landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

N logo
NOUS Imaging Inc.Saint Louis, MO
Information Security Manager   Who You Are   You are an experienced IT security professional with a proven track record in developing and implementing robust information security policies and practices. With a passion for protecting sensitive data and ensuring regulatory compliance, you thrive in dynamic, fast-paced environments. You excel at collaborating cross-functionally with teams across quality, regulatory, and engineering, ensuring the organization’s security framework remains strong. Your strategic mindset, attention to detail, and methodical approach allow you to assess risks, enhance processes, and maintain compliance, positioning you as a key driver in safeguarding our overall security posture.  What You Will Do   As the Information Security Manager, you will own the Turing Information Security Program.  This includes both the creation of policies, procedures, and guidelines as well as the implementation and improvement of the program. Your focus will be on core organizational security needs, including data protection, incident response, disaster recovery, and risk management. You will regularly assess the company’s security posture, develop training programs to educate employees on best practices, and coordinate cybersecurity audits and compliance initiatives. You will also own the corporate IT function, including the enterprise IT infrastructure, employee laptop management, IT helpdesk, and overall IT improvement roadmap.  Key responsibilities include:   Developing, implementing, and maintaining information security and IT policies and procedures  Ensuring compliance with relevant regulatory frameworks and standards, starting with HIPAA compliance for patient privacy and security  Collaborating with DevOps and cloud infrastructure engineers to align security strategies  Leading risk assessments, vulnerability management, and incident response  Managing internal and external security audits  Developing and delivering security awareness programs for employees  Identifying, assessing, and mitigating security risks to protect company data and intellectual property  Leading continuous improvement initiatives in information security processes  Developing and executing the corporate IT roadmap, including employee laptop management, helpdesk support, and enterprise software administration  Ensuring the reliability and performance of IT systems to minimize downtime and enhance productivity.  What You Need   5+ years in Healthcare Information Security or another highly regulated industry  Demonstrated experience as an IT Specialist with a willingness to get your hands dirty  Expertise in achieving and maintaining SOC 2 certification and compliance with standards like HIPAA and GDPR  Experience implementing and maintaining centralized device management and IT asset management  Demonstrated history of creating and executing and IT Roadmap & Strategy  Experience implementing Zero Trust best practices  Expertise in Windows network management and support  Bachelor’s degree in computer science or information technology, or equivalent work experience  Excellent verbal and written communication skills with exceptional attention to detail  Nice to have   Experience with Software as a Medical Device (SaMD), including IEC 62304, FDA 21 CFR Part 820, HIPAA, GDPR, and other relevant medical cybersecurity regulations and standards  Strong understanding of cloud security best practices (AWS preferred)  Basic proficiency in Python and SQL  Masters degree in computer science or information systems    Who We Are   Turing Medical Technologies, Inc. is a pioneering medical imaging software company developing advanced solutions for magnetic resonance imaging (MRI). Our mission is to provide cost-effective imaging enhancements, drive the next generation of data analytics, and create a patient-centered experience in the MRI suite.  We believe in the passion of our employees and are committed to helping them achieve their goals while contributing to the success of our company. You’ll collaborate with a dedicated team of scientists, engineers, product managers, quality and regulatory professionals, and others who are united by a shared commitment to innovation and excellence. Our team is based across the United States, with headquarters in St. Louis, Missouri. Turing Medical Technologies, Inc. is an Equal Opportunity Employer.  Visit https://turingmedical.com to learn more about our products and company.  Powered by JazzHR

Posted 30+ days ago

L logo
Lucayan Technology Solutions LLCAurora, CO
📍 Aurora, CO | 🕒 Full-Time | 🔒 TS/SCI with Polygraph | Onsite Overview Lucayan Technology LLC is hiring an Information Assurance (IA) Lead to support critical Intelligence Community and Department of Defense programs. As a key position , the IA Lead will provide senior-level guidance on IA issues, ensuring secure system design, development, and integration across enterprise computing environments. What You’ll Do Advise and collaborate with senior government managers on IA issues. Lead end-to-end system security engineering for network, enclave, and computing environments. Ensure compliance with ICD 503 , DoD IA Certification & Accreditation processes, and NIST guidelines. Oversee the design and integration of secure architectures, systems, and components. Translate IA requirements into secure, mission-ready solutions . Draft technical documentation, IA policies, and security recommendations. Do You Have What It Takes? Required: Active TS/SCI with Polygraph . Bachelor’s degree in STEM (advanced degree preferred). 10+ years of IA experience in designing, developing, and integrating secure architectures. Relevant experience with IA systems security engineering, ICD 503, NIST guidelines, and DoD IA C&A processes . IASAE Level III certification (CISSP-ISSEP or CISSP-ISSAP). Preferred: Advanced STEM degrees or IA certifications. Experience leading IA on Intelligence Community programs. Strong ability to brief senior leaders and communicate technical requirements. About Lucayan Technology LLC Lucayan Technology LLC provides mission-critical cybersecurity, engineering, and program management services to the Department of Defense and Intelligence Community . Our IA experts ensure secure system architectures that protect the nation’s most sensitive missions. At Lucayan, you’ll collaborate with top professionals, engage directly with senior leadership, and contribute to the design and defense of secure enterprise systems . 👉 Apply today and take on a leadership role in advancing national security through Information Assurance excellence . Powered by JazzHR

Posted 1 week ago

A logo
AERMOR LLCPhiladelphia, PA
Location: Philadelphia, PA Clearance: Secret Position Type: Full-time AERMOR is seeking a highly skilled Information System Security Engineer III to provide comprehensive information assurance (IA) and cybersecurity support. The successful candidate will be responsible for developing, implementing, and maintaining RMF compliance documentation, conducting vulnerability assessments, executing system security testing, and ensuring Department of Defense (DoD) Information Technology (IT) systems achieve and maintain accreditation (ATO/IATT). *This is not a remote position* Key Responsibilities Develop, maintain, and track RMF system security plans. Identify and tailor IT and Cybersecurity control baselines based on system categorization Perform Ports, Protocols, and Services Management (PPSM) Conduct IT and Cybersecurity risk and vulnerability assessments. Execute security control testing per RMF assessments and annual security reviews. Mitigate and remediate vulnerabilities using STIG requirements. Develop and maintain POA&Ms in eMASS. Implement and assess STIGs and SRGs. Perform vulnerability assessments using ACAS, SCAP Compliance Checker (SCC), and Evaluate-STIG. Deploy security updates, patches, and compliance configurations across system assets. Conduct routine audits of IT system hardware/software components. Maintain inventory of information system components. Support IT change control and configuration management processes. Support configuration documentation, change control, and DoD STIG compliance. Ensure compliance of enterprise IT assets (e.g., Windows Servers, Cisco network hardware) via vulnerability assessments, patching, and STIG adherence. Required Qualifications Bachelor’s degree in Computer Science, Information Technology, or an equivalent STEM discipline from an accredited college/university. Minimum 7 years of professional experience in cybersecurity operations, Must hold an IAT III certification. Familiarity with eMASS, VRAM, ACAS, SCC, and STIG compliance. Powered by JazzHR

Posted 3 days ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:    Information Systems Specialist II - Vehicle Application  Division:      Systems & Programming Union:          IFT Location:     501 S 2nd St, Springfield, IL - Sangamon County Salary:        Salary $6,185.00 monthly - commensurate with experience Overview: Performs highly responsible technical work in the analysis and evaluation of operations to determine needed revisions of existing information systems or needed conversion to computer-based information systems; analyzes, designs, codes and tests complex programs and operational routines; as a senior team member, assists in performing data analysis work for complex projects; has working knowledge of the browser-based interface to mainframe programs (HTML and Java Script). Duties and Responsibilities: Writes complex computer programs in the COBOL programming language and interprets programs to understand logic flow for the purpose of creating technical data processing documentation, requiring attention to information detail.  Accesses programs residing on the mainframe via timesharing in order to interpret, write, modify and document the programs. Prepares, defines, modifies or designs complex data processing system definitions, forms, flowcharts, block diagrams and procedures; develops generalized and detailed systems design; converts symbolic statements of processes to detailed logical work flowcharts for coding; prepares comprehensive systems and programming documentation for complex systems. Develops and applies advanced cross-checks and auditing procedures to assure accuracy and reliable practices in information systems operations and to determine and correct deviations from specifications; resolves program intent, output requirements, data acquisition, and the use of internal checks and controls for programming functions. Understands and provides troubleshooting analysis on external input and output files or transactions involving non-IL SOS government agencies or private entities. Coordinates and directs feasibility studies to determine the practicality and economics of converting to information systems; develops data system specifications in the overall design; develops and coordinates the development of systems and programming logic diagrams and flowcharts necessary to accomplish the conversion. Coordinates major systems and programming projects including planning, scheduling and coordination of programmers and analysts to develop operational procedures related to implementation. Takes responsibility for portions of the highly technical aspects of application systems. Performs other duties as required or assigned. Education and Experience:   Requires knowledge, skill, and mental development equivalent to the completion of three years of college, with coursework in the computer science field OR 3.5 years of technical systems and/or programming experience as would be gained as an Information Systems Technician or any equivalent combination of education and experience and/or IT project management. Knowledge, Skills and Abilities:  Requires the ability to organize facts and findings, analyze data logically and to present results with clarity and comprehension, orally, in written or graphic form. Requires the ability to use and understand appropriate methods, tools, applications, and processes. Requires the ability to approach work in a rational and organized manner. Requires the ability to exercise sound judgement in analyzing, appraising, evaluating, and solving problems of a procedural, organizational, administrative, and technical nature. Requires ability to adhere to organizational standards for security, privacy, and ethics. Requires extensive knowledge of the devices for capturing data for computers and the means available for receiving and transmitting data from remote locations to a computer. Requires extensive knowledge of the advantages and limitations of computer communication, and information retrieval systems as management information tools. Requires extensive knowledge of systems design and implementation, including the way programs are written, compiled, and tested, the methods of operating computers, and the way data is transcribed into a form suitable for reading by computer. Requires extensive knowledge of the methods, procedures, and techniques of conducting feasibility studies for converting to computer applications. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Application Process: Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume or other attachments as needed. Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability.​ Powered by JazzHR

Posted 30+ days ago

K2 Integrity logo
K2 IntegrityCharlotte, NC
K2 Integrity is seeking an experienced Information Security Analyst who is passionate about secure software development and developer enablement. This candidate will be responsible for the design, implementation, and management of ISO27001-compliant security controls within our software development process. The ideal candidate will have the ability to collaborate with a software development team, raise awareness of secure coding practices, and foster a security-focused culture. We are looking for someone with the expertise to integrate robust security measures seamlessly into the development process, ensuring that security becomes an integral part of our software development lifecycle. Responsibilities: Partner with software development teams to integrate security practices into the software development process. Ensure that SDLC processes comply with ISO27001 and SOC2 audit standards within agreed timeframes. Conduct internal audits of SDLC controls. Manage secure code review processes, threat modeling, and application security assessments. Develop and maintain policies, coding standards, and best practices for developers. Maintain and support internal security systems relevant for secure software development. Identify and correct issues with vendors, suppliers, and subcontractors as required. Identify security gaps and manage gap mitigation. Participation in audit, incident response and access review processes. Serve as the primary point of contact for technology vendors, coordinating support activities, managing vendor relationships, and ensuring timely resolution of issues. Champion good security practices and assist developers with questions. Act as project manager for information security projects. Qualifications: Bachelor’s of science in cybersecurity required; master’s preferred. At least five years’ experience in the information security field and at least 2 years within software development Experience with Microsoft Azure, O365, and PowerShell. Experience with software tools which facilitate secure SDLC. Experience completing ISO27001, and SOC2 audits. Experience with regulatory compliance (GDPR, CCPA, PCI). Good understanding of information security principles. Ability to explain complex theories to development staff. Strong knowledge of operating systems and related security issues (Windows, Linux, mobile). Strong knowledge of network security systems and practices. Strong knowledge of encryption technologies and common issues. Any security certification or progress towards a certification is a plus. Strong desire to learn, research, and problem solving. Excellent communication skills. This role is work from home (USA).   Powered by JazzHR

Posted 30+ days ago

I logo
Innovative Management & Technology ServicesClarksburg, WV
Company Overview: Join a fast-growing company highly experienced in cyber security, cloud computing, virtualization, big data analytics, and project management!  IMTS offers competitive compensation, excellent benefits including tuition reimbursement and employer-contributed 401K, and referral bonuses.  We work with the best customers on-site at top government agencies. Job Title: Senior Information Security Specialist Primary Location: Clarksburg, WV - Hybrid Clearance: Top-Secret (TS) Position Summary: As a Senior Information Security Specialist, you will play a critical role in safeguarding federal or state information systems and ensuring they remain compliant, secure, and resilient across all phases of their lifecycle. Your work will directly support mission-driven initiatives that protect sensitive government data, improve operational continuity, and reduce cyber risk in Agile, fast-paced environments. You will lead risk assessments, analyze system controls, interpret compliance standards, and serve as a trusted advisor to engineering, operations, and leadership teams. Responsibilities: Lead comprehensive reviews of management, operational, personnel, and technical controls throughout the system development lifecycle (SDLC). Identify and assess emerging security risks, weaknesses, and vulnerabilities associated with infrastructure, applications, and operations. Collaborate with developers and engineers to ensure identified risks are mitigated and documented effectively. Ensure compliance with federal and industry security standards including NIST SP 800-53, OWASP Top 10, Common Criteria, DISA STIGs, and SANS Institute recommendations. Support and contribute to Authorization to Operate (ATO) packages, including preparation of SSPs, POA&Ms, and continuous monitoring (ConMon) artifacts. Advise on policy alignment and security architecture improvements to support secure Agile delivery. Apply technical knowledge of networking, system administration, and development to assess the security posture of enterprise environments. Utilize Splunk to perform audit log analysis, generate system alerts, and support threat hunting and incident response activities. Recommend and implement automated logging, monitoring, and security reporting processes. Engage proactively with Agile development teams, product owners, and ISSOs to embed security into project planning and delivery. Translate complex technical findings into clear, actionable guidance for non-technical stakeholders and leadership. Contribute to security knowledge-sharing, training sessions, and cross-functional security strategy initiatives. Required Qualifications: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent professional experience). Minimum 7 years of experience in information security, IT risk management, or cybersecurity compliance, preferably in a federal or state agency environment. Demonstrated experience applying and interpreting NIST 800-53, OWASP, and DISA STIGs in real-world projects. Strong hands-on technical background in networking, system administration, or software development. Proficiency with SIEM tools—especially Splunk—for event correlation, alerting, and compliance reporting. Familiarity with Agile development environments and DevSecOps principles. Strong written and verbal communication skills, with the ability to create reports and briefings for technical and non-technical stakeholders. Active Top Secret clearance is required. U.S. Citizenship is required. Preferred Qualifications: Experience supporting federal ATO processes, RMF frameworks, or FISMA compliance efforts. Familiarity with continuous monitoring, vulnerability scanning tools, and risk scoring models. Certifications such as CISSP, CISM, Security+, CEH, or GSEC. IMTS is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law.    Powered by JazzHR

Posted 30+ days ago

M logo
Metropolitan Bank Holding Corp.New York City, NY
Come work with us: Metropolitan Commercial Bank (the "Bank") is a full-service commercial bank based in New York City. The Bank provides a broad range of business, commercial, and personal banking products and services to individuals, small businesses, private and public middle-market and corporate enterprises and institutions, municipalities, and local government entities. Metropolitan Commercial Bank was named one of Newsweek's Best Regional Banks and Credit Unions 2024. The Bank was ranked by Independent Community Bankers of America among the top ten successful loan producers for 2023 by loan category and asset size for commercial banks with more than $1 billion in assets. Kroll affirmed a BBB+ (investment grade) deposit rating on January 25, 2024. For the fourth time, MCB has earned a place in the Piper Sandler Bank Sm-All Stars Class of 2024. Metropolitan Commercial Bank operates banking centers and private client offices in Manhattan, Boro Park, Brooklyn and Great Neck on Long Island in New York State. The Bank is a New York State chartered commercial bank, a member of the Federal Reserve System and the Federal Deposit Insurance Corporation, and an equal housing lender. The parent company of Metropolitan Commercial Bank is Metropolitan Bank Holding Corp. (NYSE: MCB). Position Summary: We are seeking a highly motivated and analytical Information Security Analyst to join our Line 2 Information Security team. This position plays a critical role in supporting the Bank's IT Risk & Cyber Resilience functions, including IT risk assessments, user access reviews, business continuity, and operational resilience practices. The role reports to the VP of IT Risk & Cyber Resilience, under the broader direction of the Chief Information Security Officer (CISO). This position is ideal for professionals with 1-4 years of relevant experience in cybersecurity, risk management, audit or IT governance, and who hold or are pursuing an advanced degree. We have a flexible work schedule where employees can work from home one day a week. Essential duties and responsibilities: IT Risk Assessments: Assists in the planning, execution, and documentation of IT risk assessments against minimum security standards, for the entire IT asset inventory. Review control environments, identify control gaps, and work with first-line partners to ensure risk mitigation plans are in place Internal IT Controls Testing and Validation Execute validation testing of IT internal controls to ensure design and operating effectiveness across infrastructure, applications, databases, and systems. Apply risk analysis principles to determine testing scope, focus, objectives, and rationale. Develop testing strategies, including the selection of samples, sample sizes, and testing methodologies. Analyze testing results, identify exceptions, and recommend actionable steps to address control deficiencies and strengthen internal processes. Prepare thorough working papers and document control testing findings to ensure accuracy and alignment with standards. User Access review Governance: Coordinate and oversee the user access review process across business applications and infrastructure. Ensure alignment with access control policies and identity governance best practices. Business Continuity Planning (BCP): Support the development, maintenance, and testing of business continuity and resilience plans. Work with business units to ensure plan completeness and alignment with enterprise resilience strategies. Operational Outage Investigations: Assist in root cause analysis and risk review of IT outages and incidents and determine if BCPs need to be updated. Track remediation efforts and document lessons learning for reporting to senior leadership. Governance Reporting: Develop and maintain risk metrics, dashboards, and material for the IT and IS Steering Committee and Operational Risk Management Committee. Draft risk summaries and escalation reports for senior management, auditors, and regulators, where appropriate. Policy Framework Support: Support the development and refinement of policies, standards, and procedures related to IT and Cyber Risk Management, Business Continuity, and security governance. Required knowledge, skills and experience: Graduate degree in Information Technology, Information Security, Risk Management, Finance, or Accounting. Candidates with IT audit or IT controls and/or audit experience preferred. Experience and or education in IT controls testing, risk management, or IT audit. Strong knowledge of IT internal controls, infrastructure, and applications. Familiarity with IT risk frameworks such as NIST, COBIT, or ISO 27001. Ability to analyze and document control deficiencies, root causes, and remediation efforts. Proficiency in Microsoft Office Suite (Excel, Word, PowerPoint). Strong analytical, verbal, and written communication skills with attention to detail. Ability to interact effectively with IT teams, risk management partners, and stakeholders. Exposure to Third-Party Risk Management (TPRM) or vendor IT controls assessment. Preferred knowledge, skills and experience: Certifications (e.g., CISA, CRISC) are a plus. Potential Salary: $80,000 - $100,000 annually This salary range only reflects base wages and does not include benefits, bonus, or incentive pay. Salary bands are purposefully wide ranging to encompass the different factors considered in determining where a candidate falls in the range, including but not limited to, seniority, performance, experience, education, and any other legitimate, non-discriminatory factor permitted by law. Metropolitan Commercial Bank provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. This applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.

Posted 1 week ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:    MuleSoft Architect – Information Systems Advisor I Division:      Systems & Programming Union:          IFT Location:    501 S Second St, Springfield, IL - Sangamon County Salary:         Range $6,433 to $11,967 monthly - commensurate with experience Benefits:       https://cms.illinois.gov/benefits/stateemployee.html Overview: Provides technical leadership on MuleSoft implementation projects. This person is primarily responsible for evaluating technical and functional requirements and for developing a sound architectural blueprint in line with business goals. As an experienced practitioner, the Solution Architect will advise on best practices for on-premise/cloud/hybrid integration and API management.  This person will be an influencer and thought leader and will also possess the in-depth technical expertise and credibility to provide detailed guidance to the implementation team. The Solution Architect will perform hands-on activities as required to ensure project.  Duties and Responsibilities: Platform Administration - provides operational support for production incident response; controls Plane Administration - Access, Teams, Business Groups, ConnectedApp, Monitoring, RTF Upgrades; License renewal and Certificate management. Conducts requirement gathering workshops and leads the solution design process. Articulates recommendations through compelling presentations and architectural blueprint documents to a variety of audiences, including business management and experienced IT architects. Translates functional and non-functional requirements into well-documented integration interfaces and implementation design. Designs reusable assets, components, standards, frameworks, and processes to support and facilitate API and integration projects. Selects the best Mule components and patterns for integration solution designs. Leads technical teams through complex, multi-phased delivery projects and provides hands-on delivery guidance. Creates and influences proper standards for development, governance and operational lifecycle Mentors and trains the internal team on design and architecture best practices and API Sizing. Advises on effective use of the automation capabilities of Anypoint Platform for DevOps, CI/CD, and testing Performs other duties as required or assigned Required Qualifications: Requires knowledge, skill, and mental development equivalent to the completion of two years of college, with coursework in the computer science field AND four years of experience with technical systems and/or programming experience and/or IT project management OR any equivalent combination of education and experience. Requires valid Illinois Driver’s License Requires the ability to lift and carry up to 50 lbs Preferred Qualifications: 5+ years demonstrated expertise designing, implementing, and supporting enterprise-grade technical solutions using MuleSoft to meet complex business requirements 3+ years of experience providing technical solutions development for on-­premise and SaaS applications using JEE and/or JSE frameworks Design, development and operations experience with highly-­available, scalable, and fault tolerant systems and solid understanding of the design patterns. Experience with XML, JMS, WS, SOA integration, API Management technologies and standards Experience designing public and private enterprise secure services using RAML and REST based APIs Experience using JAVA IDE (Eclipse, Intelli J, Netbeans) Experience using Maven Experience profiling Java applications including threading issues and examining thread dumps Integration product support from integration vendors like IBM, BEA, Oracle, Tibco, etc. MuleSoft Certifications: MuleSoft Certified Developer (MCD), MuleSoft Certified Integration Architect (MCIA), MuleSoft Certified Platform Architect (MCPA) Bachelor’s degree in CS or equivalent industry experience Application Process:  Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume, or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).     Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States . Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability.   Powered by JazzHR

Posted 30+ days ago

T logo
Tetrad Digital Integrity LLCAlexandria, VA
Tetrad Digital Integrity (TDI) is a leading-edge cybersecurity firm with a mission to safeguard and protect our customers from increasing threats and vulnerabilities in this digital age.TDI is looking for a Secret cleared ISSO to support our DISA customer on a hybrid basis out of Alexandria VA. RESPONSIBILITIES: Establish and implement security procedures and practices in support of Customer goals and current DoD regulations. Develop and update Assessment & Authorization (A&A) documentation (Body of Evidence) for management and continuous monitoring of information systems. Using knowledge of the Information System (IS) and understanding of established Information Assurance (IA) and Cybersecurity requirements validate security policies and procedures outlined in the System Security Plan (SSP), customer policies & regulations, and ensure local policies are followed. Initiate the authorization or re-authorization efforts and process for new or expiring systems and coordinate, schedule, and attend required meetings Serve as the System Information System Security Officer (ISSO) for various Joint Service Provider (JSP) systems Take corrective action to resolve problems identified and ensure systems are operated, maintained, and disposed of in accordance with established policies and procedures. Perform security audits IAW established procedures. Develop process for the management, review, and retention of security audit data. Make decisions and implement corrective action as required to resolve audit discrepancies. Author and review IS security-related documentation and submit to Enterprise Mission Assurance Support Service (eMASS). As an IA Subject Matter Expert (SME), provide critical thinking to ensure system security requirements are addressed during all phases of the System Development Life Cycle (SDLC). Conduct ongoing security reviews and tests of systems to verify security features and controls are functional and effective. Take corrective action to resolve identified vulnerabilities. Provide security engineering review of proposed changes or additions to the IS (including hardware, software, or connectivity), and advise the Information System Security Manager (ISSM) of the security relevance. Create and maintain processes and procedures for use by members of the ISSO team Support the ISSO Team Lead in conducting lessons learned activities to improve the overall productivity and efficiency of the ISSO team Communicates with internal team members and customer team members QUALIFICATIONS: DoDI 8570 IAM Level II or IAT Level II Certification BS and four or more years of prior relevant experience, additional experience may be considered in lieu of degree Active Secret TDI does business with the federal government, which restricts employment to individuals who are either US citizens or lawful permanent residents of the United States. “TDI is an Equal Opportunity Employer. Employment decisions are made based on individual qualifications, merit, and business needs. We do not discriminate in employment opportunities or practices based on race, color, religion, sex, or national origin, in accordance with applicable federal laws.” Powered by JazzHR

Posted 3 days ago

Watershed Security logo
Watershed SecurityPhiladelphia, PA
JOB DESCRIPTION Watershed Security, is a Veteran Owned Small Business with over 20 years’ Cybersecurity and Government Contracting experiencing. Watershed is looking for a Senior Information Systems Security Officer (ISSO) to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidates will have experience coordinating and enacting required security changes, with in various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting. REQUIRED QUALIFICATIONS Bachelor’s degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university. Must have at least one of the following active certifications: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP, Years of Experience: 6 years practical experience in a cybersecurity or A&A related field. Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards. Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems. Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership. Provide guidance on best practices and recommend improvements to the organization's security posture. Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats. Support continuous monitoring of information systems and provide regular status reports on security compliance. Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices. Clearance Level: SECRET; US Citizen. Ability to possibly provide onsite support in Philadelphia, PA or Norfolk, VA. Some/all remote work may be an option, however the norm will be onsite support. This will be dependent upon customer needs and classification level of work being performed. Some travel may be required. Experience with the Navy RMF Process Guide (RPG), and Navy A&A tools such as ACAS, eMASS and eMASSter. Proficient with Microsoft Office Suite (Word, Excel, Teams, Project). Self Starter; detail oriented; able to brief senior level staff. DESIRED QUALIFICATIONS Experience supporting 10 or more Navy Packages (achieving and/or maintaining ATO) Experience with the NAVSEA RMF Business Rules Contingent upon award PAY RANGE Final salary is influenced by factors such as location, contract labor categories, experience, skills, education, and certifications. Watershed offers competitive compensation, medical and dental benefits, educational reimbursement, 401K plans with matching, 15 days of PTO to start and 11 paid holidays per year. The proposed salary range for this position is: $70,000.00 - $100,000.00 USD. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans Powered by JazzHR

Posted 2 days ago

South Shore Health logo
South Shore HealthNorwell, MA
If you are an existing employee of South Shore Health then please apply through the internal career site. Requisition Number: R-20907 Facility: LOC0027 - 141 Longwater Norwell141 Longwater DriveNorwell, MA 02061 Department Name: SHS Health Information Management Status: Full time Budgeted Hours: 40 Shift: Day (United States of America) This position is responsible for processing requests for release of patient health information while following established State and Federal rules and regulations, South Shore Health System and department policies and procedures. Required to maintain confidentiality, privacy and security of all patient health information. ESSENTIAL FUNCTIONS 1 - Responsible for the release of patient information. 2- Examines requests for HIPAA/State compliance and valid patient authorization 3- Processes priority requests for release of patient information 4 - Assists in responding to all requester and patients questions and/or problems or other health system personnel. 5 - Contacts other health system clinics/departments for additional health information required to fulfill patient requests 6- Examines subpoenas/court orders for validity 7 - Retrieves hardcopy and Electronic Medical Records from hospital systems 8 - Orders offsite records and pulls microfilm record if necessary 9- Ensures the patient name and medical record number on the request matches the medical record 10 - Reviews medical records for legally protected and sensitive information and obtain specific patient authorization when necessary 11 - Determine if authorization is valid and rejection letter is required 12 - Creates/Edits/Modifies letters 13 - Contacts requestors for extensions or clarification 14 - Interacts with Internal Council if subpoena is not sufficient and any other legal matters 15 - Abstract, scan and print the required information to adequately fulfill requests 16- Enters request into the South Shore Health System Release Module tracking system in 17 - Creates invoices for billable requests 18 - Updates South Shore Health System Release Module Tracking System 19- Monitors work queues and ROI Reports 20 - Interact with Internal Council if subpoena is not sufficient Technology and Learning a- Participates in continued learning and possess a willingness and ability to learn and utilize new technology and procedures that continue to develop in their role and throughout the organization. b- Embraces technological advances that allow us to communicate information effectively and efficiently based on role. c- Prepare certification in lieu of personal appearance in court d- Package and mail records for delivery e- May perform other related duties as required f- Ensures timely Completion of ROI Requests. g- Meets productivity standards for processing ROIs h- Ensures ROI's are completed accurately and sent out to the correct party JOB REQUIREMENTS Minimum Education- Preferred Minimum of high school diploma, RHIT or related Associates Degree preferred Minimum Work Experience 3-5 years experience in a Health Information Management Department preferred Monday- Friday, rotating start time 8:00am- 4:30 or 8:30am- 5:00pm, onsite and remote rotation required Responsibilities if Required: Education if Required: License/Registration/Certification Requirements:

Posted 2 days ago

AnaVation logo
AnaVationHuntsville, AL
Be Challenged and Make a Difference In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture. Description of Task to be Performed: AnaVation is looking for a dedicated Information System Security Engineer (ISSE) to join our team. This position is part of a talented technical team responsible for the ongoing development, operations and maintenance of several networked systems supporting digital forensic investigations running primarily on Windows and utilizing virtual and cloud environments. The ideal candidate must be a self-starter with strong work habits, is able to complete task independently while working as part of a team and have demonstrated career experience as an ISSO or ISSE and with the Federal ATO process. Functional Responsibilities: Senior level capabilities regarding Information system security. Knowledgeable of current Information Assurance (IA) technologies to the architecture, design, development, evaluation, and integration of applications, systems, and networks to maintain the system security posture. Develops compliancy and standardization within the customer's policies regarding various information systems. Work closely with Government customers to ensure the confidentiality, integrity, and availability of systems, applications, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs; infrastructure; application; Security Assessment and Authorization (SAA), IA policy directives (PD) and guides (PG); and IA Security tools (e.g., Tenable.io , Nessus Pro, NMap, etc.). The ISSE shall: •Have excellent verbal and written communication skills to be able to accurately relate requirements and document all within the appropriate security document and/or within the RMF system and coordinate with program, other system(s), and security personnel. •Prepare documentation from templates such as, but not limited to, Configuration Management Plan (CMP), Incident Response Plan (IRP), Information System Contingency Plan (ISCP), and Plan of Action and Milestones (POA&M) to ensure compliance with customer PDs and PGs and Federal IA requirements as well as coordinate review(s) and approvals. •Must be able to discern the program policies and procedures, identify areas that need work and bring up to management for resolution. •Identify IA vulnerabilities and coordinate with the Infrastructure and Development teams to correct, mitigated or apply for an exception via the POA&M processes. •Review vulnerability (i.e., patches, updates, etc.) and compliance (i.e., Security Content Automation Protocol (SCAP) and/or Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG)) scans on the infrastructure and applications to ensure patch and configuration compliance (on-premises and in the cloud (Azure preferred)) •Prepares SAA package(s) to obtain and maintain an authority-to-operate (ATO), authority-to-test (ATT), or other SAA authority types for all systems and applications. •Attend Configuration Control Board (CCB) meetings and review all change requests for impact to the system/application security posture(s) and applicable Federal and customer PD and PG compliance requirements; and document decisions within the CMP. •Coordinate security incident and high priority compliance responses with the Enterprise Security Operations Center (ESOC). •Represent program security interests in various meetings within and outside of the program. •Schedule and conduct meetings with pertinent program personnel to address findings to determine appropriate path forward and document within the CMP and, if necessary, POA&M. •Coordinates with other system Information System Security Officers (ISSO) to ensure that their requirements for interconnection, policy and procedures are met and all documentation is provided and updated as necessary. •Ability to assess current and evolving security threats in an operational environment. •With an appropriate amount of Government PM guidance, works independently to carry out all technical requirements as directed by the Government PM, Information System Security Representative, Information System Security Manager, and Authorizing Official in a timely manner. T his position is on-site in Huntsville, AL and requires a Top Secret clearance and the ability to obtain an CI polygraph Required Qualifications: Ten (10) years of experience or more assessing and documenting results for system(s), infrastructure(s) and applications (on-premises and cloud (i.e., AWS GovCloud and/or Azure GovCloud)) against NIST SP 800-53 security controls and SP 800-171 Risk Management Framework (RMF) processes. Bachelor of Science (B.S.) Degree in Computer Security or related field of study; (ISC)2 Information Security Certification(s) (e.g., CISSP, CAP, etc.); or in lieu of education, an additional five (5) years of relevant experience that addresses all requirements of the position. Requires an Active Top Secret clearance and the ability to obtain an CI polygraph Day to Day Expectations: Experience working on an Agile team Experience working with a federal law enforcement organization Willingness to implement Lean principles, Agile engineering and DevSecOps Desire longevity on the project. Technical background desired, knowledge broader in scope. Have an understanding of taclans, basic coding, and scripts. Splunk and Tenable experience desired. Need to be able to read technical diagrams, dataflows, create workflows, read network diagrams. Understand JRC and the 6 steps of the Risk Management Framework. Have a team perspective, invite collaboration, the personality needs to be one of investment. Need to connect and to learn. Be function driven. They need to have an accountability to the program, be on time, personable, positive Desired Qualifications: Experience in a cyber-risk and compliance management system (e.g., Xacta, RiskVision, etc.). One (1) year experience or more configuring, performing, scheduling, reviewing, and assessing vulnerability (i.e., patches, updates, etc.) and compliance (i.e., Security Content Automation Protocol (SCAP) and/or Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG)) scans on the infrastructure and applications to ensure patch and configuration compliance on-premises and in the cloud (Azure preferred). Technical background that will assist in assessing the NIST SP 800-53 security controls and gather evidence to support conclusions. Knowledge of operating systems, network and application security to aid implementation of information security and assurance principles. Knowledge of SPLUNK software and tools. Knowledge of Taclane, encryption devices and COMSEC technology. Benefits · Generous cost sharing for medical insurance for the employee and dependents · 100% company paid dental insurance for employees and dependents · 100% company paid long-term and short term disability insurance · 100% company paid vision insurance for employees and dependents · 401k plan with generous match and 100% immediate vesting · Competitive Pay · Generous paid leave and holiday package · Tuition and training reimbursement · Life and AD&D Insurance About AnaVation AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team. If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you! AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.

Posted 30+ days ago

AnaVation logo
AnaVationReston, VA
Be Challenged and Make a Difference In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture. The job duties of the ISSO are as follows: • Responsibilities are full time on customer’s onsite and will cover classified programs and Special Access Programs (SAP). No Telework. • Provide subject matter expertise and consulting on security related matters for enterprise information system and network architectures, access problems, and implementation of security policies and procedures. • Assist in overseeing and managing day-to-day operation of SAP Information Systems. • Optimize system operation and resource utilization and performs system capacity planning/analysis while maintaining the security posture. • Assist team in DIA’s Authorization and Accreditation (A&A) process using RMF across the design lifecycle for classified systems obtaining and maintaining Interim Authority to Operate (ATO), ATO and Authority to Connect (ATC). • Create and process RMF authorization SAP packages from submission to approval/disapproval • Develop and maintain IT security documents, including system security plans, risk assessments, Plan of Action and Milestones (POA&M), contingency plans, incident response plans, IT security policies and procedures. • Provide recommendations regarding remediation and mitigation of identified vulnerabilities by developing plan of action and milestones (POA&Ms). • Advise developers on integrating security requirements • Demonstrate a strong understanding of Networks, Cloud, and IT system security authorization procedures. Required Qualifications: Demonstrates strong experience with IC/DoD customer's Assessment and Authorization (A&A) process (e.g., RMF, NIST800-53, ICD503). Experience in developing and implementing DoD/DIA approved information security controls, procedures and documentation for the operation of standalone classified systems. A Bachelor’s Degree from an accredited institute in an area applicable to this position and eight (8) years of relevant experience An additional four (4) years of relevant experience may be substituted for the bachelor’s degree Must presently be 8570 compliant (IAT Level 2 preferred); must be 8570 compliant (IAT Level 2) Experience with one or more commercial government cloud service provider’s system accreditation processes Experience with the Xacta Experience as a Cybersecurity Control Assessor for SAP Experience with Ongoing Authorizations and Assessments Experience with C2S Cloud, or DevOpsSec) Active TS/SCI with CI Poly Benefits · Generous cost sharing for medical insurance for the employee and dependents · 100% company paid dental insurance for employees and dependents · 100% company paid long-term and short term disability insurance · 100% company paid vision insurance for employees and dependents · 401k plan with generous match and 100% immediate vesting · Competitive Pay · Generous paid leave and holiday package · Tuition and training reimbursement · Life and AD&D Insurance About AnaVation AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team. If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you! AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.

Posted 30+ days ago

Whoop logo
WhoopBoston, MA
At WHOOP, we're on a mission to unlock human performance. WHOOP empowers members to perform at a higher level through a deeper understanding of their bodies and daily lives. WHOOP is seeking a Senior Information Security Engineer to join our team, reporting to our Information Security Manager. In this role you will design, implement, administer, and monitor security measures to protect WHOOP systems, networks, and data from security threats. Success in this role requires continuous learning and adaptation to guard against ever-evolving security threats. RESPONSIBILITIES: Serve as a technical lead and subject matter expert on key security initiatives and cross-functional projects, collaborating with IT, GRC, Software, and other stakeholders to reduce risk across the organization. Design, implement, and continuously improve security controls, automation, and monitoring solutions to protect WHOOP systems, infrastructure, and data at scale. Lead and execute complex security assessments, vulnerability testing, and risk analysis efforts, providing recommendations and driving remediation plans. Drive incident response efforts, including investigation, coordination, containment, remediation, root cause analysis, and post-incident reviews. Lead cloud security governance, focusing on AWS security best practices including IAM, networking, encryption, and threat detection. Collaborate on secure software development practices in partnership with Product Security and Software teams. Oversee and enhance IAM architecture and policies, including SSO, SCIM, MFA, RBAC, and user lifecycle management. Provide technical leadership in securing IaaS/PaaS and SaaS applications by defining best practices, conducting reviews, and hardening security controls. Guide the deployment, integration, and tuning of security tools such as CASB, EDR, DLP, SIEM, CNAPP, and MDM solutions to maximize effectiveness and coverage. Lead efforts to identify, triage, prioritize, and support the remediation of vulnerabilities across cloud environments, infrastructure, and SaaS platforms. Lead and mentor team members by providing guidance on security best practices, project execution, work review, and knowledge sharing. Promote a culture of security-first thinking across engineering, IT, and product teams by driving awareness, training, and secure development practices. Track emerging threats, technologies, and regulatory changes; propose and drive forward-looking security strategies to ensure WHOOP maintains a resilient security posture. Continuously assess and improve security operations, workflows, and tooling to meet evolving business and security requirements. Participate in and help improve the on-call rotation to support critical security incidents, offering guidance and escalation support as needed. QUALIFICATIONS: Bachelor’s degree in Computer Science, Information Security, or a related technical field. 6+ years of hands-on experience in Information Security, IT Security, or a related role, including at least 2 years in a senior or lead capacity. Proven track record implementing and managing advanced security technologies (e.g., CASB, CNAPP, CSPM, SIEM, SOAR, DLP, SWG). Strong understanding of modern cloud security architecture (AWS, Azure, GCP) and experience performing threat modeling and risk assessments on cloud-based systems. Demonstrated leadership in security incident response, investigations, and root cause analysis. Excellent communication and interpersonal skills with the ability to influence stakeholders and explain security concepts to technical and non-technical audiences. Strong project management skills and the ability to drive initiatives to completion in a fast-paced environment. Experience mentoring junior engineers and promoting best practices across teams. Solid documentation and operational tracking skills with familiarity with ticketing systems such as Jira. Interested in the role, but don’t meet every qualification? We encourage you to still apply! At WHOOP, we believe there is much more to a candidate than what is written on paper, and we value character as much as experience. As we continue to build a diverse and inclusive environment, we encourage anyone who is interested in this role to apply. WHOOP is an Equal Opportunity Employer and participates in E-verify to determine employment eligibility. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.

Posted 30+ days ago

Seattle Art Museum logo
Seattle Art MuseumSeattle, WA
ABOUT THE ROLE The Collections Information and Database Manager leads the administration, maintenance, and optimization of SAM’s collections management system, The Museum System (TMS). This position ensures TMS integrates seamlessly with departmental workflows and institutional priorities, while also supporting cross-departmental access, data integrity, and public access through eMuseum. The role collaborates with Registration, Conservation, Curatorial, and Technology colleagues to set data standards, develop best practices, and improve overall usability of the system. It also serves as liaison to Gallery Systems, co-administers technical needs, and manages database enhancements, upgrades, and migrations. Key Responsibilities Oversee the daily administration and operation of TMS, including user accounts, permissions, and data hierarchies. Serve as primary liaison to Gallery Systems and work with Technology to troubleshoot technical issues, manage security, and plan/executed upgrades, patches, and migrations. Develop and maintain data entry standards, tools, and documentation to ensure consistency and accuracy. Train and onboard staff in TMS use; provide ongoing support to staff across departments. Conduct regular data hygiene checks and implement corrective actions using tools such as Audit Trail, Alerts, Crystal Reports, and SQL. Write SQL queries, scripts, and batch updates; design custom reports and workflows to support collections management and strategic initiatives. Create and manage custom TMS forms, alerts, list views, and Crystal Reports. Integrate controlled vocabularies (Getty Vocabularies, Linked Open Data) and ensure consistent terminology. Support public access to collections by managing eMuseum integration and collaborating with Technology to ensure accurate data mapping. Partner with Registration leadership on long-term digital strategy, data migration, and optimization of digital workflows. Represent SAM in the TMS/museum database user community through professional forums and conferences. FSLA STATUS: Full Time, Exempt REPORTS TO: Director of Registration COMPENSATION: $85,000-$95,000 WORK SCHEDULE This role is typically scheduled to business hours Monday – Friday. However, the needs of this role may require occasional flexibility in support of departmental or organizational projects. Please connect with your Recruiter or Manager for more information about SAM’s current hybrid work policy and expectations. SAM’s hybrid work policy is subject to change. BENEFITS Benefits include a fully employer-paid HMP medical plan or an employee contribution PPO plan, dental, vision, and basic life insurance/LTD/AD&D, Flexible Spending Account, Short Term Disability, Supplemental Dental Insurance, and participation in SAM’s 403(b) retirement plan.Following 1 year of service and 1,000 hours worked, SAM makes a discretionary 3% employer contribution regardless of participation and provides an employer match program. Historically, this contribution has been made annually. Additional benefits include paid time off for vacation, PSST, bereavement leave, and jury duty, 11 scheduled holidays, 1 paid floating holiday, a subsidized unlimited ORCA card, onsite fitness facility, and an EAP. FT staff also receive a Patron level membership to SAM, a Tier III membership to the American Alliance of Museums, and discounts to the museum shop and programming. ABOUT SAM Seattle Art Museum’s vision is to be the museum for all of Seattle—a bold, dynamic hub of creativity, belonging, and cultural leadership, shaping the future of art and community. To create a welcoming community where people find inspiration and discover our common humanity through exceptional art and dynamic, engaging programs. Art is always at the start and heart of what we do. Collecting, conserving, and displaying extraordinary works of art is the governing motivation of our museum. So too is fostering a vigorous exchange of ideas while cultivating connection with the broad array of communities we serve.As the leading visual arts institution in the Pacific Northwest, SAM shares its global connections, powerful exhibitions, and dynamic programs to engage, educate, and inspire. SAM is a vibrant, three-site organization that is supported by 365 employees, 10 executive leaders, and more than 200 volunteers. WE ARE LOOKING FOR Required Qualifications 3–5 years of experience managing a museum collections information system, with demonstrated growth and innovation. Proven ability to design and implement processes that improve efficiency, accessibility, and data quality. Strong understanding of database structures, nomenclature, and data integrity standards. Experience with Crystal Reports and SQL for reporting, queries, and updates. Excellent organizational skills, ability to manage multiple projects, and strong attention to detail. Professional written and verbal communication skills, with ability to tailor communication for different audiences. Ability to train and support staff with varying technical skill levels. Proficiency in Microsoft Office Suite, Zoom, Asana, Slack, and internet-based research. Ability to pass and maintain a security background check clearance. Preferred Qualifications Bachelor’s degree in Computer Science, Art History, Studio Art, Museum Studies, or a related field. Master’s degree in Library and Information Sciences or post-graduate coursework in a related discipline. Experience with TMS or another major collections information system. WORK CONDITIONS Exposure: Work areas are primarily inside, in a climate-controlled environment with moderate background noise. Some work takes place in galleries, warehouses, and workshops with potential exposure to objects containing residues or materials requiring PPE (training and equipment provided). Stationary Work: Approximately 60% of the time is spent at a desk, with the balance moving around work areas. Communication: Clear and effective verbal and written communication in English is necessary. Office Work: Regular use of computer, phone, and office machinery is required. Lifting/Carrying: Ability to transport up to 50 pounds of equipment and supplies. ACCOMMODATION If you need assistance applying for a role due to a disability or additional need, please let us know at hr@seattleartmuseum.org . The Seattle Art Museum will consider reasonable accommodations for all employees with disabilities to perform the essential functions/duties of this position. If you need an accommodation during the application or interview process, please contact hr@seattleartmuseum.org . For candidates, we ask that, if possible, you wait until you’re invited to a screen, online technical assessment, or interview before requesting an accommodation. ------------------------------------------------ Celebrating difference . At Seattle Art Museum, our members, visitors, and local community come from all walks of life, and so do our employees, volunteers, and interns. The plurality of our identities and experiences strengthens our mission: connecting art to life. Our mission and vision call us to be responsive to a multitude of cultural contexts and lived experiences, and as such, our Strategic Plan directly addresses the role art plays in empowering and elevating social justice movements, and promoting structural change to further equity in our society. SAM is particularly dedicated to racial equity in the workplace, because we know that people of color are the most impacted when it comes to both historical and present inequities. We know that equity is not a single fixed destination, it’s ongoing reckoning. As SAM continually strives to be a more inclusive and equitable workplace, we are particularly interested in engaging with those who have been historically underrepresented in the museum field. We are dedicated to building a diverse workplace, and a sense of belonging for each and every employee, because we know our organization is at its best when we celebrate difference. SAM is an equal opportunity employer . We are an equal opportunity employer, and consider qualified applicants for employment without regard to race, color, creed, religion, national origin, age, sex (including pregnancy, childbirth, or related medical conditions), marital status, ancestry, sensory, physical, or mental disability, genetic information, military or veteran status, gender identity or expression, sexual orientation, citizenship or immigration status, or other applicable legally protected characteristic. If you need assistance applying for a role due to a disability or additional need, please let us know at hr@seattleartmuseum.org. The Seattle Art Museum will consider reasonable accommodations for all employees with disabilities to perform the essential functions/duties of the role. If you need an accommodation during the application or interview process, please contact hr@seattleartmuseum.org. For candidates, we ask that, if possible, you wait until you're invited to a screen, online technical assessment or interview before requesting an accommodation. We encourage you to apply . We are dedicated to building a diverse workplace, and a sense of belonging for each and every employee, because we know our organization is at its best when we include, celebrate and embrace difference. We encourage you to submit an application, even if your experience doesn’t feel like a 100% match with the position. We know applying for a job can be intimidating, and research tells us that womxn and folks of color are less likely to apply if they don't see themselves meeting or exceeding every single qualification listed. We encourage you to apply, even if you feel unsure about whether you meet every requirement in this job post. You could very well be a great fit for this role or others. Requirements for employment. In order to be employed by the Seattle Art Museum, you must reside in the state of Washington. Employment at SAM is contingent upon successful clearing and maintenance of clearance in both a federal and state criminal background check. Want to learn more? If you haven't already, check out our Careers page for more on working at SAM. Though we'd love to be able to reply to every question that crosses our desk, due to the high volume of applications we receive, our HR team is unfortunately unable to offer a response to inquiries requesting search status updates, inquiries about hiring timeline, or requests to be put in touch with directly with the Hiring Team. If your experiences and capabilities are well suited to an open role, our Recruiter or the Hiring Manager will reach out directly to schedule an interview. Thanks for your understanding! Powered by JazzHR

Posted 3 weeks ago

Watermark Risk Management International logo
Watermark Risk Management InternationalSan Antonio, TX
Come make your mark with Watermark! 🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business. 🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We’re intimately familiar with DOD security programs and mission requirements. ⭐ OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do. 💲 COMPETITIVE BENEFITS PACKAGE to address our employees’ physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Systems Security Manager I The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. In this role you will… Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview Review AIS assessment plans Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs) Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination Ensure all authorization documentation is current and accessible to properly authorized individuals Ensure that system security requirements are addressed during all phases of the system life cycle Develop Assured File Transfers (AFT) on accordance with the JSIG Participate in self-inspections Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available Additional duties as assigned Experience Requirements: 5 - 7 years related experience Prior performance in roles such as ISSO or ISSM Education Requirements: Bachelor’s degree in a related area or equivalent experience (4 years) Certification Requirements: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager Level I within 6 months of the date of hire. Security Clearance Requirements: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a Counterintelligence polygraph Other Requirements: Reports to a physical location which occasionally requires the ability to traverse between buildings May require sedentary work at least 50% of the time Ability to manage stress with a high degree of maturity/professionalism Demonstrated critical thinking and leadership skills and the ability to work well with others Effective verbal and written communication skills All Level I & Level II positions - candidate should possess some Special Access Program (SAP) experience All Level III positions -candidate should possess 2+ years of Special Access Program (SAP) experience KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP Watermark provides salary ranges with job postings in states where it is legally required; any other salary ranges associated with our postings are third party estimates and may not be an accurate reflection of Watermark’s total compensation package. Multiple considerations are taken into account when determining the final salary/hourly rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor Categories. Central to Watermark’s employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation. Watermark is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws. Powered by JazzHR

Posted 5 days ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title:              Digital Imaging Analyst – Information Systems Technician I Division:               Data Center Services Union:                   IFT Location:             2701 S Dirksen Pkwy, Springfield, IL – Sangamon County Salary:                  Starting at $4,962.00 monthly – commensurate with experience Overview: Sets up, configures, troubleshoots and administers digital imaging software; participates in the setup, configuration and administration of associated servers, document scanners and the PC's used within the digital imaging system; analyses, configures and monitors the workflow function; assists in occasional programming functions; researches software, hardware, storage media and file types. Duties and Responsibilities: Sets up, configures, troubleshoots and administers digital imaging software, which includes both desktop and server environments; functions include adding and editing user accounts, keeping track of document levels and, adjusting databases. Participates in the setup, configuration and administration of servers associated with each Digital Imaging application, which includes daily activities of monitoring system resources and backup. Sets up, configures and troubleshoots document scanners and all connectivity issues associates with the scanner to provide the most efficient operation. Sets up, configures and troubleshoots the PC's used within the Digital Imaging system for efficient operation in the retrieval and editing of images and associated data. Analyze, configure, and monitor workflow functions, which includes mainly electronic workflow with the Digital Imaging system, but can include manual processes as they affect the system; monitors the entire workflow for efficiency and document levels at each step. Assists in the occasional programming functions, which usually includes scripts or small utility program. Researches software, hardware, storage media and file types. Performs other duties as assigned or required. Education and Experience:   Requires knowledge, skill, and mental development equivalent to completion of one year of college, with coursework in the computer science field OR 1.5 years of technical systems and programming experience OR any equivalent combination of education and experience. Knowledge, Skills and Abilities: Requires elementary knowledge of Information Technology concepts and principles, the theories and functions of computer systems, and the principles and techniques of Information Technology documentation. Requires elementary knowledge of hardware and software, languages, and procedures to provide assigned technical and analytical support services. Requires elementary knowledge of accounting and statistical theories, methods and practices. Requires working knowledge of the devices for capturing data and the means available for receiving and transmitting data from remote locations to a computer. Requires working knowledge of the principles and techniques of computer system documentation. Requires ability to effectively participate in and profit from formal and in-service training programs. Requires ability to analyze data logically. Requires ability to maintain satisfactory working relationships with others. Requires the ability to follow oral and/or written instructions and to carry out routine operations, once established, without further instructions. Requires sufficient oral and written communication skills for effective engagement with colleagues and internal users/customers. Requires awareness and adherence to organizational standards for security, privacy and ethics. Requires willingness to travel and possession of a valid Illinois driver’s license as required by individual positions within the class. Application Process: Please visit  https://ilsos.applytojob.gov/apply  to apply by completing the online application; you may also upload a resume or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783).   Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States. Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 30+ days ago

Illinois Secretary of State logo
Illinois Secretary of StateSpringfield, IL
Office of the Illinois Secretary of State Alexi Giannoulias Job Title: iOS Developer - Information Systems Specialist I Division: Systems & Programming Union: IFT Location: 501 S Second St, Springfield, IL – Sangamon County Salary: Range $5,761 to $10,719 monthly – commensurate with experience Benefits: https://cms.illinois.gov/benefits/stateemployee.html Overview: We are seeking a skilled and passionate iOS Developer to design, build and maintain high-performance mobile applications for iOS devices. The ideal candidate will possess strong knowledge of Swift, UIKit/SwiftUI and Apple’s design principles, with a track record of delivering robust and user-friendly mobile solutions. Key Responsibilities: Design and build advanced applications for the iOS platform Collaborate with cross-functional teams (designers, product managers, backend engineers) to define, design, and ship new features Ensure performance, quality and responsiveness of applications Identify and correct bottlenecks, fix bugs and continually improve application performance Stay up to date with the latest industry trends, technologies and best practices in mobile development Work with RESTful APIs, JSON and third-party libraries/frameworks Participate in code reviews and unit testing to maintain high code quality standards Deploy and manage apps through the Apple App Store Required Qualifications: Requires knowledge, skill, and mental development equivalent to the completion of two years of college, with coursework in the computer science field OR 2.5 years of technical systems and/or programming experience as an iOS developer Preferred Qualifications: Bachelor’s degree in computer science, engineering or related field Proven work experience as an iOS developer with at least one published app in the App Store Strong proficiency in Swift (Objective-C knowledge is a plus) Experience with UIKit, SwiftUI, Core Data, Core Animation and other iOS frameworks A solid understanding of Apple’s design principles and interface guidelines Familiarity with RESTful APIs and integration with backend services Proficient with code versioning tools (e.g., Git, Azure Dev Ops) Experience with testing frameworks like XCTest Knowledge of cloud services (e.g., Azure) for mobile app backends Experience with CI/CD pipelines for iOS apps Familiarity with Agile/Scrum methodologies Strong problem-solving skills and attention to detail Soft Skills: Strong communication and collaboration skills Ability to work independently and as part of a team Adaptability to learn new technologies quickly Passion for delivering high-quality user experiences Application Process: Please visit https://ilsos.applytojob.gov/apply to apply by completing the online application; you may also upload a resume or other attachments as needed . Preference will be given to Illinois residents in the hiring and selection process, in accordance with the Illinois Secretary of State Merit Employment Code. Questions regarding this posting or Illinois Secretary of State employment practices may be directed to Job Counselors at our Personnel offices in Chicago (312-793-5515) or Springfield (217-782-4783). Equal Employment Opportunity Employer. Applicants must be lawfully authorized to work in the United States .Applicants are considered for all positions without regard to race, color, religion, sex, national origin, sexual orientation, age, marital or veteran status, or the presence of a non-job-related medical condition or disability. Powered by JazzHR

Posted 1 day ago

Clarity Innovations logo
Clarity InnovationsColumbia, Maryland
Clarity Innovations is a trusted national security partner, dedicated to safeguarding our nation’s interests and delivering innovative solutions that empower the Intelligence Community (IC) and Department of Defense (DoD) to transform data into actionable intelligence, ensuring mission success in an evolving world. Our mission-first software and data engineering platform modernizes data operations, utilizing advanced workflows, CI/CD, and secure DevSecOps practices. We focus on challenges in Information Warfare, Cyber Operations, Operational Security, and Data Structuring, enabling end-to-end solutions that drive operational impact. We are committed to delivering cutting-edge tools and capabilities that address the most complex national security challenges, empowering our partners to stay ahead of emerging threats and ensuring the success of their critical missions. At Clarity, we are people-focused and set on being a destination employer for top talent, offering an environment where innovation thrives, careers grow, and individuals are valued. Join us as we continue to lead innovation and tackle the most pressing challenges in national security. Role As an Information Security Intern (ISSE Track) at Clarity Innovates, you will work alongside senior engineers and security professionals to learn how to design and implement secure solutions in advanced environments like CI/CD pipelines, containerized deployments, and cloud infrastructure. This internship is tailored to help you build a foundation in security engineering concepts, automation, and compliance as part of the path toward a future ISSE role. You will support the development of technical solutions that contribute to ATO packages, collaborate on integrating security controls into development workflows, and help establish secure-by-default standards. This is an excellent opportunity for motivated individuals to gain hands-on experience in modern security engineering practices. Responsibilities Assist in creating and maintaining automated cybersecurity technical solutions. Support the development and integration of cybersecurity best practices for Kubernetes clusters and DevOps pipelines. Contribute to generating technical artifacts (e.g., SSP, PPSM, SCTM) to support system authorizations. Collaborate with engineers on implementing security controls and policy enforcement. Participate in CI/CD and infrastructure automation initiatives to establish secure-by-default standards. Help evaluate, develop, and implement information assurance guidelines. Assist with vulnerability and risk analysis of systems throughout the development life cycle. Support audits and ongoing monitoring activities to maintain compliance. Document and help resolve identified security violations. Learn to monitor systems and recommend updates to align with cybersecurity requirements and best practices. Requirements A Bachelors Degree in Computer Science, Cybersecurity, Information Systems, Engineering, or related field. 6-10 years of cybersecurity experience Demonstrated interest in one or more of the following areas: Secure software and system development Cloud security and automation Container orchestration and DevOps practices Infrastructure as Code Risk Management Framework (RMF) Familiarity with at least one programming or scripting language (e.g., Python, Java, Kotlin, C/C++, JavaScript, SQL, Bash). Understanding of basic networking, operating systems (Linux and/or Windows), and cybersecurity fundamentals. Excellent communication skills and a collaborative mindset. Preferred Qualifications Hands-on experience with tools like Jenkins, Ansible, Terraform, Docker, Kubernetes, AWS, GCP, or Azure. Coursework or projects in penetration testing, secure coding, or reverse engineering. Familiarity with vulnerability scanning tools (e.g., Nessus, SonarQube). Interest in learning how to generate ATO artifacts and work within RMF guidelines. Active security clearance or eligibility for clearance. We are an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.

Posted 1 week ago

AHU Technologies logo
AHU TechnologiesWashington, District of Columbia
TITLE: IA & SS Master LOCATION: Washington, DC/ Hybrid MINIMUM EDUCATION: Bachelor’s degree in IT, related field, or equivalent experience. REQUIRED EXPERIENCE: 5 years INTERVIEWS: Either a Webcam Interview or In Person Job Description: A client seeks an IA & SS (Information Assurance & Security Specialist Master) Responsibilities: · Provisioning and system setup for new hires. · Prioritize incidents and service requests according to defined processes to meet defined SLAs. · Use remote tools and diagnostic utilities to aid in resolving support requests. · Perform hands-on fixes at the desktop level when remote tools are not appropriate, including hardware repairs, delivery of peripherals, or other fixes as determined. · Installing and configuring hardware and software components throughout various network infrastructure devices. · Install antivirus software and ensure virus definitions are up to date. · Server administration via Active Directory, File & Print services, DNS, DHCP. · Network firewall and switch administration and maintenance. · Perform preventative maintenance, including checking and cleaning of workstations, printers, and peripherals. · Establishing good relationships with all departments and colleagues. · Ensuring company safety and security standards are met. · Some network and server solution design and architecture. Skills: · High-level Tech Support experience. 5 Years Required · Active Directory knowledge and experience. 5 Years Required · Kaseya Experience. Required · Network firewall and switch administration and maintenance. Required · Valid Driver's License and ability to drive to customer locations. Required · CompTIA Net+ and/or CompTIA Security+ certifications. Highly Desired Microsoft Desktop Operating Systems certification. Highly Desired Compensation: $65.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 30+ days ago

N logo

Information Security Manager

NOUS Imaging Inc.Saint Louis, MO

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Information Security Manager 

Who You Are 
You are an experienced IT security professional with a proven track record in developing and implementing robust information security policies and practices. With a passion for protecting sensitive data and ensuring regulatory compliance, you thrive in dynamic, fast-paced environments. You excel at collaborating cross-functionally with teams across quality, regulatory, and engineering, ensuring the organization’s security framework remains strong. Your strategic mindset, attention to detail, and methodical approach allow you to assess risks, enhance processes, and maintain compliance, positioning you as a key driver in safeguarding our overall security posture. 

What You Will Do 
As the Information Security Manager, you will own the Turing Information Security Program.  This includes both the creation of policies, procedures, and guidelines as well as the implementation and improvement of the program. Your focus will be on core organizational security needs, including data protection, incident response, disaster recovery, and risk management. You will regularly assess the company’s security posture, develop training programs to educate employees on best practices, and coordinate cybersecurity audits and compliance initiatives. You will also own the corporate IT function, including the enterprise IT infrastructure, employee laptop management, IT helpdesk, and overall IT improvement roadmap. 

Key responsibilities include: 

  • Developing, implementing, and maintaining information security and IT policies and procedures 
  • Ensuring compliance with relevant regulatory frameworks and standards, starting with HIPAA compliance for patient privacy and security 
  • Collaborating with DevOps and cloud infrastructure engineers to align security strategies 
  • Leading risk assessments, vulnerability management, and incident response 
  • Managing internal and external security audits 
  • Developing and delivering security awareness programs for employees 
  • Identifying, assessing, and mitigating security risks to protect company data and intellectual property 
  • Leading continuous improvement initiatives in information security processes 
  • Developing and executing the corporate IT roadmap, including employee laptop management, helpdesk support, and enterprise software administration 
  • Ensuring the reliability and performance of IT systems to minimize downtime and enhance productivity. 

What You Need 
  • 5+ years in Healthcare Information Security or another highly regulated industry 
  • Demonstrated experience as an IT Specialist with a willingness to get your hands dirty 
  • Expertise in achieving and maintaining SOC 2 certification and compliance with standards like HIPAA and GDPR 
  • Experience implementing and maintaining centralized device management and IT asset management 
  • Demonstrated history of creating and executing and IT Roadmap & Strategy 
  • Experience implementing Zero Trust best practices 
  • Expertise in Windows network management and support 
  • Bachelor’s degree in computer science or information technology, or equivalent work experience 
  • Excellent verbal and written communication skills with exceptional attention to detail 

Nice to have 
  • Experience with Software as a Medical Device (SaMD), including IEC 62304, FDA 21 CFR Part 820, HIPAA, GDPR, and other relevant medical cybersecurity regulations and standards 
  • Strong understanding of cloud security best practices (AWS preferred) 
  • Basic proficiency in Python and SQL 
  • Masters degree in computer science or information systems 
 
Who We Are 
Turing Medical Technologies, Inc. is a pioneering medical imaging software company developing advanced solutions for magnetic resonance imaging (MRI). Our mission is to provide cost-effective imaging enhancements, drive the next generation of data analytics, and create a patient-centered experience in the MRI suite. 
We believe in the passion of our employees and are committed to helping them achieve their goals while contributing to the success of our company. You’ll collaborate with a dedicated team of scientists, engineers, product managers, quality and regulatory professionals, and others who are united by a shared commitment to innovation and excellence. Our team is based across the United States, with headquarters in St. Louis, Missouri. Turing Medical Technologies, Inc. is an Equal Opportunity Employer. 

Visit https://turingmedical.com to learn more about our products and company. 

Powered by JazzHR

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall