1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

ECP logo
ECPMadison, WI
ECP is a market-leading SaaS software solution that enables senior living communities to better care for their residents. ECP is used in over 8,000 communities. We're looking to further expand by increasing the number of customers that use our software and increasing the scope of how we serve our customers by developing and releasing new products. ECP is seeking a Director of Information Security to lead and execute our cybersecurity and compliance strategy. This is a hands-on role responsible for ensuring the confidentiality, integrity, and availability of our systems and customer data within the context of healthcare regulations (HIPAA) and SOC 2 Type II compliance. The ideal candidate brings a blend of technical expertise, regulatory understanding, and practical execution, partnering closely with our Infrastructure and IT teams to strengthen our security posture across the company. You’ll manage annual audits, harden systems, guide best practices, and foster a culture of security awareness. This position reports to the VP of Engineering and collaborates cross-functionally with DevOps, Infrastructure, Compliance, and IT. Note: We are open to remote candidates located in the U.S. Cybersecurity: Develop and execute ECP’s information security strategy, aligned with business goals and risk tolerance. Maintain and evolve SOC 2 Type II compliance, including evidence gathering, documentation, and audit coordination. Ensure compliance with HIPAA and other healthcare data protection standards. Establish, implement, and maintain security policies, procedures, and standards consistent with regulatory and customer expectations. Manage third-party risk and vendor security assessments. Lead the incident response program, including detection, investigation, communication, and remediation. Oversee vulnerability management, penetration testing, and security monitoring. Partner with Infrastructure and DevOps teams to secure servers, cloud environments (AWS/Azure), and CI/CD pipelines. Integrate secure development lifecycle (SDLC) practices into engineering workflows. Stay current on emerging security threats, technologies, and frameworks, and advise leadership accordingly. IT & Platform Security: Collaborate with internal IT to harden employee laptops and mobile devices, ensuring encryption, endpoint protection, and compliance with policy. Manage and optimize the company’s mobile device management (MDM) platform. Support and guide internal IT in maintaining secure onboarding/offboarding and access management processes. Coordinate internal penetration testing efforts and develop recommendations for infrastructure hardening. Assist with network and system security, including identity management and monitoring. Develop and lead employee security and HIPAA awareness training programs. Maintain visibility into and tracking of vulnerabilities and remediation efforts. Requirements Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience). 5+ years of experience in information security, infrastructure security, or a related role. Prior experience in a SaaS or healthcare technology environment required. Demonstrated experience leading SOC 2 Type II audits and ensuring HIPAA compliance. Strong understanding of AWS cloud security, identity and access management, and data protection best practices. Hands-on experience with endpoint management, laptop hardening, and mobile device management (MDM) tools. Strong troubleshooting, analytical, and problem-solving skills. Excellent communication skills with the ability to work effectively across technical and non-technical teams. Ability to thrive in a collaborative, fast-paced environment. Preferred: Certifications such as CISSP, CISM, CISA, Security+, or HCISPP (Healthcare Information Security & Privacy Practitioner). Familiarity with frameworks such as NIST CSF, CIS Controls, or ISO 27001. Experience scripting or automating security tasks (Python, PowerShell, Bash).

Posted 30+ days ago

Avint logo
AvintDC, WA

$115,000 - $125,000 / year

Avint LLC is seeking a highly motivated, solution-oriented, and customer-focused Information Systems Security Officer (ISSO) III to join our growing team. We are looking for a senior-level ISSO who is confident working independently and demonstrates deep technical and operational expertise. This position is 100% on-site 1750 Pennsylvania Ave, Washington, DC Requirements Responsibilities: Provide subject matter expertise to ensure compliance with Treasury, DHS, and NIST cybersecurity policies and frameworks. Support the implementation and sustainment of security controls in alignment with the NIST Risk Management Framework (RMF). Responsibility for and to assist system owners in maintaining system Authorization to Operate (ATO) status. Enhance Treasury’s ability to measure, report, and manage cybersecurity posture and control effectiveness at a maturity level consistent with OIG FISMA Metrics Level 4 (“Managed and Measurable”). Strengthen collaboration and information sharing across internal Treasury offices and external partners to support cybersecurity risk reduction and resilience. Position Requirements: US citizen without dual citizenship Ability to obtain a Public Trust clearance Currently possess at least 8570 IAT II certification Thorough knowledge of and experience with executing the seven key steps of the Risk Management Framework (RMF) Thorough knowledge of and experience with completing the components of a FedRAMP system package, to include the System Security Plan (SSP) and the Control Implementation Summary (CIS)/Customer Responsibilities Matrix (CRM) Experience with security control implementation statement development and testing Familiarity with AI-based systems Benefits Joining Avint is a win-win proposition! You will feel the personal touch of a small business and receive BIG business benefits. From competitive salaries, full health, and generous time off and Federal Holidays. Additionally, we encourage every Avint employee to further their professional development. To assist you in achieving your goals, we offer reimbursement for courses, exams, and tuition. Interested in a class, conference, program, or degree? Avint will invest in YOU and your professional development! Salary range $115,000-125,000

Posted 3 weeks ago

S logo
Seneca Gaming CorporationNiagara Falls, New York
The Director of Information Security & Assurance (ISA) is responsible for establishing and maintaining an enterprise-wide information security program to support the confidentiality, integrity and availability of Seneca Gaming Corporation’s information assets. The Director of ISA collaborates and consults with IT management and business units to develop appropriate security controls. The Director leads the development of information security policies, procedures, and best practices and works with internal and external teams to implement and promote compliance with those procedures, best practices and/or regulatory compliance requirements. The Director of ISA is responsible for the development of an information security & assurance strategy within the context of a risk-based approach. This position is responsible for identifying, evaluating and reporting on information security risks in a manner that meets compliance and regulatory requirements. This position requires a visionary leader with strong leadership skills, business acumen and technology. The Director of ISA will work proactively with business units to implement practices that meet defined policies and standards for information security lead IT risk management activities.The Director will report directly to the CIO and provide guidance for all Information Technology Security and Assurance concerns. The Director will also have an indirect reporting relationship to the SGC Audit Committee for audit compliance services. ESSENTIAL FUNCTIONS AND RESPONSIBILITIES: 1. Works in close partnership with VP of Information Technology / CIO to ensure coordinated and effective information security operations across all systems and platforms. 2. Works closely and collaborates with Technical Services, Systems, Network, Operations, Applications and Support teams to ensure alignment between the information security and the enterprise information technology architecture, thus coordinating the strategic planning implicit in these architectures. 3. Leads and oversees the daily operations of the information security & assurance department and develops programs and best practices on information security domains such as access control, telecommunications and network security, risk analysis and security governance, security architecture, cryptography, operational security, application security, and business continuity/disaster recovery. 4. Together with the CIO, develops, implements, and monitors, a strategic, comprehensive enterprise information security and risk management program to ensure the integrity, confidentiality and availability of information owned, controlled or processed by the organization. 5. Manages the enterprise's security organization, consisting of direct reports and indirect reports and leads all hiring, training, staff development, performance management and annual compensation reviews. 6. Identifies legal, regulatory, organizational and other requirements and provides recommendations for managing the risk of non-compliance. Identifies gaps between current and desired risk levels. 7. Develops and communicates organizational information security policies and standards. 8. Leads the development of and provides management oversight for the information security operating and capital budgets and monitors for variances. 9. Creates and manages information assurance and risk management awareness training programs for all employees and approved system users. 10. Acts as the liaison between Internal Audit, Legal, Human Resources and Compliance Departments providing leadership and oversight for audit and information assurance activities. 11. Works directly with the business units to analyze information security risks and recommends appropriate risk treatment options to manage risk to acceptable levels. 12. Provides subject matter expertise to executive management on a broad range of information security standards and best practices, such as CIS, NIST, NIGC MICS, PCI DSS, COBIT, ITIL. 13. Provides strategic and tactical security guidance for all IT projects, including the evaluation and recommendation of technical controls. 14. Creates and facilitates the information assurance risk assessment process, including reporting and oversight of remediation efforts to address negative findings. 15. Collaborates on the development of a secure information technology infrastructure that provides reliable, resilient, responsive and secure enterprise information technology services. 16. Manages security incidents and events to protect corporate IT assets, including intellectual property, fixed assets and the company's reputation. 17. Coordinates the use of external resources involved in the information assurance program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources. 18. Assists in the development of effective disaster recovery policies and procedures. 19. Develops business-relevant metrics to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation and increase the maturity of the security program. QUALIFICATIONS/REQUIREMENTS: Education/Experience: 1. Must be 18 years of age or older upon employment. 2. Bachelor’s Degree in an Information Technology related field. 3. Minimum of ten (10) years of experience in an Information Technology management role with a combination of information technology and demonstrable information security and assurance responsibilities. 4. Minimum of five (5) years in Information Technology project management, systems design and integration and experience leading project teams using formal project management methodologies 5. A level of pertinent security/risk-focused certification, e.g. Security+, CISSP, CISM, CISA, CRISC. 6. An equivalent combination of education and/or experience may be substituted for the above requirements. 7. A deep understanding of and extensive experience with implementing network operating systems, systems design and enterprise architecture, systems development lifecycle (SDLC), project management methodology, asset management, access control systems, network communication protocols and topology, security engineering, public key infrastructure and identity and access management concepts. 8. Experience with security/risk-specific program/program component development, e.g. information security governance & continuous improvement, security awareness, vulnerability management, data protection, endpoint protection, identity & access management, cryptography & key management, business continuity/disaster recovery, incident response. 9. Direct experience with IT-based audit processes. 10. Excellent written and verbal communication skills; interpersonal and collaborative skills; and the ability to communicate security and risk-related concepts to technical and nontechnical audiences. 11. Must be a critical thinker with strong problem-solving skills. 12. Knowledge of technological trends and developments in the area of information assurance and risk management. 13. Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals. 14. Knowledge of security and control frameworks, such as CIS, NIST, NIGC MICS, PCI DSS, COBIT, and ITIL. 15. Experience with contract and vendor negotiations. 16. High level of personal integrity and ethical standards and the ability to professionally handle confidential matters and exemplify the appropriate level of judgment and maturity. 17. High degree of initiative, dependability and ability to work with little supervision. 18. Must possess and maintain a valid driver’s license and be able to substantiate a safe driving record within the parameters acceptable to our liability insurance carrier. Language Skills and Reasoning Ability: 1. Must possess excellent communication skills: listening, writing, speaking, and interpersonal skills. 2. Must have the ability to speak effectively to the public, employees, customers and vendors. 3. Must have the ability to deal effectively and interact well with the customers, vendors and employees. 4. Must have the ability to resolve problems/conflicts in a diplomatic and tactful manner. Physical Requirements and Work Environment: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually moderately loud. When on the casino floor, the noise levels increase to loud. Must be able to work in an environment where smoking is permitted. 1. Must be able to stand, walk, and move through all areas of the casino. 2. Maintain physical stamina and proper mental attitude to work under pressure in a fast-paced, casino environment and effectively deal with customers, management, employees, and members of the business community in all situations. Salary Starting Rate: $143,936.95 Compensation is negotiable based on experience and education. Each position has varying minimum qualifications. In the absence of fully qualified candidates, some requirements may be waived.

Posted 6 days ago

Bergen New Bridge Medical Center logo
Bergen New Bridge Medical CenterParamus, New Jersey
Join Our Team at New Bridge Medical Center! We are dedicated to providing high-quality, compassionate care to our diverse community. As a leading healthcare provider, we offer a supportive and inclusive work environment. If you’re passionate about making a difference and thrive in a collaborative setting, New Bridge Medical Center is looking for a HIM Archive Coordinator. Principal Duties and Responsibilities Pick up and reconciliation of all discharged encounters throughout Hospital units pursuant to assigned schedule Demonstrates competency in the medical record analysis process for IP, ED, LTC, OP and SDS encounters and assists with all patient types as needed and directed by management including chart scanning, prepping, indexing, and quality review. Demonstrates ability to use computer applications e.g. OneContent, Paragon proficiently Demonstrates an ability to prioritize work and meet productivity requirements as directly and outlined by management. Retrieves medical record documentation for patient care Place like documents in the appropriate order for scanning Accurately assemble LTC Records Review each record for poor original documents Knowledge of prepping and scanning medical records in order to coordinate staff and appropriate workflows. Reconcile and box records being sent to our archive vendor, including accessing the archive portal to request records to be picked up or requesting records to be delivered when in need for ROI and Internal Audits. Reconcile, log and box all medical records scanned from previous month to be placed in our store room to be shredded after 30 days from the last day of previous month, it included transporting the boxes to building 8-6, and then placing paper charts in tote containers at the end of the month to be shredded by the vendor. The person would need to be able to lift boxes with records to be transferred to store room. Process and merge medical records reported as duplicate, by reviewing medical information in both Paragon and OneContent to make sure merged MRNs accordingly. Demonstrate ability to assist physicians or other clinical staff Performs duties in accordance with established procedures, protocols and department standards Correctly identify and Inpatient, Outpatient & Emergency room record Basic knowledge of scanning process, assuring scanned documents are legible. Demonstrate the ability to reconcile charts delivered to HIM via the appropriate list Participates in departmental and organizational performance improvement activities. Adheres to the organizational Code of Conduct and Ethics which outlines collaborative work, professional demeanor, and the ability to understand the mission, vision, and values of BNMBC while respecting patient privacy, confidentiality, and care. Maintain patient, medical record, department and employee confidentially at all times. Minimum Knowledge and Skills Required EMR Experience Microsoft Office/Computer proficient Excellent oral and written communication skills Excellent interpersonal/customer service skills Certification, Registration, or Licensure Required AHIMA certification preferred. Salary commensurate with experience within posted range We provide a comprehensive benefits package, including a competitive medical, dental, and vision plans. We prioritize work-life balance with a generous time off policy that includes ample vacation days, personal time, sick leave and nine paid holidays. Additionally, we are committed to the personal and professional growth of our employees, offering robust tuition reimbursement and continuing education programs to help support our employees ongoing development.

Posted 4 days ago

Leidos logo
LeidosHampton, Virginia

$87,100 - $157,450 / year

Grow with us! Through training, teamwork, and exposure to challenging technical work, let Leidos show you how to accelerate your career path. The Leidos National Security Sector is seeking Information Assurance Analysts for future and upcoming positions at Langley AFB. These positions are part of a large Military Intelligence Program supporting the USAF Air Combat Command’s (ACC) ISR mission. Applicants will support the Air Force Distributed Common Ground System (AF DCGS) by providing Information Assurance (IA) support to AF Wing and Squadron-level organizations located at Joint-Base Langley-Eustis VA. Note: This is a contingent job posting for vacancies as they arise within the program. Opportunities for technical skill development, career advancement and internal position mobility are available . Primary Responsibilities Advise, conduct and document risk assessments. Help develop System Security Plans (SSP), Plans of Action and Milestones (POA&M). Provide continuous surveillance of mission critical AF DCGS systems and components inclusive of Authority to Operate (ATO) and Interim Authorizations to Test (IATT) components. Perform computer equipment, software and magnetic media inspections during Sensitive Compartmented Information Facility (SCIF) installations and removals. Investigate, verify and report information related to firewall exception requests, network service requests (NSR) and port service requests (PSR). Implement IA and security standards and procedures to identify, report and resolve security violations. Develop capability-based IA requirements based upon user, policy, regulatory, and resource demands. Develop, collaborate and coordinate IA solutions with product developers and AF acquisition agents, security, Information Technology and operations personnel during day-to-day operations and during weekly / monthly Integration forums. Validate and maintain the accreditation of the assigned Security Plans. Assist with preparation and maintenance of documentation. Basic Qualifications BA/BS Degree and 2-8 years of experience. Additional experience may be considered in lieu of a degree. Must possess a current TS/SCI clearance eligibility and DOD 8140 certifications prior to assignment Must be capable of working independently and collaboratively with on-site personnel and enterprise AF DCGS stakeholders and possess excellent oral and written communication skills. Preferred Qualifications Applicants possessing extensive working knowledge of Risk Management Framework (RMF), Assessment and Authorizations (A&A), Xacta IA Manager and Enterprise Mission Assurance Support Service (eMASS) A&A workflow platforms are highly desired If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares. Original Posting: July 11, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $87,100.00 - $157,450.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Posted 4 days ago

Daiichi Sankyo logo
Daiichi SankyoBasking Ridge, New Jersey

$17 - $58 / hour

Join a Legacy of Innovation 125 Years and Counting! Daiichi Sankyo Group is dedicated to the creation and supply of innovative pharmaceutical therapies to improve standards of care and address diversified, unmet medical needs of people globally by leveraging our world-class science and technology. With more than 125 years of scientific expertise and a presence in more than 20 countries, Daiichi Sankyo and its 18,000 employees around the world draw upon a rich legacy of innovation and a robust pipeline of promising new medicines to help people. In addition to a strong portfolio of medicines for cardiovascular diseases, under the Group’s 2025 Vision to become a “Global Pharma Innovator with Competitive Advantage in Oncology,” Daiichi Sankyo is primarily focused on providing novel therapies in oncology, as well as other research areas centered around rare diseases and immune disorders. We are currently seeking a Medical Information and Education Intern for Summer 2026. This full-time positions works approximately 37.5 hours per week. Responsibilities : Conduct desktop research of medical literature Assist in the development of medical information resources for Health Care Professionals and patients Collaborate with Medical Information staff to manage customer inquiries from the Daiichi Sankyo Contact Center Conduct review of medical information resources Provide project management support Qualifications: Qualified candidates must currently be enrolled in an accredited PharmD program Prior experience in a corporate business environment is preferred; experience in the pharmaceutical industry is a plus. Candidates must have excellent academic achievement Strong analytical/critical thinking skills and attention to detail Excellent writing skills Experience writing, reviewing, and editing scientific content Strong organizational skills and the ability to work independently and as part of a team Daiichi Sankyo, Inc. is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law. Salary Range: $17.23 - $58.15 Download Our Benefits Summary PDF

Posted 1 week ago

Leidos logo
LeidosFort Bragg, North Carolina

$73,450 - $132,775 / year

Launch Your Next Mission: Multi-Functional Information Systems Analyst -Fort Bragg, NC Step into the future of national defense technology with Leidos! We're searching for a driven, mission-focused Multi-Functional Information Systems Analyst to join our team at Fort Bragg, NC. This is your chance to play a pivotal role in supporting cutting-edge Air Force operations. Candidates must hold a current TS/SCI security clearance to be considered. What You’ll Do Serve as a communications liaison for an AF Squadron/Detachment and Field Training Unit for changes to the Operations/policy/capabilities of the related networks. Communications oversight/planning of NIPR/SIPR/TS networks (differing classifications up to TS//SCI) Build relationships with network owners and administrators to garner greater capability/insight on all networks Work with new and existing networks/capabilities by Gather customer requirements and working with the network/system owners to provide design inputs/implement a solution that meets the customer's needs and system limitations/security concerns (physical and logical) Conduct network and telecommunications system incident investigation. Identify and document network errors and solutions. Analyze network and telecommunications alarms and identify potential issues and provide updated system solutions using AFWAY Configure, test, install, troubleshoot, and maintain network devices such as firewalls, cryptographic devices, and routers to optimize performance and ensure the desired security posture is attained and maintained. Configure, test, install, troubleshoot, and maintain network devices, phone systems, including phone units, voicemail, switches, infrastructure, call manager systems, Video Teleconference (VTC) systems video recording/viewing/distribution systems, and related telecommunications trunk circuits. Configure, test, install, troubleshoot, and maintain network devices including Classified and Unclassified systems, peripherals, and other network systems. Work with Air Force Communications Squadron to complete Network, Systems, and Telecommunications work orders Maintain documentation for system installs and MICT compliance Create User accounts on multiple domains Obtain/maintain system administrator account for NIPR and SIPR Load/configure workstations/laptops on (NIPR/SIPR/JWICS) networks Troubleshoot computer hardware and software issues and printer hardware/configuration issues Regularly monitor Remedy for ticket status/updates (NIPR/SIPR; no notifications) Monitor base comm. squadron monthly vulnerability scans (NIPR/SIPR; not notified) Remediate workstations/laptops that have vulnerabilities Obtain/maintain an account for the Comm. & Infrastructure Planning System /Work Order Management Systems (CIPS/WOMS) Process all new NIPR/SIPR requirements via CIPS/WOMS to Remedy Mobile Satellite Services (MSS)-support DOW in dual-management and responsible for Silent Dagger Lite and Mobile Satellite Phone program Perform function until squadron appoints Unit Property Custodian Provides MSC to support squadron EMSEC program management Squadron focal point for USLM program Integrate with squadron security manager to ensure TEMPEST guidelines are in compliance for SCIF. Provide Tactical Systems Emulator “TSE” 8570 support until separate TSE 8570 member is hired Coordinate/set up VTCs for squadron leadership and provide technical support/coordination and operational capability for Tandberg systems Process download transfer authority paperwork and validate DTA authorizations as requested by 27 SOCS Complete training and perform update and validation of MSC assigned Management Internal Tool Kit (MICT) checklists Capability to handle communications security (COMSEC) information and material Qualifications: 5+ years of related experience. Bachelor’s degree in a relevant technical discipline OR 4+ years of experience in lieu of a degree. Hands-on expertise with AF CSA, ISSO, TSE, VTC, DTA, USLM Mobile Satellite Services, ITEC EMSEC/TEMPEST. Experience within an Air Force intelligence organization is highly desired. Active TS/SCI clearance required. Must hold and maintain DoD 8570 certifications (Security+) and meet future requirements. EIO2024 ​ If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares. Original Posting: November 14, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $73,450.00 - $132,775.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Posted 4 days ago

Constellation Technologies logo
Constellation TechnologiesFort Meade, Maryland

$200,000 - $250,000 / year

Information Assurance, Nessus, RMF, Windows, Linux, WireShark, System Security Plans, Authorization to Operate, Verification and Validation, NIST, PKI, Scripting Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. https://jobs.lever.co/cti-md/08683d2d-4a7c-4b6f-8a3e-9848a26b0b92 Required: Must be a US Citizen. Must have TS/SCI clearance w/ active polygraph (Polygraph must be within the last five (05) years). At least fourteen (14) years of direct/relevant experience Bachelor’s degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a bachelor’s degree. Certified Information System Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. Must be comfortable working on multiple systems and components simultaneously in various configurations. Must have strong verbal and written communications skills. Must be committed to adopting and adhering to best practices. Must be able to effectively plan and prioritize tasking and communicate clearly regarding technical options and trade-offs. Must be capable of performing high quality work both independently and with a team in a fast-moving environment. These Qualifications Would Be Nice to Have: Five (05) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, public key infrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation. Experience with penetration testing tools. Experience with scripting languages.​​ $200,000 - $250,000 a year The pay range for this job, with multi-levels, is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. The benefits package: • Affordable healthcare options with 80% employer paid premium PLUS a company-funded HSA • Dental insurance with 100% employer paid premium • Vision with 80% employer paid premium • Employer paid Life insurance 100% • Employer paid Short-term and Long-term disability 100% • Annual training, continued education, and professional memberships reimbursement • Unlimited access to Red Hat Enterprise Linux and AWS training and accreditation • Annual reimbursement for technology i.e. phones, computers, printers, etc. • 401(k) with company match up to 5% with 100% immediate vesting (after 90 days of employment) The environment and perks: • Professional development investment and paid time off for training • Contract and work locations in Maryland, Virginia, Colorado, Texas, Utah, Florida and Hawaii. • Team building events throughout the year such as Destination Family Events, Holiday Party, Monthly Get-Togethers • Leadership Team engagement and mentorship • Performance Recognition Program • Complimentary branded apparel Don't see a job opening that's the perfect fit? Apply to our General Position to join our talent pool for consideration for future opportunities. Know someone else who may be a good fit? Refer them through the CTI External Referral Program and you could receive a one-time referral bonus of up to $10,000 ! Email [email protected] for more information. Constellation Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, religion, creed, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, medical condition, marital or domestic partner status, sexual orientation, gender, gender identity, gender expression and transgender status, mental disability or physical disability, genetic information, military or veteran status, citizenship, low-income status or any other status or characteristic protected by applicable law. Job applicants can submit questions about CTI’s equal employment opportunity policy to [email protected]. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.

Posted 2 days ago

AHU Technologies logo
AHU TechnologiesWashington, District of Columbia

$80 - $85 / hour

Role : Information Assurance and Security SpecialistLocation : Washington DCClient : DC GovernmentJob Description: Duties:a. Identify network problems, and recommend improvements to ensure optional performance;b. Ability to monitor and analyze data traffic patterns within the OCFO Network infrastructurec. Ability to enhance security and knowledge of the latest security threats, worms, and malware and advise on how to deter them;d. Ability to reliability of the network through the above actions;e. Extensive experience in developing strategic systems architecture plansf. Experience with Storage infrastructure (NetApp Storage) and technologies include virtualization/arrays, FC/FCOE, NFS, ISCSI.g. Design, administration of VMware Infrastructure including full integration with SAN for VMotion and VMware SRM multi-site administrationh. Advanced knowledge of disaster recovery and business continuity processes and tools needed.i. Active Directory service management and operational stability and maintenancej. Design and build solutions utilizing on-premise computer, networking, and storage technologies using Azure cloud. Cloud Engineer leads the design and support of large-scale projects.k. Configure routers, switches, firewalls, and other appliances in compliance with OCFO security standards;l. Monitor security measures in place within network perimeter, ensuring security breaches do not occur and information is safeguarded Responsibilities:a. Determines enterprise information assurance and security standards.b. Develops and implements information assurance/security standards and procedures.c. Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers' requirements.d. Identifies, reports, and resolves security violations.e. Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.f. Supports customers at the highest levels in the development and implementation of doctrine and policies.g. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.h. Performs analysis, design, and development of security features for system architectures.i. Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.j. Designs, develops, engineers, and implements solutions that meet security requirements.k. Provides integration and implementation of the computer system security solution.l. Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.m. Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.n. Ensures that all information systems are functional and secure Qualifications:a. 16+ years of experience developing, maintaining and recommending enhancements to IS policies/requirements (Required)b. 16+years of experience performing vulnerability/risk analyses of computer systems/apps (Required)c. 16+ years of experience identifying, reporting and resolving security violations (Required)d. Cloud-Azure (Highly Desired)e. Experience in complex Enterprise-level projects (Required)f. Expert understanding of Windows server operating systems (Required)g. Knowledge of on-premise and cloud security productions (Required)h. Good understanding of IP Networks/Security (Required)i. Extensive experience troubleshooting NetApp SAN (Required)j. In-depth knowledge of SAN replication/Disaster Recovery (Highly Desired)k. Hands-on experience managing storage on VMware ESXi (Required)l. Good understanding of server/endpoint operating sytem (Required)m. Windows 2016 AD Enterprise troubleshooting experience (Required)n. In-depth experience with Disaster Recovery & Avoidance planning (Required)o. VMare Site Recovery Manager experience (Highly Desired)p. Excellent understanding of troubleshooting IT infrastructure (Highly Desired) Education:a. Bachelor's Degree in IT or related field or equivalent experience (Required)b. Master's Degree in IT or related field or equivalent experience (Highly Desired)c. Security CISSP, Security+, CEH (Required) Compensation: $80.00 - $85.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 1 week ago

Viva Health logo
Viva HealthBirmingham, Alabama
Manager of Information Security Location: Birmingham, AL Why VIVA HEALTH? VIVA HEALTH, part of the renowned University of Alabama at Birmingham (UAB) Health System, is a health maintenance organization providing quality, accessible health care. Our employees are a part of the communities they serve and proudly partner with members on their healthcare journeys. VIVA HEALTH has been recognized by Centers for Medicare & Medicaid Services (CMS) as a high-performing health plan and has been repeatedly ranked as one of the nation's Best Places to Work by Modern Healthcare. Benefits Comprehensive Health, Vision, and Dental Coverage 401(k) Savings Plan with company match and immediate vesting Paid Time Off (PTO) 9 Paid Holidays annually plus a Floating Holiday to use as you choose Tuition Assistance Flexible Spending Accounts Healthcare Reimbursement Account Paid Parental Leave Community Service Time Off Life Insurance and Disability Coverage Employee Wellness Program Training and Development Programs to develop new skills and reach career goals Employee Assistance Program See more about the benefits of working at Viva Health - https://www.vivahealth.com/careers/benefits Job Description The Manager of Information Security oversees and mentors a team of security engineers while remaining hands-on in designing, implementing, and monitoring security measures that safeguard the organization's digital assets. This individual will need a broad and strategic knowledge of principles, practices, and procedures in information security to plan, design, develop, execute, and support critical systems and projects. This role will lead the planning, design, enforcement, and audit of enterprise-wide security policies and procedures which safeguard the integrity of and access to enterprise systems, files, and data elements while actively engaging in tactical execution. This position will continuously assess, refine, and implement data security strategies proactively advising leadership with actionable risk assessments and security briefings. This individual evaluates and deploys emerging technologies, collaborates across IT Operations and Development, and strengthens organizational resilience by championing employee education, security culture, security best practice, and continuous improvement. This role drives value by balancing leadership responsibilities with direct technical contributions, ensuring scalable protection aligned with future business growth. Key Responsibilities Direct and actively contribute to day-to-day security operations. Perform hands on technical work in daily security operations while guiding team performance. Lead the development and enforcement of comprehensive, scalable security policies and frameworks. Recommend, implement, and optimize security protections across enterprise systems. Conduct and oversee vulnerability assessments, mitigation, and remediation strategies. Monitor and interpret threat intelligence using organizational tools. Research, identify, and deploy solutions that strengthen the organizations cyber defense posture. Detect, investigate, and resolve potential security breaches. Participate in the vetting and management of third-party vendors and business associates. Drive enterprise-wide risk assessments with quantifiable, business-aligned outcomes. REQUIRED QUALIFICATIONS : Bachelor’s Degree in Information Systems or related field or equivalent work experience 7 years of I.T. environment experience with progressive responsibilities 3+ years management experience in I.T. Expertise in risk assessment tools, methodologies, and data-driven decision-making Proficiency of security platforms such as: endpoint detection and response (EDR), internet traffic for both onsite remote users, and intrusion prevention (IDS/IPS/DLP) Knowledge of databases (MSSQL/MongoDB/MySQL) Advanced skills in Azure cloud including Purview and Defender Hands on experience in penetration testing and vulnerability management Knowledge of firewall and intrusion detection/prevention protocols Proven ability to lead system administration and security across diverse environments (Windows, UNIX, Linux) Skilled in drafting, enforcing, and scaling security policies, standards, and procedures Strong communicator who can translate complex security risks into actionable business terms for executives Ability to read and use the results of mobile code, malicious code, and anti-virus software PREFERRED QUALIFICATIONS: CISSP, CISM, or equivalent advanced certifications Knowledge of disaster recovery, computer forensic tools, technologies, and methods Strong understanding of software development frameworks and code review Knowledge of virtualization technology

Posted 30+ days ago

American Credit Acceptance logo
American Credit AcceptanceSpartanburg, South Carolina
Description American Credit Acceptance (ACA) is seeking a highly experienced and strategic Principal Security Architect to lead the design and implementation of secure architectures across our hybrid environment, including on-premise infrastructure, AWS, and Azure cloud platforms. This role will be pivotal in shaping our enterprise security posture, driving secure software development practices, and ensuring compliance with industry standards and regulatory requirements. Key Responsibilities Security Architecture Leadership Design and maintain enterprise-wide security architecture frameworks that support business objectives and risk management strategies. Lead the development of security reference architectures for cloud (AWS, Azure) and on-premise environments. Application Security Define and enforce secure coding standards and practices across development teams. Oversee the implementation and integration of DAST (Dynamic Application Security Testing) and SAST (Static Application Security Testing) tools into CI/CD pipelines. Collaborate with DevOps and engineering teams to embed security into the software development lifecycle (SDLC). Cloud Security Architect and implement security controls for AWS and Azure environments, including IAM, encryption, logging, and monitoring. Evaluate and integrate cloud-native security services (e.g., AWS Security Hub, Azure Defender). On-Premise Security Ensure legacy and hybrid systems are aligned with modern security standards. Lead risk assessments and remediation strategies for on-premise infrastructure. Governance, Risk & Compliance Align security architecture with NIST, ISO 27001, and other relevant frameworks. Support internal and external audits, and ensure compliance with regulatory requirements (e.g., SOX, HIPAA, PCI-DSS). Collaboration & Leadership Serve as a trusted advisor to executive leadership on security strategy and risk. Mentor junior architects and security engineers, fostering a culture of security-first thinking. Required Qualifications 10+ years of experience in cybersecurity, with at least 5 years in a security architecture role. Deep expertise in application security, including hands-on experience with DAST and SAST tools (e.g., Veracode, Fortify, Burp Suite). Proven experience designing secure architectures in AWS and Azure environments. Strong understanding of network security, identity and access management, encryption, and threat modeling. Familiarity with on-premise infrastructure and hybrid cloud models. Certifications such as CISSP, CCSP, AWS Certified Security – Specialty, or Azure Security Engineer Associate are highly desirable. Preferred Attributes Excellent communication and stakeholder management skills. Ability to translate complex security concepts into business-friendly language. Experience working in regulated industries or with compliance-heavy environments. EEO Statement ACA provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ACA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. California Privacy Notice As an employer of California residents, we are dedicated to protecting your privacy rights. Any personal information you provide during the application process will be used solely for permitted internal purposes and will be handled in accordance with applicable privacy laws. By applying to this position, you consent to the collection, use, and disclosure of your personal information as described in our Employee Privacy Notice . Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.

Posted 3 days ago

B logo
Bravera CareersBismarck, North Dakota
Bravera is hiring for an Information Security Analyst at any Bravera Bank location (MT, ND or MN). The Information Security Analyst supports the Information Security Officer (ISO) in safeguarding the bank’s information assets by assisting in the development, implementation, and monitoring of security policies, procedures, and controls. This role is critical in helping maintain the confidentiality, integrity, and availability of the bank’s information systems and data. In addition, this position will assist with performing audits for Bravera Holdings Corp. & Subsidiaries, remaining independent and objective while assessing compliance with controls, policies/procedures, and regulations. MEASURES OF SUCCESS: Contribution to successful regulatory or external audit outcomes. Security awareness training to prevent cybersecurity incidents. Attention to detail Strong Communication – written and verbal Willingness to learn, work independently, and ask questions DUTIES AND RESPONSIBILITIES: Assist the ISO in implementing and maintaining the bank’s information security program. This includes Information Security, Information Systems, Access Control, Incident Response Plan and Vendor Management Program. Assist with vendor risk assessments and third-party due diligence. (includes vendor risk assessment, due diligence, ongoing monitoring, proper documentation and reporting, and contracts) Ensure appropriate administrative, physical, and technical safeguards are in place to protect information assets from internal and external threats. Information Security Monitoring (Firewall, core system, internet banking platforms, etc.) Coordinate phishing simulations, security awareness campaigns, and training for security awareness month. Evaluate and recommend information security technologies to countermeasures against threats to information or privacy. Monitor, analyze and report on internal/external threats, cyber-crimes, and critical third-party vendor risks. Stay updated on the latest security trends and technologies to enhance the organization's security posture. Assist with annual access control review. Assist with Incident Response functional testing for appropriate staff. Assist with Information Technology Risk Assessments. Assist with CRI Profile, CIS Controls, and PCI compliance reviews/updates. Lead Clean Desk and Fedline Audit. Monitor Phishlabs, Information Security Committee & Abuse email accounts. Will assist with examinations of Federal Regulators, external and internal audits, and investigations of fraud as requested. (Including evidence collection and remediation tracking) Work with IT teams to ensure security measures are integrated into the organization's infrastructure. Must maintain a high level of confidentiality and professionalism regarding all employee and customer issues and information. The employee will adhere to all rules and regulations, including but not limited to the requirements of the Bank Secrecy Act. In addition, the employee will be proactive in the prevention of illegal activities, will vigilantly look for activities that may constitute any type of fraud including money laundering, and will report any suspicious activity to the BSA Officer. Will assist with special projects and new technology initiatives, as requested. Stay current on emerging threats, vulnerabilities, and regulatory changes. Contribute to the overall success of the organization. Responsibilities require a high degree of accuracy and strong communication skills. Earn and maintain the respect and trust of people. Display honesty, integrity, and morality. Must be able to efficiently organize work assignments in order to meet deadlines. SECONDARY DUTIES AND RESPONSIBLITIES: Create a monthly/quarterly fraud report. Will assist with internal audits and FDICIA Testing. QUALIFICATIONS (KNOWLEDGE, SKILLS AND ABILITIES): Education: Bachelor’s degree in Computer Science, Information Technology, Management Information Systems, Cybersecurity or related field (or equivalent experience). 2+ years of experience in cybersecurity, Information Security, or Information Technology (banking or financial services preferred). Familiarity with cybersecurity/regulatory frameworks such as FFIEC, GLBA, NIST, or CRI Profile. Obtain and keep current professional certification and training, as required. (Certified Community Bank Technology Officer, Certified Banking Vendor Manager) LOCATION: Any of Bravera's locations in Montana, North Dakota or Minnesota. BENEFITS: To support this, we provide a competitive and rewarding compensation package which includes a competitive salary, incentive compensation opportunities, retirement plan with company match, health insurance, paid holidays, paid time off (PTO), paid community volunteer time and stock opportunities. As a learning organization, we are committed to investing in the growth and development of our team members, offering training opportunities and tuition reimbursement. Our Values Give and earn trust. We support and empower one another to earn trust through accountable performance. Learn, teach and mentor. We are a learning organization that invests in growth and development. Collaborate and innovate. We work together to drive continuous improvement to enhance your experience. Want to learn more about careers with Bravera? Go to bravera.bank/careers. #ForgeYourPath with us! Find us on Facebook , Instagram , X , LinkedIn , Youtube , and Tik Tok. --- Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing or action, including an investigation conducted by the employer or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c).

Posted 1 week ago

Boeing logo
BoeingBerkeley, Missouri

$125,800 - $170,200 / year

Cybersecurity – Information System Security Manager (ISSM) Company: The Boeing Company Boeing Classified Cybersecurity is currently seeking a highly motivated Cybersecurity – Information System Security Manager (ISSM) to join the team in Berkeley, MO or Hazelwood, MO . The selected candidate will rely on cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSM is responsible for ensuring all Information System Security policies, standards, and directives are enforced to support assessment, authorization and continued operation of information systems processing classified information. This position will directly support the A-PX Program. Position Responsibilities: Perform security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards Lead and implement the Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF) for new and existing information systems Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acknowledgement Letters (RAL) and support Continuous Monitoring (CONMON) Supervise configuration management of assigned systems; auditing systems to ensure security posture integrity Lead staff with assessments and test/analysis data to document state of compliance with security requirements Conduct risk assessments and investigations, implement appropriate risk mitigations, and coordinate incident response activities Conduct periodic hardware/software inventory assessments Serve as organization spokesperson on sophisticated projects and programs Act as advisor to management and customers on sophisticated technical research studies Collaborate with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements Additional Responsibilities: Supervise the development and deployment of program information security for all program systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures Handle assigned team to facilitate effective execution of Risk Management Framework (RMF) Provide guidance and mentor to support team within Information Security Lead and perform security compliance continuous monitoring Coordinate and participate in security assessments and audits Prepare, review, and present technical reports and briefings Identify root causes, prioritize threats and recommend and/or implement corrective action Explore the enterprise and industry for evolving state of industry knowledge and methods regarding information security best practices Lead development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple partner organizations Basic Qualifications (Required Skills/Experience): Successfully completed Tier 5 Investigation (T5), formerly known as a Single Scope Background Investigation (SSBI) by the federal government within the last 5 years, or requires candidate to have been enrolled in a Continuous Vetting program within the last 5 years Ability to obtain access to Special Access Programs (SAP) Currently hold certification in good standing to satisfy IAM Level III (CISSP, GSLC, or CISM) 5+ years of experience with cyber security policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, CNSSI 1253, ICD-503, JSIG, or NIST SP 800 series 5+ years of experience working within Special Access Programs Preferred Qualifications (Desired Skills/Experience): 5+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs 5+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS 5+ years of experience assessing and documenting test or analysis data to show cyber security compliance Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies . Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $125,800 - $170,200 Language Requirements: Not Applicable Education: Not Applicable Relocation: This position offers relocation based on candidate eligibility. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position requires an active U.S. Top Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E – Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)

Posted 5 days ago

Leidos logo
LeidosAnnapolis Junction, Maryland

$131,300 - $237,350 / year

Leidos is seeking Information Security Professionals for programs in our National Security Sector's (NSS) Cyber & Analytics Business Area (CABA) . Our talented team is at the forefront in Security Engineering, Computer Network Operations (CNO), Mission Software, Analytical Methods and Modeling, Signals Intelligence (SIGINT), and Cryptographic Key Management. At Leidos , we offer competitive benefits , including Paid Time Off, 11 paid Holidays, 401K with a 6% company match and immediate vesting, Flexible Schedules, Discounted Stock Purchase Plans, Technical Upskilling, Education and Training Support, Parental Paid Leave, and much more. Join us and make a difference in National Security! Information Systems Security Officers (ISSO) and Information Systems Security Engineers (ISSE) will support our Leidos-led Prime Programs supporting the Ft. Meade, MD customer. Our work locations range from North and South Laurel, Columbia, Annapolis Junction, Linthicum and Ft. Meade, MD. ISSO Job Summary: The Information System Security Officer (ISSO) is integral to our mission of safeguarding our information systems. The ISSO collaborates with cross-functional teams to develop and maintain a robust security framework, protecting our systems against threats and vulnerabilities. This role requires a proactive approach to managing security policies, performing assessments, and supporting security authorization processes. Primary Responsibilities: Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies. Maintain the operational security posture for information systems to ensure policies, standards, and procedures are established and followed. Manage security aspects of information systems and perform daily security operations. Evaluate security solutions to ensure they meet requirements for processing classified information and perform vulnerability/risk assessments to support certification and accreditation. Provide configuration management for information system security software, hardware, and firmware, and manage changes to systems, assessing their security impact. Prepare and review security documentation, including System Security Plans (SSPs) and Assessment and Authorization packages. Manage and coordinate security authorization activities in accordance with Government regulations, Department of Defense and National Institute of Standards and Technology Risk Management Framework and standards, and customer-specific information security policies, processes, and procedures. ISSE Job Summary The Information Systems Security Engineer (ISSE) is crucial in designing, developing, and implementing secure information systems. The ISSE collaborates with architects and developers to integrate robust security measures into systems, ensuring they are resilient against threats and vulnerabilities. This role requires a deep understanding of security engineering principles and a proactive approach to risk management throughout the system lifecycle. Primary Responsibilities: Perform and review technical security assessments to identify vulnerabilities and ensure compliance with information assurance (IA) standards and regulations. Validate and verify system security requirements, establish system security designs, and integrate system security capabilities for various environments. Build cybersecurity into systems deployed to operational environments, ensuring uniform application of security policies and enterprise solutions. Assess and mitigate system security threats and risks throughout the program life cycle, contributing to security planning, assessment, risk analysis, and risk management. Apply system security engineering expertise in areas such as system security design, life cycle, risk management, and security testing, using industry system security engineering methodologies. Enforce the design and implementation of trusted relations among external systems and architectures and manage changes to systems while assessing security impact. Support security authorization activities in accordance with Government regulations, Department of Defense and National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) standards, and customer-specific information security policies, processes, and procedures. Basic Qualifications Bachelors Degree, candidates with out higher level education will be considered if they have extensive relevant ISSO or ISSE experience DoD 8570 Certification compliance related to level of position. This could include one or more of the following IAT II, IAM I, II or III or IASAE I, II or III: Security+ CE CISSP CASP+ CE ISSEP Five (5) or more years of experience as an ISSO or ISSE Five (5) or more years of experience with MD customer security suite Clearance Required: Must have an active TS/SCI with Polygraph. CONMD KQW If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares. Original Posting: January 17, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $131,300.00 - $237,350.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Posted 4 days ago

P logo
Point72 New York, NY

$300,000 - $350,000 / year

A CAREER WITH POINT72’S TECHNOLOGY TEAM As Point72 reimagines the future of investing, our Technology group is constantly improving our company’s IT infrastructure, positioning us at the forefront of a rapidly evolving technology landscape. We’re a team of experts experimenting, discovering new ways to harness the power of open source solutions, and embracing enterprise agile methodology. We encourage professional development to ensure you bring innovative ideas to our products while satisfying your own intellectual curiosity. The mission of our Information Security team is to ensure the development, implementation, and management of a comprehensive program that effectively protects the confidentiality, integrity, and availability of our information assets. Our team is comprised of security professionals with expertise in a diverse portfolio of security disciplines. WHAT YOU’LL DO As the Head of Security Operations, you will oversee and manage the information security operations of Point72. You will play a critical role in safeguarding our systems, networks, and data by proactively identifying and mitigating security threats.  Specifically, you will: •    Oversee a team of security professionals responsible for defending our global infrastructure, intellectual property, and sensitive data •    Manage our comprehensive threat monitoring strategy and 24/7 Security Operations Center (SOC), ensuring rapid detection and response to security events across our global infrastructure •    Lead cyber incident response for the firm, coordinating with internal stakeholders, technology partners, external incident handlers, and law enforcement  •    Direct our threat intelligence program reacting to and anticipating emerging threats targeting financial services.  Leverage threat intelligence by integrating actionable insights into threat hunts, detection mechanisms, vulnerability management, preventative controls, and tabletop exercises.  •    Manage threat hunting initiatives to proactively identify sophisticated adversaries that have evaded detection  •    Drive vulnerability operations program, ensuring timely remediation of prioritized security weaknesses •    Execute penetration tests to identify and treat findings to harden our infrastructure •    Continually enhance threat detection capabilities by tuning and introducing new detection alerts •    Conduct purple team exercises to introduce and test detection against simulated attacks.  •    Design and facilitate cybersecurity tabletop exercises that test our response capabilities against financial services-specific attack scenarios WHAT’S REQUIRED This role requires a deep understanding of information security principles, experience with incident response and the ability to lead a team of security professionals in protecting our firm's sensitive financial data and intellectual property. Specifically, you should have: •    Proven experience (10+ years) in leading security operations •    Strong knowledge of information security principles, practices, and technologies, including threat monitoring, threat intelligence, threat hunting,  vulnerability management, incident response, and security operations •    Experience with security monitoring tools, SIEM solutions, EDR platforms, and security incident response platforms •    Demonstrated experience leading penetration testing programs, interpreting results and managing remediation •    Experience designing and facilitating effective tabletop exercises for various security scenarios •    Familiarity with relevant regulatory frameworks and industry standards (e.g., SEC requirements, NIST Cybersecurity Framework, etc.) •    Excellent leadership and management skills, with the ability to inspire and motivate a team •    Strong analytical and problem-solving abilities, with keen attention to detail •    Excellent communication and collaboration skills, with the ability to effectively interact with stakeholders at all levels of the organization •    Commitment to the highest ethical standards •    Experience securing algorithmic trading environments and quantitative research platforms •    Knowledge of cloud security architecture and containerization security •    Understanding of data protection techniques for highly sensitive financial information We take care of our people We invest in our people, their careers, their health, and their well-being. When you work here, we provide: Fully-paid health care benefits Generous parental and family leave policies Mental and physical wellness programs Volunteer opportunities Non-profit matching gift program Support for employee-led affinity groups representing women, minorities and the LGBT+ community Tuition assistance A 401(k) savings program with an employer match and more About Point72 Point72 Asset Management is a global firm led by Steven Cohen that invests in multiple asset classes and strategies worldwide. Resting on more than a quarter-century of investing experience, we seek to be the industry’s premier asset manager through delivering superior risk-adjusted returns, adhering to the highest ethical standards, and offering the greatest opportunities to the industry’s brightest talent. We’re inventing the future of finance by revolutionizing how we develop our people and how we use data to shape our thinking. For more information, visit  www.Point72.com/working-here The annual base salary range for this role is $300,000-$350,000 (USD) , which does not include discretionary bonus compensation or our comprehensive benefits package. Actual compensation offered to the successful candidate may vary from posted hiring range based upon geographic location, work experience, education, and/or skill level, among other things.

Posted 30+ days ago

Curaleaf logo
CuraleafCutler Bay, FL
At Curaleaf, we’re redefining the cannabis industry with a strong commitment to quality, expertise, and innovation. As a leading global cannabis provider, our brands—including Curaleaf, Select, and Grassroots—offer premium products and services in both medical and adult-use markets. Join us at Curaleaf to be part of a high-growth, purpose-driven company that champions corporate social responsibility through our Rooted in Good initiative, supporting community outreach and positive change. Here, you’ll have the opportunity to make a meaningful impact, drive innovation, and help shape the future of cannabis. Title: Sr. Manager, Information Security Location: Las Vegas, NV - Scottsdale, AZ - Cutler Bay, FL Job Type: Full Time I Exempt About the Role: The Senior Manager of Information Security is responsible for leading Curaleaf’s application, data, and software security programs. This role ensures that security and privacy-by-design principles are embedded into all aspects of system architecture, development, and operations, aligning Curaleaf’s digital transformation strategy with global compliance and risk management objectives. The Senior Manager will provide strategic direction and day-to-day guidance to a cross-functional technical team, ensuring alignment with organizational goals and security best practices What You’ll Do: Minimum of Eight years hands on experience configuring and working with Information Technology Systems is preferred. Excellent problem-solving skills, ability to triage and resolve critical technical issues. Technical knowledge of mainstream operating systems and a wide range of security technologies, such as network security appliances, anti-malware solutions, automated policy compliance tools, and desktop security tools is preferred. Fundamental knowledge of network traffic alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms. Knowledge and understanding of current Information threats. Understanding of cyber security technologies & controls, processes, and threat landscape concepts. Drive team execution of secure development practices, threat modeling, and vulnerability management across applications and systems. What You’ll Bring: Ability to work collaboratively across multiple functions. Ability to prioritize and execute tasks. Understand Risk Management principles and the tools to ensure attention is brought to high-risk areas. Good communicator who is used to working in a dynamic environment. Solid attention to detail and ability to communicate that detail in summary form. Solid understanding in application security, cloud security, security operations, incident response and infrastructure security. Skilled in translating technical data into business impact information. Proven analytical and problem-solving abilities. Ability to lead, coach, and develop a high-performing team of security engineers and analysts to support Curaleaf’s security initiatives. What We Offer: Career Growth Opportunities Competitive Pay and Benefits Generous PTO and Parental Leave 401(K) Retirement Plan Life/ Disability Insurance Community Involvement Referral Bonuses and Product Discounts Benefits vary by state, role type, and eligibility. Follow us on Social Media: Instagram: @curaleaf.usa Twitter: @Curaleaf_Inc LinkedIn: Curaleaf LinkedIn Curaleaf Holdings, Inc. (TSX: CURA) (OTCQX: CURLF) ("Curaleaf") is a leading international provider of consumer products in cannabis with a mission to enhance lives by cultivating, sharing, and celebrating the power of the plant. As a high-growth cannabis company known for quality, expertise and reliability, the Company, and its brands, including Curaleaf, Select, Grassroots, JAMS, Find and Zero Proof provide industry-leading service, product selection and accessibility across the medical and adult-use markets. Curaleaf International is the largest vertically integrated cannabis company in Europe with a unique supply and distribution network throughout the European market, bringing together pioneering science and research with cutting-edge cultivation, extraction, and production. Home | Curaleaf | Cannabis with Confidence Our Vision: To be the world's leading cannabis company by consistently delivering superior products and services and driving the global acceptance of cannabis. Our Values: Lead and Inspire. Commit to Win. ONE Curaleaf. Driven to Deliver Excellence. Curaleaf is an equal opportunity employer. Curaleaf recruits, employs, trains, compensates, and promotes regardless of race, religion, color, national origin, gender identity, sexual orientation, physical ability, age, veteran status, and other protected status as required by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Individuals adversely impacted by the war on drugs are encouraged to apply. Current Curaleaf employees should apply for open positions through our Internal Job Board, which can be accessed via the link on The Leaf.

Posted 30+ days ago

Sony Pictures Entertainment logo
Sony Pictures EntertainmentCulver City, California

$115,000 - $150,000 / year

The Information Security organization at Sony Pictures Entertainment is responsible for protecting our content, systems, and data from being stolen, damaged, or destroyed. To do so, we are continuously improving our tools, capabilities, and processes to stay ahead of evolving threats. The Manager, Information Security Productions is accountable for operationalizing the Information Security Productions program across all SPE U.S. productions. This includes driving consistent implementation of approved security standards, tools, and controls; ensuring data-driven visibility into production security risk; and supporting compliance and readiness reporting to leadership. Success in this role requires strong cross-functional collaboration across Information Security, IT, S3, and production teams to embed security into creative workflows without friction, while ensuring protection of SPE’s most valuable assets—our stories and intellectual property. This role will also ensure program consistency with regional and global counterparts, contribute to automation and standardization of key controls, and support ongoing improvement of information security for productions practices across the production lifecycle. Key indicators of success in this role will be: Business leaders have near real-time visibility into production information security risk using meaningful, actionable metrics that drive timely and effective decision-making. Consistent application of approved tools, workflows, and controls across productions, ensuring compliance and readiness reporting aligns with studio KPIs. Production teams trust SPE to provide a secure, highly available, and easy-to-use digital production environment that safeguards our content and data. Information Security, Physical Security, and IT operate as unified partners to protect SPE productions from concept to archive. Within this organization, we value learning, agility, and collaboration. The Manager, Information Security Productions (CC, US) will be a key contributor to Sony Pictures Entertainment’s goal of being the most trusted studio in the industry. Responsibilities Provide visibility and actionable insight into Information Security risk across active U.S. productions. Monitor, analyze, and report on production security posture and key control performance metrics for each production. Partner with global InfoSec, Risk, Threat Intelligence, Incident Response, Training, and Governance teams to align production needs with enterprise programs. Prepare and present dashboards and reports on security trends, compliance status, and improvement opportunities. Support the development of production-specific metrics and KPIs to measure control effectiveness. With IT and Physical Security, maintain security controls in place for productions to most effectively meet our business goals. Operationalize the Production Information Security Program across U.S. productions. Ensure consistent implementation of approved security tools, policies, and workflows within productions. Coordinate adoption of automated controls with productions, such as provisioning, watermarking, and access telemetry. Support the standardization and scalability of production security practices across production titles and business units. Ensure and track production security culture, awareness, and response readiness. Amplify the reach of security training and awareness initiatives by coordinating rollout to productions, ensuring consistent messaging and participation tracking. Gather feedback from productions to help refine information security for productions training and awareness efforts. Partner with Incident Response to ensure clear communications, timely follow-up, and closure of corrective actions. Track cultural and operational readiness indicators (e.g., onboarding rates, reporting engagement, post-incident improvements) to measure program maturity and continuous improvement. Qualifications 5+ Years of experience in Information Security, Information Technology or a related field 5+ Years of experience in an organization directly involved in movie, television and/or other entertainment production, or equivalent educational experience. Bachelor’s degree preferred Strong understanding of the technologies, tools and processes used in production of movies and/or television. Knowledge of Information Security frameworks, standards and best practices and their relevance to business success Specific knowledge of processes, tools and practices used to maintain confidentiality in the context of movie and television productions. Ability to develop and maintain meaningful metrics to track program and process effectiveness. Strong planning and analytical skills Strong communications skills The anticipated base salary for this position is $115,000-$150,000. This role may also qualify for annual incentive and/or comprehensive benefits. The actual base salary offered will depend on a variety of factors, including without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location of the position. Sony Pictures Entertainment is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, age, sexual orientation, gender identity, or other protected characteristics. SPE will consider qualified applicants with arrest or conviction records in accordance with applicable law. To request an accommodation for purposes of participating in the hiring process, you may contact us at SPE_Accommodation_Assistance@spe.sony.com.

Posted 2 weeks ago

Ingram Micro logo
Ingram MicroFort Worth, Texas

$84,500 - $143,700 / year

Accelerate your career. Join the organization that's driving the world's technology and shape the future. Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to business-to-business technology experts. Our market reach, diverse solutions and services portfolio, and digital platform Ingram Micro Xvantage™ set us apart. Learn more at www.ingrammicro.com Come join our team where you’ll make technology happen in surprising ways. Let’s shape tomorrow - it’ll be a fun journey! We have the flexibility of hiring this role in 3 markets: Irvine-CA, Dallas/Fort Worth-TX and Carol Stream, IL. The role has the opportunity to work up to two days remote per week. The Sr Information Security Compliance & Audit Analyst will report to our Sr Manager of Quality and will be part of the OpEx compliance team. The Analyst will support global activities as they relate to ISO27001, ISO9001 and ISO14001. You will be responsible for providing subject matter expertise in ISO27001 Information Security regarding compliance requirements. In addition, implementing, maintaining and improving the Information Security Management System at a corporate level for Ingram Micro facilities across North and Central America. The Information Security Compliance & Audit Analyst will perform and lead complex compliance reviews, within the IT audits including network, internet, applications, telecommunications, security administration, and contingency planning. Assess risks, develops detail audit/compliance programs, execute audit/compliance programs steps, analyses result and effectively communicates results to senior management. Your role: Manage and Support IT compliance activities for regional information security support of ISO27001 auditing, reporting and remediation where appropriate. Coordinate and communicate IT compliance activities to align with Global Information Security leadership in support and improvement of ISO27001 management system. Ensure regional Information Security compliance to Information security standards (ISO27001) requirements Plan and conduct complex IS and integrated audit/compliance projects, including preparation of an objective risk-based assessment and an effective audit/compliance approach. Leads and/or participates on audit/compliance activities of various locations and departments for compliance with plans, policies and procedures. Execute operational activities to support IS audit and compliance activities including technical validation processes. Execute collection of evidence to support compliance status Provide and present reporting including monthly metric delivery Manage escalation and enforcement for unresolved noncompliance issues Manage and Support External Audit activities and reporting Work with Information Security staff to ensure tools and reporting mechanisms are satisfactorily meeting statutory objectives Support compliance and security validation of all 3rd party IT providers Maintain strong working relationships with internal and external support teams including Global, Regional and Country Information Security associates Work on special projects as required by management Stay abreast of changes within the Information Security compliance areas including business change requirements and regulatory changes from an international perspective Support and enforce Information Security Policy, Standards, and Guidelines for business operations and technology implementations Work as the Subject Matter Expert (SME) on assigned projects and offers council regarding the intent of Compliance requirements What you bring to the role: Bachelor’s degree in computer science, engineering, or related science and math discipline with an information security or business emphasis is required. A minimum of 5 years of experience with IS compliance projects (specifically ISO27001) Understands key security concepts such as access management, vulnerability and patch management, security information event management, and encryption Strong understanding of TCP/ IP and other network protocols Understanding of the basic audit best practices, standards and methodologies Ability to formulate detailed technical documentation preferred ASQ Certified Engineer, Auditor or OE Managers preferred Experience using SharePoint, MS Excel, Word, PowerPoint and Visio Must possess a valid passport and be legally allowed to leave and return to originating country. Attributes we look for: The ability to work independently and in cross functional teams Actively looks for opportunities to develop new ideas to positively impact existing methods, services, or products. Understands, analyzes, and documents cost/benefit analysis where appropriate. Actively accepts individual and team responsibilities and meet commitments. Takes responsibility for own performance and actions and demonstrates responsibility and teamwork towards overall team/department goals. Ability to multi-task and work on projects concurrently and under tight deadlines Must be detail oriented and customer focused with excellent time management skills Takes and exhibits initiative to further develop technical and professional skills, by attending training and/or willingness to learn new systems or technologies in use by the Information Systems department. Possesses understanding of Ingram Micro’s business including knowledge of department names and business processes conducted by each, company global organization, and key customer and vendor segments. Behavorial Competencies: Communication Excellent verbal, written and inter-personal communication skills Strong communication skills; capable of explaining technical issues simply both verbally and in writing Keeps his/her manager informed of any problems, challenges, or unanticipated events affecting his/her work. Listens respectfully and avoids interrupting. Expresses ideas and suggestions in an organized and concise manner both orally and in written form. Solicits and readily accepts constructive feedback. Maintains composure when addressing an adversarial or hostile audience. Decision Making Researches and collects appropriate data points for effective decision making. Readily makes recommendations and includes necessary documentation and material to support conclusions. Develops Innovative Practices Identify, develop and manage innovative ideas and solutions to problems. Identify opportunities to reduce inefficiencies in work processes. Recognizes when it is appropriate to challenge the status quo and when it is not. Works as a Team Member Supports team decisions to implement changes, suggestions, improvements, and solutions. Encourages and supports the exploration and application of best practices. Offers assistance to others and shares information regardless of personal likes or dislikes. Acts with Integrity & Respect Prevents personal conflicts from interfering with his/her objectivity. Consistently arrives on time for meetings and appointments. Accepts responsibility for the results of his/her decisions and actions. Behaves in a way that is consistent with Ingram Micro’s values. #LI-Hybrid #LI-AH1 The typical base pay range for this role across the U.S. is USD $84,500.00 - $143,700.00 per year. The ranges above reflect the potential annual base pay across the U.S. for all roles; the applicable base pay range will depend on the candidate’s primary work location, pay grade, and variable compensation plan. Individual base pay within each range depends on various factors, in addition to primary work location, such as complexity and responsibility of role, job duties/requirements, and relevant experience and skills. Base pay ranges are reviewed and typically updated each year. Offers are made within the base pay range applicable at the time of hire. New hires starting base pay generally falls in the bottom half (between the minimum and midpoint) of a pay range. At Ingram Micro certain roles are eligible for additional rewards, including merit increases, annual bonus or sales incentives and long-term incentives. These awards are allocated based on position level and individual performance. U.S.-based employees have access to healthcare benefits, paid time off, parental leave, a 401(k) plan and company match, short-term and long-term disability coverage, basic life insurance, and wellbeing benefits, among others. This is not a complete listing of the job duties. It’s a representation of the things you will be doing, and you may not perform all these duties. Please be prepared to pass a drug test and successfully pass a pre-employment (post offer) background check. Ingram Micro Inc. is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, veteran status, or any other protected category under applicable law.

Posted 30+ days ago

CACI logo
CACIAnnapolis Junction, Maryland

$103,800 - $218,100 / year

Information Systems Security Manager – Level 2Job Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: TS/SCI with PolygraphEmployee Type: RegularPercentage of Travel Required: NoneType of Travel:* * * The Opportunity: We are seeking a highly skilled and experienced professional to provide comprehensive management support for an organization's Information Assurance (IA) program. The ideal candidate will play a key role in ensuring the security of information systems by overseeing the proposal, coordination, implementation, and enforcement of security policies, standards, and methodologies. Responsibility: The candidate will be responsible for managing the operational security posture of an Information System, ensuring compliance with established policies, procedures, and standards. In this role, the candidate will work closely with Information System Security Engineers (ISSEs) and Information System Security Officers (ISSOs) to evaluate security solutions and assess their effectiveness in protecting classified information. The candidate will also manage vulnerability and risk assessments, as well as contribute to security authorization activities, including preparation and review of critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, and Certification and Accreditation (C&A) packages. The successful candidate will oversee configuration management (CM) processes, ensuring that security software, hardware, and firmware are up-to-date and secure. Additionally, they will be responsible for assessing the security impact of system changes and providing support in line with the Risk Management Framework (RMF) and DoD Information Assurance Certification and Accreditation Process (DIACAP). This position offers a unique opportunity to make a significant impact on the overall security of critical information systems and ensure compliance with all regulatory and security requirements. Qualifications: Required: Current Active TS/SCI with POLY Ten (10) years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Bachelor's degree in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required. In lieu of a Bachelor’s degree, an additional four (4) years of work-related experience may be substituted. DoD 8570 compliance with IAM II is required. Following certifications qualify: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, HCISPP Desired: Familiarity with Network Security Services and Chief Information Security Officer processes and procedures. This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you’ll be part of a high-performing group dedicated to our customer’s missions and driven by a higher purpose – to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You’ll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground — in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here . The proposed salary range for this position is: $103,800 - $218,100 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.

Posted 1 week ago

Geisinger logo
GeisingerDanville, Pennsylvania
Location: Geisinger Medical Center (GMC) Shift: Days (United States of America) Scheduled Weekly Hours: 40 Worker Type: Regular Exemption Status: No Job Summary: The Health Information Management (HIM) Health Records Analyst manages patient data within the healthcare facility, ensuring the accuracy, organization, and security of health records. Additionally, this position provides reasonable assurance to the organization that patient care and satisfaction remain a priority within the day-to-day operations. This is achieved by compiling, processing, maintaining, and sustaining medical records of hospital and clinic patients in a manner consistent with medical, administrative, ethical, legal, and regulatory requirements of the healthcare system. Job Duties: Learns the fundamentals of health records and health information management (HIM). Learns the terminal digit order filing system to appropriately locate historical paper and microfilmed medical records as requested. Develops a general understanding of Epic Chart Desk. Develops an understanding of policies/procedure documented in the systems policy repository specific to job role. Processes health records as applicable (i.e. paper medical record scanning, adoption cases, chart destruction/retention, unidentified patient assignment/merges, date of death processing, medical record assignment, etc.). Answers phone calls, satisfies requests, and relays messages as associated with the role. Develops an understanding of scanning methodologies (ex. HIM scans, Fax Image Management System (FIMS), Clinic scanning etc.). Develops a familiarity of all areas of HIM/locations and the role each team plays. Learns what a duplicate medical record is, how to identify/report, etc. General understanding of chart corrections, to appropriately direct callers and assist as needed. Work is typically performed in an office environment. Accountable for satisfying all job specific obligations and complying with all organization policies and procedures. The specific statements in this profile are not intended to be all-inclusive. They represent typical elements considered necessary to successfully perform the job. * Relevant experience may be a combination of related work experience and degree obtained (Associate’s Degree = 2 years; Bachelor’s Degree = 4 years) Position Details: Education: High School Diploma or Equivalent (GED)- (Required) Experience: Certification(s) and License(s): Skills: Communication, Data Entry, Flexibility, Medical Records Management, Medical Records Systems, Teamwork, Working Independently OUR PURPOSE & VALUES: Everything we do is about caring for our patients, our members, our students, our Geisinger family and our communities. KINDNESS: We strive to treat everyone as we would hope to be treated ourselves. EXCELLENCE: We treasure colleagues who humbly strive for excellence. LEARNING: We share our knowledge with the best and brightest to better prepare the caregivers for tomorrow. INNOVATION : We constantly seek new and better ways to care for our patients, our members, our community, and the nation. SAFETY: We provide a safe environment for our patients and members and the Geisinger family. We offer healthcare benefits for full time and part time positions from day one, including vision, dental and domestic partners. Perhaps just as important, we encourage an atmosphere of collaboration, cooperation and collegiality. We know that a diverse workforce with unique experiences and backgrounds makes our team stronger. Our patients, members and community come from a wide variety of backgrounds, and it takes a diverse workforce to make better health easier for all. We are proud to be an affirmative action, equal opportunity employer and all qualified applicants will receive consideration for employment regardless to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or status as a protected veteran.

Posted 30+ days ago

ECP logo

Director of Information Security

ECPMadison, WI

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

ECP is a market-leading SaaS software solution that enables senior living communities to better care for their residents. ECP is used in over 8,000 communities. We're looking to further expand by increasing the number of customers that use our software and increasing the scope of how we serve our customers by developing and releasing new products.

ECP is seeking a Director of Information Security to lead and execute our cybersecurity and compliance strategy. This is a hands-on role responsible for ensuring the confidentiality, integrity, and availability of our systems and customer data within the context of healthcare regulations (HIPAA) and SOC 2 Type II compliance.

The ideal candidate brings a blend of technical expertise, regulatory understanding, and practical execution, partnering closely with our Infrastructure and IT teams to strengthen our security posture across the company. You’ll manage annual audits, harden systems, guide best practices, and foster a culture of security awareness.

This position reports to the VP of Engineering and collaborates cross-functionally with DevOps, Infrastructure, Compliance, and IT.

Note: We are open to remote candidates located in the U.S.

Cybersecurity:

  • Develop and execute ECP’s information security strategy, aligned with business goals and risk tolerance.
  • Maintain and evolve SOC 2 Type II compliance, including evidence gathering, documentation, and audit coordination.
  • Ensure compliance with HIPAA and other healthcare data protection standards.
  • Establish, implement, and maintain security policies, procedures, and standards consistent with regulatory and customer expectations.
  • Manage third-party risk and vendor security assessments.
  • Lead the incident response program, including detection, investigation, communication, and remediation.
  • Oversee vulnerability management, penetration testing, and security monitoring.
  • Partner with Infrastructure and DevOps teams to secure servers, cloud environments (AWS/Azure), and CI/CD pipelines.
  • Integrate secure development lifecycle (SDLC) practices into engineering workflows.
  • Stay current on emerging security threats, technologies, and frameworks, and advise leadership accordingly.

IT & Platform Security:

  • Collaborate with internal IT to harden employee laptops and mobile devices, ensuring encryption, endpoint protection, and compliance with policy.
  • Manage and optimize the company’s mobile device management (MDM) platform.
  • Support and guide internal IT in maintaining secure onboarding/offboarding and access management processes.
  • Coordinate internal penetration testing efforts and develop recommendations for infrastructure hardening.
  • Assist with network and system security, including identity management and monitoring.
  • Develop and lead employee security and HIPAA awareness training programs.
  • Maintain visibility into and tracking of vulnerabilities and remediation efforts.

Requirements

  • Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent experience).
  • 5+ years of experience in information security, infrastructure security, or a related role.
  • Prior experience in a SaaS or healthcare technology environment required.
  • Demonstrated experience leading SOC 2 Type II audits and ensuring HIPAA compliance.
  • Strong understanding of AWS cloud security, identity and access management, and data protection best practices.
  • Hands-on experience with endpoint management, laptop hardening, and mobile device management (MDM) tools.
  • Strong troubleshooting, analytical, and problem-solving skills.
  • Excellent communication skills with the ability to work effectively across technical and non-technical teams.
  • Ability to thrive in a collaborative, fast-paced environment.
  • Preferred:
    • Certifications such as CISSP, CISM, CISA, Security+, or HCISPP (Healthcare Information Security & Privacy Practitioner).
    • Familiarity with frameworks such as NIST CSF, CIS Controls, or ISO 27001.
    • Experience scripting or automating security tasks (Python, PowerShell, Bash).

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall