landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

DSS Inc. logo
DSS Inc.Charleston, SC
SBG, a DSS, Inc. company, specializing in engineering, information technology, cyber-security, intelligence, and training, is looking for a hard-working results-oriented Information Systems Security Specialist II. We are seeking highly motivated individuals with a positive attitude looking to join our rapidly growing company. The ideal candidates for this position have strong attention to detail, analytical and ethical, who can excel in a very fast-paced government contractor environment. This is an on-site role based in Charleston, SC Contingent Upon Contract Award OVERVIEW The Information System Security Specialist II is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated competency with specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. Must have active Secret clearance. The Information System Security Specialist II: Support all aspects of Program Information Assurance (IA) activities across the Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) lifecycle. Apply knowledge and experience in cybersecurity, engineering, Test & Evaluation (T&E), and/or Security Control Assessment (SCA) roles. Demonstrate working knowledge of the Risk Management Framework (RMF) and/or prior experience with Defense Information Assurance Certification and Accreditation Process (DIACAP). Interpret and apply relevant security policies and guidance documents to support the development and maintenance of IA artifacts and traceability documents required for Authority to Operate (ATO) compliance. Evaluate and validate security solutions to ensure they meet system requirements for handling up to classified information. Assist in the development and enforcement of system security policies, ensuring alignment with configuration management and change control processes. Qualifications RREQUIREMENTS: Active DoD Secret Security Clearance Two (2) - Five (5) years of practical experience in a Cybersecurity, Engineering, T&E or A&A (formerly C&A) related field. Have worked with Information Assurance tools such as DISA Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS) and may be required to hold an Interim Security Control Assessor qualification. EDUCATION: High School Diploma / GED PHYSICAL DEMANDS: Standing 10% per day Sitting 60% per day Walking 5% per day Stooping 0% per day Lifting If traveling, the ability to lift up to 50 lbs. unassisted (luggage, laptop, etc.) Up to 15 lbs. unassisted, several times a day (laptop, office equipment, office supplies, etc.) Computer Work 100% per day Telephone Work 60% per day Reading 100% per day Other, please specify Travel unassisted less up to 10% per year, via aircraft or privately owned vehicle. SBG, Inc. is an Equal Opportunity Employer If you need an accommodation seeking employment with SBG, Inc., please email recruiting@sbgts.com or call (703) 299-9093. Accommodations are made on a case-by-case basis. #MN

Posted 30+ days ago

Whoop logo
WhoopBoston, MA
At WHOOP, we're on a mission to unlock human performance. WHOOP empowers members to perform at a higher level through a deeper understanding of their bodies and daily lives. WHOOP is seeking a Senior Information Security Engineer to serve as a technical leader in our Security team reporting to our Information Security Manager. In this role, you will drive the deployment and continuous enhancement of controls that protect millions of users' biometric and health data, build scalable defenses across our infrastructure and applications, and lead incident response efforts with visibility across the business. This is an opportunity to have direct impact at scale, working alongside engineers, product teams, and executives to drive forward-looking security strategies. RESPONSIBILITIES: Implement and enhance security controls by leading the deployment, integration, and tuning of solutions such as CNAPP, SIEM, CASB, EDR, DLP, and MDM to maximize effectiveness. Support security design decisions by providing subject matter expertise on cloud and SaaS security best practices while influencing architecture led by the Security Architect role. Lead incident response and investigations by guiding containment, remediation, root cause analysis, and post-incident improvements. Strengthen application security by overseeing secure development practices and managing SAST, SCA, and DAST tooling. Advance identity and access management by supporting IAM policy enforcement, SSO, MFA, SCIM, RBAC, and user lifecycle governance. Secure AI systems and integrations by assessing and protecting embedded APIs and organizational AI tool usage to ensure resilience, privacy, and compliance. Collaborate cross-functionally by working with Engineering, IT, and GRC teams to embed security into systems and workflows. Mentor and influence by providing technical guidance, reviewing work, and promoting security-first thinking across the organization. Stay ahead of threats and regulations by tracking emerging risks, technologies, and compliance requirements to inform forward-looking strategies. Participate in and help improve the on-call rotation by providing guidance, escalation support, and driving improvements in response processes. QUALIFICATIONS: Bachelor's degree in Computer Science, Information Security, or a related technical field and/or advanced certifications (CISSP, CISM, AWS Security Specialty, SANS, etc.). 8+ years of hands-on experience in Information Security, IT Security, or a related role, including at least 2 years in a senior or lead capacity. Proven track record implementing and managing advanced security technologies (e.g., CASB, CNAPP, CSPM, SIEM, SOAR, DLP, SWG). Experience securing AI/ML systems or APIs, including governance of third-party AI integrations and organizational use of AI tools. Strong understanding of modern cloud security architecture (AWS, Azure, GCP) and experience performing threat modeling and risk assessments on cloud-based systems. Hands-on experience with application security tooling (SAST, SCA, DAST) and embedding secure development practices. Demonstrated leadership in security incident response, investigations, and root cause analysis. Effective communicator with the ability to influence stakeholders and explain security concepts to technical and non-technical audiences. Strong project management skills and the ability to drive initiatives to completion in a fast-paced environment. Experience mentoring engineers and setting operational standards. Familiarity with compliance and risk frameworks relevant to health and AI (SOC 2, ISO 27001, PCI, GDPR, FTC guidance, HIPAA-adjacent state laws) is a plus. Interested in the role, but don't meet every qualification? We encourage you to still apply! At WHOOP, we believe there is much more to a candidate than what is written on paper, and we value character as much as experience. As we continue to build a diverse and inclusive environment, we encourage anyone who is interested in this role to apply. WHOOP is an Equal Opportunity Employer and participates in E-verify to determine employment eligibility. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.

Posted 30+ days ago

Telophase Corporation logo
Telophase CorporationLanham, MD
Telophase Corporation is seeking a motivated, career and customer-oriented senior Information Systems Security Officer (ISSO) to join our team. The ISSO shall ensure the implementation and maintenance of security controls in accordance with the System Security Plan (SSP) in preparation for NIST RMF and 800-53 based independent security assessments and provide strong leadership in the development of a cyber security validation program for mission systems. Responsibilities: Support adoption and implementation of NIST-based standards across the organization in support of multiple mission system authorization boundaries including Cloud-based workloads Support all steps of NIST RMF with strong background in NIST SP 800-53 Revision 5 and 800-53A Participate in the selection of the organization's common security controls and in determining their suitability for use in the information system Review the 800-53 security and privacy controls regarding their adequacy in protecting the planned or operational information system Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment and Authorization(A&A) packages, and support system authorization activities Implement and enforcing organizational information systems security policies, standards, and methodologies Evaluate security solutions to ensure they meet security requirements for processing unclassified/classified information; perform vulnerability/risk assessment analysis to support certification and accreditation. Red Team operations background such as penetration testing is bonus. Manage changes to the information system and assess the security impact of those changes. Required Skills & Experience: Education: Bachelor's or higher in computer science/ technical discipline preferred or equivalent work experience Years of related experience: 8+ years of experience is required as an ISSO/ ISSM including experience implementing, and enforcing information systems security policies, standards, and methodologies; creating security plans, policies & procedures, SSPs, and Risk Assessment Reports Technical Skills: FISMA, FedRAMP, NIST RMF (Risk Management Framework), NIST 800-53 Revision 5 controls, and strong understanding Security Control Assessment (SCA) processes. Good understanding of Windows and Linux operating systems and architecture. Good knowledge of public cloud providers such as Azure, AWS, and GCP highly desirable Experience with applications for Amazon AWS, Microsoft Azure, GCP or other cloud platforms for large-scale, multi-tenant, SaaS systems highly desirable Experience with security assessments of AWS/Azure/GCP environments preferred Experience with AWS/Azure/GCP service offerings preferred Skills and ideally certifications in public cloud providers (AWS, Azure, GCP) highly desirable Cloud Security experience (AWS/Azure/GCP), including both IaaS and PaaS models preferred Hands-on experience with public cloud services (AWS, Azure, GCP) preferred Hands-on experience in PaaS, SaaS, CI/CD, Docker, Jenkins, Puppet Chef, Ansible, Kubernetes preferred Strong understanding of and experience in AWS / Azure / GCP cloud architecture Experience developing applications for Microsoft Azure, Amazon AWS, Google or other cloud platforms for large-scale, multi-tenant, SaaS systems a bonus Clearance: Must have or be able to attain Public Trust or higher Desired Skills & Experience: Certifications: Cybersecurity certifications, such as CISSP, CISA, CISM, CISA, CEH, GCIH, GCIA, GCFA, GCFE, CDMP, OSCP, OSCE, CDP-DG or similar Work Type: Onsite location on a regular basis with some hybrid telework options. Note for staffing agencies: We are not accepting unsolicited resumes for this position. All inquiries must go through the Telophase team As an Equal Opportunity Employer, it is Telophase’s policy to recruit, hire, and provide opportunities for advancement in all job classifications without regard to race, color, religion, sex, national origin, age, citizenship, marital status, sexual preference, parental status, or disability.   Powered by JazzHR

Posted 30+ days ago

TestPros logo
TestProsColorado Spring, CO
Company Overview: TestPros is a successful and growing business, established in 1988 to provide Information Technology (IT) technical support services to a wide range of Commercial and U.S. Federal, State, and Local Government customers. Our capabilities include Program Management, Program Oversight, Process Audit, Cyber Security, Zero Trust, Resiliency, CMMC and NIST SP 800-171 Assessment and Compliance, Computer Forensics, Software Assurance, Governance Risk Management and Compliance (GRC), Privacy, Software Testing, Test Automation, Customer Experience (CX), Section 508 and WCAG Accessibility Assessment, Usability, Localization Testing, Independent Verification and Validation (IV&V), Quality Assurance (QA), Intelligence Analysis, and Research and Development (R&D) services. TestPros delivers innovative independent IT assessment solutions to critical challenges facing the nation and the world.  We support the U.S. Federal Government and Commercial clients within the continental USA. TestPros is dedicated to making lives better, safer and more secure. Location: Colorado Springs, CO (Hybrid) Clearance: Active Secret Citizenship: U.S. citizenship is required Start Date: Summer 2025 (Pending Award) Overview: Seeking an experienced ISSO to support ongoing ATO maintenance, vulnerability assessments, and system compliance with DoD cybersecurity policies and frameworks. Key Responsibilities: Ensure cybersecurity controls are properly implemented Conduct vulnerability scans and interpret results (ACAS, STIG Viewer) Lead development and updates of RMF packages in eMASS Coordinate with ISSM and stakeholders to resolve findings Maintain compliance with NIST 800-171 and other federal standards Qualifications: 4+ years of ISSO or cybersecurity compliance experience Experience with RMF lifecycle, eMASS, and STIGs Familiarity with DoD policy and IA controls DoD 8570 certification (Security+, CAP, CISM, etc.) Benefits TestPros offers a competitive salary, medical/dental/vision insurance, disability insurance, life insurance, paid time off, paid holidays, 401(k) retirement plan with company match, opportunities for professional growth, cell phone discounts, and much more!  All benefits are per TestPros current policies and are subject to change without notice.  Benefits are available to full-time employees.​ TestPros, Inc. is an Equal Opportunity Employer. EEO Statement All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, gender identity, marital status, age, national origin, or protected veteran status. Powered by JazzHR

Posted 30+ days ago

Illinois Secretary of State logo
Illinois Secretary of StateChicago, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title: iOS Developer - Information Systems Specialist I Division: Systems & Programming Union: IFT Location: 115 S LaSalle St, Chicago, IL – Cook County Salary: Range $5,761 to $10,719 monthly – commensurate with experience Benefits: https://cms.illinois.gov/benefits/stateemployee.html Overview: We are seeking a skilled and passionate iOS Developer to design, build and maintain high-performance mobile applications for iOS devices. The ideal candidate will possess strong knowledge of Swift, UIKit/SwiftUI and Apple’s design principles, with a track record of delivering robust and user-friendly mobile solutions. Key Responsibilities: Design and build advanced applications for the iOS platform Collaborate with cross-functional teams (designers, product managers, backend engineers) to define, design, and ship new features Ensure performance, quality and responsiveness of applications Identify and correct bottlenecks, fix bugs and continually improve application performance Stay up to date with the latest industry trends, technologies and best practices in mobile development Work with RESTful APIs, JSON and third-party libraries/frameworks Participate in code reviews and unit testing to maintain high code quality standards Deploy and manage apps through the Apple App Store Required Qualifications: Requires knowledge, skill, and mental development equivalent to the completion of two years of college, with coursework in the computer science field OR 2.5 years of technical systems and/or programming experience as an iOS developer Preferred Qualifications: Bachelor’s degree in computer science, engineering or related field Proven work experience as an iOS developer with at least one published app in the App Store Strong proficiency in Swift (Objective-C knowledge is a plus) Experience with UIKit, SwiftUI, Core Data, Core Animation and other iOS frameworks A solid understanding of Apple’s design principles and interface guidelines Familiarity with RESTful APIs and integration with backend services Proficient with code versioning tools (e.g., Git, Azure Dev Ops) Experience with testing frameworks like XCTest Knowledge of cloud services (e.g., Azure) for mobile app backends Experience with CI/CD pipelines for iOS apps Familiarity with Agile/Scrum methodologies Strong problem-solving skills and attention to detail Soft Skills: Strong communication and collaboration skills Ability to work independently and as part of a team Adaptability to learn new technologies quickly Passion for delivering high-quality user experiences Application Process: Please visit https://ilsos.applytojob.gov/apply to apply by completing the online application; you may also upload a resume or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783). Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States .Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 1 day ago

H logo
Hoplite Solutions LLCFort Meade, MD
Hoplite Solutions is seeking a self-starting, motivated individual to be the Senior Information System Security Officer supporting the Joint Activities Integration Division with maintaining compliance and strengthening the security posture of critical mission systems and their System Security Plans (SSPs) via the Risk Management Framework. Mission Focus : Ensure the appropriate operational security posture is maintained for information systems. Support continuous monitoring of networks to detect and correct areas of security non-compliance, unmitigated vulnerabilities, and other risks. Follow consistent security processes and play a role in the information systems continuous monitoring program. Perform regular audits of information systems. Assist the information systems security manager in preparing the information system for periodic reaccreditation Technical Proficiency : Experience as an ISSO with emphasis on Defense-in-Depth principles, network, and enterprise security architecture. Experience applying the principles of the NIST 800-53 including the procedures in the Risk Management Framework (RMF). Familiarity with STE/STN requirements Qualifications: Bachelor's degree plus 8-years of relevant experience or Master's degree plus 6-years of relevant experience. An Associate's degree or 18 semesters hours of military coursework/training in a computer-related field plus 10-years of relevant experience or high school diploma/GED plus 12-years of relevant experience may be considered. Information Assurance Manager (IAM) Tier 1 certification. Security Clearance: Active TS/SCI with Polygraph required.​ Hoplite Solutions offers a highly competitive salary and a comprehensive benefits package, including paid holidays and vacation, fully covered healthcare, short- and long-term disability, up to 7% 401(k) matching, referral bonuses, and tuition reimbursement.Turn your interest into action, apply today! If your background matches the requirements, you will be contacted by one of our Recruiters! Powered by JazzHR

Posted 3 days ago

T logo
Tetrad Digital Integrity LLCWashington, DC
Tetrad Digital Integrity (TDI) is seeking a DoD Information Systems Security Officer / RMF & Cloud Engineer who is hands-on, technically sharp, and ready to hit the ground running. We need an operator who can support ATO efforts and turn RMF, NIST 800-ity fast, sharpen53, and Cloud SRG guidance into clear, defensible deliverables. This is not a typical ISSO role; if you’re eager to build credibil your Kubernetes/GKE and AI-risk chops, and make a visible impact on mission systems—including cloud-native, containerized workloads—you’ll fit right in! Join TDI’s Solutions team to raise and maintain a high bar for DoD cloud security and accelerate your career from day one.KEY RESPONSIBILITIES: Lead and support RMF activities throughout all phases (categorization, control selection, implementation, assessment, authorization, and continuous monitoring). Provide expert guidance on DoD cloud security policies, NIST SP 800-53 controls, CNSS policies, and DoD-specific frameworks such as Cloud Computing SRG and AI-specific guidance. Conduct security architecture reviews and security engineering analysis for cloud-native and containerized workloads hosted in Google Cloud Platform. Evaluate security controls associated with Kubernetes, Docker, and container orchestration platforms within GCP. Assess security risks related to generative AI components, including large language models (LLMs) and AI/ML workloads, ensuring responsible and compliant use. Develop and maintain System Security Plans (SSPs), Security Assessment Reports (SARs), Plan of Action and Milestones (POA&Ms), and related RMF documentation. Perform threat modeling, vulnerability assessments, and risk analysis tailored to cloud environments and AI technologies. Interface with system architects, developers, and DevSecOps teams to integrate security throughout the Software Development Lifecycle (SDLC). Support security control assessments (SCAs) and coordinate with third-party assessors. Monitor, track, and report on security compliance posture through Continuous Monitoring (ConMon) processes. Minimal travel will be required. QUALIFICATIONS: U.S. Citizenship with an active DoD Secret clearance (Top Secret preferred). Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field. Security certifications such as CompTIA Security+, Certified Information System Security Professional (CISSP) or Certified Information System Manager (CISM). 5+ years of cybersecurity experience, with demonstrated experience supporting RMF activities for DoD systems. Practical knowledge and application of concepts with cloud platforms. Google Cloud Platform (GCP), including IAM, VPC, Kubernetes Engine (GKE), and security-related services are preferable. Strong knowledge of containerized environments (e.g., Docker, Kubernetes) and container security best practices. Familiarity with Generative AI technologies, including LLMs and AI/ML security considerations. Deep understanding of NIST SP 800-53, DoD RMF, FedRAMP, and other relevant cybersecurity frameworks. Experience writing and maintaining RMF artifacts such as SSPs, POA&Ms, and SARs. Strong communication skills and ability to collaborate effectively with technical and non-technical stakeholders. Experience with security risk assessments in DoD environments. PREFERRED QUALIFICATIONS: Advanced cloud security certifications Google Professional Cloud Security Engineer, Cloud Certified Security Professional. Experience integrating DevSecOps pipelines with RMF compliance processes. Familiarity with automation tools for RMF documentation and control testing (e.g., Xacta, eMASS, OpenRMF). TDI does business with the federal government, which restricts employment to individuals who are either US citizens or lawful permanent residents of the United States. “TDI is an Equal Opportunity Employer. Employment decisions are made based on individual qualifications, merit, and business needs. We do not discriminate in employment opportunities or practices based on race, color, religion, sex, or national origin, in accordance with applicable federal laws.” Powered by JazzHR

Posted 1 week ago

West 4th Strategy logo
West 4th StrategyArlington, VA
Sr. Admin Project Info Specialist ROLE We need an experienced Senior Administrative Support professional with expertise as a Project Information Specialist to support the U.S. Trade and Development Agency (USTDA). USTDA helps advance overseas infrastructure projects that create opportunities for U.S. exports while supporting jobs at home. In this role, you will develop, maintain, and disseminate agency reports, publications, and official correspondence, ensuring the accuracy and accessibility of USTDA’s information resources. You will manage program and financial reports, maintain the USTDA Correspondence Procedures Manual, and support updates to administrative manuals and standard operating procedures. You will also coordinate internal and external information requests, process inquiries, track distribution of project reports, and maintain official mailing lists. This is a full-time opportunity. We offer a competitive salary and a comprehensive benefits package. Apply today! RESPONSIBILITIES Develop and run agency program and financial reports from information management systems, including activity status, statistical, contract, and deliverable reports, as well as library holdings by region and sector Maintain and update the USTDA Correspondence Procedures Manual for internal document distribution Assist with development and maintenance of official USTDA mailing lists Maintain and update the USTDA IRC Manual/SOPs and Administrative Manual in coordination with the Director/Deputy Director of Administration Provide and organize records disposition data for the annual Records Management Self-Assessment and prepare draft responses for approval by agency leadership Receive and process public inquiries about the Agency and its mission, routing them appropriately within USTDA Process internal and external requests for project or agency reports, tracking distribution and report checkouts Obtain and disseminate participant list information from USTDA business briefings and events, creating and maintaining distribution lists with staff and external contractors Provide daily personnel status updates agency-wide Assist with FOIA-related records support as needed, ensuring dissemination tasks align with reporting and compliance requirements REQUIRED SKILLS/EXPERIENCE At least 10 years of administrative management or relevant work experience Experience in creating and implementing organizational or administrative management policies and procedures Experience evaluating program effectiveness and recommending improvements Experience providing training and technical assistance to staff Proficient in the use of a variety of IT programs, databases, and computerized systems Excellent written and verbal communication skills Commitment to innovative and quality customer service Ability to identify and resolve complex problems, manage multiple tasks, prioritize work, and meet deadlines REQUIRED EDUCATION / CERTIFICATIONS Business or Information Management degree – Required LOCATION Arlington, VA 22209 CLEARANCE US Citizenship Ability to obtain and retain a SECRET security clearance CLIENT US Trade and Development Agency (USTDA), Information Resource Center (IRC) TRAVEL No travel required. WORK HOURS Full time = 40 hours a week, 8 hours a day EMPLOYMENT CLASSIFICATION W2 Classification RELOCATION Not eligible for relocation benefits. West 4 th Strategy is an Equal Opportunity (EEO) employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, gender, sexual orientation, ancestry, national origin, age, marital status, mental disability, physical disability, medical condition, pregnancy, political affiliation, military or veteran status, or any other basis prohibited by federal or state law. Other Considerations: applicants will be subject to a background investigation. Individual’s primary workstation is in an office area. The noise level in this environment is low to moderate. Regularly required to sit for extended periods up to 80% of the time; frequently required to move about to access file cabinets and use office equipment such as PC, copier, fax, telephone, cell phone, etc. Occasionally required to reach overhead, bend, and lift objects of up to 10 lbs. Specific vision abilities required by this job include the use of computer monitor screens up to 80% of the time. Powered by JazzHR

Posted 1 week ago

North South Consulting Group logo
North South Consulting GroupElizabethtown, KY
In this role, you will ensure that all system operations comply with DoD cybersecurity policies, federal mandates, and Risk Management Framework (RMF) standards. You will be responsible for protecting sensitive applicant and personnel data, maintaining system Authority to Operate (ATO), and monitoring security vulnerabilities. By safeguarding the system against threats, you will enable recruiters to operate with confidence that their tools are secure and reliable. This role is fully remote.  Key Responsibilities Maintain security documentation in eMASS. Monitor compliance with NIST, DoD SRG, DFARS. Respond to and document incidents. Conduct vulnerability scans and support ATO. Required Qualifications Bachelor’s degree in Cybersecurity or related field. 3+ years ISSO or IA experience. Certification: DoD 8570.01-M IAT II/III (e.g., Security+, CASP+, CISSP). Desired Qualifications Salesforce/FedRAMP security knowledge. DISA STIG and RMF experience. This position is contingent upon contract award.  Powered by JazzHR

Posted 30+ days ago

K2 Integrity logo
K2 IntegrityRaleigh, NC
K2 Integrity is seeking an experienced Information Security Analyst who is passionate about secure software development and developer enablement. This candidate will be responsible for the design, implementation, and management of ISO27001-compliant security controls within our software development process. The ideal candidate will have the ability to collaborate with a software development team, raise awareness of secure coding practices, and foster a security-focused culture. We are looking for someone with the expertise to integrate robust security measures seamlessly into the development process, ensuring that security becomes an integral part of our software development lifecycle. Responsibilities: Partner with software development teams to integrate security practices into the software development process. Ensure that SDLC processes comply with ISO27001 and SOC2 audit standards within agreed timeframes. Conduct internal audits of SDLC controls. Manage secure code review processes, threat modeling, and application security assessments. Develop and maintain policies, coding standards, and best practices for developers. Maintain and support internal security systems relevant for secure software development. Identify and correct issues with vendors, suppliers, and subcontractors as required. Identify security gaps and manage gap mitigation. Participation in audit, incident response and access review processes. Serve as the primary point of contact for technology vendors, coordinating support activities, managing vendor relationships, and ensuring timely resolution of issues. Champion good security practices and assist developers with questions. Act as project manager for information security projects. Qualifications: Bachelor’s of science in cybersecurity required; master’s preferred. At least five years’ experience in the information security field and at least 2 years within software development Experience with Microsoft Azure, O365, and PowerShell. Experience with software tools which facilitate secure SDLC. Experience completing ISO27001, and SOC2 audits. Experience with regulatory compliance (GDPR, CCPA, PCI). Good understanding of information security principles. Ability to explain complex theories to development staff. Strong knowledge of operating systems and related security issues (Windows, Linux, mobile). Strong knowledge of network security systems and practices. Strong knowledge of encryption technologies and common issues. Any security certification or progress towards a certification is a plus. Strong desire to learn, research, and problem solving. Excellent communication skills. This role is work from home (USA).   Powered by JazzHR

Posted 30+ days ago

D logo
Diligent Consulting IncNellis AFB, NV
ACTIVE TOP SECRET CLEARANCE REQUIREDInformation System Security Officer (ISSO)/Technical Security Requirements. The contractor shall perform the following duties related to Information Assurance/Technical Security IAW DoD JSIG and applicable DoD, DAF, ACC, and Wing applicable AIS security polices and regulations: - Manage, update, and accomplish AIS RMF BOE and BOE associated requirements. Ensure development and implementation of procedures IAW Configuration Management policies and procedures for evaluation of AIS security program. - Perform analysis of network security, based upon RMF JSIG, National Industrial Security Program Operating Manual (NISPOM) Chapter 8, and other sources as added or updated, advise customers on AIS certification and accreditation issues. - Perform AIS risk assessments and make recommendations to customers, Wing Information System Security Manager (ISSM), and System Owner. - Participation in AIS Configuration Control Board. - Advise Wing ISSM and System Owner on security testing methodologies and processes. - Evaluate AIS certification documentation and provide written recommendations for accreditation to Wing ISSM and System Owner. - Review AIS security to accommodate and/or recommend changes to policy or technology. - Evaluate Information Technology (IT) threats and vulnerabilities to determine whether additional safeguards are needed and report these threats or vulnerabilities to Wing ISSM and System Owner. - Develop and maintain a formal Information Systems Security Program. - Recommend changes/updates to the Wing Information Assurance Standard Operating Procedure (IA SOP) to the Wing ISSM when applicable to support unique AIS requirements. - Review and evaluate all certification/accreditation support documentation for proof of acceptable AIS and network security procedures and based upon review, provide written documentation for accreditation to the Wing ISSM, to include External Information Systems (EIS). - Ensure all personnel have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to AIS. - Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output. - Ensure all accreditation documentation, to include Cyber Program required documentation is loaded to Core File Share IAW Wing IA SOP. - Conduct and coordinate AIS security inspections, tests, and reviews. - Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within the applicable computer or network system. - Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements. - Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting AIS security training. Manage Media Custodian Training, User Account Training, Annual SAP Security Training, and Data Transfer Training. - Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed. Manage, track, and install AIS vulnerability patches. - Assess configuration changes in the system, environment, and operational needs that could affect AIS accreditation. - Review existing security documentation to verify documents still accurately represent the system; a re-evaluation of the system vulnerabilities, threat and risk; and complete security test, or subset of the original test that will be conducted. - Conduct periodic testing of the security posture of the information systems as required. Verify the compliance of the system with the security requirements by demonstrating, inspecting, and analyzing the system’s capabilities and base-line configuration. - Ensure configuration management for security-relevant AIS software, hardware, and firmware is maintained and documented. - Ensure system recovery processes are monitored to ensure security features and procedures are properly restored. - Ensure all AIS security-related documentation is current and accessible to authorized individuals. - Ensure system security requirements are addressed during all phases of the system life cycle. Develop and manage an AIS End of Support (EOS) program for all AIS and associated equipment/devices. Advise customer on upcoming costs associated with replacing EOS equipment for effective budget. 1.2.1.27. Perform weekly system audits as required on multiple systems; work closely with system administrators and ensure current security measures are sufficient and in compliance with approved policies and processes. -Perform account management for all systems and access; tasks include verifying requirements for access and adding/modifying/deleting accounts as required. - Write Request for Approvals (RFA) for equipment and electronic data being used in off-site locations. - Participate in annual self-inspections and Command Compliance Inspections; identify discrepancies and report security incidents as required by the DAA and/or Program Security Officer (PSO). - Maintain a working knowledge of system functions, security safeguards, and operational security measures. - Provide research and analysis in support of expanding programs and areas of responsibility. - Manage Media Control Program to include accountability of magnetic and optical media of all types. - Perform virus and malicious code scanning on all computer media entering the facility. - Perform file transfers between local systems to storage devices. - Manage the disposition and destruction of AIS, at all classification levels, and supported devices/peripherals IAW DoD policies. - Inspect incoming equipment to ensure what was ordered; inspect outgoing equipment for classified markings and for any non-volatile storage devices. Powered by JazzHR

Posted 2 weeks ago

K2 Integrity logo
K2 IntegrityMiami, FL
K2 Integrity is seeking a highly skilled Information Security Specialist with a strong focus on security architecture to join our cybersecurity team. This candidate will be responsible for the operation of cybersecurity solutions internally for the firm. The successful candidate will possess an in-depth knowledge of information security systems with focus on Microsoft security products, as well as a working knowledge of policies, procedures, controls, and regulatory requirements. Responsibilities: •    Implement, maintain and support internal security systems such as EDR, DLP, and Threat management. •    Design and oversee security architecture for enterprise systems, applications, and networks. •    Develop and enforce security architecture documents, policies and standards. •    Participation in audit, incident response, and access review processes. •    Monitor and analyze security events to identify potential threats. •    Serve as the primary point of contact for technology vendors, coordinating support activities, managing vendor relationships, and ensuring timely resolution of issues. •    Collaborate with IT and DevOps departments to ensure the integration of security measures into all aspects of the organization's operations. •    Champion good security practices and assist users with questions and issues. •    Report potential risks and develop relevant mitigation plans. •    Stay up-to-date with the latest security trends, threats, and technologies. Qualifications: •    Bachelor’s of science in cybersecurity required; master’s preferred. •    At least five years’ experience in the information security field. •    Extensive experience with Microsoft Defender, Purview, and Microsoft Sentinel. •    Experience with end user support in a large, decentralized environment. •    Working knowledge of design, installation and/or operation of enterprise security systems (EDR,DLP, etc.)   •    Documented experience with Microsoft Azure, O365, KQL, and PowerShell. •    Strong understanding of information security principles, protocols, and technologies. •    Strong knowledge of operating systems and related security issues (Windows, mobile). •    Proven ability to work independently with success. •    Any security certification or progress towards a certification is a plus. •    Strong desire to learn, research, and problem solving. •    Excellent communication skills. This role is work from home (USA).   Powered by JazzHR

Posted 30+ days ago

A logo
Action Logistics, IncArlington, TX
Job Overview: We are seeking a qualified Information Systems Auditor to conduct a focused audit of our accounting servers and data backup infrastructure. This role will assess the effectiveness, reliability, and security of our current data backup and recovery processes, ensuring they comply with best practices and support business continuity objectives. The audit will specifically evaluate the backup strategies for our accounting systems, including their implementation, scheduling, monitoring, testing, and restoration capabilities. Key Responsibilities: Conduct a comprehensive audit of the current backup methods and policies for all Accounting-related servers and data repositories. Evaluate existing infrastructure, software, and tools used for backup and recovery, including offsite/cloud-based solutions. Assess the consistency, frequency, and completeness of backup processes, including full, incremental, and differential strategies. Test and validate data restoration procedures at various levels (file, database, server image, and full disaster recovery scenarios). Identify gaps or risks in backup integrity, scheduling, encryption, and retention policies. Review user access and security protocols related to backup data and restoration tools. Document all findings and provide actionable recommendations to improve backup reliability, security, and compliance. Collaborate with IT staff and third-party vendors (if applicable) to validate systems, access logs, and restoration capabilities. Produce a final audit report including an executive summary, technical findings, remediation priorities, and proposed action plan. Qualifications: Bachelor’s degree in Information Systems, Cybersecurity, Computer Science, Accounting Information Systems, or related field. 5+ years of experience in IT audit, systems administration, or cybersecurity with direct involvement in data backup and recovery. Strong understanding of accounting system infrastructures (e.g., Microsoft Dynamics GP). Familiarity with backup solutions (e.g., Datto,  AWS backup) and cloud/offsite backup best practices. Experience with risk assessments and business continuity planning. Certifications such as CISA, CISSP, or CRISC are highly desirable. Strong communication skills, including report writing and presenting findings to senior leadership. Powered by JazzHR

Posted 30+ days ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:         Web Services –​​​​​​​ Information Systems Specialist I Division:         Systems & Programming Union:            IFT Location:         501 S 2 nd St, Springfield, IL – Sangamon County Salary:           Range $5,593 to $10,407 monthly – commensurate with experience Benefits:          https://cms.illinois.gov/benefits/stateemployee.html Overview: Performs responsible technical work in the analysis and evaluation of operations to determine needed revisions of existing information systems or needed conversion to computer-based information systems; participates in the assessment, planning, implementation, supplemental development and maintenance of Qflow systems, Create!Form and CUPS and assists with training new users; as a senior team member, assists in performing data analysis work for complex projects; analyzes designs, codes and tests complex programs and operational routines, has direct contact with user department staff and vendors.  Duties and Responsibilities. Writes code in support of CUPS, Qflow and Create!Form software products, participating in the planning, implementation, supplemental development and maintenance; determines when products should be upgraded and assists in training new users. As lead for the queueing system Qflow for Facilities.  Responsible for all aspects of administration by creating calendars for appointments, making counter assignment changes, creating new facilities, creating new services and functions, setting up Reception PCs and Media PCs, setting up new reception points in the QFlow Administration, user administration and troubleshooting issues with the Qflow Queueing System such as stuck tickets, counters calling the wrong numbers, login issues, account unlocks.  Also troubleshoot ticket printers when they are having issues printing.  Responsible for setting up mobile greeter tablets and printers to be used at the facilities to print tickets outside of the facility from the tablet. As lead for Facility Printing, uses proprietary software Create!Form.  Troubleshoots printing problems, creating new printers, creating projects that route the data and merge the forms, assists application developers when needed when working on forms, troubleshoots problems with projects, forms and queues. As lead for CUPS in the Linux printing platform, creates printers that print ERT, troubleshoots printing issues. Develops and applies advanced cross-checks and auditing procedures to ensure accuracy and reliable practices in information systems operations and to determine and correct deviations from specifications; resolves program intent, output requirements, data acquisition, and the use of internal checks and controls for programming functions. Coordinates and directs feasibility studies to determine the practicality and economics of converting to information systems; develops data system specifications in the overall design; develops and coordinates the development of systems and programming logic diagrams and flowcharts necessary to accomplish the conversion. Continually updates, improves and refines job knowledge by tracking emerging technologies through training opportunities and information technology driven professional organizations. Coordinates major systems and programming projects including planning, scheduling and coordination of programmers and analysts to develop operational procedures related to implementation. Perform other duties as required or assigned. Education and Experience:   Requires knowledge, skill, and mental development equivalent to the completion of two years of college with coursework in the computer science field OR 2.5 years of technical systems and/or programming experience as would be gained as an Information Systems Technician OR any equivalent combination of education and experience and/or IT project management. Knowledge, Skills and Abilities: Requires working knowledge of systems design and implementation, including the way programs are written, compiled, and tested, the methods of operating computers, and the way data is transcribed into a form suitable for reading by computer. Requires working knowledge of the devices for capturing data for computers and the means available for receiving and transmitting data from remote locations to a computer. Requires working knowledge of the advantages and limitations of computer communication, and information retrieval systems as management information tools. Requires working knowledge of the methods, procedures, and techniques of conducting feasibility studies for converting to computer applications. Requires the ability to organize facts and findings, analyze data logically and to present results with clarity and comprehension, orally, in written or graphic form. Requires the ability to use and understanding of appropriate methods, tools, applications, and processes. Requires the ability to approach work in a rational and organized manner. Requires the ability to exercise sound judgement in analyzing, appraising, evaluating, and solving problems of a procedural, organizational, administrative, and technical nature. Requires ability to adhere to organizational standards for security, privacy, and ethics. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Requires the ability to lift and carry 0-25 pounds. Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 30+ days ago

D logo
Diligent Consulting IncPhiladelphia, PA
Contingent on Award June/July 2025 Engineer the Cybersecurity Backbone of the Navy's Next-Generation Systems. Diligent Consulting is seeking Information Systems Security Engineers (ISSE III) to provide advanced cybersecurity and Risk Management Framework (RMF) engineering services to the Naval Surface Warfare Center, Philadelphia Division (NSWCPD) . This isn’t a checkbox compliance role—we need engineers who architect secure solutions, shape cyber strategy, and turn NIST controls into operational strength. If you thrive at the intersection of mission and security architecture, this role is built for you. Key Responsibilities: Lead complex security engineering tasks throughout the system lifecycle: design, development, integration, and sustainment. Execute full-spectrum RMF activities (Steps 0–6), including control tailoring, POA&M management, and continuous monitoring. Author and maintain RMF documentation: System Security Plans (SSP), Security Assessment Reports (SAR), ISCM strategies, CAPs, and risk assessments. Apply guidance from NIST SP 800-53 Rev 5 , DoDI 8510.01 , and NAVSEA/Navy cybersecurity policies . Conduct vulnerability assessments and remediation planning using ACAS, HBSS, VRAM, SCC, and related DoD tools. Collaborate with ISSMs, AOs, developers, and system owners to define system boundaries, safeguards, and security architectures. Serve as cybersecurity SME during design reviews, connection requests, and mission-critical deployments. Analyze risk posture and support risk acceptance decisions with security-first, mission-aware insight. Minimum Qualifications: Bachelor’s degree in Cybersecurity, Computer Science, Systems Engineering, or related field 8+ years of experience in information assurance, cybersecurity engineering, or RMF package development IAT Level III Certification required (CISSP, CASP+, or equivalent per DoD 8140.03M) Deep experience with: DoD RMF lifecycle (Steps 0–6) NIST SP 800-53 Rev 5, STIGs, and POA&M management Navy eMASS, VRAM, SCC, and cybersecurity reporting workflows Preferred Qualifications: Master’s degree in Cybersecurity or Engineering Prior experience supporting Navy or NAVSEA cybersecurity programs Strong technical writing skills and experience briefing senior leadership Familiarity with DevSecOps and Zero Trust principles Clearance: Active Secret Clearance required Top Secret Clearance preferred Why Join Diligent Consulting: Direct impact on national defense and naval readiness Cutting-edge cyber engineering work at the system level Competitive salary and comprehensive benefits package Professional growth in a mission-driven, collaborative environment Powered by JazzHR

Posted 30+ days ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:       Database Design – Information Systems Advisor II Division:         Data Center Services Union:            IFT Location:       201 S 2 nd St, Springfield, IL – Sangamon County Salary:           Starting at $7,411 to $13,065 - commensurate with experience Benefits:         https://cms.illinois.gov/benefits/stateemployee.html             Overview: Performs highly specialized data systems work with 4 th Generation Languages involving more than one user subsystem or affecting all user subsystems and operational areas; serves as technical consultant in area including, but not limited to 4 th Generation Languages, programming standard and investigation of major equipment changes; serves as special liaison with agencies or organizations outside of the Office of the Secretary of State and all SOS departments concerning computer-based information systems; serves as a technical consultant in project management and control, long range planning or other functions of similar scope and responsibility. Duties and Responsibilities: Perform advisor level duties including supervising systems database design working extensively with Systems & Programming on database in defining project requirements, solving problems, and coordinating activities between sections. Monitor database performance, identifying and resolving performance bottlenecks, and optimizing query execution, compliance with standards and guideline and adherence to deadlines, sharing knowledge and experiences to peers and junior staff.  Recommend and implement security measures. Collaborate with cross-functional teams to understand business requirements and provide database solutions that support business objectives. Review the new release or updated maintenance for the database software and related tools and prepare the system/databases to accept the changes.  Migrate to the latest release or apply maintenance to the database software.            Supervise staff and schedule/follow up on work assignments to junior staff and provide guidance.  Reviews prepared documentation for the data file structures/design for quality assurance. Acts independently as a top-level advisor in a highly specialized phase of a problem resolution.  Establishes milestones and play a significant role in the assignment of task and/or responsibilities.  Advise users and management in planning, scheduling of said resolution, including unplanned hardware or database software failures. Demonstrate full technical knowledge of all phases in design, development or conduct training or provide written materials for users of the database.                  Continue education by attending meeting training sessions, seminars, conferences, webinars to keep abreast of new developments, increase familiarity with and maintain current IT products, vendors, techniques, procedures in the database environments. Utilizing vendor supplied database tools, monitor the health and status of the database for changes, growth performance, etc. Perform other duties as assigned within scope of duties. Education and Experience: Requires knowledge, skill, and mental development equivalent to the completion of two years of college, with coursework in the computer science field AND 4.5 years of experience with technical systems and/or programming experience and/or IT project management, including at least 1-year supervisory experience or any equivalent combination of education and experience.   Knowledge, Skills and Abilities: Requires extensive knowledge of systems design and implementation, including the way programs are written, compiled, and tested, the methods of operating computers, and the way data is transcribed into a suitable form and has an appreciation of the wider business context for those programs. Requires excellent oral and written communication skills for effective engagement with colleagues and internal users/customers. Requires extensive knowledge necessary to effectively perform the ability to exercise sound judgement in analyzing, evaluating, and solving problems of a procedural, organizational, administrative, and/or technical nature. Requires the use and understanding of appropriate methods, tools, applications, and processes to demonstrate a rational and organized approach to work. Requires awareness and adherence to organizational standards for security, privacy, and ethics. Requires extensive knowledge of the devices for capturing data for computers and the means available for receiving and transmitting data from remote locations to a computer. Requires extensive knowledge of the principles and techniques of computer system documentation. Requires the desire to seek to identify learning and professional development opportunities. Requires extensive knowledge of the advantages and limitations of computer communication, and information retrieval systems as management information tools. Requires the ability to follow oral and/or written instructions and to carry out routine operations, once established, without further instructions. Requires the ability to organize facts and findings, analyze data logically and to present results with clarity and comprehension, orally and in written or graphic form. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Requires the ability to lift, carry, and push/pull 0 – 50lbs. Application Process: Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 30+ days ago

Independent Software logo
Independent SoftwareFort Meade, MD
What You Will Do At Independent Software, we are committed to building secure, mission-driven technology that protects what matters most. As an Information System Security Manager, you will provide expert-level oversight of security operations across complex systems and programs. You will help design, implement, and enforce information security policies that align with organizational goals and regulatory requirements. Your leadership will ensure systems remain secure throughout their lifecycle—from concept through retirement—while collaborating closely with engineers, program managers, and cybersecurity personnel.This role offers the opportunity to shape enterprise cybersecurity practices, lead high-impact security initiatives, and mentor the next generation of security professionals. You will be a key contributor to programs that support critical national priorities Key Responsibilities: Provide management support for the development, coordination, and enforcement of enterprise information assurance programs Oversee the operational security posture for assigned information systems or programs Lead the development and enforcement of system security policies, standards, and procedures Perform risk and vulnerability assessments to support security authorization decisions Provide day-to-day security operations support and oversight for ISSEs and ISSOs Manage and assess the security impact of changes to hardware, software, and firmware Review and manage documentation including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices (SRTMs) Analyze user needs to determine functional and cross-functional security requirements Gather and organize technical information relevant to organizational goals and security posture Facilitate issue resolution through Technical Exchange Meetings and integrated product teams Collaborate with engineering staff to ensure secure systems integration throughout the development lifecycle Serve as the program’s designated ISSM and provide daily oversight to ISSOs Advise and support Program Managers on cybersecurity strategy and program execution Enable the design and implementation of secure IT systems for future enterprise environments Required Skills and Qualifications: Twelve years of professional experience in the field of security authorization Demonstrated experience with current security tools, hardware and software security implementation, communication protocols, and encryption technologies Knowledge of commercial security products, risk management practices, security incident management, and PKI and authorization services Experience developing and managing system security documentation and artifacts Proven ability to manage security across multi-system environments, including secure collaboration with engineering, operations, and leadership teams Strong communication and leadership skills to interact with both technical teams and executive stakeholders Education and Experience: Bachelor’s degree in Computer Science, Cybersecurity, IT Engineering, or a related field from an accredited college or university In lieu of a degree, four additional years of relevant work experience may be substituted Certifications: Compliance with DoD 8570.01-M Minimum certification required: IAM Level II (e.g., CISSP, CAP, CISM) Clearance Requirement: Must possess an active TS/SCI with appropriate Polygraph to be considered for this role This position is contingent on contract award We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Powered by JazzHR

Posted 30+ days ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:    Information Systems Technician I – DB2/SQL Analyst Division:      Data Center Services Union:          IFT Location:    501 S Second St, Springfield, IL – Sangamon County Salary:         Range $4,962 to $9,512 monthly, commensurate with experience Benefits:       https://cms.illinois.gov/benefits/stateemployee.html Overview: Serves as a technical expert in an assigned area of database design, participates in the utilization of advanced programming languages and systems and programming techniques.  Duties and Responsibilities: Under direction of senior staff creates and maintains the necessary data files to support both production and test environments when developing projects such for areas such as, but not limited to, Driver Services, Vehicle Services, Business Services, etc. Under direction of senior staff, develops, designs and implements database structures to support user departments such as, but not limited to Driver Services, Vehicle Services, Business Services, etc. Prepares and maintains documentation for the data file structures/design. Under direction of senior staff, assures the adherence for the standardization of data names within data files that correspond with data names defined in the Data Dictionary/Data Directory. Under direction of senior staff, coordinates with personnel from Systems & Programming, transaction processing specialist and Production Assurance the implementation of new database changes from a test environment into a production environment. Utilizing vendor supplied database tools, monitors the status of data files for changes, growth, etc. Maintains user contact by attending meetings to gain better understanding of user requirements in areas such as, but not limited to, Vehicles Services, Drivers Services, etc. Performs other duties as required or assigned. Education and Experience: Requires knowledge, skill, and mental development equivalent to completion of one year of college, with coursework in the computer science field OR 1.5 years of technical systems and programming experience OR any equivalent combination of education and experience. Knowledge, Skills and Abilities: Requires elementary knowledge of Information Technology concepts and principles, the theories and functions of computer systems, and the principles and techniques of Information Technology documentation. Requires elementary knowledge of hardware and software, languages, and procedures to provide assigned technical and analytical support services. Requires elementary knowledge of accounting and statistical theories, methods and practices. Requires working knowledge of the devices for capturing data and the means available for receiving and transmitting data from remote locations to a computer. Requires working knowledge of the principles and techniques of computer system documentation. Requires ability to effectively participate in and profit from formal and in-service training programs. Requires ability to analyze data logically. Requires ability to maintain satisfactory working relationships with others. Requires the ability to follow oral and/or written instructions and to carry out routine operations, once established, without further instructions. Requires sufficient oral and written communication skills for effective engagement with colleagues and internal users/customers. Requires awareness and adherence to organizational standards for security, privacy and ethics. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Required to lift, carry and push/pull up to 50 lbs. Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume, or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).     Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability . Powered by JazzHR

Posted 30+ days ago

M logo
MetroSysChicago, IL
About the Role MetroSys is seeking a skilled Information Security Engineer II to support and lead efforts around vulnerability management within a dynamic, enterprise-scale environment. This individual will be instrumental in identifying and addressing security vulnerabilities across systems, networks, and applications. The ideal candidate brings a deep understanding of vulnerability scanning tools, remediation prioritization, and collaborative risk mitigation strategies. You will work closely with cross-functional teams to enhance the organization’s security posture and help ensure compliance with industry standards. If you thrive in fast-paced environments and are passionate about cybersecurity, this is an exciting opportunity to grow and make an impact. Key Responsibilities Lead the end-to-end vulnerability management lifecycle : scanning, analysis, prioritization, reporting, and remediation tracking. Perform regular vulnerability assessments and support remediation efforts in collaboration with infrastructure and application teams. Track and assess emerging threats and zero-day vulnerabilities using vendor bulletins and threat intelligence feeds. Generate reports and dashboards to communicate risk posture and mitigation progress to technical and executive stakeholders. Maintain and optimize vulnerability scanning tools to ensure full visibility and accurate detection across the environment. Assist in security incident response involving known or suspected exploited vulnerabilities. Support regulatory and compliance audits (e.g., PCI, NIST, HIPAA ) by providing documentation and metrics. Continuously improve processes, documentation, and tooling in the vulnerability management program. Qualifications Bachelor's degree in Computer Science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in information security, with a strong emphasis on vulnerability management. Hands-on experience with scanning tools (e.g., Tenable, Qualys, Rapid7). Solid understanding of network architecture , operating systems (Linux, Windows), and web applications . Familiarity with CVSS scoring , risk modeling, and remediation prioritization frameworks. Ability to work with scripting or automation tools (Python, PowerShell, Bash) is a plus. Excellent communication and problem-solving skills; ability to clearly explain security findings to non-security audiences. Experience with compliance frameworks such as PCI DSS, NIST, HIPAA , or ISO 27001 . Relevant certifications are a plus (e.g., CISSP, Security+, LFCS, RHCSA ). Powered by JazzHR

Posted 30+ days ago

ROUSH logo
ROUSHLivonia, MI
At Roush, we fuse technology and engineering to provide product development solutions to customers in a diverse range of industries. Widely recognized for providing engineering, testing, prototype, and manufacturing services to the transportation industry, Roush also provides significant support to the aerospace, defense, and theme park industries. With over 2,400 employees in facilities throughout the United States, Europe, Asia, and South America, our unique combination of creativity and tenacity activates big ideas on a global stage.  We want motivated, ambitious people who put the needs of our customers first, bring creativity to their work and will do whatever it takes to achieve success.  If you share our passion for providing innovative solutions to complex challenges, we want you on our team.   At Roush, we work alongside the best and brightest to do incredibly cool things you wouldn’t believe. At Roush, you are part of building the future.     The Chief Information Officer (CIO) at Roush will be responsible for overseeing the company's information technology strategy and ensuring that all systems necessary to support its operations and objectives are in place. The CIO will lead the IT department in planning, implementing, and managing the technology infrastructure and services that support the company's business goals. The ideal candidate is a strategic thinker with a strong focus on building relationships and a passion for advancing Roush’s technology vision. This is a full-time, onsite position based in Livonia, MI.                                 Essential Duties and Responsibilities: Develop and implement the IT strategy to align with the company's business objectives. Oversee the management of IT infrastructure, including hardware, software, networks, and data centers. Ensure the security of the company's IT systems and data, implementing robust cybersecurity measures. Lead the IT team in the design, development, and deployment of new applications and systems. Manage relationships with external vendors and service providers. Collaborate with other departments to identify and address their technological needs. Monitor and evaluate emerging technologies to determine their potential impact on the company. Develop and manage the IT budget, ensuring cost-effective solutions. Ensure compliance with relevant regulations and standards. Provide leadership and guidance to the IT team, fostering a culture of innovation and continuous improvement. Required Education and Experience: Bachelor’s degree in information technology, Computer Science, or a related field. U.S. Citizen allowing for International Traffic in Arms Regulations (ITAR) compliance. Minimum 15 years proven experience as a CIO or in a similar senior IT leadership role. Experience with cybersecurity and data protection. Strong knowledge of IT infrastructure, systems, and applications. Excellent leadership and management skills. Strong strategic thinking and problem-solving abilities. Excellent communication and interpersonal skills. Ability to manage multiple projects and priorities in a fast-paced environment. Preferred Skills: Knowledge of ERP systems and CRM platforms. Familiarity with cloud computing and virtualization technologies. Master's degree in information technology, Computer Science, or a related field. Experience in the automotive or manufacturing industry. To apply, please visit the Roush careers page by clicking on this link: https://jobs.roush.com/us/en Our full-time benefits include medical, dental, vision, life insurance, earned sick time, STD, LTD, 401K, tuition reimbursement, paid vacation, and paid holidays. Visit our website:   www.roush.com Like us on Facebook:  www.facebook.com/RoushCareers Roush is an EO employer – Veterans/Disabled and other protected categories. If you need a reasonable accommodation for our employment application process due to disability, please contact Roush Talent Acquisition at (734) 779-7087. Powered by JazzHR

Posted 30+ days ago

DSS Inc. logo

Information Systems Security Specialist II (Pending Contract Award) - SBG

DSS Inc.Charleston, SC

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

SBG, a DSS, Inc. company, specializing in engineering, information technology, cyber-security, intelligence, and training, is looking for a hard-working results-oriented Information Systems Security Specialist II. We are seeking highly motivated individuals with a positive attitude looking to join our rapidly growing company. The ideal candidates for this position have strong attention to detail, analytical and ethical, who can excel in a very fast-paced government contractor environment. This is an on-site role based in Charleston, SC

Contingent Upon Contract Award

OVERVIEW

The Information System Security Specialist II is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated competency with specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. Must have active Secret clearance.

The Information System Security Specialist II:

  • Support all aspects of Program Information Assurance (IA) activities across the Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) lifecycle.

  • Apply knowledge and experience in cybersecurity, engineering, Test & Evaluation (T&E), and/or Security Control Assessment (SCA) roles.

  • Demonstrate working knowledge of the Risk Management Framework (RMF) and/or prior experience with Defense Information Assurance Certification and Accreditation Process (DIACAP).

  • Interpret and apply relevant security policies and guidance documents to support the development and maintenance of IA artifacts and traceability documents required for Authority to Operate (ATO) compliance.

  • Evaluate and validate security solutions to ensure they meet system requirements for handling up to classified information.

  • Assist in the development and enforcement of system security policies, ensuring alignment with configuration management and change control processes.

Qualifications

RREQUIREMENTS:

  • Active DoD Secret Security Clearance

  • Two (2) - Five (5) years of practical experience in a Cybersecurity, Engineering, T&E or A&A (formerly C&A) related field.

  • Have worked with Information Assurance tools such as DISA Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS) and may be required to hold an Interim Security Control Assessor qualification.

EDUCATION:

  • High School Diploma / GED

PHYSICAL DEMANDS:

Standing

10% per day

Sitting

60% per day

Walking

5% per day

Stooping

0% per day

Lifting

  • If traveling, the ability to lift up to 50 lbs. unassisted (luggage, laptop, etc.)
  • Up to 15 lbs. unassisted, several times a day (laptop, office equipment, office supplies, etc.)

Computer Work

100% per day

Telephone Work

60% per day

Reading

100% per day

Other, please specify

  • Travel unassisted less up to 10% per year, via aircraft or privately owned vehicle.

SBG, Inc. is an Equal Opportunity Employer

If you need an accommodation seeking employment with SBG, Inc., please email recruiting@sbgts.com or call (703) 299-9093. Accommodations are made on a case-by-case basis.

#MN

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall