1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

M logo
MetroSysChicago, IL
About the Role MetroSys is seeking a skilled Information Security Engineer II to support and lead efforts around vulnerability management within a dynamic, enterprise-scale environment. This individual will be instrumental in identifying and addressing security vulnerabilities across systems, networks, and applications. The ideal candidate brings a deep understanding of vulnerability scanning tools, remediation prioritization, and collaborative risk mitigation strategies. You will work closely with cross-functional teams to enhance the organization’s security posture and help ensure compliance with industry standards. If you thrive in fast-paced environments and are passionate about cybersecurity, this is an exciting opportunity to grow and make an impact. Key Responsibilities Lead the end-to-end vulnerability management lifecycle : scanning, analysis, prioritization, reporting, and remediation tracking. Perform regular vulnerability assessments and support remediation efforts in collaboration with infrastructure and application teams. Track and assess emerging threats and zero-day vulnerabilities using vendor bulletins and threat intelligence feeds. Generate reports and dashboards to communicate risk posture and mitigation progress to technical and executive stakeholders. Maintain and optimize vulnerability scanning tools to ensure full visibility and accurate detection across the environment. Assist in security incident response involving known or suspected exploited vulnerabilities. Support regulatory and compliance audits (e.g., PCI, NIST, HIPAA ) by providing documentation and metrics. Continuously improve processes, documentation, and tooling in the vulnerability management program. Qualifications Bachelor's degree in Computer Science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in information security, with a strong emphasis on vulnerability management. Hands-on experience with scanning tools (e.g., Tenable, Qualys, Rapid7). Solid understanding of network architecture , operating systems (Linux, Windows), and web applications . Familiarity with CVSS scoring , risk modeling, and remediation prioritization frameworks. Ability to work with scripting or automation tools (Python, PowerShell, Bash) is a plus. Excellent communication and problem-solving skills; ability to clearly explain security findings to non-security audiences. Experience with compliance frameworks such as PCI DSS, NIST, HIPAA , or ISO 27001 . Relevant certifications are a plus (e.g., CISSP, Security+, LFCS, RHCSA ). Powered by JazzHR

Posted 30+ days ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we believe security starts with the details. As an Information Systems Security Officer (ISSO), you will support the security posture of critical systems across their lifecycle. From assisting with risk assessments to maintaining compliance documentation, you’ll play a key role in protecting sensitive systems and data. Working alongside experienced ISSMs and ISSEs, you will gain hands-on experience with cybersecurity best practices in a collaborative, mission-driven environment.Independent Software is where innovation meets purpose. You'll join a team that values integrity, learning, and technical excellence. We offer the opportunity to work on impactful projects, grow your cybersecurity expertise, and contribute to real-world missions. With flexible work environments, strong mentorship, and a commitment to professional development, Independent Software is the place to launch or elevate your cybersecurity career. Key Responsibilities: Assist senior ISSOs in implementing and enforcing information systems security policies and standards Support the evaluation of security solutions for classified environments Perform basic configuration management for security software, hardware, and firmware Maintain records for systems including upgrades, firewalls, routers, switches, and other network components Develop and maintain required cybersecurity documentation such as System Security Plans (SSPs), Risk Assessment Reports, and other accreditation packages Assist in daily security operations and maintaining the system’s operational cybersecurity posture Track and manage user access control and authentication mechanisms Support vulnerability and risk assessments to enable system authorization Coordinate with engineers and customers to ensure compliance with IT security policies and NIST RMF Help manage and control system changes and assess their security impact Interact with system owners, customers, and IT staff to support cybersecurity objectives Required Skills and Qualifications: Strong foundational knowledge in IT or cybersecurity principles Experience with or understanding of system hardening, access control, or security policy implementation Ability to prepare, maintain, and review cybersecurity documentation Familiarity with vulnerability assessment and basic risk analysis Clear communication and collaboration skills to support interaction with teams and stakeholders Minimum of five years of combined work-related experience in IT, cybersecurity, or security authorization · Experience in at least two of the following areas is required: Current security tools Hardware or software security implementation Communication protocols Encryption tools or techniques Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or related technical discipline In lieu of a bachelor’s degree, an additional four years of relevant work experience may be substituted Certifications: Must be compliant with DoD 8570.01-M Minimum certification required: IAM Level I Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

i-Tech Support logo
i-Tech SupportOrlando, FL
Virtual Chief Information Officer (vCIO) Team: Business Alignment Role Summary The vCIO role is integral to the success of both clients and the MSP. The vCIO works to understand each client's business, technology use, and strategic goals to recommend solutions that enhance operational efficiency. By collaborating with the Managed Services Team, the vCIO aligns client technologies with industry standards through benchmarking, technology roadmaps, and strategic budgeting. This position requires balancing business acumen and technical expertise to optimize systems, reduce risk, and support growth. The vCIO also plays a crucial role in client retention through consistent engagement, satisfaction management, and identifying opportunities for additional professional services. Key Responsibilities 1. Client Engagement and Strategic Planning Initiate and manage MSP client relationships through onboarding and ongoing engagements. Establish and lead client steering committees and conduct Quarterly Business Review (QBR) meetings. Create and present technology roadmaps and budgets aligned with business goals. 2. Operational Excellence and Process Management Follow established Business Alignment (BA) processes and ensure smooth inter-departmental coordination. Use MSP tools for visibility, reporting, and management of client environments. Improve service metrics like tickets per endpoint per month (TPE/M) and average resolution time. 3. Technology Risk Management and Lifecycle Consulting Educate clients on cyber-risk management and implement strategies for protection. Manage technology lifecycle to ensure systems remain current and efficient. Advocate for appropriate upgrades and services, explaining needs and costs. 4. Communication and Team Collaboration Maintain transparent communication with clients and internal teams. Participate in meetings like Noise Abatement Process (NAP), Standards Committee, and Preflight Check-ins. Promote company values and contribute to the organization's culture. Accountability / KPIs Process Development & Optimization: Continuously refine BA processes. KPI Management: Track and report team metrics. QBR Engagement: Monitor scheduled and completed QBRs. Client Interaction: Evaluate engagement and satisfaction. Proposal Performance: Track proposal success rates. Competencies Business Acumen & Communication: Strong business insight and communication. Technical Proficiency: Expertise in relevant technologies with continuous learning. Organizational Skills: Efficient workflow and coordination. Task Management: Prioritization and multitasking under deadlines. Strategic Recommendations: Deliver impactful technology alignment insights. Qualifications Education: Bachelor's degree or equivalent experience. Technical Passion: Certifications or demonstrated expertise in technology. Business & Financial Acumen: Understanding ROI, P&L, TCO, and business models. Proven Track Record: Achievement of goals with strong client satisfaction and leadership. Benefits We offer comprehensive medical, dental, and vision insurance with competitive plan options We provide basic life insurance and long-term disability for all our employees 401k program with employer match to help you invest in your future Paid parental leave to support you and your family 22 paid days off (15 PTO + 7 National Holidays) Company issued laptop Company paid training as necessary Opportunities for professional development and growth Access to cutting-edge technology and resources

Posted 30+ days ago

T logo
Talent Acquisition ConceptsLinthicum, MD
Are you looking for a Challenge? Looking for an innovative organization and the opportunity to learn and grow professionally? At Terrestris, LLC, we are helping the government create better mission outcomes through better human performance. We are currently seeking an Information Security SME Instructor to develop, deliver, and maintain the Information Security curriculum. This position will have hybrid (subject to change) opportunities and is located Linthicum, MD. In this role you will be expected to: The ideal candidate will provide subject matter expertise in the development, delivery and maintenance of the Information Security Curriculum. This includes working with client program leads, management, technical staff in the design, conversion, development and delivery of training and certification projects, curricula, and products. Complete client Instructor Basic and Intermediate Certification as defined in the client Instructor Certification Manual Demonstrate mastery of Information Security knowledge, skills, and policy Instruct Information Security courses to include basic and advanced instructor- led courses in accordance with the course schedule Serve as a SME in response to student and customer inquiries with respect to Information Security Provide assistance to the Curriculum Manager in all phases of the ADDIE process, to include file management, and extensive course review from cradle to grave Review training material/deliverables and provide recommendations on the accuracy of and relevancy of content of instructor-led eLearning, webinars and performance support tools (i.e. storyboards, instructor guides, participant guides, design plans, and other related material) We're looking for someone who is/has: Bachelor's degree in the field of education from an accredited university. In lieu of a Bachelor's degree, five years of experience as an instructor for adult learners, in formal classroom or via distance learning courses related to DoD Security Policy Experience in Information Security Experience in Microsoft Outlook, Word, and PowerPoint Current TS/SCI security clearance Preferred Qualifications: Five years of work experience in Information Security All qualified applicants will receive consideration for employment without regard to race, color, religion, sexual orientation, gender identity, national origin, disability, age, marital status, ancestry, protected veteran status, or any other protected group or class. DILBERT © 2018 Scott Adams. Used By permission of ANDREWS MCMEEL SYNDICATION. All rights reserved.

Posted 30+ days ago

Centurum logo
CenturumSan Diego, CA

$41 - $53 / hour

The Information System Security Specialist III role encompasses a broad range of information security disciplines, including risk assessment, security architecture development, vulnerability management, compliance adherence, incident response, and cybersecurity. DUTIES AND RESPONSIBILITIES Risk Assessment: Conduct comprehensive risk assessments to identify vulnerabilities and threats to information assets, systems, and networks. Analyze potential impacts and develop mitigation strategies. Security Architecture Development: Design, develop, and implement security architectures, policies, standards, and procedures to protect information assets and systems. Compliance: Ensure compliance with relevant regulatory requirements, industry standards and organizational policies. Develop and maintain documentation to support compliance efforts, such as IATT, IA certification documentation etc. Cybersecurity: Implement and maintain cybersecurity measures to protect against cyber threats, including malware, phishing, ransomware, and other attacks. Stay abreast of emerging threats and vulnerabilities. Documentation: Maintain accurate and up-to-date documentation of security policies, procedures, and controls. Update patches to address vulnerabilities and support preparation and recurring scans/documentations to maintain IATT/ATO. Install, update, and troubleshoot systems/servers. Check system hardware availability, functionality, integrity, and efficiency. Conduct functional and connectivity testing to ensure continuing operability. Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing. Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. Develop and document systems administration standard operating procedures. Ensure the application of security patches for commercial products integrated into system design meets the timelines dictated by the management authority for the intended operational environment. Maintain baseline system security according to organizational policies. Identify and analyze anomalies in network traffic using metadataIsolate and remove malware. Identify applications and operating systems of a network device based on network traffic. REQUIRED SKILLS/YEARS OF EXPERIENCE Minimum of one (1) to three (3) years of experience in information assurance, cybersecurity, or a related field. Relevant certifications such as CompTIA, CISSP, CISM, Security+, or equivalent. Extensive knowledge of information security principles, practices, and technologies. Strong understanding of Department Of navy (DON) Risk Management methodologies and Frameworks (RMF). Proficiency in vulnerability management processes and tools. In-depth knowledge of security architecture and design principles. Examine network topologies to understand data flows through the network. Recommend computing environment vulnerability corrections. Bachelor's degree in Computer Science, Information Systems, or a related field. Demonstrated ability to immediately contribute to the organization's security posture with no supervision or training. Travel Required : 10% Work Location : San Diego, CA This position is required to have and maintain a Secret US DoD security clearance. PREFERRED SKILLS REMARKS Must be able to communicate effectively in English, both verbally and in writing.Must be able to interface effectively with all levels of technical and management personnel. Labor Category - Specialist, Information System Security I Compensation: $41 - $53 an hour.Compensation for positions at Centurum vary depending on a wide range of factors including, but not limited to, location, responsibilities, skill set, and level of experience.EOE M/F/Disability/VeteranWhen responding to this posting please reference job # SD25-75, Information System Security Specialist I (SATCOM) Benefits Full-time employees are eligible for the following benefits enrollment from their date of hire: Health Insurance - Centurum provides insurance for employee and dependent in a comprehensive package. Coverage for vision care is included. This option is available on a cost-sharing basis. Dental Insurance - Available in conjunction with Health Insurance for an additional cost. Provides oral maintenance care for employee and dependent. Basic Life Insurance - Company provided benefit for all full-time employees. Supplemental Life Insurance - Optional life insurance coverage to employees at group rates. Dependant Life Insurance - Optional coverage for dependents at a group rate. Long Term Disability Insurance - Optional coverage available to employees at group rates. Vacation and Sick Leave - Leave accrual is determined by length of service. Holidays - The company observes ten paid holidays each year. Retirement 401(k) Plan - Centurum’s corporate benefits package includes 401K with a company bi-weekly match and a year-end profit sharing company match for all eligible employees. Investments can be made into selected funds under this plan. Centurum is an Equal Opportunity Employer, providing employment opportunities for all persons without discrimination on the basis of race, color, religion, sex, sexual orientation, national origin, age, disability, marital status, citizenship or any other characteristic protected by U.S. law. Centurum makes reasonable accommodations for persons with disabilities. Powered by JazzHR

Posted 1 week ago

Ansible Government Solutions logo
Ansible Government SolutionsTemple, TX
Overview Ansible Government Solutions, LLC (Ansible) is seeking multiple Medical Records Technicians Release of information positions to work with us in support of the Central Texas Veterans Healthcare System located at 1901 Veterans Memorial Blvd, Temple, TX 76504. The schedule is typically Monday-Friday, 8:00am-5:00pm. If you accept employment with Ansible, you must also acknowledge that any assigned schedule is subject to change at the direction of either Ansible or its customers. Ansible is a Service-Disabled Veteran-Owned Small Business (SDVOSB) providing Federal customers with solutions in many arenas. Our customers face wide-ranging challenges in the fields of health care, national security, and information technology. To address these challenges, we employ intelligent and committed staff who take care of our customers’ success as if it is their own. Duties and Responsibilities Process requests for medical records and health information in compliance with privacy regulations (HIPAA, VA policies) Review and verify authorization forms for release of information Ensure timely and accurate release of medical records to authorized parties Maintain confidentiality and security of patient information at all times Communicate with patients, healthcare providers, and third parties regarding information requests Track and manage workload volumes, meeting VA timeliness requirements Address backlogs and support ongoing technician competency through training and auditing practices Document all release of information activities according to VA standards Qualifications and Requirements Experience handling medical records and release of information in a healthcare setting Knowledge of HIPAA and other privacy regulations Familiarity with VA policies and procedures for release of information Strong attention to detail and accuracy Ability to manage workload and meet deadlines Effective communication and customer service skills Commitment to maintaining confidentiality and security of patient information No sponsorship available All candidates must be able to: Sit, stand, walk, lift, squat, bend, twist, and reach above shoulders during the work shift Lift up to 50 lbs from floor to waist Lift up to 20 lbs Carry up to 40 lbs a reasonable distance Push/pull with 30 lbs of force All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Powered by JazzHR

Posted 4 days ago

S logo
SERVISS LLCWashington, DC
About SERVISS At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Information Assurance Professional. Position Summary We are seeking a dynamic and versatile Information Assurance Professional to support a high-impact U.S. Government program. The ideal candidate brings a rare balance of hands-on technical acumen and governance expertise—able to move seamlessly between engineering, architecture, and GRC functions. This role is pivotal in ensuring that systems are not only compliant but also resilient, secure, and aligned with federal risk management frameworks. Key Responsibilities · Serve as a trusted IA advisor, bridging technical engineering efforts with cybersecurity policy, governance, and risk management. · Collaborate with system architects and engineers to design secure solutions that meet compliance and mission requirements. · Support the development, review, and maintenance of key authorization documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms). · Guide system owners and developers through the Risk Management Framework (RMF) process and associated controls (e.g., NIST 800-53, 800-171, CMMC, FedRAMP). · Translate complex technical risks and mitigation strategies into actionable GRC documentation and executive communications. · Conduct system security assessments, gap analyses, and continuous monitoring activities. · Coordinate with cybersecurity operations, incident response, and engineering teams to align IA strategy with operational realities. · Recommend and help implement security architecture improvements based on evolving threat and compliance landscapes. · Track and report on IA posture, risk status, and compliance progress across multiple systems or program areas. Required Qualifications · 10+ years of experience in information assurance, cybersecurity engineering, or GRC. · In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP). · Strong technical foundation with the ability to understand complex systems, architectures, and security configurations. · Excellent verbal and written communication skills, including experience preparing formal security documentation and reports. · Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams. · Bachelor’s degree in Cybersecurity, Computer Science, Engineering, or a related field; or Associate’s degree with 2+ years of additional relevant experience. Preferred Qualifications · Prior experience supporting U.S. federal agencies or DoD environments. · Professional certifications such as CISSP, CISM, CAP, CCSP, or Security+. · Experience with security automation tools and continuous compliance approaches. · Understanding of Zero Trust principles, DevSecOps environments, and modern system architecture. Why Join SERVISS Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way. Freedom to Thrive. · Be part of an exciting company with ground floor opportunities to include equity · Highly competitive compensation and best in class benefits · Opportunities for annual performance bonuses, growth incentives, and profit-sharing · 100% of medical, vision, dental, and life insurance premiums covered by SERVISS · 401(k) retirement plan with company match for the first 6% Note:  This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025. Powered by JazzHR

Posted 30+ days ago

Maania Consultancy Services logo
Maania Consultancy ServicesWashington DC, DC
Required Skills & Qualifications: Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility Minimum of 5 years of work experience in a computer science or cybersecurity-related field Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WeblInspect, Network Mapper (NMAP), and/or similar applications. Powered by JazzHR

Posted 2 days ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we believe security starts with the details. As an Information Systems Security Officer (ISSO), you will support the security posture of critical systems across their lifecycle. From assisting with risk assessments to maintaining compliance documentation, you’ll play a key role in protecting sensitive systems and data. Working alongside experienced ISSMs and ISSEs, you will gain hands-on experience with cybersecurity best practices in a collaborative, mission-driven environment.Independent Software is where innovation meets purpose. You'll join a team that values integrity, learning, and technical excellence. We offer the opportunity to work on impactful projects, grow your cybersecurity expertise, and contribute to real-world missions. With flexible work environments, strong mentorship, and a commitment to professional development, Independent Software is the place to launch or elevate your cybersecurity career. Key Responsibilities: Assist senior ISSOs in implementing and enforcing information systems security policies, standards, and methodologies Support the evaluation of security solutions to ensure they meet requirements for processing classified information Perform configuration management for information system security software, hardware, and firmware Maintain records of system components including servers, routers, switches, firewalls, and related infrastructure Develop and maintain cybersecurity documentation such as System Security Plans (SSPs), Risk Assessment Reports, and accreditation packages Assist in maintaining the operational cybersecurity posture of information systems Track and manage user identification and authentication mechanisms Support vulnerability and risk assessments to assist in system authorization Coordinate with engineers and customers to ensure compliance with IT security policies and NIST RMF Plan and coordinate the implementation of IT security programs and policies Manage and control system changes and assess their security impact Provide daily oversight and direction to contractor ISSOs Interact with customers, IT staff, and executive stakeholders to define and achieve cybersecurity objectives Required Skills and Qualifications: Strong foundational knowledge in IT or cybersecurity principles Experience with or understanding of system hardening, access control, or security policy implementation Ability to prepare, maintain, and review cybersecurity documentation Familiarity with vulnerability assessment and basic risk analysis Clear communication and collaboration skills to support interaction with teams and stakeholders Minimum of ten years of combined work-related experience in IT, cybersecurity, or security authorization · Experience in at least two of the following areas is required: Current security tools Hardware or software security implementation Communication protocols Encryption tools or techniques Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or related technical discipline In lieu of a bachelor’s degree, an additional four years of relevant work experience may be substituted Certifications: Must be compliant with DoD 8570.01-M Minimum certification required: IAM Level I Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

Telophase Corporation logo
Telophase CorporationLanham, MD
Telophase Corporation is seeking a motivated, career and customer-oriented senior Information Systems Security Officer (ISSO) to join our team. The ISSO shall ensure the implementation and maintenance of security controls in accordance with the System Security Plan (SSP) in preparation for NIST RMF and 800-53 based independent security assessments and provide strong leadership in the development of a cyber security validation program for mission systems. Responsibilities: Support adoption and implementation of NIST-based standards across the organization in support of multiple mission system authorization boundaries including Cloud-based workloads Support all steps of NIST RMF with strong background in NIST SP 800-53 Revision 5 and 800-53A Participate in the selection of the organization's common security controls and in determining their suitability for use in the information system Review the 800-53 security and privacy controls regarding their adequacy in protecting the planned or operational information system Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment and Authorization(A&A) packages, and support system authorization activities Implement and enforcing organizational information systems security policies, standards, and methodologies Evaluate security solutions to ensure they meet security requirements for processing unclassified/classified information; perform vulnerability/risk assessment analysis to support certification and accreditation. Red Team operations background such as penetration testing is bonus. Manage changes to the information system and assess the security impact of those changes. Required Skills & Experience: Education: Bachelor's or higher in computer science/ technical discipline preferred or equivalent work experience Years of related experience: 8+ years of experience is required as an ISSO/ ISSM including experience implementing, and enforcing information systems security policies, standards, and methodologies; creating security plans, policies & procedures, SSPs, and Risk Assessment Reports Technical Skills: FISMA, FedRAMP, NIST RMF (Risk Management Framework), NIST 800-53 Revision 5 controls, and strong understanding Security Control Assessment (SCA) processes. Good understanding of Windows and Linux operating systems and architecture. Good knowledge of public cloud providers such as Azure, AWS, and GCP highly desirable Experience with applications for Amazon AWS, Microsoft Azure, GCP or other cloud platforms for large-scale, multi-tenant, SaaS systems highly desirable Experience with security assessments of AWS/Azure/GCP environments preferred Experience with AWS/Azure/GCP service offerings preferred Skills and ideally certifications in public cloud providers (AWS, Azure, GCP) highly desirable Cloud Security experience (AWS/Azure/GCP), including both IaaS and PaaS models preferred Hands-on experience with public cloud services (AWS, Azure, GCP) preferred Hands-on experience in PaaS, SaaS, CI/CD, Docker, Jenkins, Puppet Chef, Ansible, Kubernetes preferred Strong understanding of and experience in AWS / Azure / GCP cloud architecture Experience developing applications for Microsoft Azure, Amazon AWS, Google or other cloud platforms for large-scale, multi-tenant, SaaS systems a bonus Clearance: Must have or be able to attain Public Trust or higher Desired Skills & Experience: Certifications: Cybersecurity certifications, such as CISSP, CISA, CISM, CISA, CEH, GCIH, GCIA, GCFA, GCFE, CDMP, OSCP, OSCE, CDP-DG or similar Work Type: Onsite location on a regular basis with some hybrid telework options. Note for staffing agencies: We are not accepting unsolicited resumes for this position. All inquiries must go through the Telophase team As an Equal Opportunity Employer, it is Telophase’s policy to recruit, hire, and provide opportunities for advancement in all job classifications without regard to race, color, religion, sex, national origin, age, citizenship, marital status, sexual preference, parental status, or disability.   Powered by JazzHR

Posted 30+ days ago

A logo
Action Logistics, IncArlington, TX
Job Overview: We are seeking a qualified Information Systems Auditor to conduct a focused audit of our accounting servers and data backup infrastructure. This role will assess the effectiveness, reliability, and security of our current data backup and recovery processes, ensuring they comply with best practices and support business continuity objectives. The audit will specifically evaluate the backup strategies for our accounting systems, including their implementation, scheduling, monitoring, testing, and restoration capabilities. Key Responsibilities: Conduct a comprehensive audit of the current backup methods and policies for all Accounting-related servers and data repositories. Evaluate existing infrastructure, software, and tools used for backup and recovery, including offsite/cloud-based solutions. Assess the consistency, frequency, and completeness of backup processes, including full, incremental, and differential strategies. Test and validate data restoration procedures at various levels (file, database, server image, and full disaster recovery scenarios). Identify gaps or risks in backup integrity, scheduling, encryption, and retention policies. Review user access and security protocols related to backup data and restoration tools. Document all findings and provide actionable recommendations to improve backup reliability, security, and compliance. Collaborate with IT staff and third-party vendors (if applicable) to validate systems, access logs, and restoration capabilities. Produce a final audit report including an executive summary, technical findings, remediation priorities, and proposed action plan. Qualifications: Bachelor’s degree in Information Systems, Cybersecurity, Computer Science, Accounting Information Systems, or related field. 5+ years of experience in IT audit, systems administration, or cybersecurity with direct involvement in data backup and recovery. Strong understanding of accounting system infrastructures (e.g., Microsoft Dynamics GP). Familiarity with backup solutions (e.g., Datto,  AWS backup) and cloud/offsite backup best practices. Experience with risk assessments and business continuity planning. Certifications such as CISA, CISSP, or CRISC are highly desirable. Strong communication skills, including report writing and presenting findings to senior leadership. Powered by JazzHR

Posted 30+ days ago

Veracity Insurance logo
Veracity InsurancePleasant Grove, UT

$75,000 - $85,000 / year

At Veracity, we aim to be a different kind of insurance partner – one that is free from outside investors, venture capital, or the pressures of a corporate parent. Ours is a culture of empowerment – one that believes in effort, results, and accountability. We believe that transparency fosters trust, trust fosters growth, and that growth drives innovation. Our commitment to rigorous evaluation and relentless execution lead to rapid evolution. We answer only to the small business owners we serve, and this independence allows us to stay focused on what matters most: helping their businesses thrive by providing expert guidance and best-in-class insurance policies. We’re growing fast and want you to be a part of it! We’re seeking a talented, detail-oriented Information Security and Compliance Analyst to join our team. Reporting to the Technical Operations and Information Security Manager, this role is responsible for supporting the organization’s cybersecurity posture by maintaining and enhancing security policies, controls, and monitoring systems, and ensuring compliance with frameworks such as SOC 2 and PCI DSS to protect company and client data. Key Responsibilities Strengthen the organization’s cybersecurity posture by implementing, maintaining, and improving security policies, standards, and technical controls Monitor security tools and system activity to identify, investigate, and escalate potential threats or vulnerabilities Support vulnerability management, including performing scans, tracking remediation, and validating fixes Maintain accurate, audit-ready documentation and coordinate evidence collection for SOC 2, PCI DSS, and other compliance frameworks Support incident response processes, including triage, documentation, and post-incident follow-up Assist with user access reviews, control testing, risk assessments, and security awareness efforts Collaborate with IT, Engineering, and Compliance teams on secure configurations, remediation plans, and cross-functional security initiatives Participate in routine policy, procedure, and control reviews to ensure alignment with regulatory requirements and security best practices Maintain detailed logs and reports of security activities, metrics, and compliance obligations Identify opportunities to strengthen controls, streamline processes, and enhance overall security program maturity Required to perform other duties as requested, directed, or assigned Requirements and Qualifications Bachelor’s degree in information systems, IT, Cybersecurity, or a related field 2–3 years of experience in security compliance, auditing, or governance (SOC 2 experience preferred) Strong integrity, attention to detail, and accountability in handling sensitive or regulated information Proactive problem-solving skills with the ability to anticipate and address risks effectively Strong collaboration and communication skills with experience working across technical and compliance teams Ability to remain composed and effective under pressure, including during audits and security incident Perks Health, dental, and vision plans Amazing work-life balance with 4 weeks of Paid Time Off 10 Paid Company Holidays with 2 floating holidays 401K Programs with employer match Personal assistance programs for support in a healthy personal and work life Why Veracity? Here at Veracity, you’ll be part of a team of trailblazers and visionaries. We’re not just revolutionizing the way people “do” insurance; we are creating a whole new paradigm. Here, you will experience a vibrant and inclusive workplace where your ideas matter! With us, you have a chance to: Engage in groundbreaking projects that are reshaping the insurance landscape Collaborate with a group of dedicated, like-minded professionals Experience a culture that prioritizes growth and development Compensation Range: $75k/yr - $85k/yr We are proud to be an equal-opportunity employer. We are committed to providing equal opportunities to all qualified applicants, regardless of race, color, religion, sex, national origin, disability, or any other legally protected characteristics. If you need accommodation, please let us know during the interview process. Powered by JazzHR

Posted 1 week ago

Kegman Inc logo
Kegman IncMelbourne, FL
Information System Security Officer Kegman Inc. is a Woman-Owned/Service-Disabled Veteran-Owned Small Business headquartered in Melbourne FL that provides engineering and technical support services to U.S. Government clients. We are seeking an Information System Security Officer (ISSO) to join our team at Patrick Space Force Base in Melbourne, FL. NOTE: This is not a remote/telework job. This job requires the selected applicant to have an active U.S. Government-issued security clearance at time of hire and, therefore, requires U.S. citizenship. The ISSO will be involved in all aspects of cybersecurity operations and will partner with program/site leads as well as government staff and mission partners to maintain an effective information security program. This position will document, implement, and assess security controls to perform system monitoring and compliance assessment activities. In addition, this ISSO will provide Risk Management Framework (RMF) support. Responsibilities Work as part of an integrated team to develop and maintain RMF body of evidence documentation (example: System Security Plan, Security Controls Traceability Matrix, Plan of Action and Milestones, ATO’s) using Microsoft products such as Word, Excel, PowerPoint, and Visio. Maintain repositories of all body of evidence documentation for systems under your purview and ensure they are accessible only to properly authorized individuals. Develop and execute security control assessment procedures to verify conformance with control requirements as part of ongoing continuous monitoring and authorization assessment activities. Work in close coordination with system administrators and other cyber team members to ensure systems are operated, maintained, and disposed of in accordance with applicable security policies and procedures and notify the ISSM when changes occur that might impact system authorization posture. Support the CISO, PM, ISSM or ISO in maintaining current authorization to operate, and approval to connect, and in implementing corrective actions identified in the plan of action and milestones. Coordinates, with the CISO, PM, ISSM and AO staffs, development of an IS Configuration Management strategy and monitor any proposed or actual changes to the system and its environment. Ensure all security-related vulnerabilities and deficiencies are documented in the Plan of Action and Milestones (POA&M). Ensure integration of cybersecurity into, and throughout the lifecycle of the IT, on behalf of the ISSM and ISO. Ensure the development and implementation of an effective information security education, training, and awareness program. Ensure configuration management policies and procedures for authorizing use of hardware/software on a system are followed and coordinate any additions, changes or modifications to hardware, software, or firmware with the ISSO/ISSM prior to the addition, change or modification. Ensure software, hardware, and firmware complies with appropriate security configuration guidelines (e.g., security technical implementation guides (STIG)/security requirement guides). Reports security incidents or vulnerabilities to the CISO/ISSM/wing cybersecurity office according to AFI 17-203, Cyber Incident Handling. Basic Qualifications Experience working in information assurance or cybersecurity roles supporting classified DoD environments Working knowledge of NIST 800-53 controls and RMF Experience analyzing and interpreting outputs of various endpoint security, vulnerability, and enumeration tools (example: Tenable Nessus, Security Center, SolarWinds, EndPoint Security Solutions, Vulnerator, SCAP Compliance Checker) Preferred Qualifications Strong interpersonal and written/oral communication skills to coordinate with program/site leads as well as government staff and mission partners Experience working on/with Government contracts Detail-oriented team member who can consistently meet deadlines and is able to work independently as needed Able to multi-task and work with a diverse work group of vendors, executive managers, subcontractors, consultants, and other professionals. Education Bachelor’s degree in Cybersecurity or other related field and 3+ years of experience, or Master’s degree Or DoD 8570 IAM Level I (Security+) or higher baseline certification (CISSP preferred) OTHER: U.S. citizenship required. Must pass a pre-employment drug test. Must have a fully adjudicated (not an interim) U.S. Government-issued security clearance at time of hire. Kegman Inc. is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law. Kegman will abide by the requirements of 41 CFR 60741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. Please be aware many of our positions require an active security clearance. Security clearances are be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment that requires a security clearance will be subject to government security investigation(s) and must meet and maintain eligibility requirements for access to classified information. By submitting your résumé for this position, you understand and agree that Kegman may share your résumé, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions. Kegman maintains a drug-free workplace and performs pre-employment substance abuse testing where permitted by law. Powered by JazzHR

Posted 1 week ago

L logo
Lucayan Technology Solutions LLCTampa, FL
Location: Remote Clearance Required: Public Trust (Minimum Background Investigation – MBI) Employment Type: Full-Time Overview Lucayan Technology Solutions is seeking an experienced Lead Systems Information Engineer to support and lead the technical team responsible for the IRS Microsoft 365 (M365) Cloud Suite platform. The ideal candidate will bring deep expertise in Microsoft cloud technologies, strong leadership capabilities, and experience working within federal government environments requiring strict compliance, privacy, and security controls. Key Responsibilities Lead, manage, and support the technical operations of the IRS Microsoft 365 Cloud Suite environment. Perform system administration, maintenance, integration, troubleshooting, and optimization of M365 services. Oversee implementation and support of Power Platform, including PowerApps, Power BI, and Flow. Conduct security and privacy analysis in alignment with IRS and federal standards. Develop and maintain project documentation, including technical policies, procedures, and system configurations. Serve as the primary technical liaison, collaborating with internal teams, stakeholders, and IRS SMEs to ensure deliverables meet compliance requirements. Provide technical guidance and mentorship to team members. Quickly adapt to IRS-specific processes, security requirements, and compliance frameworks. Required Qualifications Minimum 5 years of experience supporting Microsoft 365 Cloud Suite in a large corporate or government environment. Experience supporting federal government clients or similar high-security environments (IRS experience is a plus). Expertise with Microsoft Power Platform (PowerApps, Power BI, Flow). Strong .NET development skills (C#, ASP.NET MVC, Entity Framework, JavaScript, HTML, CSS). Proficiency in PowerShell scripting for automation and administration. Experience with Exchange, Intune, Azure AD , and other Azure ecosystem tools. Experience with SharePoint Administration and PowerApps model-driven development. Excellent communication, problem-solving, and leadership skills. Security Clearance & Training Requirements Must have or be able to obtain a Public Trust (MBI) clearance. Must complete all IRS-required security, privacy, and compliance training. Preferred Qualifications Prior IRS support experience or familiarity with IRS modernization initiatives. Working knowledge of federal compliance frameworks (NIST, FISMA, Zero Trust, TIC). Microsoft certifications such as: M365 Enterprise Administrator Expert Power Platform Developer / Administrator Azure Administrator or Solutions Architect Experience leading remote technical teams. Work Environment Fully remote position with virtual collaboration across distributed teams. Fast-paced, compliance-driven environment supporting federal agencies. May require occasional off-hours support for maintenance or urgent system needs. Powered by JazzHR

Posted 3 weeks ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we are committed to building secure, mission-driven technology that protects what matters most. As an Information System Security Manager, you will provide expert-level oversight of security operations across complex systems and programs. You will help design, implement, and enforce information security policies that align with organizational goals and regulatory requirements. Your leadership will ensure systems remain secure throughout their lifecycle—from concept through retirement—while collaborating closely with engineers, program managers, and cybersecurity personnel.This role offers the opportunity to shape enterprise cybersecurity practices, lead high-impact security initiatives, and mentor the next generation of security professionals. You will be a key contributor to programs that support critical national priorities Key Responsibilities: Provide management support for the development, coordination, and enforcement of enterprise information assurance programs Oversee the operational security posture for assigned information systems or programs Lead the development and enforcement of system security policies, standards, and procedures Perform risk and vulnerability assessments to support security authorization decisions Provide day-to-day security operations support and oversight for ISSEs and ISSOs Manage and assess the security impact of changes to hardware, software, and firmware Review and manage documentation including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices (SRTMs) Analyze user needs to determine functional and cross-functional security requirements Gather and organize technical information relevant to organizational goals and security posture Facilitate issue resolution through Technical Exchange Meetings and integrated product teams Collaborate with engineering staff to ensure secure systems integration throughout the development lifecycle Serve as the program’s designated ISSM and provide daily oversight to ISSOs Advise and support Program Managers on cybersecurity strategy and program execution Enable the design and implementation of secure IT systems for future enterprise environments Required Skills and Qualifications: Twelve years of professional experience in the field of security authorization Demonstrated experience with current security tools, hardware and software security implementation, communication protocols, and encryption technologies Knowledge of commercial security products, risk management practices, security incident management, and PKI and authorization services Experience developing and managing system security documentation and artifacts Proven ability to manage security across multi-system environments, including secure collaboration with engineering, operations, and leadership teams Strong communication and leadership skills to interact with both technical teams and executive stakeholders Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or a related field from an accredited college or university In lieu of a degree, four additional years of relevant work experience may be substituted Certifications: Compliance with DoD 8570.01-M Minimum certification required: IAM Level II (e.g., CISSP, CAP, CISM) Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

IDS International logo
IDS InternationalArlington, VA
Join our team at IDS Technology as an Information Warfare Exercise Design Specialist and immerse yourself in cutting-edge military exercises focused on Special Operations in the Information Environment. As a leader, you'll use your expertise to bring digital information to life, simulating a near-peer contested information environment to provide warfighters with real-life training. You'll work with US Military and other organizations to develop, plan, and coordinate scenarios, providing instruction, coaching, and subject matter expertise in the human domain and computer and network troubleshooting. With opportunities to travel to exercise sites and provide remote support, this role offers a dynamic and exciting environment to hone your skills and make a meaningful impact. Apply your knowledge of relevant technologies and expertise in SOF, Cyber, PSYOP, Intel, SPACE and Civil Affairs to this unique challenge. Embrace the chance to push the boundaries of Information Advantage, developing innovative solutions and advancing the field. Join us at IDS, where we believe in resolving conflict through innovative approaches and technical solutions.  Why IDS?   IDS believes in resolving conflict and building innovative approaches to do so. Combining operational expertise with an intimate understanding of today’s greatest challenges to bring our customers the technical solutions required for success in a complex and multi-domain world.   Synthetic Internet for Training and Exercises (SITE), a proprietary product of IDS Technology Government Services, is a digital training solution that provides a full-range, free-play, immersive, realistic, and scalable simulated Information Advantage environment where warfighters simultaneously train on full-spectrum cyberspace, Electronic Warfare, and social media analytics during integrated and multi-domain exercises.  Responsibilities:  Become the Subject Matter Expert on the SITE platform.  Maintain current knowledge of relevant technologies and subject areas.  Display subject matter expertise in SOF, Cyber, PSYOP, Intel, or Civil Affairs and its relevance to Multi-Domain Operations and/and Operations in the Information Environment.  Work with our technical team to learn how to build and design websites within SITE that enrich an exercise scenario’s Operational Environment.  Travel to exercise locations as required. Travel and accommodation to/at training locations are provided for the assignment period (typically 1-4 weeks).  Computer and networking troubleshooting with customers, including server connection diagnosis, token authentication errors, and basic user support. Be able to communicate issues to the remote Technical Support Team and Software Developers and manage troubleshooting ticketing from identification to resolution.   Perform research on various social media platforms; develop and incorporate replicated platforms and associated input/outputs into scenario planning, execution, and assessment.  Demonstrate that you know the problems clients are facing in the innovation and growth of Information Advantage with real examples from your experience. Convince customers that there are challenges they may not yet have identified (or at least understood could be solved)   Identify which of our use cases match the client’s pain points, enabling the customer to help compile a list of requirements, capabilities, MOP/MOEs, and improve their experience with SITE.  Surface new product development opportunities and/or issues with current solution & own feedback loop to the product team and roadmap   Monitor KPIs and ARR growth. Prepare reports, briefs, and documents to support event scenario development.  Oversee OPFOR (red) and population (grey) activity on social media and civilian internet activity, ensuring MSEL/scenario development is accurately portrayed online.  Demonstrate a strong understanding of layered effects between Kinetic Operations, Information Operations, Full-spectrum Cyberspace Operations, Electronic Warfare, SIGINT, SPACE, and MILDEC.  Understand and demonstrate the TTPs and concepts of social media weaponization.  Define and develop innovative Information Advantage capabilities that integrate advanced analytics and concepts of operation into the exercise scenario.  Plan and create visual information products that communicate assigned information objectives and illustrate assigned messages to inform OPSGRP and the training audience.  Gather open-source and controlled intelligence to develop a predictive understanding of adversarial strategies, priorities, and overlapping interests.  Plan, develop, and disseminate digital information content into the rotational scenario in a closed internet environment, such as tweets, blogs, news articles, propaganda, Facebook profiles, images, and videos.  Develop and publish Open-Source Enterprise style Daily Social Media Alerts to be used by training units and exercise control groups for scenario development and inclusion in AARs to demonstrate the tangible confluence of the physical and digital environments.  Establish a community and facilitate interaction to identify opportunities for collaboration and sharing.  Create presentations and marketing material to articulate the program.  Required Qualifications:  Active Top-Secret clearance. Those with “SECRET” clearance will be reviewed on a case-by-case basis  Ability to travel up to 50%  Familiarity with Direct Action, Counterterrorism, Unconventional Warfare, Foreign Internal Defense, Psychological Operations, Civil Affairs, Multi-Media Production, and Special Operations Forces.  Experience working with tactical to enterprise-scale clients, especially within USASOC.  Familiarity with exercise planning and management   Preferred Qualifications:  Degree from an accredited college; preferred degree in Computer Science or Information Technology  CompTIA Network+  CompTIA Sec+  Eight (8) years demonstrated experience in an intelligence discipline, civil affairs, ODA, Joint SOF, or psychological operations working in the DoD or IC, or six (6) years demonstrated experience working in a field related to OSINT research, J39X, non-standard communications, cyberspace operations, collection management, or analysis or the exploitation of publicly available information or social media.  Demonstrated working knowledge of computer networking, including Local Area Networks (LAN) and Cloud Networks  Special Operations Forces experience in both intelligence and operations  Computer Skills:  Advanced knowledge of Microsoft Office tools (Word, Excel, and PowerPoint).  Working knowledge of WordPress, VPNs, and HTML  Physical Demands:  Employee must be able to sit at a workstation for extended periods; use hand(s) to handle or feel objects, tools, or controls; reach with hands and arms; talk and hear. Most positions require the ability to work on a desktop or laptop computer for extended periods of time reading, reviewing/analyzing information, and providing recommendations, summaries, and/or reports in written format. Must be able to communicate effectively with others verbally and in writing. Employee may be required to occasionally lift and/or move moderate amounts of weight, typically less than 40 pounds. Regular and predictable attendance is essential.  Must be an effective communicator both verbally and in writing. Most positions require the ability to work on a desktop or laptop computer for extended periods of time. Computer activities include reading, reviewing, and analyzing information and providing recommendations, summaries, and reports in written or verbal format. Additionally, positions require the ability to sit at a workstation for extended periods; use hand(s) to handle or feel objects, tools, or controls; reach with hands and arms; as well as speak and hear.  Employee may be required to occasionally lift and/or move moderate amounts of weight, typically less than 20 pounds, but may vary depending on the position. Regular and predictable attendance is essential. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status, and any other characteristic protected by federal, state, and local law. If you are unable to apply through the portal and need to speak to someone about necessary accommodations to apply, please email accommodation@idsinternational.com and we will follow up with you. Do not submit resumes and applications through this email. Powered by JazzHR

Posted 30+ days ago

L logo
Lucayan Technology Solutions LLCChantilly, VA
📍 Chantilly, VA | 🕒 Full-Time | 🔒 TS/SCI with Polygraph | Onsite Join Our Mission Lucayan Technology LLC is looking for an Information Systems Security Engineer (ISSE) with Space Systems experience to join our growing cybersecurity team in Chantilly, VA. In this role, you will be instrumental in safeguarding mission-critical systems, applying your expertise in ICD 503 compliance, secure systems design, and information assurance engineering. What You’ll Do Conduct information system security engineering throughout the lifecycle, from acquisition to operations. Integrate security requirements into system design and development using systems engineering methodologies. Collaborate with government stakeholders to ensure compliance with ICD 503 certification and accreditation. Provide hands-on expertise with networks, virtualization platforms, and enterprise operating systems. Lead or support technical activities in system integration, configuration management, and testing . Participate in space system security requirement reviews, working groups, and national-level security councils. Prepare and maintain security documentation, including System Security Plans (SSPs), CONOPS, POA&Ms, and configuration management plans . Qualifications Required: Active TS/SCI with Polygraph . Bachelor’s degree in Computer Science, Engineering, or related discipline. 8+ years of experience in information assurance and systems security engineering. Hands-on experience with operating systems (Windows, Linux, Unix, macOS) and virtualization (VMware, Xen, Hyper-V). Demonstrated knowledge of ICD 503 and security accreditation processes. Space systems security engineering experience. One of the following baseline certifications: CISSP, CISM, GCLP, CCSP . Preferred: Master’s degree in Computer Science, Cybersecurity, or related field. Experience with NIST Risk Management Framework (RMF) and continuous monitoring practices. Strong technical project management and leadership experience. Why You Should Join Lucayan At Lucayan Technology LLC, we specialize in cybersecurity, engineering, and program support for mission-critical federal and defense programs. Our engineers play a direct role in protecting national security systems, including space-based platforms and networks . By joining Lucayan, you’ll gain: The opportunity to contribute to high-impact national security missions . A collaborative environment working alongside government and industry experts. Professional growth through training, certifications, and advancement opportunities. A company culture built on integrity, mission-focus, and technical excellence . 👉 Apply today and help us secure the future of national defense and space systems! Powered by JazzHR

Posted 30+ days ago

L logo
Lucayan Technology Solutions LLCChantilly, VA
📍 Chantilly, Virginia | 🕒 Full-Time | 🔒 TS/SCI with Polygraph | Onsite Overview Lucayan Technology LLC is seeking a Cyber Defense IASAE Level II to join our growing team in Chantilly, VA. This role is focused on designing and securing information system architectures for a mission-critical Intelligence Community program. As part of Lucayan’s cybersecurity engineering team, you will play a key role in protecting networks, applications, and systems by applying ICD 503 standards, DoD IA policies , and best practices in cybersecurity architecture. What You’ll Do Design and secure end-to-end information system architectures . Engineer security solutions across networks, applications, and databases. Implement defense-in-depth strategies, including firewalls, VPNs, IDS/IPS, antivirus, switches, routers, and boundary protection . Support system development through ICD 503 certification and accreditation processes. Collaborate with government stakeholders to ensure compliance with NIST and NRO security policies . Integrate security engineering into all phases of the system lifecycle. Do you have what it takes? Requirements: Active TS/SCI with Polygraph . Bachelor’s degree in Computer Engineering, Cybersecurity, INFOSEC, Information Management, or Computer Science. 5+ years of IASAE experience. One of the following certifications: CASP, CSSLP, or CISSP (Associate). Preferred: Experience supporting senior government managers on IA issues. Familiarity with NRO policies and Risk Management Framework (RMF) . End-to-end system security engineering and integration experience. About Lucayan Technology LLC At Lucayan Technology LLC, we deliver mission-focused cybersecurity, engineering, and program management solutions to the Department of Defense and Intelligence Community . Our teams are trusted to safeguard some of the nation’s most sensitive systems, from enterprise networks to space-based platforms. By joining Lucayan, you’ll contribute directly to national security , work in a collaborative environment , and gain access to professional development opportunities that support your career growth. 👉 Apply today to become part of Lucayan’s expert cybersecurity engineering team and help us secure the future of national defense systems. Powered by JazzHR

Posted 30+ days ago

S logo
Summit Federal Services, LLCSalem Winston, NC
Summit Federal Services, LLC (SFS) with headquarters in Oakland, Maryland, is a fast growing woman owned Small Business and HUBZone company with an outstanding record of performance providing more effective and efficient acquisition, business process, training, IT, administrative and security services to multiple federal agencies. SFS/Merito is looking for a Information Systems Security Manager to spearhead their client organizations information security program.  The ISSM will lead the development and implementation of security measures, ensuring compliance with industry regulations, frameworks, and company policies. The ideal candidate will bring expertise in cybersecurity, risk management, and information systems security compliance to protect the organization’s critical assets Location: Winston-Salem, NC, hybrid  (Remote for first 5 months then reports onsite) Job Type:  Contract Reports To:  Corporate Compliance Manager & Facility Security Officer Pay : Based on experience Key Responsibilities: •    Lead the establishment and maintenance of classified networks and operating systems. •    Develop and maintain technical documentation and security policies for IT equipment within open storage areas. •    Determine technical Information Assurance (IA) requirements and conduct cyber risk assessments, including vulnerability analysis and implementation of mitigation solutions in alignment with RMF standards. •    Author and manage security documentation for system authorization, continuous monitoring, and information systems lifecycle management (e.g., Authorization to Operate (ATO), System Security Plan (SSP), Plans of Action and Milestones (POAM). •    Provide guidance and technical expertise in the creation of solutions for complex security problems, requiring deep knowledge of systems security. •    Ensure that security controls are implemented effectively and continuously throughout the information systems lifecycle. •    Utilize cybersecurity tools to provide ongoing security monitoring for infrastructure in accordance with Department of Defense (DoD) requirements. •    Perform system audits, vulnerability risk assessments, and investigations into security incidents or violations related to information assurance. •    Conduct regular training and awareness programs on cybersecurity best practices and risk mitigation strategies for all system users. •    Other duties as required. Basic Qualifications: •    U.S. Citizenship. •    Active Secret Clearance. •    Prior experience as an ISSM or ISSO, with strong familiarity in establishing classified networks and information systems. •    Experience as a COMSEC Custodian and in handling security controls for classified information systems. •    Proficiency in cybersecurity frameworks and risk management practices, including the Risk Management Framework (RMF) and DoD compliance requirements. Preferred Qualifications: •    Relevant certifications such as CISSP, CISM, or Security+ •    Familiarity with cybersecurity tools, auditing processes, and incident response frameworks.   Summit Federal Services, LLC is an equal opportunity employer regardless of race, color, religion, creed, sex, marital status, national origin, disability, age, veteran status, on-the-job injury, sexual orientation, political affiliation or belief. Employment decisions are made without consideration of these or any other factors that employers are prohibited by law from considering. Any discriminatory action can be a cause for disciplinary action. Summit Federal Services, LLC also prohibits discrimination against individuals with disabilities and will reasonably accommodate applicants with a disability, upon request, and will also ensure reasonable accommodation for employees with a disability. Powered by JazzHR

Posted 30+ days ago

Charles IT logo
Charles ITProvidence, RI
Exceptional Service, Endless Improvement, Passionate People, and Honest and Forthright. Guided by our values, we foster a culture of growth, balance, and belonging where every team member can thrive We're seeking a highly qualified Virtual Chief Information Officer (vCIO) to join our team. This strategic role serves as the primary liaison for assigned clients, addressing both technical escalations and business objectives. The ideal candidate will be client-focused, collaborative, exceptionally organized, and detail-oriented. Responsibilities Act as a strategic advisor, aligning client technology with business goals. Deliver executive-level insights and communicate effectively with both technical and non-technical stakeholders. Ensure client environments are secure, scalable, and optimized for performance and growth. Develop IT roadmaps, lead business reviews, manage budgets, and uphold compliance standards. Build and maintain strong client relationships, serving as the primary point of contact and escalation. Mentor internal team members and foster collaboration across departments. Identify gaps and partner with technical teams to scope and prioritize initiatives. Ensure alignment with industry best practices and regulatory requirements. Requirements 5+ years of experience in IT consulting, account management, or technical leadership, ideally within the MSP space. Proven success in strategic IT planning, budgeting, and engaging with C-suite stakeholders. Strong business acumen with the ability to align technology with business strategy. Industry certifications (e.g., MCSA, VCP, CCNA) are a plus. Proficiency with ConnectWise, Cisco, Meraki, Datto, VMware, Office 365, and advanced Mac OS support preferred. Excellent multitasking, prioritization, and follow-through in a fast-paced, collaborative environment. Highly organized, detail-oriented, and self-motivated with minimal supervision. Must be able to pass a background check and hold a valid U.S. driver’s license. Benefits Charles IT offers a comprehensive benefits package, including medical, dental, vision, life and disability insurance, paid holidays, PTO, 401(k), and performance-based bonuses. Team members also enjoy ongoing training, professional development, quarterly team-building events, and a collaborative workplace culture. Commitment to Inclusion: Charles IT is an equal opportunity employer committed to fostering an inclusive and respectful work environment. We welcome diverse backgrounds and perspectives and do not discriminate based on any protected characteristic.

Posted 3 days ago

M logo

Information Security Engineer II

MetroSysChicago, IL

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

About the Role

MetroSys is seeking a skilled Information Security Engineer II to support and lead efforts around vulnerability management within a dynamic, enterprise-scale environment. This individual will be instrumental in identifying and addressing security vulnerabilities across systems, networks, and applications. The ideal candidate brings a deep understanding of vulnerability scanning tools, remediation prioritization, and collaborative risk mitigation strategies.

You will work closely with cross-functional teams to enhance the organization’s security posture and help ensure compliance with industry standards. If you thrive in fast-paced environments and are passionate about cybersecurity, this is an exciting opportunity to grow and make an impact.


Key Responsibilities

  • Lead the end-to-end vulnerability management lifecycle: scanning, analysis, prioritization, reporting, and remediation tracking.

  • Perform regular vulnerability assessments and support remediation efforts in collaboration with infrastructure and application teams.

  • Track and assess emerging threats and zero-day vulnerabilities using vendor bulletins and threat intelligence feeds.

  • Generate reports and dashboards to communicate risk posture and mitigation progress to technical and executive stakeholders.

  • Maintain and optimize vulnerability scanning tools to ensure full visibility and accurate detection across the environment.

  • Assist in security incident response involving known or suspected exploited vulnerabilities.

  • Support regulatory and compliance audits (e.g., PCI, NIST, HIPAA) by providing documentation and metrics.

  • Continuously improve processes, documentation, and tooling in the vulnerability management program.


Qualifications

  • Bachelor's degree in Computer Science, Cybersecurity, or a related field (or equivalent experience).

  • 3+ years of experience in information security, with a strong emphasis on vulnerability management.

  • Hands-on experience with scanning tools (e.g., Tenable, Qualys, Rapid7).

  • Solid understanding of network architecture, operating systems (Linux, Windows), and web applications.

  • Familiarity with CVSS scoring, risk modeling, and remediation prioritization frameworks.

  • Ability to work with scripting or automation tools (Python, PowerShell, Bash) is a plus.

  • Excellent communication and problem-solving skills; ability to clearly explain security findings to non-security audiences.

  • Experience with compliance frameworks such as PCI DSS, NIST, HIPAA, or ISO 27001.

  • Relevant certifications are a plus (e.g., CISSP, Security+, LFCS, RHCSA).

Powered by JazzHR

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall