy and guidance (ICD 503, CNSSI-1253, etc.). All candidates must have current TS/SCI eligibility with the ability to obtain a CI polygraph to be considered. Duties Include: Support to the Assessment and Authorization (A&A) and all Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems Work with software engineers, DevOps engineers, release managers, and project management to follow A&A and ATO processes, and ensure Minimum Viable Product (MVP) and full releases are compliant and meet security requirements for continuous delivery to an AWS production environment Ensure validity and accuracy review of all associated security documentation Create and maintain System Security Plan (SSP), Security CONOPS, Security Test Plan (STP) and Security Test Procedures, document and maintain implementation details of NIST 800-53 security controls Plans and performs security functional testing, creates and maintains STPs, supports security assessments Utilize Xacta to maintain Security Body of Evidence (BoE) files and to work through the A&A process for each system release cycle Provide guidance on the application of security policy, identifying security requirements, providing technical guidance for the satisfaction of requirements, reviewing and determining the adequacy of required documentation Manage the plan of action and milestones (POA&Ms) by working with project managers and engineers to develop schedules and engineering actions that mitigate open findings Monitor and audit operational systems for proper use Must have: Bachelor’s degree with 9 years of experience, or Master’s degree with 7 years of experience, or no degree with 13 years of experience DoD 8570 IAT Level II certification requirements (one of CCNA Security, CySA+, GICSP, GSEC, Security+ CE, or SSCP) Must have current TS/SCI eligibility or Active TS/SCI Must be able to obtain a CI polygraph Nice to have: Proficiency with Xacta IA Manager (or Xacta 360) We believe that our strength is in our employees. We offer employees the chance to work with great people on projects of high importance and are committed to providing the best culture that foster’s technical innovation and personal growth. To help our staff achieve a productive work-life balance, we offer a full range of highly competitive benefits for our employees and their families. For more information visit our website at https://www.mantissecurity.com Powered by JazzHR

Posted 3 weeks ago

M logo
MetroSysChicago, IL
About the Role MetroSys is seeking a skilled Information Security Engineer II to support and lead efforts around vulnerability management within a dynamic, enterprise-scale environment. This individual will be instrumental in identifying and addressing security vulnerabilities across systems, networks, and applications. The ideal candidate brings a deep understanding of vulnerability scanning tools, remediation prioritization, and collaborative risk mitigation strategies. You will work closely with cross-functional teams to enhance the organization’s security posture and help ensure compliance with industry standards. If you thrive in fast-paced environments and are passionate about cybersecurity, this is an exciting opportunity to grow and make an impact. Key Responsibilities Lead the end-to-end vulnerability management lifecycle : scanning, analysis, prioritization, reporting, and remediation tracking. Perform regular vulnerability assessments and support remediation efforts in collaboration with infrastructure and application teams. Track and assess emerging threats and zero-day vulnerabilities using vendor bulletins and threat intelligence feeds. Generate reports and dashboards to communicate risk posture and mitigation progress to technical and executive stakeholders. Maintain and optimize vulnerability scanning tools to ensure full visibility and accurate detection across the environment. Assist in security incident response involving known or suspected exploited vulnerabilities. Support regulatory and compliance audits (e.g., PCI, NIST, HIPAA ) by providing documentation and metrics. Continuously improve processes, documentation, and tooling in the vulnerability management program. Qualifications Bachelor's degree in Computer Science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in information security, with a strong emphasis on vulnerability management. Hands-on experience with scanning tools (e.g., Tenable, Qualys, Rapid7). Solid understanding of network architecture , operating systems (Linux, Windows), and web applications . Familiarity with CVSS scoring , risk modeling, and remediation prioritization frameworks. Ability to work with scripting or automation tools (Python, PowerShell, Bash) is a plus. Excellent communication and problem-solving skills; ability to clearly explain security findings to non-security audiences. Experience with compliance frameworks such as PCI DSS, NIST, HIPAA , or ISO 27001 . Relevant certifications are a plus (e.g., CISSP, Security+, LFCS, RHCSA ). Powered by JazzHR

Posted 30+ days ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we believe security starts with the details. As an Information Systems Security Officer (ISSO), you will support the security posture of critical systems across their lifecycle. From assisting with risk assessments to maintaining compliance documentation, you’ll play a key role in protecting sensitive systems and data. Working alongside experienced ISSMs and ISSEs, you will gain hands-on experience with cybersecurity best practices in a collaborative, mission-driven environment.Independent Software is where innovation meets purpose. You'll join a team that values integrity, learning, and technical excellence. We offer the opportunity to work on impactful projects, grow your cybersecurity expertise, and contribute to real-world missions. With flexible work environments, strong mentorship, and a commitment to professional development, Independent Software is the place to launch or elevate your cybersecurity career. Key Responsibilities: Assist senior ISSOs in implementing and enforcing information systems security policies and standards Support the evaluation of security solutions for classified environments Perform basic configuration management for security software, hardware, and firmware Maintain records for systems including upgrades, firewalls, routers, switches, and other network components Develop and maintain required cybersecurity documentation such as System Security Plans (SSPs), Risk Assessment Reports, and other accreditation packages Assist in daily security operations and maintaining the system’s operational cybersecurity posture Track and manage user access control and authentication mechanisms Support vulnerability and risk assessments to enable system authorization Coordinate with engineers and customers to ensure compliance with IT security policies and NIST RMF Help manage and control system changes and assess their security impact Interact with system owners, customers, and IT staff to support cybersecurity objectives Required Skills and Qualifications: Strong foundational knowledge in IT or cybersecurity principles Experience with or understanding of system hardening, access control, or security policy implementation Ability to prepare, maintain, and review cybersecurity documentation Familiarity with vulnerability assessment and basic risk analysis Clear communication and collaboration skills to support interaction with teams and stakeholders Minimum of five years of combined work-related experience in IT, cybersecurity, or security authorization · Experience in at least two of the following areas is required: Current security tools Hardware or software security implementation Communication protocols Encryption tools or techniques Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or related technical discipline In lieu of a bachelor’s degree, an additional four years of relevant work experience may be substituted Certifications: Must be compliant with DoD 8570.01-M Minimum certification required: IAM Level I Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

Arlo Solutions logo
Arlo SolutionsPhiladelphia, PA
Company Summary Arlo Solutions (Arlo) is an information technology consulting services company that specializes in delivering technology solutions. Our reputation reflects the high quality of the talented Arlo Solutions team and the consultants working in partnership with our customers. Our mission is to understand and meet the needs of both our customers and consultants by delivering quality, value-added solutions. Our solutions are designed and managed to not only reduce costs, but to improve business processes, accelerate response time, improve services to end-users, and give our customers a competitive edge, now and into the future. Position Description: The Information System Security Officer (ISSO) III will support Naval Surface Warfare Center Philadelphia Division (NSWCPD) as a contractor through Arlo Solutions, serving as a key cybersecurity professional for NSWCPD Code 104. This key personnel position is responsible for coordinating cybersecurity processes and activities for assigned systems, ensuring compliance with all applicable policies, and managing security controls implementation throughout the Risk Management Framework (RMF) lifecycle. Location: Philadelphia, PA Clearance: Active Secret Responsibilities and/or Success Factors: Cybersecurity Compliance and Policy Implementation Assist the Information System Security Managers (ISSM) in executing their duties and responsibilities Ensure compliance with all NAVSEA, DON, and DoD cybersecurity policies Ensure relevant cybersecurity policy and procedural documentation is current and accessible Coordinate cybersecurity processes and activities for assigned systems Report changes in system security posture to the ISSM Security Assessment and Authorization (A&A) Management Maintain and report Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs Provide oversight of Security Plans for assigned systems throughout their lifecycle Manage and maintain Plan of Actions and Milestones (POA&M), tracking vulnerabilities through remediation Assist with identification of security control baselines and applicable overlays Coordinate the validation of security controls with Navy Qualified Validators (NQV) Perform Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews Adjudicate findings from Package Submitting Officer (PSO) System Security Management Register and maintain systems in Enterprise Mission Assurance Support Service (eMASS) Plan and coordinate security control testing during Risk Assessments and Annual Security Reviews Maintain vulnerability data in Vulnerability Remediation Asset Manager (VRAM) Participate in change control and configuration management processes Ensure execution of Continuous Monitoring requirements as defined in system strategies Review all data produced by Continuous Monitoring activities and update eMASS records as necessary Correlate findings from non-RMF vulnerability assessments to RMF controls for holistic risk assessment Cybersecurity Analysis and Reporting Perform analysis of logs, events, and reporting from various data collection tools Assess impacts from observed risks and report via the Cybersecurity Program chain of command Present data to management in a comprehensive and cohesive manner Develop reports and produce procedural documentation as required Evaluate system administrator, security engineer, and/or system owner proposed corrections Minimum Qualifications Including Certificates: Must be a U.S. Citizen Active Secret security clearance Bachelor's degree in computer science, information technology, communications systems management, or equivalent STEM degree from an accredited college or university Minimum 6 years of experience coordinating and implementing security changes, ensuring compliance with published policies, conducting cybersecurity vulnerability and threat analysis, and supporting cyber incident response Current IAM-II certification (CAP, CASP+ CE, CISM, CISSP, GSLC, CCISO, or HCISPP) Desired Qualifications: Experience with the DoD Information Assessment and Authorization (A&A) process Familiarity with Risk Management Framework (RMF) implementation Proficiency with eMASS, VRAM, and other DoD cybersecurity systems Experience with NIST Special Publications and DoD/Navy cybersecurity directives Experience with vulnerability management tools (ACAS, HBSS, etc.) Knowledge of Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) AAP Statement We are proud to be an Affirmative Action and Equal Opportunity Employer and as such, we evaluate qualified candidates in full consideration without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, age, disability status, protected veteran status, and any other protected status.

Posted 30+ days ago

D logo
Dark Horse TechPhiladelphia, PA
Location: Philadelphia, PA, client site Clearance Requirement: Secret Responsibilities: · Support IT security goals and objectives and reduce overall organizational risk. · Assist with the collection of data needed to meet system cybersecurity reporting. · Communicate the value of IT security throughout all levels of the organization stakeholders. · Assist with security improvement actions as they are evaluated, validated, and implemented. · Assist with cybersecurity inspections, tests, and reviews for the network environment. · Assist with identifying alternative information security strategies to address organizational security objective. · Assist with interpretation of patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program. · Participate in an information security risk assessment during the Security A&A process. · Assist with the tracking of audit findings and recommendations to ensure that appropriate mitigation actions are taken. · Assist with the identifying security requirements specific to an IT system in all phases of the system life cycle. · Assist with the successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. · Assist programs to resolve findings identified during internal and external review processes. · Assist with Quality Assurance (QA) reviews for RMF package submissions in accordance with NSWCPD and NAVSEA 03 SOP. · Develop findings reports and recommended corrective actions for identified deficiencies. · Coordinate with programs to resolve findings identified during internal and external review processes. · Report system compliance in DON Application and Database Management System (DADMS), Department of Defense Information Technology Portfolio Repository – Department of the Navy (DITPR-DON), and VRAM. · Assist with facilitating communication between all RMF stakeholders throughout the RMF process. · Assist with monitoring systems for upcoming authorization conditions/stipulations, upcoming or past due POA&M items, and SLCM activities. Experience: Eight (8) years of experience coordinating with various levels of an organization to oversee and manage information security program implementation within the organization or other area of responsibility. Must have managed cyber strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources. · Knowledge of DoD policies, processes, and procedures related to common duties for Information System Security Managers Education/Certification: DoD 8570 IAM II (CAP, CASP+ CE, CISM, CISSP, GSLC, CCISO, HCISPP) Master's degree in computer science, information technology, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.

Posted 30+ days ago

Spry Methods logo
Spry MethodsWashington, DC
Who We’re Looking For (Position Overview): This role is critical in ensuring the security posture of mission-critical applications and infrastructure across multiple network enclaves (Unclassified, Secret, Top Secret). The ISSO will be responsible for developing, maintaining, and enforcing security policies, implementing cybersecurity controls, managing Authority to Operate (ATO) documentation, and conducting continuous monitoring and risk assessments in compliance with FISMA, NIST, DOJ, and other federal mandates. What Your Day-To-Day Looks Like (Position Responsibilities): Serve as the principal cybersecurity advisor to system owners and stakeholders. Design, analyze, and test of information security systems, products, cloud architectures and cloud solutions. Provide recommendations and/or alternatives to mitigate impact of system security boundary changes as part of any potential re-architecting and/or re-design activities. Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability. Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments. Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO). Responsible for ensuring operational security is maintained for assigned information systems. Ensure systems are operated, maintained, disposed of in accordance with security policies and practices. Perform Security Incident Reporting and Response. Coordinate with the Office of the Chief Information Officer (OCIO), Security Division, and others to provide documentation to the system Certification and Accreditation process. Ensure audits and reviews are responded to with accurate information. Perform system access control responsibilities. Participate in the change management process for assigned applications. Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle. Perform continuous system security monitoring. Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management. Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented. Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures. Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan. Responsible for ensuring the implementation and maintenance of annual security controls assessments. Assist with FISMA System audits as necessary. Leverage necessary vulnerability assessment and scanning tools including Nessus and ACSA to identify vulnerabilities, Splunk tools to monitor, detect and rectify misconfigurations. Working directly with development, platform, and infrastructure teams on security problems. What You Need to Succeed (Minimum Requirements): TS Clearance with SCI eligibility. 3 - 5 years of experience required. Extensive experience with federal cybersecurity frameworks, including RMF, NIST 800-53, CNSS, and FISMA. Experience supporting cloud security in environments such as AWS GovCloud, C2S, SC2S, and Microsoft Azure. Analyze logs using Splunk and AWS tools. Hands-on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk. Work with GRC tools such as Xacta/JCAM Hold at least one of the following security certifications. Example: Security +, CGRC, CASP, CISSP Experience using Atlassian suite tools such as JIRA/CONFLUENCE Experience with Agile Methodologies/SAFe Expertise on Information Security Principles, processes and guidelines Able to obtain and maintain an Authority to Operate (ATO) for Information Systems. Experience with scanning tools such as Tenable Nessus Ability to work on multiple projects with various timelines, at times very short deadlines. Ideally, You Also Have (Preferred Qualifications): Certifications: CISSP, CISM, CAP, Security+, AWS Certified Security – Specialty, or other relevant certifications. Experience in a high-side or multi-enclave (U/S/TS) environment. Experience working with Agile development teams and CI/CD pipelines. Familiarity with Infrastructure as Code (IaC) and cloud configuration management tools (e.g., Terraform, Ansible). Familiarity with NIST 800-53 Rev. 5 #CJ

Posted 3 days ago

A logo
AERMOR LLCNorfolk, VA
Location: Norfolk, VA Clearance: Secret Position Type: Full-Time AERMOR is seeking an Information System Security Specialist III to provide advanced cybersecurity and information assurance support to ensure the protection, compliance, and accreditation of information systems. This role requires hands-on expertise with Risk Management Framework (RMF), information assurance tools, and security evaluation processes to support Authority to Operate (ATO) requirements. The Specialist will oversee and maintain security postures, evaluate security solutions, and ensure compliance with applicable federal and DoD cybersecurity policies and standards. This is not a remote position. Responsibilities: Apply cybersecurity, engineering, and Test & Evaluation (T&E) knowledge to support security planning and execution. Demonstrate working knowledge of the Risk Management Framework (RMF) process; experience with DIACAP is also applicable. Utilize Information Assurance tools such as: DISA Enterprise Mission Assurance Support Service (eMASS) and Assured Compliance Assessment Solution (ACAS). Assist with the preparation and maintenance of process artifacts, traceability documents, and compliance evidence to support ATO requirements. Evaluate security solutions to verify compliance with security requirements for processing up to classified information. Supervise and/or maintain the operational security posture of assigned information systems and programs. Develop or assist in developing system security policies. Ensure compliance with change management and configuration control processes. May be required to hold Interim Security Control Assessor qualification. Required Experience: Bachelor’s degree with 5 years of practical experience, OR High School/GED with 7 years of practical experience. Demonstrated competency in Cybersecurity, Engineering, Test & Evaluation (T&E), or Assessment & Authorization (A&A)/ Certification & Accreditation (C&A). Familiarity with security policies, standards, and guidance documents. Strong background in RMF, DIACAP, and related security compliance processes. Experience with eMASS, ACAS, and other security assessment tools. Must hold Information Assurance Technical (IAT) III certification. Powered by JazzHR

Posted 4 weeks ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:    Information Systems Technician I – DB2/SQL Analyst Division:      Data Center Services Union:          IFT Location:    501 S Second St, Springfield, IL – Sangamon County Salary:         Range $4,962 to $9,512 monthly, commensurate with experience Benefits:       https://cms.illinois.gov/benefits/stateemployee.html Overview: Serves as a technical expert in an assigned area of database design, participates in the utilization of advanced programming languages and systems and programming techniques.  Duties and Responsibilities: Under direction of senior staff creates and maintains the necessary data files to support both production and test environments when developing projects such for areas such as, but not limited to, Driver Services, Vehicle Services, Business Services, etc. Under direction of senior staff, develops, designs and implements database structures to support user departments such as, but not limited to Driver Services, Vehicle Services, Business Services, etc. Prepares and maintains documentation for the data file structures/design. Under direction of senior staff, assures the adherence for the standardization of data names within data files that correspond with data names defined in the Data Dictionary/Data Directory. Under direction of senior staff, coordinates with personnel from Systems & Programming, transaction processing specialist and Production Assurance the implementation of new database changes from a test environment into a production environment. Utilizing vendor supplied database tools, monitors the status of data files for changes, growth, etc. Maintains user contact by attending meetings to gain better understanding of user requirements in areas such as, but not limited to, Vehicles Services, Drivers Services, etc. Performs other duties as required or assigned. Education and Experience: Requires knowledge, skill, and mental development equivalent to completion of one year of college, with coursework in the computer science field OR 1.5 years of technical systems and programming experience OR any equivalent combination of education and experience. Knowledge, Skills and Abilities: Requires elementary knowledge of Information Technology concepts and principles, the theories and functions of computer systems, and the principles and techniques of Information Technology documentation. Requires elementary knowledge of hardware and software, languages, and procedures to provide assigned technical and analytical support services. Requires elementary knowledge of accounting and statistical theories, methods and practices. Requires working knowledge of the devices for capturing data and the means available for receiving and transmitting data from remote locations to a computer. Requires working knowledge of the principles and techniques of computer system documentation. Requires ability to effectively participate in and profit from formal and in-service training programs. Requires ability to analyze data logically. Requires ability to maintain satisfactory working relationships with others. Requires the ability to follow oral and/or written instructions and to carry out routine operations, once established, without further instructions. Requires sufficient oral and written communication skills for effective engagement with colleagues and internal users/customers. Requires awareness and adherence to organizational standards for security, privacy and ethics. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Required to lift, carry and push/pull up to 50 lbs. Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume, or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).     Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability . Powered by JazzHR

Posted 30+ days ago

C logo
cFocus Software IncorporatedSpringfield, VA
The ISSO serves as the principal advisor to the DHS Geospatial Information Infrastructure (GII) System Owner. This position provides security guidance, oversight, and technical expertise based on Department of Homeland Security (DHS) directives, policies, and standards. The ISSO ensures that security controls are implemented, maintained, and compliant with all DHS security requirements and the GII Security Plan (SP) . The ISSO operates under the authority of the System Owner (SO) , a government employee, and is responsible for ensuring the continuous monitoring, assessment, and documentation of system security across all environments supporting DHS geospatial systems. Key Responsibilities Serve as the principal security advisor to the GII System Owner. Ensure implementation and maintenance of security controls in accordance with DHS policies and the GII Security Plan. Perform Information Security Continuous Monitoring (ISCM) , including: Automated security management and credentialed scans. Review and adjudication of findings from continuous monitoring and mitigation activities. Support assessment, authorization, certification, and accreditation activities (ATO/ATC). Execute Plan of Actions and Milestones (POA&M) and remediation processes per DHS MD 4300A. Update the Contingency Plan annually , execute it, and report on outcomes. Review Change Control Board (CCB) submissions for security compliance. Create and update (but not finalize) key artifacts, such as: Memorandum of Agreements (MOAs) Interconnection Security Agreements (ISAs) Privacy Threshold Assessments (PTAs) Privacy Impact Assessments (PIAs) Respond to Information Security Vulnerability Management (ISVM) notifications. Monitor and report on system security posture, ensuring compliance with DHS Sensitive System Policy (MD 4300A). Support DHS cyber investigation and data call responses related to system security. Ensure compliance with Federal Information Security Modernization Act (FISMA) and DHS directives. Required Experience The SOW specifies that the ISSO must meet or exceed the GTSS 3.0 “Information System Security Officer” labor category standards. While the document does not include the exact GTSS labor category details, these positions typically require: Minimum of 7–10 years of IT security or cybersecurity experience. At least 3–5 years of experience specifically as an ISSO or in an equivalent federal security compliance role. Required Certifications The ISSO must be qualified and credentialed in alignment with DHS 4300A Sensitive Systems Policy , which implies one or more of the following certifications (based on DHS and DoD 8570.01-M standards): Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Authorization Professional (CAP) CompTIA Security+ CE GIAC Security Essentials (GSEC) Required Tools & Technologies The ISSO role requires familiarity and practical experience with: DHS ISCM tools (e.g., Swimlane, Tenable/Nessus, Splunk, or equivalent SIEM tools). Vulnerability Management Systems (for ISVM response). Change Management Systems (e.g., ServiceNow, Jira). Plan of Action & Milestone (POA&M) tracking and reporting tools. Compliance Frameworks: NIST SP 800-37, 800-53, 800-137, FISMA. Documentation & Reporting Tools: Microsoft Office Suite, Confluence, or DHS-provided templates. Cloud Environments: AWS (federal GovCloud), ESRI Geospatial Cloud integration, and DHS enterprise networks. Powered by JazzHR

Posted 30+ days ago

L logo
Lucayan Technology Solutions LLCTampa, FL
Location: Tampa, FL (Onsite) Employment Type: Full-Time, Regular Department: Intelligence Operations and Analysis Security Clearance: Secret clearance required; active TS/SCI preferred Hours: Standard duty hours, Monday–Friday (mission support may require flexibility, evenings, or weekends) About Us At Lucayan Technology Solutions LLC , we deliver secure, innovative solutions in support of national defense and intelligence missions. As a trusted government contracting partner, we provide top-tier technology and intelligence services that safeguard our nation. Our team is mission-driven, and we are committed to building careers that matter. Job Summary Lucayan Technology Solutions is seeking an Information Environment Analyst to support social media and information operations programs in Tampa, FL. This role involves conducting online and social media research, applying cultural and linguistic expertise, and supporting Military Information Support Operations (MISO). The analyst will monitor regional information environments, identify key communicators and narratives, and deliver assessments that inform operational planning and senior decision-making. Key Responsibilities Conduct online and social media research to identify regional issues, ideological trends, and influencers . Support planning and execution of internet-based MISO and information operations . Apply cultural and linguistic expertise to analyze and interpret online content. Develop and deliver briefings, multimedia reports, and written products for senior decision-makers. Monitor emerging information technologies and platforms and recommend improvements. Provide open-source intelligence (OSINT) support to mission partners. Collaborate with DoD, IC, and interagency stakeholders to synchronize operations. Work Environment Onsite position located in Tampa, FL . Fast-paced, mission-critical environment supporting U.S. defense operations. Must be comfortable working in multicultural and dynamic settings . Less than 10% travel required. Minimum Qualifications Clearance: Active Secret clearance required Eligible for TS/SCI (active TS/SCI preferred). Citizenship: U.S. Citizenship required. Education: Bachelor’s degree in International Relations, Communications, Information Technology, or related discipline (or equivalent experience). Experience: 3+ years of experience in social media analysis, OSINT, or information operations. Strong written and verbal communication skills. Proficiency in Microsoft Office Suite. Required Certifications None required. Training in OSINT, social media analytics, or MISO support preferred. Preferred Qualifications Prior experience with Military Information Support Operations (MISO) . Department of Defense or military background. Experience presenting intelligence products to senior leaders. Employment Details Seniority Level: Mid-Level Employment Type: Full-Time, Regular Job Function: Social Media Research, OSINT, Intelligence Operations Industry: Defense & Space, Government Contracting Travel: Less than 10% Why Lucayan? At Lucayan Technology Solutions , you’ll join a mission-focused team working at the intersection of intelligence, social media, and information operations. We value our people as the key to our success and provide opportunities to grow professionally while making a direct impact on national security. Apply Now to leverage your expertise in information environment analysis where it matters most. Powered by JazzHR

Posted 30+ days ago

BTI logo
BTIAlbany, NY
Business Technology Integrators (BTI) is seeking a Lead Information Desk Supervisor to oversee the Information Desk operations at the Stratton VA Medical Center in Albany, NY. The Supervisor will manage Information Desk personnel and ensure that veterans, families, visitors, and employees receive prompt, courteous, and accurate assistance in alignment with the VA’s values of service, respect, and commitment. This position requires leadership, strong communication skills, and the ability to maintain operational excellence in a healthcare facility environment. Responsibilities Supervision & Staffing Oversee all Information Desk personnel and daily desk operations. Ensure coverage during all required hours: Monday – Friday: 7:00 AM – 7:00 PM Saturday – Sunday: 8:00 AM – 6:00 PM Ensure trained backup personnel are available to cover absences, breaks, and emergencies. Performance Monitoring & Training Monitor staff interactions to ensure compliance with the Quality Assurance Surveillance Plan (QASP) standards for accuracy, responsiveness, courtesy, and professionalism. Provide coaching, mentoring, and corrective feedback to staff as needed. Ensure all personnel complete required On-the-Job Training (OJT) and remain familiar with facility layout, departmental operations, and emergency procedures. Emergency Preparedness Ensure personnel are trained and prepared to respond effectively during emergencies, including medical crises, facility evacuations, and communication disruptions . Act as a point of escalation during incidents to ensure rapid and effective response. Reporting & Issue Tracking Review logs of reported issues related to switchboard, telephones, and paging communications. Track problem resolution and coordinate with the VA Police and Project Manager for follow-up and corrective action. Maintain accurate records of daily desk activities and operational reports. Customer Service & Representation Ensure veterans, families, and visitors receive clear and courteous information, directions, and assistance. Foster a professional and welcoming environment that reflects the VA’s values of service, respect, and commitment. Qualifications Prior supervisory or lead experience in a customer service, information desk, healthcare, or communications environment . Strong interpersonal, leadership, and coaching skills with the ability to manage and motivate staff. Ability to work under pressure, adapt to changing conditions, and manage stressful situations calmly and effectively. Knowledge of facility operations, communications systems (telephone, paging, radios), and VA Medical Center procedures (preferred). Excellent problem-solving, organizational, and documentation skills. Must complete at least one full week of OJT to ensure readiness for supervisory responsibilities. About BTI Business Technology Integrators (BTI) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) with over 25 years of experience providing innovative solutions to the Federal Government. BTI is committed to supporting our nation’s veterans by delivering professional services with integrity, respect, and excellence. Powered by JazzHR

Posted 30+ days ago

T logo
TLA-LLCMcLean, VA
TLA is seeking a detail-oriented and proactive Information System Security Analyst to join our IT department. This critical role involves safeguarding our organization's sensitive data and computer systems from evolving cyber threats. The analyst will be responsible for monitoring network activity, identifying vulnerabilities, responding to incidents, and ensuring compliance with security standards and regulations. The ideal candidate will have strong analytical skills and a passion for staying current with the latest IT security trends and technologies. Key Responsibilities: · Monitoring and Detection: Monitor the organization's networks and systems for security breaches and suspicious activity using Security Information and Event Management (SIEM) tools. · Vulnerability Management: Conduct regular vulnerability assessments and penetration tests to identify potential weaknesses in computer systems and applications. · Incident Response: Respond promptly to security incidents and breaches, investigate their root cause, contain the damage, and coordinate remediation efforts. · Policy and Compliance: Develop, implement, and maintain security policies, standards, and procedures to ensure compliance with relevant industry standards and regulations (e.g., NIST, ISO 27001, HIPAA, GDPR, PCI-DSS). · Security Measures: Install, configure, and maintain security software and tools, such as firewalls, data encryption programs, and antivirus systems. · Risk Assessment: Perform risk analyses of systems and applications to determine security requirements and recommend enhancements to management and senior IT staff. · Training and Awareness: Provide security awareness training and guidance to employees on best practices and new security procedures. · Documentation and Reporting: Prepare detailed reports of security assessments, incidents, and general security metrics for technical and non-technical audiences. Requirements TLA is seeking a detail-oriented and proactive Information System Security Analyst to join our IT department. This critical role involves safeguarding our organization's sensitive data and computer systems from evolving cyber threats. The analyst will be responsible for monitoring network activity, identifying vulnerabilities, responding to incidents, and ensuring compliance with security standards and regulations. The ideal candidate will have strong analytical skills and a passion for staying current with the latest IT security trends and technologies. Key Responsibilities: · Monitoring and Detection: Monitor the organization's networks and systems for security breaches and suspicious activity using Security Information and Event Management (SIEM) tools. · Vulnerability Management: Conduct regular vulnerability assessments and penetration tests to identify potential weaknesses in computer systems and applications. · Incident Response: Respond promptly to security incidents and breaches, investigate their root cause, contain the damage, and coordinate remediation efforts. · Policy and Compliance: Develop, implement, and maintain security policies, standards, and procedures to ensure compliance with relevant industry standards and regulations (e.g., NIST, ISO 27001, HIPAA, GDPR, PCI-DSS). · Security Measures: Install, configure, and maintain security software and tools, such as firewalls, data encryption programs, and antivirus systems. · Risk Assessment: Perform risk analyses of systems and applications to determine security requirements and recommend enhancements to management and senior IT staff. · Training and Awareness: Provide security awareness training and guidance to employees on best practices and new security procedures. · Documentation and Reporting: Prepare detailed reports of security assessments, incidents, and general security metrics for technical and non-technical audiences. Benefits At TLA , we build solutions that matter—supporting national security missions through technology innovation, collaboration, and excellence. Our team is passionate about leveraging modern technologies to deliver impactful, mission-focused outcomes for our customers. We offer a competitive and comprehensive benefits package including: Competitive salary and performance bonuses Medical, dental, and vision coverage Paid time off and federal holidays 401(k) with company match Education and certification reimbursement Training and professional development opportunities Employee referral bonuses and team events TLA is proud to be an Equal Opportunity Employer . We celebrate diversity and are committed to creating an inclusive environment for all employees.

Posted 3 weeks ago

Northern California Behavioral Health System logo
Northern California Behavioral Health SystemSanta Rosa, CA

$25 - $31 / hour

ABOUT US: Formerly Aurora Santa Rosa Hospital, SRBHH was opened in 2016 and is regarded as an integral part of the greater Santa Rosa and Northern California mental health system of care. Conveniently located in the North Bay, this hospital consists of 144 acute psychiatric inpatient beds. Santa Rosa Behavioral Healthcare Hospital (SRBHH) is regarded as an integral part of the greater Santa Rosa and Northern California mental health system of care. Conveniently located in the North Bay, SRBHH serves adolescents and adults. We treat both mental health and co-occurring psychiatric and substance abuse conditions. POSITION TITLE: Health Information Management (HIM) Technician PAY RANGE : $24.50-$30.93 PER HOUR REPORTS TO: Director of HIM DESCRIPTION OF POSITION: The Health Information Technician is responsible for analyzing medical records for completeness and compliance in accordance with federal and state regulatory guidelines, the Joint Commission standards, Medical Staff By-Laws/policies and procedures, Rules and Regulations, and HIM department policies and procedures. This includes reviewing medical records for completeness and assigning deficiencies to appropriate clinical and nursing staff, monitoring deficiency analysis work queues and resolving related problems. The HIM Technician is a resource for continuum of care services to hospital staff, medical staff and patients. This role is responsible for rounding on the units to gather, process, scan and index medical records for accuracy, timeliness, completeness and compliance in accordance with federal and state regulatory guidelines, Joint Commission standards, Medical Staff By-Laws/policies and procedures, and HIM department policies and procedures. This includes scanning all record types into the electronic medical record system ensuring documents are properly indexed, boxed and stored according to retention and retrieval guidelines. Responsibilities may include (but are not limited to) operational department coverage, patient calls, facilitating quick retrieval of and/or process of specific requested documentation to ensure safe and quality patient care services. The Health Information Management Clerk maintains knowledge of, participates in further training provided, and understands the potential risks regarding occupational health hazards (e.g. bloodborne pathogen exposures). KEY RESPONSIBILITIES : Run daily AIS reports to validate and account for patient discharges, both Inpatient and Outpatient. Pull charts for review and analysis on a timely basis as required by policy and by regulation. Assemble and analyze discharged patient charts and review Inpatient and Outpatient records according to department standards. Responsible for managing patient health records. Identify chart deficiencies for missing details (i.e., Protected Health Information, signatures, dates, times, and details) and charting. Document deficiency findings using the deficiency tools in software and on corresponding audit forms. Enter deficiencies into AIS. When charts have been completed by the physician or midlevel, reanalyze the pt charts for accuracy and remove deficiencies from AIS accordingly. Create and maintain patient charts based on established department guidelines. Ensures medical records are assembled in standard order and are accurate and complete. Assist in retrieving charts for stakeholders for chart completion. Retrieve and re-file the patient’s medical records, as needed. File loose filing daily into the proper charts. Prepare charts for patient discharge process. Creates or scans digital images of photos, forms or records to be included in the electronic medical record. Responds to requests for patient records, both within the facility and by external sources, retrieving them and transmitting them accurately, timely, and appropriately. Process all requests for medical records received by mail, fax, or phone according to State and Federal requirements. Ensure that the release of information is completed properly, timely, and valid. Collaborate with other departments to gather records needed to ensure timely and compliant billing. Assist in answering telephone and taking accurate messages. Pulling charts for physicians, nursing and other hospital personnel. Perform audits as requested. Assist in processing dictated and/or transcribed reports. Print reports as needed for timely inclusion into the patient’s active medical record. Work with the physicians, midlevels, and other hospital personnel to answer questions regarding dictation or transcription. Ensures that errors by outsourced transcription company are corrected and sent to the document’s author for review and signature. Requirements Knowledge and Experience: High school diploma or equivalent. One year of experience working with medical records preferred. Coursework specific to regulations pertaining to proper administration of medical records preferred. Demonstrated knowledge of patient privacy and security, HIPAA, CMIA, and LPS relative to maintaining medical records required. Knowledge of medical terminology preferred. Skills and Abilities: Promote patient, physician, customer and employee satisfaction by personal example, treating all contacts with respect Support and participate in activities that foster customer service Communicate and follow the organizational chain of command for notification of patient care/service issues, when appropriate Maintain a complete knowledge base of record completion requirements Maintain consistent productivity and quality of work in a challenging, fast paced and rapidly changing environment Closely adhere to set schedules and timecard procedures Identify, resolve and escalate major issues and service failures that impede success Maintain confidentiality of all patient demographic, medical, and financial information, ensuring proper handling and disposal of confidential documents and adherence to HIPAA Comply with all applicable Federal, State, and local laws, regulations, and requirements as well as PH&S policies and procedures in all aspects of job performance Attend and successfully completes general and department orientation, in-service programs and the annual key competencies and mandatory update requirements Participate actively in department staff meetings Demonstrate effective verbal and written communications Communicate effectively in all interactions in a clear, concise, understandable manner. Actively seeks constructive feedback and remains open and receptive to it Anticipate the information needs of others Demonstrate competency by maintaining positive, constructive interpersonal relationships, and by understanding and practicing the principles of effective teamwork Take responsibility to support team members in meeting project milestones and objectives. Perform challenging tasks efficiently and effectively Show strong, meticulous attention to detail and excellent analytical skills Demonstrate performance by adhering to established policies and procedure and exhibiting the defined characteristics associated with attendance and punctuality Monitor work queues and perform problem resolution/corrective action where needed Analyze medical records for completeness and compliance Assign documentation deficiencies to the correct physician, nursing, or other hospital personnel Process, scan and index medical records for accuracy, completeness and compliance into the correct paper or electronic medical record Confirm authorizations for release of information for requests as necessary Respond to business office requests for information and copies of specified documents Physical Requirements : While performing the duties of this job, this position is frequently required to do the following: Use standard office equipment and access, input, and retrieve information from a computer. Use computer keyboard with manual and finger dexterity and wrist-finger speed sufficient to perform repetitive actions efficiently for extended periods of time. Communicate effectively in person or via telephone in a manner which can be understood by those with whom the person is speaking, including a diverse population. Frequent bending, squatting, kneeling, climbing with the use of a step stool and twisting. Lift and carry up to 20 pounds. Sit or stand for minimum periods of one hour at a time. Come and go from the work area repeatedly throughout the day. Give and follow verbal and written instructions with attention to detail and accuracy. Perform complex mental functions and basic arithmetic functions; interpret complex laws, regulations, and policies; collect, interpret, and/or analyze complex data and information. Vision: see details of objects at close range. Coordinate multiple tasks simultaneously. Benefits Health Insurance Vision Insurance Dental Insurance 401k Retirement Plan Healthcare Spending Account Life Insurance(Supplemental Life, Term and Universal plans are also available) Short and Long-Term Disability(with additional buy-in opportunities) PTO Plan with Holiday Premium Pay Discounted Cafeteria Meal Plan Tuition Reimbursement

Posted 30+ days ago

Delaware Nation Industries logo
Delaware Nation IndustriesVirginia Beach, VA
Delaware Nation Industries (DNI) is about to begin a contract supporting the NAVSEA mission at Dam Neck Annex. This program provides full-spectrum Information Technology (IT), Cybersecurity, and Information Management Support to the Naval Surface Warfare Center Dahlgren Division (NSWCDD). This team delivers expert services in cybersecurity, data analytics, enterprise architecture, and systems administration. It ensures secure, efficient, and modern digital operations that support Navy mission readiness and IT transformation objectives. Oversee development and maintenance of information systems and data repositories. Implement and manage IT governance and data management policies. Support digital transformation initiatives and information assurance compliance. Coordinate system integration and lifecycle management activities. Provide oversight of configuration and access control standards. Developer documentation and reports for executive stakeholders. Support enterprise content management and SharePoint administration. Requirements DoD Secret Security Clearance Required. CISSP or equivalent certification. Six (6) years of professional experience in an ADP or IT management environment. Strong knowledge of data governance, system documentation, and configuration control. Experience with Navy or DoD IT management systems preferred. Benefits Benefits Include: Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental Matching 401K Short- and Long-Term Disability Pet Insurance Professional Development/Education Reimbursement Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.

Posted 30+ days ago

Edison State Community College logo
Edison State Community CollegePiqua, OH

$115,904 - $130,392 / year

Salary: $115,904.10 to 130,392.12 Annually Edison State Community College invites qualified candidates to apply for the full-time position of Chief Information Officer (CIO). The Chief Information Officer is responsible for oversight and strategic implementation of the organization's information technology (IT) systems and infrastructure. The CIO aligns technology initiatives with the organization's goals and objectives to drive efficiency, innovation, modernization, and growth. This leader is responsible for developing and maintaining a strong culture of customer support service for the institution and provides strategic oversight of the IT department. To be considered, candidates should include cover letter, resume, and list of education/work experience, including job titles in chronological order when completing their online application. Edison State Community College is an EOE/AA Employer. Functional Responsibilities: IT Strategy and Planning: Execute a comprehensive IT strategic plan that aligns with the collegewide strategic plan. Evaluate and prioritize technology investments, ensuring alignment with the organization's short-term and long-term goals. Work with departmental staff, the campus community, and the senior administrative team to plan and implement information technology systems that provide superior support for academic functions and administrative desktop computing, making efficient use of financial and personnel resources. Leadership and Management: Provide strong leadership and management to the IT department, ensuring effective collaboration, communication, and coordination among IT staff and other departments. Foster a culture of customer service, innovation, teamwork, and continuous improvement within the IT organization. Set and manage priorities for the IT division. Supervise recruitment, retention, organization, and professional development of all IT staff in accordance with budgetary objectives and personnel policies. IT Governance and Compliance: Establish and enforce IT governance policies, standards, and procedures to ensure the security, integrity, and availability of information. Stay updated on industry best practices and regulatory requirements to ensure compliance. Assemble and prepare all reports and research as required by local, state, and national agencies for this division. IT Infrastructure and Operations: Oversee the planning, implementation, and maintenance of IT infrastructure. Act as liaison with vendors and managed services providers. Plan, implement, and support systems in a complex education environment. Provide technical direction and leadership to ensure infrastructure and applications are reliable, available, secure, and up to date for the college’s academic and administrative use. Oversee and provide leadership in the development of training related to IT hardware, software, and educational technologies. Digital Transformation: Drive digital transformation initiatives by identifying and leveraging emerging technologies that can enhance business processes, improve customer experience, and promote innovation and modernization across all college departments. Evaluate, implement, and manage software applications and technology solutions to optimize operational efficiency. Vendor and Budget Management: Manage relationships with technology vendors and service providers, negotiate contracts, and ensure the delivery of high-quality services and solutions. Develop and manage the IT budget, ensuring cost-effective allocation of resources and adherence to financial goals. Consolidate vendors and remove duplicate technology solutions in alignment with the IT Strategy Identify opportunities for the appropriate and cost-effective investment of financial resources in IT systems and resources, including staffing, sourcing, purchasing, and in-house development. Risk Management: Identify and mitigate IT-related risks, including cybersecurity threats, data breaches, and system failures. Develop and implement disaster recovery and business continuity plans to ensure the organization's ability to respond to and recover from IT disruptions. Stay abreast of technological advancements, industry trends, and competitive landscapes to identify opportunities for innovation and improvement. Participate in professional networks and attend industry events to expand knowledge and stay informed. Other duties as assigned by the Vice President of College Operations. Requirements Required Knowledge, Skills, and Personal Qualifications: Exceptional customer service and leadership skills. Excellent written, verbal, interpersonal communication, and management skills. Ability to work effectively with all college constituents and possess the leadership capability necessary to build a highly effective technology division. Experience managing applications including but not limited to ERP, Productivity apps, Monitoring apps etc. Relate to all levels of the user community. Be a team player who motivates and educates other team members. Comprehend complex, technical subjects. Required Experience: 5 years of experience providing direct customer service in an IT-related industry. 5 years of increasingly responsible administrative and supervisory experience in an academic, industrial, or business setting is required, preferably at the community college level. Required Educational Background: Master’s Degree in an Information Technology discipline or related field is required, or equivalent combination of education and experience. College Teaching or IT Training experience highly desired. IT Support experience desired. Supervises Following Staff: Director of IT Services Database and Applications Developer External Managed Services Staff Any other personnel assigned to the division Other: Serve on Committees as assigned. Provide Coverage for special events. Provide evening and weekend coverage as needed. Ability to share on-call 24/7 availability. Benefits The following benefits are available to full-time Administrative employees. Employees working less than thirty hours a week are ineligible. Health & Life Insurance Edison State Community College provides excellent medical and dental plans with cost-shared premiums. The college offers a reimbursement program to share a portion of the employee's out-of-pocket expenses. Each employee receives an accidental death and dismemberment insurance policy. Retirement Benefits Edison State Community College participates in the Ohio Public Employee Retirement System (OPERS). Based upon the Ohio Revised Code, 10% of an Edison State employee's gross salary is deposited into their individual OPERS account. The college contributes an additional 14% which is not figured into the employee's base salary. An option for an alternate retirement plan is also available. Employee and employer contributions would be the same as above. Benefits that are not cost-shared by the college (available for payroll deduction): Vision Supplementary Life Insurance 403(b) Tax Deferred Annuities Vacation Administrative employees receive 4 weeks of vacation each year which begins accruing on the employee's first pay period. After five years of employment with Edison State the administrative employee will receive 4.5 weeks each year and this once again increases to 5 weeks after ten years of employment with the college. Sick Leave Edison State employees receive 3 weeks of sick leave each year which begins accruing on the employees first pay period. Holiday Pay At the start of their employment employees are eligible to receive pay for the 11 holidays for which the campus is closed. Tuition Waiver Edison State employees receive 100% of their instructional fees waived for any Edison State courses they take. Dependents (spouse or children) of full time Edison State employees receive the same 100% waiver for Edison State course instructional fees and dependents of part time employees receive a partial waiver. Tuition Reimbursement Edison State offers partial tuition reimbursement for continued education. Health Club Contribution Edison State will pay a portion of an employee's yearly premiums for a health club membership. Memberships to some local YMCA organizations can be payroll deducted. The college also provides an on-site fitness center to employees, students and the community at no charge.

Posted 30+ days ago

Charles IT logo
Charles ITStamford, CT
Exceptional Service, Endless Improvement, Passionate People, and Honest and Forthright. Guided by our values, we foster a culture of growth, balance, and belonging where every team member can thrive We're seeking a highly qualified Virtual Chief Information Officer (vCIO) to join our team. This strategic role serves as the primary liaison for assigned clients, addressing both technical escalations and business objectives. The ideal candidate will be client-focused, collaborative, exceptionally organized, and detail-oriented. Responsibilities Act as a strategic advisor, aligning client technology with business goals. Deliver executive-level insights and communicate effectively with both technical and non-technical stakeholders. Ensure client environments are secure, scalable, and optimized for performance and growth. Develop IT roadmaps, lead business reviews, manage budgets, and uphold compliance standards. Build and maintain strong client relationships, serving as the primary point of contact and escalation. Mentor internal team members and foster collaboration across departments. Identify gaps and partner with technical teams to scope and prioritize initiatives. Ensure alignment with industry best practices and regulatory requirements. Requirements 5+ years of experience in IT consulting, account management, or technical leadership, ideally within the MSP space. Proven success in strategic IT planning, budgeting, and engaging with C-suite stakeholders. Strong business acumen with the ability to align technology with business strategy. Industry certifications (e.g., MCSA, VCP, CCNA) are a plus. Proficiency with ConnectWise, Cisco, Meraki, Datto, VMware, Office 365, and advanced Mac OS support preferred. Excellent multitasking, prioritization, and follow-through in a fast-paced, collaborative environment. Highly organized, detail-oriented, and self-motivated with minimal supervision. Must be able to pass a background check and hold a valid U.S. driver’s license. Benefits Charles IT offers a comprehensive benefits package, including medical, dental, vision, life and disability insurance, paid holidays, PTO, 401(k), and performance-based bonuses. Team members also enjoy ongoing training, professional development, quarterly team-building events, and a collaborative workplace culture. Commitment to Inclusion: Charles IT is an equal opportunity employer committed to fostering an inclusive and respectful work environment. We welcome diverse backgrounds and perspectives and do not discriminate based on any protected characteristic.

Posted 1 week ago

Charles IT logo
Charles ITProvidence, RI
Exceptional Service, Endless Improvement, Passionate People, and Honest and Forthright. Guided by our values, we foster a culture of growth, balance, and belonging where every team member can thrive We're seeking a highly qualified Virtual Chief Information Officer (vCIO) to join our team. This strategic role serves as the primary liaison for assigned clients, addressing both technical escalations and business objectives. The ideal candidate will be client-focused, collaborative, exceptionally organized, and detail-oriented. Responsibilities Act as a strategic advisor, aligning client technology with business goals. Deliver executive-level insights and communicate effectively with both technical and non-technical stakeholders. Ensure client environments are secure, scalable, and optimized for performance and growth. Develop IT roadmaps, lead business reviews, manage budgets, and uphold compliance standards. Build and maintain strong client relationships, serving as the primary point of contact and escalation. Mentor internal team members and foster collaboration across departments. Identify gaps and partner with technical teams to scope and prioritize initiatives. Ensure alignment with industry best practices and regulatory requirements. Requirements 5+ years of experience in IT consulting, account management, or technical leadership, ideally within the MSP space. Proven success in strategic IT planning, budgeting, and engaging with C-suite stakeholders. Strong business acumen with the ability to align technology with business strategy. Industry certifications (e.g., MCSA, VCP, CCNA) are a plus. Proficiency with ConnectWise, Cisco, Meraki, Datto, VMware, Office 365, and advanced Mac OS support preferred. Excellent multitasking, prioritization, and follow-through in a fast-paced, collaborative environment. Highly organized, detail-oriented, and self-motivated with minimal supervision. Must be able to pass a background check and hold a valid U.S. driver’s license. Benefits Charles IT offers a comprehensive benefits package, including medical, dental, vision, life and disability insurance, paid holidays, PTO, 401(k), and performance-based bonuses. Team members also enjoy ongoing training, professional development, quarterly team-building events, and a collaborative workplace culture. Commitment to Inclusion: Charles IT is an equal opportunity employer committed to fostering an inclusive and respectful work environment. We welcome diverse backgrounds and perspectives and do not discriminate based on any protected characteristic.

Posted 3 days ago

C logo

Sr. Information Management Specialist- Navy - Top Secret/SCI Required

cFocus Software IncorporatedDahlgren, VA

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

cFocus Software seeks a Sr. Information Management Specialist to join our program supporting the Department of Defense (DoD). This position is remote. This position requires the ability to obtain a Secret clearance.Qualifications:
  • Six (6) years of professional experience in a broad-base Automatic Data Processing (ADP) services environment
  • This position requires a DoD IAM III level certification
Duties:
  • Develop, implement, and maintain information and records management policies, processes, and systems in alignment with DoD and Navy regulations.
  • Oversee the organization, classification, and lifecycle management of digital and physical information assets.
  • Ensure compliance with Department of the Navy (DON) and National Archives and Records Administration (NARA) records retention schedules.
  • Support data governance and configuration management efforts to maintain data integrity and traceability.
  • Coordinate with IT and cybersecurity teams to ensure the protection of classified and sensitive information.
  • Manage the creation, maintenance, and disposition of records in accordance with approved Navy information management procedures.
  • Implement metadata standards, tagging, and indexing strategies to facilitate efficient data retrieval and analysis.
  • Support audit and inspection readiness activities related to records and information management compliance.
  • Train and mentor staff on information management procedures, security protocols, and document control systems.
  • Maintain and update document repositories and electronic filing systems to ensure accessibility and compliance.
  • Develop reports and metrics to track compliance, data quality, and information lifecycle activities.
  • Serve as the subject matter expert (SME) for information management, providing guidance to stakeholders and leadership.
  • Collaborate with program managers and contracting officers to ensure contract deliverables and documentation are properly archived and retrievable.
  • Participate in continuous improvement initiatives to enhance information sharing, collaboration, and data governance capabilities.
  • Ensure secure and compliant handling, transmission, and storage of controlled unclassified and classified information.

Powered by JazzHR

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall