landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Senior Information Systems Security Officer (ISSO)-logo
Independent SoftwareAnnapolis Junction, MD
What you will be doing! As a Senior Information Systems Security Officer (ISSO), your role will be essential in safeguarding our information systems. You will work closely with cross-functional teams to develop and maintain a strong security framework that protects our systems from threats and vulnerabilities. This position demands a proactive approach to managing security policies, conducting assessments, and supporting security authorization processes. Responsibilities Support the information assurance program for the program, organization, system, or enclave. Assist in proposing, coordinating, implementing, and enforcing security policies, standards, and methodologies for information systems. Maintain the operational security posture of an information system or program, ensuring compliance with established security policies, standards, and procedures. Manage the security aspects of the information system and perform daily security operations. - Evaluate security solutions to verify that they meet the necessary requirements for processing classified information. Conduct vulnerability and risk assessments to support certification and accreditation efforts. Provide configuration management (CM) for information system security software, hardware, and firmware. Manage changes to the system and assess the security impact of those changes. - Prepare and review documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assist with security authorization activities in compliance with the Information System Certification and Accreditation Process (NISCAP) and the DoD Risk Management Framework (RMF). Experience and Education:  A Bachelor of Science degree in Computer Science, Information Assurance, Information Security, or a related discipline, along with 12 or more years of relevant experience. A minimum of 7 years of experience as an ISSO supporting Intelligence Community (IC) or Department of Defense (DoD) programs and contracts of similar scope, type, and complexity. Compliance with DoD 8570 standards at IAM Level II or IAT Level III (such as CASP, CISSP, or Associate). Clearance Required:   Must possess an active TS/SCI with Full Scope Polygraph security clearance to be considered for this role Independent Software is an Equal Opportunity Employer EOE, M/F/D/V. Powered by JazzHR

Posted 3 weeks ago

MuleSoft Developer - Information Systems Specialist I-logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:        MuleSoft Developer – Information Systems Specialist I Division:         Systems & Programming Union:             IFT Location:        501 S 2 nd St, Springfield, IL – Sangamon County Salary:            Range $5,761 to $10,719 monthly – commensurate with experience Benefits:         https://cms.illinois.gov/benefits/stateemployee.html Overview: Analyzes, designs, implements and tests customized software applications. This position will have a strong knowledge of software development and design and will have experience working to develop business-critical applications.  Java development and concepts, including debugging against Java APIs using a JAVA IDE (Eclipse, IntelliJ, NetBeans).   JEE Application Servers and Containers (administration, deployment, and/or development in Tomcat, JBoss, WebSphere, Spring, etc.). Proficient in SOAP and/or Web Services. Duties and Responsibilities: Use Anypoint Platform to discover, design, build, deploy, manage, and govern APIs. Designs, develops, and maintains complex applications Develops unit tests and provides code coverage to accurately test business logic and functionality Participates in developing specifications such as user stories and designs Solves or recommends solutions for complex issues and problems Assist in the development of logical and physical specifications Documents designs, issues, solutions, tips & tricks as needed Fosters a team approach to software development and delivery Stays current in new IT technologies to maintain a high level of subject matter expertise. Connect to databases, files, web services, Software as a Service (SaaS) applications, JMS queues, and more. Harness DataWave to add application logic, handle errors, and transform data. Structure applications to facilitate development and deployment. Provide operational support for software deployments and production incident response Performs other duties as assigned or required. Required Qualifications: Requires knowledge, skill, and mental development equivalent to the completion of two years of college with coursework in the computer science field OR 2.5 years of technical systems and/or programming experience as would be gained as an Information Systems Technician OR any equivalent combination of education and experience and/or IT project management. Requires a valid Illinois Driver’s License. Requires the ability to lift and carry up to 50 lbs. Preferred Qualifications: Expertise in several areas including cloud computing, API integration, cloud messaging, ground ‐ to- cloud connectivity, and highly scalable distributed systems. 2+ years of experience in Java development and concepts, including debugging against Java APIs using a JAVA IDE (Eclipse, Intelli J, Netbeans). 2+ years of experience with JEE Application Servers and Containers (administration, deployment, and/or development in Tomcat, JBoss, WebSphere, Spring, etc.) Experience with SOAP and/or Web Services. Experience with MuleSoft Anypoint Platform developing MuleSoft integrations and customizations. Experience working with RAML using MuleSoft. 2+ years of relevant consulting or industry experience. Solid understanding of the design patterns. Experience with XML, JMS, WS and SOA/Integration technologies. Experience using Maven. Experience profiling Java applications including threading issues and examining thread dumps. Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 3 weeks ago

L
Lawelawe Defense IncBethesda, MD
Who We Are Lawelawe is a Native Hawaiian Owned Small Disadvantaged Business (NHO SDB) that specializes in providing a range of services to federal government clients, including program management, digital solutions, human capital and training. Lawelawe leverages our NHO status to secure federal contracts that not only drive business success but also support our overall mission to uplift economically disadvantaged Native Hawaiian families and preserve the Native Hawaiian heritage.  You Are An experienced Information System Security Officer (ISSO) with a laser focus on protecting sensitive systems and ensuring regulatory compliance in high-stakes environments. You thrive on solving complex security challenges, translating policies into actionable security procedures. You are agile and strategic while managing daily security operations, responding to incidents under pressure, and contributing to long-term cybersecurity planning. How You Will Make an Impact You’ll serve as a key security authority and trusted advisor, helping secure sensitive systems and fortify the network from evolving threats. Shaping and enforcing Information Assurance policies, supporting ATO processes from start to finish, ensuing the operation of vulnerability management programs. Responsibilities Participate in various aspects in developing and writing certification and accreditation (C&A) documentation packages included in the process of helping an organization/agency obtain an Authority to Operate (ATO) on its systems and/or environment. Follow National Institute of Standards and Technology (NIST) and/or Department of Defense IA Certification and Accreditation Process standards in performance of job functions. Manage or take part in the MTF Information Assurance Vulnerability Management (IAVM) program, which requires disseminating, coordinating, validating, reviewing, guiding, data entry, training, and monitoring compliance data provided or available to/from DoD and MHS. Use DoD and MHS approved vulnerability assessment and mitigation tools to identify vulnerabilities, apply mitigation, and to identify potential areas of weaknesses in the IA programs. Identify security problems and requirements through studies, analysis, and research. Responsible for disseminating information, policies, procedures, and/or guidance to superior and subordinate units and for the management of tasks and requirements for MTF. Respond to reported security breaches, violations of rules, regulations, policies, procedures, and   codes of conduct and takes appropriate action to minimize harm, investigate, evaluate, track, and report incidents. Manage the security of the information system that is slated for Certification & Accreditation (C&A). Support the information system owner/information owner for the completion of security-related responsibilities. Advise system changes and impact. Provide view on the continuous monitoring of the information system. Assess security events to determine impact, develop and execute corrective action plans, and make recommendations to management for corrective long-term preventive solutions to avoid recurrence. Monitor and audits installed software and hardware tools for signs of suspicious activity leading to potential security events. Responsible for the implementation, maintenance, and proliferation of new technologies meant to enhance the overall network security posture. Develop and implements technical programs to ensure that users adhere to systems security policies and procedures. Ensure access to computer applications, operating systems, and other stored programs and data is limited to those personnel authorized for such access. Review and design systems software routines to facilitate security processes. Works with other Information Technology (IT) Specialists and participates in operational teams. Assign work to team members, tracks work completion, and assesses effectiveness and efficiency of work performed. Assist with customer ticketing system assignments and meets SLA Elevate difficult assignments to senior IA managers as needed. May be required to respond to support nights or weekends to fulfill department related duties or be required to be placed on an on-call schedule for duties as directed/needed by command, directorate, or department. The Team Lawelawe Defense Inc ("LDI") is an SBA Certified 8(a) Native Hawaiian Owned (NHO) SDB. Lawelawe Defense offers an outstanding record of delivery on various projects encompassing: Program and Portfolio Management; Systems Engineering and Architecture; Network Engineering and Operations; Data Center Optimization and Operations; Desktop/Server and Application Virtualization. Here's What You Need Minimum of 6+ years of experience demonstrating the required proficiency as an Information Security Officer Bachelor’s degree and/or equivalency Active Secret Security Clearance required Must possess an IAT III certification  (CCNP Security,CISSP (or Associate), GCED, GCIH, CCSP) Must be a U.S. Citizen Excellent verbal and written communications skills Knowledge of databases, spreadsheets and report writing Ability to adapt to a consistently changing environment. Experience with various tools such as: SPLUNK, PowerShell, ACAS, NESSUS, Siphon, and other tools used within the DoD and MHS environment. Knowledge of APL list, eMASS, CSTARS, and other DoD sites for cybersecurity system management. Strong knowledge of technical domain data requirements, system architecture, sensor/data sources. Experience with applying STIGS Strong knowledge of DoD and applicable service or agency security policies, manuals, and standards. Knowledge of processes in controlling, labeling, virus scanning, auditing tools, and secure data transfer between information systems. Bonus Points If You have prior experience supporting a DoD environment.   The above job description is intended to describe the general nature and level of work being performed by individuals assigned to this position. It is not intended to be an exhaustive list of all responsibilities, duties, and skills required. Candidates possessing the necessary qualifications for the position will be considered. Lawelawe Defense Inc is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status, and will not be discriminated against on the basis of disability. Offers of employment are contingent upon satisfactory completion of a comprehensive background verification, inclusive of a criminal record check. Employment may be subject to other background checks, as required by the position. Powered by JazzHR

Posted 3 weeks ago

I
Infovisa, Inc.Cornelius, NC
Location: Cornelius, NC                                          FLSA Status: Exempt Immediate Supervisor:  CISO Date Revised:  February 18, 2025 Position Summary: The Information Security Manager is a hands-on/ working manager position that defines, implements and monitors security policy for on-prem, cloud, and remote access deployments.  The primary duty of the job is to maintain a security posture that allows the business to thrive while preventing a security breach. The IS Manager hires, retains, and trains an IS Engineer to assist with day-to-day duties. The IS team maintains on-premises firewall rules and active directory as well as overseeing vulnerability management.  In the cloud, the IS Manager is responsible for designing security measures, and the IS team is responsible for their implementation and monitoring.  The IS team also designs, implements, and maintains a remote access VPN for associates when working outside the corporate offices. Essential Functions : Demonstrate an understanding of all applications deployed, and data stored within the enterprise. Demonstrate an understanding of security measures that are in place and their role in securing the enterprise. Assess the threat of zero-day vulnerabilities and third-party risk to the enterprise.  Take action to remediate such vulnerabilities.  Effectively report status to executive management in terms of the threat level and associated risk. Assess risks related to general threat landscape.  Identify, design and implement controls to mitigate those threats and prevent security breaches. Measure, monitor, and report on vulnerabilities that have been identified within the enterprise. Maintain on-premises firewall rules; maintain cloud security settings and restrictions; maintain remote access rules and restrictions. Identify new security related vendors as needed and assist in evaluating new and existing vendors from a security perspective. Participate and communicate effectively in external audits, third-party vulnerability scans, and regulatory examinations. Maintain, comply with, and develop Infovisa’s policies, procedures, and strategies to provide a safe and efficient environment for Infovisa software to run and associates to work. Liaison with IT-ISAC, InfraGard, and other industry groups. Manage projects and create detailed technical documentation. Hire, train, mentor and manage associates on the security team.  Qualifications: 10 years of information security experience required. Three years of management experience. Displays strong technical aptitude with IT Security, VPN, Endpoint Detection and Response, IIS, networking concepts and technologies, and other third-party and internally developed tools and technologies. Prefer familiarity with Check Point technologies. Prefer one or more applicable network security certifications. Valid driver’s license. Four-year degree in information technology / systems, or computer science. Preferred Talents: Analytical and detailed. Effective communicator technically, in the board room, and with customers and coworkers. Organized. Independent with good judgment. Proven ability to multitask and prioritize projects. Self-directed and takes initiative. Working Environment: Mostly indoor work with occasional exposure to outdoor elements or hazards. Medium workload – lifting and/or carrying up to 20 pounds frequently and exerting up to 75 pounds of force occasionally.  Some travel required. Weekend, evening and on-call.     About Infovisa Infovisa is a leading provider of financial technology solutions delivered to forward-thinking trust, wealth management, and retirement professionals.  Infovisa’s solutions empower its clients to acquire new customers, invest assets effectively, manage trust and investment portfolios efficiently, and flexibly report results to customers.  For more information about Infovisa, visit www.infovisa.com .  Follow us on LinkedIn . We are interested in every qualified candidate who is lawfully eligible to work in the United States.  However, we are unable to sponsor visas. Infovisa, Inc. is an Equal Opportunity Employer. Powered by JazzHR

Posted 3 weeks ago

Command Information & Engagements Manager-logo
rockITdataFredrick, MD
Driven by Innovation and built on Trust, rockITdata is a unique SDVOSB services company that partners with leading commercial healthcare/life sciences organizations on cutting edge innovations - think AI, automation and data transformation. We then bring those commercially tested solutions to government entities to deliver predictable, measurable impact for the American taxpayer and consumer. We are seeking a highly organized, detail-oriented Command Information & Engagements Manager to lead the planning, coordination, and execution of high-profile visits, engagements, and strategic communications initiatives. This role works closely with senior leadership, internal stakeholders, and subject matter experts to deliver seamless experiences for distinguished visitors, while maintaining a consistent and professional public-facing image. This full-time position is in-person and located in Fredrick, MD.  Key Responsibilities:    Organize and manage requests and invitations for senior-level command visits in coordination with the PAO and leadership.  Design visit agendas, secure venues, and identify programs, products, and capabilities to be showcased.  Conduct research, solicit input from stakeholders, perform strategic analyses, and recommend initiatives to achieve organizational objectives.  Develop and manage command taskers, serving as the point of contact for the tasking system.  Coordinate communications between customers and SMEs, tracking progress from initial engagement to final outcome.  Prepare and distribute official correspondence such as invitations, agendas, registration forms, lodging details, and event reminders.  Plan and manage meetings and events, including securing space, coordinating vendors, managing attendee communications, and providing on-site support for registration, check-in, and protocol.  Oversee pre-visit preparation, day-of-event execution, and post-event wrap-up.  Develop talking points and presentation materials in collaboration with the PAO.  Draft and post social media content related to visits and engagements.  Assist in creating invitation lists, preparing name tags, takeaway materials, and hospitality arrangements.  Provide support for conferences and trade shows.  Maintain a visit calendar and manage after-action reports to capture lessons learned.  Generate and share original content related to DHA R&D-MRDC projects through social media and communication channels.  Supervise Strategic Communications, Marketing, & Multimedia Support Contract staff.  Support protocol functions as required.  Required Qualifications:  Bachelor’s degree in Communications, Public Affairs, Event Management, or a related field (or equivalent experience).  Proven experience in event planning, protocol, or senior-level engagement management.  Exceptional organizational skills with the ability to manage multiple projects simultaneously.  Strong interpersonal and communication skills, with the ability to interface with senior leaders and high-profile visitors.  Proficiency in Microsoft Office Suite; familiarity with event management tools a plus.  Experience drafting professional correspondence, agendas, and social media content.  Ability to work in a fast-paced environment, adapt to changing priorities, and maintain composure under pressure.  #LIRemote Here at rockITdata, we are committed to following our 10 Guiding Principles. Our Guiding Principles define our culture. They’re who we are, how we work, and what inspires us to be the best. We empower our people to be themselves and encourage an entrepreneurial way of thinking. In our challenging, fast-paced environment, no day is the same. Know the Why. Value People Above All Else. Transparency to a Fault. Progress, Not Perfection. Be Good by Doing Good. Smart People Can Disagree. Bend but Don’t Break. Represent Your Brand. Think Differently. Be Amazing, Be Fearless, Smile, Have Fun! Interested in joining something unique? Join us on our rockIT ship as we begin to blast off to the next chapter in our organization! rockITdata has become aware of a recruitment scam where unauthorized individuals are impersonating rockITdata recruiters, issuing fake job offers, and attempting to setup payment for the job seeker’s new hire costs. No one is ever required to complete any monetary transactions before starting employment with rockITdata. Legitimate rockITdata communications only come from @rockitdata.com email addresses and our official Applicant Tracking system, JazzHR (@applytojob.com email addresses). Please refer to our official Careers page at www.rockitdata.com/careers to accurately submit your application with us. You may also verify any suspicious communication by contacting our recruitment team directly through our official email, dreamjob@rockitdata.com. rockITdata is an equal opportunity employer and is committed to non-discrimination in all employment practices and decisions. All qualified applicants will receive consideration for employment without regard to disability status, veteran status or any characteristic protected by Federal, state, or local law. rockITdata wants all interested and qualified candidates to be able to use our career site to review and apply for employment opportunities. If you have a disability and need an accommodation to access the application process, please contact us for assistance at dreamjob@rockitdata.com. Powered by JazzHR

Posted 5 days ago

Web Systems Programmer - Information Systems Technician I-logo
Illinois Secretary of StateChicago, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:      Web Systems Programmer - Information Systems Technician I Division:       Systems and Programming Union:           IFT Location:      115 S LaSalle St, Chicago, IL - Cook County Salary:           Salary $4,865.00 monthly - commensurate with experience Overview: Performs independent systems programming and analysis of application programs for Internet applications provided by the Office of the Secretary of State; develops system scopes and objectives and prepares detailed program specifications; as a team member assists senior staff in designing, testing, programming debugging and preparing documentation; interprets and develops computer programs written in programming languages and environments such as, but not limited to Java,  JavaScript, JSP, HTML, CSS,XML, Eclipse, and RAD.  Duties and Responsibilities: Interprets and develops computer programs written in programming languages such as, but not limited to Java; writes scripting code, such as, but not limited to, JavaScript and JSP; writes and interfaces with HTML, CSS and XML technologies; works with integrated Development Environments such as Eclipse, RAD. Provides assistance to other Web programmers by the development, design, documentation and installation of internet applications/software; assists in the implementation and maintenance of Internet Web server systems; performs individual training for users on all Internet application software utilized by the office. Exercises good interpersonal skills in assisting customers in resolving problems related to Internet application software for all departments within the Secretary of State’s Office; resolves trouble and assistance calls from customers; develops resolutions to problems resulting from interaction with Internet software, hardware or other application software; works with other software programmers. Performs other duties as required or assigned. Maintains and updates documentation related to procedures, activity logs, statistics/analytics, required reference manuals, memos, backup, executions reports, etc. Travels as necessary for education, meetings and site surveys. Education and Experience:   Requires knowledge, skill, and mental development equivalent to completion of one year of college, with coursework in the computer science field OR 1.5 years of technical systems and programming experience OR any equivalent combination of education and experience. Knowledge, Skills and Abilities:  Requires elementary knowledge of Information Technology concepts and principles, the theories and functions of computer systems, and the principles and techniques of Information Technology documentation. Requires elementary knowledge of hardware and software, languages, and procedures to provide assigned technical and analytical support services. Requires elementary knowledge of accounting and statistical theories, methods and practices. Requires working knowledge of the devices for capturing data and the means available for receiving and transmitting data from remote locations to a computer. Requires working knowledge of the principles and techniques of computer system documentation. Requires ability to effectively participate in and profit from formal and in-service training programs. Requires ability to analyze data logically. Requires ability to maintain satisfactory working relationships with others. Requires the ability to follow oral and/or written instructions and to carry out routine operations, once established, without further instructions. Requires sufficient oral and written communication skills for effective engagement with colleagues and internal users/customers. Requires awareness and adherence to organizational standards for security, privacy and ethics. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Requires ability to lift and carry up to 50 pounds. Application Process: Please visit https://ilsos.applytojob.gov/apply to apply by completing the online application; you may also upload a resume or other attachments as needed. Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability.   Powered by JazzHR

Posted 3 weeks ago

A
Armed Services YMCA of The U S AWoodbridge, VA
As ASYMCA continues to grow and expand its operations, technology will continue to be at the center of supporting operations effectively.  This newly created Chief Information Officer (CIO) is responsible for overseeing the strategic planning, development, implementation, and management of the organization’s information technology (IT) initiatives. The CIO will ensure that IT systems and processes align with the organization’s goals, enhance its capabilities, and support development programs. This role requires a visionary leader with a strong background in IT, federal contracts, cybersecurity/compliance with ability to oversee daily operations, manage budgets, and ensure that IT infrastructure supports the company's computing, data processing, and communications needs. Candidates must be local to the DC Metro area working a hybrid schedule from the HQ office in Woodbridge, VA (two times weekly).   Salary commensurate with experience $175-190K + bonus potential.   ESSENTIAL DUTIES AND RESPONSIBILITIES: Strategic Planning and Leadership: Develop and implement an IT strategic plan that aligns with the institution’s mission and goals. Provide visionary and operational leadership for IT initiatives. Collaborate with executive leadership to drive innovation and technological advancement. IT Management and Operations: Oversee the management of IT infrastructure, including networks, hardware, software, and cybersecurity. Ensure the reliability, security, and scalability of IT systems and services through direct involvement in the selection, retention and development of key relationships. Oversee the design, implementation, and maintenance of the institution’s IT architecture. Budget and Resource Management: Develop and manage the IT budget, ensuring cost-effective solutions and resource allocation. Identify and pursue funding opportunities for IT projects and initiatives. Vendor Management: Manage external vendors and contractors to ensure the optimization of resources Develop and maintain key partnerships and relationships Stakeholder Engagement and Communication: Serve as the primary liaison between IT and other departments, ensuring effective communication and collaboration. Present IT strategies and initiatives to stakeholders, including the Board of Directors and external partners. Advocate for the role of technology in enhancing outcomes. Policy and Governance: Develop and enforce IT policies, standards, and procedures to ensure regulatory compliance and adherence to best practices. Ensure data governance and privacy. Monitor and manage IT risks and implement appropriate mitigation strategies. Innovation and Operational Support: Support and enhance the organization’s reach capabilities through advanced technology solutions focused on efficient and effective information flow Collaborate with vendors to identify and implement IT tools that support program, financial, development/fundraising and people operations growth. Promote the use of data analytics and research the viability of artificial intelligence to drive innovation.   QUALIFICATION: Education & Experience: Bachelor’s degree (Master’s preferred) in Information Technology, Computer Science, Programming, Information Systems, or a related field  [IT experience will be considered in lieu of MS) A minimum of 10 years of experience in IT leadership roles, preferably within a non-profit environment A minimum of 5 years of leadership and management experience in the IT field Experience in leading and developing high-performing teams Experience with security and compliance, i.e. NIST, CMMC, DFARS, ITAR, etc. Industry certifications such as CISSP, CISM, CCSP, etc. Skills & Abilities: Strong organizational and leadership skills, as well as excellent communication and interpersonal skills. Demonstrated ability to manage budgets and optimize resources Ability to work with colleagues and clients at all levels, by developing and maintaining positive relationships. Proven track record of developing and implementing successful IT strategies and initiatives Strong understanding of IT infrastructure, cybersecurity, data management, and emerging technologies Essential Physical Requirements: Must be able to move freely between facilities. Must be able to operate and manipulate a keyboard. Light physical work may be required. Military spouses, veterans and military affiliated job seekers encouraged to apply. Armed Services YMCA is an Equal Opportunity Employer and prohibits discrimination and harassment of any kind. ASYMCA is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions are based on business needs, job requirements and individual qualifications, without regard to race, color, religion or belief, family or parental status, or any other status protected by the laws or regulations in the locations where we operate. We will not tolerate discrimination or harassment based on any of these characteristics. ASYMCA encourages applicants of all ages. Armed Services YMCA acknowledges the minimal use of artificial intelligence (AI) technology in our initial recruitment stages. All AI use is coupled with human review and is designed to assist our team in building efficiencies and excelling at focusing on timeliness and communication in our hiring process. Our hiring teams thoroughly evaluate skills and qualifications and make all final hiring decisions. Powered by JazzHR

Posted 5 days ago

H
HK TechColumbia, SC
Information Systems Architect Location: 100% remote but must reside in South Carolina Type: Long-term Contract, W2 only (no third party candidates please) We are seeking an Information Systems Architect with deep expertise in Health IT and Electronic Health Records (EHR) to join a long-term project. This role is ideal for someone who can design and guide enterprise-level systems while ensuring compliance, security, and efficiency across healthcare technology platforms. Key Responsibilities Lead the planning, design, and evolution of Health IT architecture, including EHR systems, interfaces, and related healthcare technologies. Partner with leadership to define technology strategies and maintain the long-term technology roadmap. Ensure compliance with healthcare data standards (HIPAA, ICD-9/ICD-10) and security best practices. Oversee integration between EHR systems and external applications (lab systems, pharmacy, PACs, offender management, etc.). Support EHR implementation efforts, including build, testing, training, and go-live activities. Collaborate with medical and mental health providers to evaluate workflows and implement technology solutions that improve care delivery. Create and maintain technical documentation, reports, and project artifacts. Provide subject matter expertise in architecture planning, security compliance, and adoption of emerging health IT technologies. Required Skills 10+ years of experience with Electronic Health Records . 5+ years of hands-on experience with NextGen EHR, PM, and EDR , including certification. Expertise with NextGen template editor for building custom templates. Strong knowledge of HIPAA compliance , ICD-9/ICD-10 , and healthcare data interface standards . Proven ability to plan, prioritize, and deliver solutions in complex health IT environments. Preferred Skills Experience with HL7, SQL, Crystal Reports, eMAR, Mirth, PACs, CIPS/Fusion, and Merge . Familiarity with project management methodologies . Experience with health information exchanges and enterprise-level integrations. Ideal Candidate The successful candidate will be a senior-level architect with the vision to guide large-scale Health IT systems, the technical expertise to work across multiple platforms, and the leadership ability to collaborate with diverse teams.

Posted today

Health Information Management Assistant-logo
Beth Israel Lahey HealthBoston, Massachusetts
When you join the growing BILH team, you're not just taking a job, you’re making a difference in people’s lives. ***This is a fully on-site position at 330 Brookline Avenue, Boston MA*** The Health Information Management (HIM) Assistant 2 will serve as the main point of contact for the HIM department for a designated clinical area. Responsible for managing and prioritizing the electronic scanning and indexing of all medical documents for a designated area. Responsible for validating the accuracy of indexed documents and presentation of documents in the Electronic Health Record (EHR). Job Description: Essential Duties & Responsibilities: Promotes a culture of ongoing feedback with clinical staff and supervisors to promote efficient and accurate processing of medical documentation to encourage best practices. Provides customer service including assistance to clinical users in retrieving patient information from various EHR applications. In keeping with department guidelines, maintains efficient workflow process to support the department mission of timely, complete, accurate, and available patient information. Prioritizes, prepares, and analyzes documents for inclusion in the electronic health record, including patient data validation, form validation, and correct date of service. Based on priority, scans, and indexes documents. Validates that the documents are viewable in the appropriate EHR applications within established timeframes. Identifies scanning errors and routes for correction and performs quality assurance activities as assigned. · In keeping with department guidelines, responds to HIM-related questions and ad hoc requests by staff of designated clinical areas and follows up on customer service issues. · Learn, adapt, and apply skills to new technology and processes as they are implemented. Maintains courteous and effective interactions with colleagues and patients. Demonstrates an understanding of the job description, performance expectations, and competency assessment. Demonstrates a commitment toward meeting and exceeding the needs of our customers and consistently adheres to Customer Service standards. Participates in departmental and/or interdepartmental quality improvement activities. Participates in and successfully completes Mandatory Education. Performs all other duties as needed or directed to meet the needs of the department. Minimum Qualifications: Education : High School diploma or GED required. Experience: · *0-1 year of related work experience required. *Basic familiarity with computers. *Ability to navigate at a basic level within web-based applications. Skills, Knowledge & Abilities : · *Ability to work independently, effectively organize and prioritize workflow tasks, and effectively, professionally, and clearly communicate with customers in a positive manner. · *Ability to access and process electronic information utilizing computer technology. Preferred Qualifications & Skills : *Previous experience in an office environment. ***This is a fully on-site position at 330 Brookline Avenue, Boston MA*** As a health care organization, we have a responsibility to do everything in our power to care for and protect our patients, our colleagues and our communities. Beth Israel Lahey Health requires that all staff be vaccinated against influenza (flu) as a condition of employment. Learn more about this requirement. More than 35,000 people working together. Nurses, doctors, technicians, therapists, researchers, teachers and more, making a difference in patients' lives. Your skill and compassion can make us even stronger. Equal Opportunity Employer/Veterans/Disabled

Posted 1 week ago

Application Administrator for Student Information System-logo
AHU TechnologiesWashington, District of Columbia
Role : SIS ASPEN Technical Specialist Senior Client : DC Government Location : Washington, D.C (Onsite) Job Description: The primary focus of responsibilities will encompass customer support, monitoring application operations and security, Operations & Maintenance (O&M), enhancements, system-to-system data interfaces, and integrating Commercial off-the-shelf(COTS) solutions. Within Operations & Maintenance (O&M), specific duties will involve maintaining the system through upgrades, patching, identifying issues, troubleshooting, developing resolutions, testing, and deploying fixes. Additionally, the role includes generating and managing operational and security compliance documentation. Additional areas of focus include project management support, training, and mentoring of staff in Aspen configuration best practices. On top of technical skills, the individual must have a strong sense of curiosity as a critical part of the role will be to help come up with the future long-term vision for DCPS and contribute to planning out what should be built to implement that vision. Serve as a Paas administrator for evaluating customers' needs and develop processes to automate testing utilizing cloud-native database services. Develop and maintain policies and procedures related to developing and governance content created within the ASPEN ecosystem. Work closely with Project Managers, Information Systems and Solutions, and the ASPEN Account Management team to perform scoping, requirements gathering, application installation, and configuration, and provide input on the application design of the COTS environment. Develop workflow management process and create technical documentation. Collaborate with internal and external parties to transform high-level technical objectives into comprehensive technical requirements. Establish and maintain database policies and standards. Provide sustainment of customer web and application tier systems to include testing, hardening of systems per STIG guidance and industry best practices, and SSL certificate management. Work closely with customer developers for regular project releases and code deployments. Provide troubleshooting assistance for any reported issues. Assist with identifying and planning potential new cloud services, features, and capabilities. Make recommendations for improvements to security, scalability, manageability, and performance across a wide variety of network, storage, compute, and mid-tier technologies. Perform routine administration duties for the maintenance of DCPS students' records. Develop high-quality, high-reliability content using industry best practices. Minimum Requirements: Bachelor's degree in engineering/science/information technology discipline: or Minimum 15 years of relevant experience Must have 11+ years experience in the design, implementation, and operations and maintenance support of client/server applications with an underlying database. MUST have 9+ years of Application Administration experience with students' records management systems. Have 5+ years of SQL experience and understanding of database design. 7+ years of progressive experience in K12 customer-facing systems support role. 5+ years of experience with user training with user information management systems. 11+ years of a Strong attention to detail and the ability to translate high-level technical and business initiatives and goals into discrete tasks and specific timelines. Preferred Job Requirements: Experience managing the delivery of small and medium size projects. Previous "Team Lead" experience is a plus. Understanding and working knowledge of basic Internet protocols such as HTTP, SMTP, SOAP, SSL, and TLS. Experience with PowerApps is a plus. Compensation: $65.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 30+ days ago

Information Security Analyst-logo
American Transmission CompanyDe Pere, WI
Summary of Responsibilities: We're looking for an Information Security Analyst to join our team in Pewaukee, Wisconsin. This isn't just a security role; it's a critical position focused on proactively protecting the reliable operation of the bulk electric systems and ensuring power gets to our customers. You'll be instrumental in elevating our security posture by: Standardizing our risk communication, making complex security concepts clear to everyone. Forecasting and analyzing emerging risks, using data to anticipate threats before they impact our infrastructure. Strengthening our data security architecture, ensuring our critical data is secure by design. If you have a deep understanding of information security risk management, expertise in data security principles, and strong analytical and communication skills, and you're passionate about making a tangible impact on critical infrastructure, we want to talk to you. This is an opportunity to drive change and build a more resilient future. Essential Responsibilities: Are you ready to play a pivotal role in protecting vital infrastructure and ensuring power reliably reaches our customers? We're searching for a proactive and strategic Information Security Analyst to join our team. This isn't just about reacting to threats; it's about building a resilient future through foresight and strong security foundations for the bulk electric system. Essential Responsibilities: As an Information Security Analyst, this position is central to risk identification, governance, and oversight of security controls, all while preparing our organization to be resilient to attack and influence strategic planning. You'll bring your analytical prowess to transform how we approach risk, moving us beyond response to true resiliency planning. Standardize Risk Communication: You'll be key in making complex security concepts clear to everyone. Develop and implement a common language for risk, ensuring all teams-from IT to operations-understand security threats and our collective risk appetite. You'll facilitate discussions and create materials that bridge technical and non-technical understanding. Forecast and Analyze Emerging Risks: Use your analytical skills to anticipate threats before they impact our critical infrastructure. This involves gathering and interpreting threat intelligence, analyzing security metrics, and identifying trends to proactively mitigate risks. Your insights will directly inform strategic decisions, enhancing our ability to protect the bulk electric systems. Strengthen Data Security Architecture: Champion security by design, ensuring our critical data is secure from inception. Provide expert guidance on data and information security principles, conduct architecture reviews, and advise on implementing robust controls for new systems and data flows, directly safeguarding the information essential to delivering power. Perform Supplier Risk Assessments: Evaluate the security posture of third-party vendors and partners to identify and mitigate supply chain risks. Collaborate and Govern: Work closely with ATC's governance teams, including Internal Audit, Regulatory Compliance, and GRC, to ensure alignment and oversight of security controls. Develop Policies and Standards: Assist in the creation and refinement of security policies and standards that strengthen our overall security posture. Stay Ahead of the Curve: Continuously monitor industry developments, emerging threats, and hazards to identify opportunities for enhancing ATC's security posture. Education & Experience: Bachelor's degree in Computer Science, Information Systems, Engineering, Data Science, or a related field is preferred. Equivalent work experience combined with relevant certifications may be considered. Skills & Qualifications: Deep Understanding of Information Security Risk Management: Expertise with frameworks like NIST RMF or ISO 27001. You know how to assess, prioritize, and effectively communicate risk, including concepts like risk appetite, threat modeling, vulnerability management, and control effectiveness. Expertise in Data Security Principles and Architecture: Ability to translate security concepts into practical, secure designs for data at rest, in transit, and in use. Experience working closely with architecture or development teams to embed security into the design phase of systems, applications, or data pipelines. Exceptional Analytical and Communication Skills: Proven ability to process raw data, identify patterns, and draw meaningful conclusions about current and future risks. You can transform complex security data into clear, actionable insights for diverse audiences, from technical teams to leadership. Collaboration and Adaptability: Comfort working with people across diverse functional areas, from engineers to compliance leaders. You're proactive, adaptable, and skilled at balancing security goals with stakeholder needs in a dynamic environment. Strong Organizational Skills: Ability to manage multiple tasks effectively. This position could be located out of our Pewaukee, Cottage Grove or De Pere, Wisconsin offices or our Kingsford, Michigan office. If you're proactive, adaptable, and driven to contribute to a mission that matters-ensuring power delivery and protecting vital infrastructure-this is your opportunity. We offer flexible work schedules, though this role requires relocation to one of our Wisconsin or Upper Peninsula Michigan office locations. Bring your positive energy and help us lead, motivate, and influence internal and external stakeholders to meet compliance specifications and expectations! Number of Openings Available: 1 Posting Date: 2025-07-29 Time Type: Full time Equal Opportunity Employer: Applicants have rights under employment laws. ATC is an equal opportunity employer that seeks to foster diverse teams of talented people working safely together. We respect and embrace diversity of all aspects and hire, train and promote employees without regard to race, color, religion, sex, age, national origin, sexual orientation, disability, genetics, protected veteran status, or any other characteristic protected by law. We encourage women, minorities, veterans and individuals with a disability to apply. All qualified applicants will receive consideration for employment without regard to any characteristic protected by law. Family and Medical Leave Act (FMLA) Poster | U.S. Department of Labor Family and Medical Leave Act Poster Employee Polygraph Protection Act (EPPA) Poster | U.S. Department of Labor ERD-10861 Poster Honesty Testing poster WISCONSIN FAIR EMPLOYMENT LAW

Posted 3 weeks ago

T
Truist Financial CorporationRaleigh, NC
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status. Need Help? If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response). Regular or Temporary: Regular Language Fluency: English (Required) Work Shift: 1st shift (United States of America) Please review the following job description: The Information Security Officer will be part a team who is tasked with remediating risks that are identified by red team, pentest team along with Cyber Threat Management. This valuable team also responds to mediating what is determined as imminent threats managing escalated responses that have been identified as threats to Truist internal/ external. Ideal talent has cyber and technical expertise serving as a lead project manager to develop interim mitigating actions and track those to closure. You will develop a foundational understanding of the businesses you support helping drive timely discussions and decisions in partnership with those teams. You will provide oversight for the design, development and installation of the corporate-wide cybersecurity technology controls while ensuring that business practices meet cybersecurity standards and policies. You will as the Information Security Officer drive effective communication and awareness of risk posture for the businesses you support to identify, assess and manage cybersecurity risk. ESSENTIAL DUTIES AND RESPONSIBILITIES Following is a summary of the essential functions you will project manage in this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. Risk Management: Identify, assess, and manage information security risks specific to the business unit. Ensure appropriate risk mitigation strategies are implemented to minimize security threats. Conduct risk assessments and ensure compliance with internal policies and regulatory requirements. Security Strategy Alignment: Align the business unit's security requirements with the organization's overall cybersecurity strategy. Develop and implement security measures that meet both the business objectives and security needs of the unit. Compliance and Regulatory Adherence: Ensure that the business unit complies with relevant laws, regulations, and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Implement policies and processes to meet security and privacy regulations, as well as company-specific guidelines Incident Response and Management: Coordinate incident response efforts for security breaches or data loss within the business unit. Work closely with the corporate security team to manage and mitigate incidents. Awareness and Training: Promote security awareness within the business unit by educating employees on best practices and current threats. Collaboration with technology and Business Leaders: Work with business leaders to understand their objectives and ensure that security solutions support these goals. Collaborate with security teams to ensure that security controls do not hinder business processes or productivity. Security Governance: Contribute to the development of security policies, standards, and guidelines, ensuring that they are implemented effectively within the business unit. Regularly report on the security posture of the business unit to senior management and the security team. Security Capability Support: Ensure the confidentiality, integrity, and availability of sensitive information within the business unit. Oversee the implementation of data protection measures and practices to safeguard against unauthorized access or data breaches. Assess and manage the security risks associated with third-party vendors or partners that interact with the business unit. Recommend and oversee the implementation of security tools and technologies that address the specific needs of the business unit. Ensure that appropriate security monitoring and response mechanisms are in place. Required Qualifications The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Associate's degree in business, cybersecurity, computer science or equivalent and related education, training or experience. Two (2) or more years direct experience in financial services, cybersecurity, or information technology (IT) Effective communication & presentation skills Strategic mindset, goal-oriented, collaborative thinker Critical thinking and problem-solving skills with an ability to manage both short-term and long-term priorities Ability to manage multiple, concurrent projects, activities, and tasks under time constraints. General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work. Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace. EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify

Posted 1 week ago

Tax Senior Manager - Global Information Reporting-logo
PwCPhiladelphia, PA
Industry/Sector Not Applicable Specialism General Tax Consulting Management Level Senior Manager Job Description & Summary A career within Financial Markets Business Advisory services, will provide you with the opportunity to contribute to a variety of audit, regulatory, valuation, and financial analyses services to design solutions that address our clients' complex accounting and financial reporting challenges, as well as their broader business issues. To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future. As a Senior Manager, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Encourage everyone to have a voice and invite opinion from all, including quieter members of the team. Deal effectively with ambiguous and unstructured problems and situations. Initiate open and candid coaching conversations at all levels. Move easily between big picture thinking and managing relevant detail. Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required. Contribute technical knowledge in area of specialism. Contribute to an environment where people and technology thrive together to accomplish more than they could apart. Navigate the complexities of cross-border and/or diverse teams and engagements. Initiate and lead open conversations with teams, clients and stakeholders to build trust. Uphold the firm's code of ethics and business conduct. The Opportunity As part of the Financial Markets Business Advisory team you are expected to help clients comply with global tax information reporting and withholding rules. As a Senior Manager you are expected to lead staff in preparing and filing information returns, develop innovative technology solutions, and provide guidance to clients regarding compliance with complex tax issues. Responsibilities Lead staff in preparing and filing information returns Develop innovative technology solutions for compliance Provide guidance to clients on complex tax issues Maintain operational excellence and top-tier client interaction Leverage influence and proficiency to deliver quality results Guide teams in developing practical tax compliance solutions Oversee the implementation of compliance strategies for clients What You Must Have Bachelor's Degree 7 years of experience Certified Public Account (CPA), Enrolled Agent or Active Member of the Bar What Sets You Apart Degree in Accounting, Accounting & Finance, Taxation, Management Information Systems & Accounting preferred Providing guidance on global tax information reporting compliance Researching complex tax issues for client conclusions Reviewing US IRS tax forms and related documentary evidence Leading staff in preparing and filing information returns Developing innovative technology solutions for efficiency Creating educational resources for reporting and withholding requirements Training and managing local staff Understanding US tax rules and requirements Travel Requirements Up to 20% Job Posting End Date Learn more about how we work: https://pwc.to/how-we-work PwC does not intend to hire experienced or entry level job seekers who will need, now or in the future, PwC sponsorship through the H-1B lottery, except as set forth within the following policy: https://pwc.to/H-1B-Lottery-Policy . As PwC is an equal opportunity employer, all qualified applicants will receive consideration for employment at PwC without regard to race; color; religion; national origin; sex (including pregnancy, sexual orientation, and gender identity); age; disability; genetic information (including family medical history); veteran, marital, or citizenship status; or, any other status protected by law. For only those qualified applicants that are impacted by the Los Angeles County Fair Chance Ordinance for Employers, the Los Angeles' Fair Chance Initiative for Hiring Ordinance, the San Francisco Fair Chance Ordinance, San Diego County Fair Chance Ordinance, and the California Fair Chance Act, where applicable, arrest or conviction records will be considered for Employment in accordance with these laws. At PwC, we recognize that conviction records may have a direct, adverse, and negative relationship to responsibilities such as accessing sensitive company or customer information, handling proprietary assets, or collaborating closely with team members. We evaluate these factors thoughtfully to establish a secure and trusted workplace for all. Applications will be accepted until the position is filled or the posting is removed, unless otherwise set forth on the following webpage. Please visit this link for information about anticipated application deadlines: https://pwc.to/us-application-deadlines The salary range for this position is: $124,000 - $335,000, plus individuals may be eligible for an annual discretionary bonus. For roles that are based in Maryland, this is the listed salary range for this position. Actual compensation within the range will be dependent upon the individual's skills, experience, qualifications and location, and applicable employment laws. PwC offers a wide range of benefits, including medical, dental, vision, 401k, holiday pay, vacation, personal and family sick leave, and more. To view our benefits at a glance, please visit the following link: https://pwc.to/benefits-at-a-glance

Posted 30+ days ago

Information System Security Officer-logo
Lockheed Martin CorporationOrlando, FL
Description:Lockheed Martin Enterprise Operations is seeking a Information System Security Officer to join our team's efforts in supporting and defending classified networks hosted at the corporate level. The Enterprise Operations team of cyber security professionals are Subject Matter Experts (SME) supporting Department of Defense (DoD) programs to ensure classified information systems meet cyber security requirements and government directives by auditing, detecting, analyzing and mitigating cyber threats across multiple Enterprise networks. You will have a direct impact to national security, ultimately contributing to protecting your loved ones - this is dynamic, gratifying and impactful work! The cyber team has created a culture that inspires team members to think big, perform with excellence, and build positive relationships with both internal and external customers. This is a fast paced, dynamic work environment that is blazing through uncharted territory but has the resources, inspiration, and focus to exceed mission critical requirements. Duties include providing hands on technical assistance for complex systems/networks, cyber technology development/implementation, assessing threats/vulnerabilities, and supporting customer needs (meetings, calls, emails, demonstrations, etc.). An ideal and successful candidate for this position has proven experience working both independently and as part of a team, is an accomplished cyber security practitioner, is experienced in both the Collateral and Special Access Program (SAP) environments. The responsibilities of this role include but are not limited to: Planning, implementing, monitoring, and upgrading security measures for the protection of the program data, non-deliverable systems, and networks. Troubleshooting technical security and network problems. Participate in planning and implementation of current and future security domains including those which may introduce new service areas (i.e., Cloud Computing, DevSecOps, etc.). Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone classified systems. Perform system auditing, vulnerability risk assessments, Assured File Transfers, hardware/software configuration management, data integrity containments and investigations on IA related security violations/incidents. Proactive identification and resolution of security obstacles/issues affecting architectures and deployments. Provide mentoring and/or guidance to less senior technical professionals MUST BE A U.S. CITIZEN - This position is located at a facility that requires special access. What's In It For You From onsite to remote, we offer flexible work schedules to comprehensive benefits investing in your future and security, Learn more about Lockheed Martin's comprehensive benefits package here. We provide the resources and give you the flexibility to enable inspiration and focus -if you have the passion and courage to dream big, work hard, and have fun doing what you love then we want to build a better tomorrow with you. Basic Qualifications: Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience; or 3 years of professional experience with a related Master's degree Minimum of current Secret Possess a DoD 8570 IAM Level-II Certification (i.e., Security+ or equivalent) Experience executing Security Hardening on Windows Operating Systems based on approved DISA STIGs and SRGs Experience in designing, developing, and integrating classified computer systems and networks in compliance with government regulations Proven knowledge of Joint Special Access Program Implementation Guide (JSIG) and Risk Management Framework (RMF) as a Subject Matter Expert (SME) Excellent written and verbal communication skills and ability to effectively interface with numerous cognizant security agencies, customers and senior leadership Experience with standard security and network environment tools and applications (Splunk, ePO, ACAS/Tenable.sc) Ability to manage multiple projects in a dynamic and demanding environment Knowledge of other security disciplines and how they impact and interact with information system security Team player - Effective at organizing and motivating a diverse set of individuals to act as "one" in the pursuit of common objectives. Ability to build effective customer and partner relationships Prior ISSO/M experience Desired Skills: Demonstrates experience with Full-Spectrum Leadership skills necessary for Cybersecurity personnel Experience with Splunk and the ability to write queries, create dashboards, QMulos Products Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system Ability to juggle the demands of multiple diverse customers while formulating & driving security direction Experience with multi-tenancy infrastructure Recognized cloud proficiency (CSSP, AWS, CSA, CompTIA Cloud+, CCSK, or others) Experience with cloud integration Top Secret Clearance Preferred Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret with Investigation or CV date within 5 years Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 4x10 hour day, 3 days off per week Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: ENTERPRISE BUSINESS SERVICES Relocation Available: No Career Area: Cyber Security Type: Full-Time Shift: First

Posted 30+ days ago

C
Cogent Biosciences, Inc.Waltham, MA
Who We Are Cogent Biosciences is a publicly traded biotechnology company focused on developing precision therapies for genetically defined diseases. The most advanced clinical program, bezuclastinib, is a selective tyrosine kinase inhibitor that is designed to potently inhibit the KIT D816V mutation as well as other mutations in KIT exon 17. KIT D816V is responsible for driving systemic mastocytosis (SM), a serious disease caused by unchecked proliferation of mast cells. Exon 17 mutations are also found in patients with advanced gastrointestinal stromal tumors (GIST), a type of cancer with strong dependence on oncogenic KIT signaling. Top-line results from registration-directed trials in NonAdvanced SM, Advanced SM and GIST are expected in 2025. The company also has an ongoing Phase 1 study of its novel internally discovered FGFR2 inhibitor. In addition, the Cogent Research Team is developing a portfolio of novel targeted therapies to help patients fighting serious, genetically driven diseases targeting mutations in ErbB2, PI3Kα and KRAS. Our Team https://cogent.culturehq.com Cogent Biosciences is seeking a dynamic and experienced Senior Director of Medical Information to lead the development and execution of the medical information function as we transition into commercialization. This role will be instrumental in building a best-in-class medical information infrastructure to support the launch of bezuclastinib in Systemic Mastocytosis (SM) and Gastrointestinal Stromal Tumors (GIST) and support medical information related to Cogent's product pipeline. The ideal candidate will bring deep expertise in medical information strategy, operations, content development, and cross-functional collaboration in the biotech and/or pharmaceutical setting. Responsibilities Strategic Leadership: Build and lead the Medical Information function, including strategy, systems, and processes to support product launches and lifecycle management. Develop and implement a global medical information strategy aligned with commercial, medical, and regulatory objectives. Content Development & Management: Oversee the creation, review, and approval of standard response documents (SRDs), FAQs, AMCP dossier(s), and other scientific materials. Ensure scientific accuracy, compliance, and alignment with product labeling and regulatory requirements. Medical Inquiry Management: Establish and manage a medical inquiry system and response process, including oversight of vendors and call centers. Monitor inquiry trends and provide actionable insights to internal stakeholders. Cross-Functional Collaboration: Partner with Medical Affairs, Regulatory, Legal, Commercial, and Pharmacovigilance to ensure consistent and compliant communication of scientific information. Support field medical teams (MSLs) with scientific resources and training. Launch Readiness: Lead medical information launch planning and execution for bezuclastinib in SM and GIST. Develop global and regional launch materials and ensure readiness of systems and processes. Compliance & Governance: Ensure all medical information activities comply with applicable laws, regulations, and industry standards (e.g., PhRMA, FDA, EMA). Participate in internal audits and inspections as needed. Qualifications Advanced degree (PharmD, PhD, MD, NP, PA, etc.) in a scientific discipline required. Minimum of 10 years of experience in Medical Information within the biotech/pharmaceutical industry, with at least 5 years in a leadership role. Proven experience supporting the build of the Medical Information function to support oncology and/or rare disease product launches; experience with Systemic Mastocytosis and/or GIST is a strong plus. Deep understanding of regulatory and compliance frameworks (FDA, EMA, OIG, PhRMA). Demonstrated success in building and scaling medical information functions in a fast-paced, evolving environment. Strong leadership, communication, and project management skills. Experience with medical information systems (e.g., IRMS, Veeva Vault) and content management platforms. Experience in Medical Legal Regulatory of external-facing documents, medical and promotional, and the ability to work collaboratively with the responsible team members; initially leading the review process to represent the Medical review while establishing a plan for the appropriate level of support required by the Medical Information function to facilitate review and approval of documents in preparation for and through product launch(es) and product indication expansion(s). Medical review experience must be based on the ability to critically review the accuracy of information using internal data on file and externally published literature to help the team accomplish communication goals. $260,000 - $295,000 a year Target Bonus: 25% Exact compensation will vary based on skills, experience, and location. Our Locations Waltham, MA: Our Boston office includes an open office layout that has recently undergone a makeover designed for collaboration and giving our employees the best work place possible. Free access is provided for both on-site parking and gym facilities in the building. Boulder, CO: We have just moved into our new state-of-the art Research Facility in the fast-growing biopharmaceutical hub in the greater Denver/Boulder corridor. Our CEO is based full-time in this location and we are proud to call this the home of Cogent's discovery research organization. Our Offer To You To attract the very best talent, we offer a generous benefits package that includes competitive pay, performance-based bonus, stock options, insurance coverage (health, dental, life, and disability), competitive time-off, a 401(k) plan, and commuter/parking benefits. We are proud to be an Equal Opportunity Employer. Our goal is to have a diverse workforce. We do not discriminate on the basis of race, age, color, religion, national origin, gender, sexual orientation, gender identity or expression, veteran status or disability, or any other status protected under federal, state, or local law. All employment is decided on the basis of qualifications, merit, and business need.

Posted 30+ days ago

Information Systems Security Engineer (Multiple Levels)-logo
CACI International Inc.Fort Meade, MD
Information Systems Security Engineer (Multiple Levels) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local CACI is looking for talented Information Systems Security Engineer (ISSE) around the Fort Meade, Maryland area. As an Information Systems Security Engineer (ISSE), you'll: Facilitate sub-projects as they go through the Risk Management Framework (RMF) accreditation life cycle. Support the periodic system security scans as required by policy and the RMF. Validate and verify system security requirement definitions and analyze system security designs. Perform technical security assessments of computing environments to identify points of vulnerability, and then recommend mitigation strategies for those that do not comply with established Information Assurance (IA) standards. You'll Bring These Qualifications: Bachelor's (BA) degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. TS/SCI with Polygraph In addition: Level 1: Seven (7) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity - or eleven (11) years' experience with no BA. DoD 8140.03 compliance with IASAE Level 2. Level 2: Fourteen (14) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity - or eighteen (18) years' experience with no BA DoD 8140.03 compliance with IASAE Level 2 and CISSP Certification. Level 3: Twenty (20) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity - or twenty-four (24) years' experience with no BA. DoD 8140.03 compliance with IASAE Level 3 is required. Information Systems Security Engineering Professional (ISSEP) and CISSP Certifications. A Master's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline may be substituted for two (2) years' of experience, bringing the requirement to eighteen (18) years. These Qualifications Would be Nice to Have: Experience manually reviewing network diagrams, network device configurations, termination points for VPNs, and a working knowledge of software TLS security. Able to maintain a flexible and non-traditional RMF review of secure networks to assess and prescribe countermeasures for secure communications e.g. analog radio, mobile cellular, remote kits, software/hardware-based VPN solutions and VDI technologies. Familiar with applying different standards and security frameworks to include CIS benchmarks, FIPS 140-2, DISA Stigs, CNSA cryptographic suite compliance, etc. Participated as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments. Participated as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components. Supported the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures. Applied knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments Supported security planning, assessment, risk analysis, and risk management. Identified overall security requirements for the proper handling of Government data. Performed system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements. Provided security planning, assessment, risk analysis, and risk management. Recommended system-level solutions to resolve security requirements. Supported the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures. This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. ____ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ____ Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here. The proposed salary range for this position is: $86,600 - $181,800 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.

Posted 30+ days ago

Information Security Specialist-logo
MillimanChicago, IL
The Department The LifeRTC Information Security Team, led by the Head of Information Security, is dedicated to protecting the practice's digital and physical assets, as well as its global software and products. The team, consisting of cybersecurity analysts and on-premises security specialists, ensures information confidentiality, integrity, and availability by aligning security strategies with business objectives and complying with laws and industry standards. Acting as the incident response team, they focus on threat intelligence, incident management, vulnerability assessments, access control, and security awareness training. They use advanced technologies like firewalls and System Information Event Monitoring systems to counter security threats and work closely with other departments to maintain a comprehensive security approach. Through these efforts, the team plays a critical role in mitigating risks and ensuring a secure operating environment. The Role The Information Security Specialist, is a critical member of our Information Security team, reporting directly to the Head of Information Security. This is a technical role, focusing on implementing and managing solutions to assist our various teams across the practice helping increase our security posture and reduce our overall risk. This role is expected to leverage their technical expertise to enhance our security posture, manage risks, and contribute to the overall information security strategy. Your Responsibilities: Act as an escalation point for IT Security Analysts. Implement and manage technical security solutions within our Azure infrastructure and security monitoring systems. Identify areas where automation can help us become more efficient and implement automation to streamline processes and the efficiency of the security team. Collaborate with internal teams to ensure acceptable control and risk levels are maintained throughout the organization. Be responsible for answering security questionnaires from clients on behalf of the practice. Act as an integral part of the Incident Response team during security incidents, providing technical expertise and support. Contribute to the ongoing information security program, addressing all aspects of security from on-premises to cloud (Azure) and web application security. Responsible for answering security questionnaires on behalf of the practice and help us to solve the problem of how this process can be made more efficient. Participate in the system hardening and vulnerability management programs, providing direction to key business areas on their focus points. Participate in evidence gathering for the SOC audit process when required. Stay abreast of industry trends and advancements in security and cybersecurity technologies, ensuring our practices are up-to-date and effective. Form part of the Incident Response team. Job Knowledge, Experience Skills Job Knowledge Required: Minimum 4 years' experience working in a Security focused role. Strong technical Azure experience required with a focus on security systems including Defender for Cloud and Azure Sentinel Demonstratable experience automating security processes. Qualifications: Any Azure SC-/AZ- above foundation level (900) would be advantageous CCSP This role requires a hands-on approach to all aspects of security, from on-premises to Microsoft Azure. The Information Security Specialist should have a deep understanding of information security principles and a strong technical background in cloud and on-premises systems. Experience and Soft Skills Required: Passion for IT security and keeping up to date with industry trends Communicate effectively to both technical and non-technical audiences Ability to be adept at defining and building solutions from business requirements Ability to work in a fast-paced environment across multiple time zones Excellent written and verbal communications skills Ability to build and nurture relationships with stakeholders Demonstrate aptitude for, and willingness to, learn, and an appetite for continuous education Additional Knowledge and Skills to Build: Ability to discuss complex security issues in understandable terms Organize and lead internal calls and meetings Demonstrate excellent people skills with the ability to ask questions to pinpoint specific concerns Produce high quality work that demonstrates subject matter expert knowledge Build, develop and grow relationships with teams internal to the practice and the wider Milliman community Function as a mentor for junior members of security staff, providing guidance and training as needed Location: Candidates hired into this role will be required to work in-person in the Milliman office in Chicago, Illinois on a weekly basis, but flexible work arrangements will be considered. The expected application deadline for this job is August 30th, 2025. Compensation: The overall salary range for this role is $93,610 - $154,550. A combination of factors will be considered, including, but not limited to, education, relevant work experience, qualifications, skills, certifications, etc. Benefits: We offer a comprehensive benefits package designed to support employees' health, financial security, and well-being. Benefits include: Medical, Dental and Vision- Coverage for employees, dependents, and domestic partners. Employee Assistance Program (EAP)- Confidential support for personal and work-related challenges. 401(k) Plan- Includes a company matching program and profit-sharing contributions. Discretionary Bonus Program- Recognizing employee contributions. Flexible Spending Accounts (FSA) - Pre-tax savings for dependent care, transportation, and eligible medical expenses. Paid Time Off (PTO) - Begins accruing on the first day of work. Full-time employees accrue 15 days per year, and employees working less than full-time accrue PTO on a prorated basis. Holidays- A minimum of 10 paid holidays per year. Family Building Benefits- Includes adoption and fertility assistance. Paid Parental Leave- Up to 12 weeks of paid leave for employees who meet eligibility criteria. Life Insurance & AD&D - 100% of premiums covered by Milliman. Short-Term and Long-Term Disability- Fully paid by Milliman. Equal Opportunity: All qualified applicants will receive consideration for employment, without regard to race, color, religion, sex, sexual orientation, national origin, disability, or status as a protected veteran.

Posted 30+ days ago

Mid/Sr Information System Security Officer (ISSO)-logo
Belay TechnologiesAnnapolis Junction, MD
Belay Technologies has been voted Baltimore Business Journal's (BBJ) Best Places to Work 2019, runner up in 2020 and a finalist in 2021!   Belay Technologies is seeking a Mid/Sr Information Systems Security Officer (ISSO).  The selected candidate will act as an ISSO for a large software development program which includes software maintenance and development, IT support (Network/Workstation/Server), systems integration and life cycle support, enterprise application development, network engineering, and information systems security (ISS). She/he will work with other security professionals in developing and implementing strategies to detect and mitigate threats to information systems, protect critical data sets, and provide assessments of system and network vulnerabilities . Primary Roses and Responsibilities: Provide support for implementing and enforcing information systems security policies, standards, and methodologies. Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information. Assist with the Configuration Management for information system security software, hardware, and firmware. Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades. Evaluate security solutions to ensure they meet security requirements for processing information. Maintain operational security posture for information systems. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave. Develop and maintain documentation for Certification & Accreditation in accordance with specified policies. Develop and update system security plans and other IA documentation. Provide CM for security-relevant information system software, hardware, and firmware. Develop system security policy and ensure compliance. Administer the user identification and authentication mechanisms of the Information System. Candidates should have the following qualifications:  TSI/SCI with Polygraph Bachelor's degree in a related field and at least 12 years of relevant experience. Extensive experience as an Information Systems Security Officer on large software development and integration programs. DoD 8570 compliance with IAT Level I or higher DoD8570 compliance with IAM Level II or higher Candidates are desired to have the following skills: Must have at least 10 years of experience as ISSO working independently, and/or on teams maintaining secure information system operations in isolated, connected and standalone environments Must have at least 5 years of experience using tools to support IAVA management Must have at least 5 years of experience using Experience completing security evaluations of software systems or architectures to ensure they meet security requirements. Experience preparing and maintaining SSPs and other security related documentation. Experience proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies, ideally on a large software or IT program. Demonstrated experience performing day-to-day security operations of large, complicated information and information processing systems. Must be committed to developing and adhering to best practices. Must be a solutions-oriented team player. Must possess a high level of self-initiative. Must have excellent interpersonal skills. Perks and Benefits: 8 weeks paid leave - 4 weeks of personal leave, 3 Yay! days, take off on your birthday,11 paid holidays and optional leave up to 6 days through Belay's volunteer program 10% matching in 401(k) contributions vested on day one $5,000 annual training/tuition Student Loan Repayment Program 100% company-funded HSA Rich medical coverage (100% coinsurance) Dental coverage including orthodontia Up to $420,000 in life insurance, premiums 100% company funded Amazon Prime, gym reimbursement, monthly lunches, games and prizes Pet adoption program, generous referral bonus program, fun events, and more!   At Belay, we are committed to creating an environment where you can thrive both professionally and personally.  We believe in transparency and fairness in compensation. Several factors influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, education, specific skills and competencies and certifications. Belay offers a competitive total compensation package that includes benefits and perks, a flexible work-life balance, and career development. Salary Range: Mid-Level: $105,000 to $200,000 Sr. Level: $168,00 to $240,000 Belay Technologies is a certified Service-Disabled Veteran-Owned Small Business located in Columbia, Maryland (Baltimore/Washington area). Belay Technologies specializes in systems automation and full stack development. Belay Technologies provides leading technology and engineering solutions to the DoD, as well as state-of-the-art commercial products. We hire software engineers, web designers, test engineers, systems engineers, systems administrators, database engineers and other tech services. We are an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.   Powered by JazzHR

Posted 1 week ago

Information Systems Security Manager (ISSM)-logo
The Newberry GroupColorado Springs, CO
Who We Are… Newberry Group is a performance-driven government services and solutions firm that provides security compliance, program governance, consulting, and customized solutions for public sector clients nationwide.  The strength of our company is a direct reflection of our highly skilled and talented workforce. Job Summary Newberry Group seeks an Information Systems Security Manager (ISSM) for a potential contract to begin in the next sixty days. The ISSM will oversee the cybersecurity posture of classified and unclassified information systems. The ISSM will ensure compliance with DoD cybersecurity policies, manage risk, and support mission-critical operations. Location  Colorado Springs, CO Hybrid position Clearance/Certifications DoD Secret Clearance required Current DOD 8140 level II certification required, such as: CISM or CISSO or FITSP-M or GCIA or GCSA or GCIH or GSLC or GICSP or CISSP-ISSMP or CISSP Contingencies Contingent on Contract Award Primary Responsibilities: Serve as the principal advisor on all matters involving the security of information systems. Develop, implement, and maintain cybersecurity policies and procedures in accordance with DoD, NIST, and RMF (Risk Management Framework) guidelines. Manage system authorization packages, including System Security Plans (SSPs), POA&Ms, and continuous monitoring strategies. Coordinate with Information System Owners (ISOs), System Administrators, and Security Control Assessors (SCAs) to ensure compliance and readiness. Conduct security impact analysis and risk assessments for new and existing systems. Lead incident response efforts and ensure timely reporting of cybersecurity events. Provide cybersecurity training and awareness to system users and stakeholders. Maintain documentation and audit readiness for inspections and assessments. Additional Responsibilities: Serve as the Newberry Group Team Lead supporting the onsite staff and providing staffing and coaching support to achieve overall project success. Provides communication and project status updates to Newberry Group Program Manager. Required Education and Experience:   Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field. U.S. Citizenship  and ability to obtain and maintain a  Secret security clearance . At least  5 years of experience  in information assurance or cybersecurity roles. DoD 8140 level II certification. In-depth knowledge of RMF, NIST SP 800-53, and DoD cybersecurity policies. Experience with eMASS, ACAS, HBSS, and other DoD cybersecurity tools. Excellent communication, documentation, and analytical skills. Preferred Experience: Prior experience working in a DoD or military academic environment. Experience leading a team. Familiarity with Air Force cybersecurity processes and tools. Knowledge of classified and unclassified system environments. Benefits and Perks In addition to competitive wages, Newberry Group offers an outstanding benefit package. This includes medical coverage with three plan options, dental and vision coverage, personal time off, paid holidays, paid parental leave, telecommuting if available, retirement savings accounts (Pre-Tax and Roth), flexible and dependent care savings accounts, life insurance, long and short-term disability coverage, tuition and training reimbursement, employee assistance program, and more. The Newberry Group, Inc. is an Equal Opportunity Employer – EEO/AA/Disability/Veterans.   Powered by JazzHR

Posted 6 days ago

IT Support Specialist - Information Systems Technician I - Technical Services-logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:      Information Systems Technician I  Division:      Technical Services Union:          IFT Location:    2701 S. Dirksen Pkwy, Springfield, IL – Sangamon County Salary:        $4,865.00 monthly, commensurate with experience  Overview: Performs complicated technical functions and administrative work installing, evaluating and maintaining physical configuration of hardware and software, for large-scale networks.     Duties and Responsibilities: May participate with the resolution of issues escalated from Tier 1 support staff, working directly with users on timely resolution of issues.  Assist, support and document the initiation, execution, and closing activities for a program/project(s) and support activities. Ensure performance metrics are met or exceeded. May assist in developing and maintaining program support artifacts throughout the lifecycle of the initiative. Ensure constant and proactive communication with customers, team members, and subcontractors to actively mitigate any issues or concerns. Simulates and recreates user issues to resolve operational difficulties. Recommends system modifications, if required, to reduce user problems. Escalates more complex issues, as appropriate, to senior level technicians. Promote and encourage a “one team” attitude at all levels internally and externally. Manage customer expectations and deliver the highest level of quality customer service. Performs other duties as required or assigned. Minimum Requirements: Requires knowledge skill and mental development equivalent to the completion of one year of college, with computer science coursework or one and one-half (1.5) years of technical systems and/or programming experience. Requires the ability to lift, carry and push/pull up to 50 lbs. Requires a valid Illinois Driver’s License. Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume or other attachments as needed. Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 3 weeks ago

Independent Software logo

Senior Information Systems Security Officer (ISSO)

Independent SoftwareAnnapolis Junction, MD

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

What you will be doing!
As a Senior Information Systems Security Officer (ISSO), your role will be essential in safeguarding our information systems. You will work closely with cross-functional teams to develop and maintain a strong security framework that protects our systems from threats and vulnerabilities. This position demands a proactive approach to managing security policies, conducting assessments, and supporting security authorization processes.

Responsibilities

  • Support the information assurance program for the program, organization, system, or enclave.
  • Assist in proposing, coordinating, implementing, and enforcing security policies, standards, and methodologies for information systems.
  • Maintain the operational security posture of an information system or program, ensuring compliance with established security policies, standards, and procedures.
  • Manage the security aspects of the information system and perform daily security operations. - Evaluate security solutions to verify that they meet the necessary requirements for processing classified information.
  • Conduct vulnerability and risk assessments to support certification and accreditation efforts.
  • Provide configuration management (CM) for information system security software, hardware, and firmware.
  • Manage changes to the system and assess the security impact of those changes. - Prepare and review documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
  • Assist with security authorization activities in compliance with the Information System Certification and Accreditation Process (NISCAP) and the DoD Risk Management Framework (RMF).
Experience and Education: 
  • A Bachelor of Science degree in Computer Science, Information Assurance, Information Security, or a related discipline, along with 12 or more years of relevant experience.
  • A minimum of 7 years of experience as an ISSO supporting Intelligence Community (IC) or Department of Defense (DoD) programs and contracts of similar scope, type, and complexity.
  • Compliance with DoD 8570 standards at IAM Level II or IAT Level III (such as CASP, CISSP, or Associate).

Clearance Required:   Must possess an active TS/SCI with Full Scope Polygraph security clearance to be considered for this role
Independent Software is an Equal Opportunity Employer EOE, M/F/D/V.

Powered by JazzHR

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall