1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

MCG Health logo
MCG HealthSeattle, Washington

$162,200 - $227,000 / year

At MCG, we lead the healthcare community to deliver patient-focused care. We have a mission-driven team of talented physicians and technical experts developing our evidence-based content and innovating our products to accelerate improvements in healthcare. If you are driven to enhance the US healthcare system, MCG is eager to have you join our team. We cultivate a work environment that nurtures personal and professional growth, and this is a thrilling time to become a part of our organization. With dynamic roles that offer meaningful impact, you'll be able to fully realize your potential. Plus, you'll enjoy world-class benefits and the security, stability, and resources of our parent company, Hearst, with over 100 years of experience. The Associate Director, Information Security & Compliance is a security engineering leader who enables our teams to ship quickly and safely and ensures the integrity of our deployed products . You will build paved roads and guardrails – codified as Infrastructure as Code ( IaC ), Policy as Code, and automated controls – so MCG’s SaaS products meet HIPAA/HITRUST while improving developer velocity. Partnering with Product, Engineering, and IT, you’ll integrate security into CI/CD, automate audit evidence, and turn security into an accelerator for frequent, reliable releases. You Will: Build secure-by-default platforms Define and own “paved roads” (golden paths) for service creation, deployment, and runtime with embedded controls Express controls as code: IaC (Terraform), Policy-as-Code (Rego, Azure Policy as Code), Compliance-as-Code (automated evidence collection) Embed security in the software lifecycle Partner with engineering to shift left via CI/CD: SAST, SCA, container scanning, IaC scanning, DAST, SBOM, break-glass processes with audit trails Integrate lightweight threat modeling into backlog/PRs; maintain secure coding standards and reference implementations Automate compliance & audit readiness Maintain HIPAA & HITRUST through continuous controls monitoring and automated evidence pipelines; reduce manual audit work with repeatable proofs Create and maintain relevant documentation to support FedRAMP certification efforts Harden cloud & runtime Own CSPM/CNAPP baselines, least-privilege access IAM, network isolation, KMS/secret stores, container hardening, supply-chain security Operational resilience Define vulnerability SLAs risk-based by asset criticality; drive time to patch with automation and safe rollout patterns Lead incident response readiness: playbooks, tabletop exercises, automated detections, and post-incident learning loops AI & Data Protections Govern data use and model safety for AI features (prompt/response logging controls, PII/PHI handling, third-party risk reviews) without slowing delivery Partnership & Leadership Coach engineers; measure and report outcomes (DORA + security KPIs). Foster a blameless, data-driven culture where secure choices are the easiest choices What We're Looking For : Bachelor’s degree in Information Security , Computer Science, or related field . 6+ years of experience in product/application security, compliance, or risk management for SaaS. 2+ years of team or functional leadership experience . Demonstrated success enabling frequent deployments in regulated environments (HIPAA/HITRUST/FedRAMP) and p roven experience HIPAA and HITRUST controls . Practical experience integrating security into CI/CD and operating SAST/SCA/DAST, and container/ IaC scanners Excellent judgment, communication, and stakeholder management . Proven collaborator with Product/Engineering/IT with a track record of delivering automation Licensure/Certifications/Registrations/Permits: Certified Information Systems Security Professional ( CISSP ) , Certified Information Security Manager ( CISM ), or equivalent certification . Preferred Qualifications : Demonstrated ability to earn and maintain customer trust preferred. Experience with Policy as Code (OPA/ Conftest /Sentinel) and compliance/automation pipelines preferred. Familiarity with SBOM/signing, FedRAMP (Medium) compliance experience preferred. This role prioritizes Seattle based talent with the expectation to come into the Seattle office . Pay Range: $162,200 - $227,000 Other compensation: Bonus Eligible Perks & Benefits: 💻 Hybrid work 🩺 Medical, dental, vision, life, and disability insurance 📈 401K retirement plan; flexible spending and health savings account 🏝️ 15 days of paid time off + additional front-loaded personal days 🏖️ 14 company-recognized holidays + paid volunteer days 👶 U p to 8 weeks of paid parental leave + 10 weeks of paid bonding leave 🌈 LGBTQ+ Health Services 🐶 Pet insurance 📣 Check out more of our benefits here: https://www.mcg.com/about/careers/benefits/ We embrace diversity and equal opportunity and are committed to building a team that represents a variety of backgrounds, perspectives, and skills. Only with diverse thoughts and ideas will we be able to create the change we want in healthcare. The more inclusive we are, the better our work will be for it. All roles at MCG are expected to engage in occasional travel to participate in team or company-sponsored events for the purposes of connection and collaboration. All roles at MCG are expected to engage in occasional travel to participate in team or company-sponsored events for the purposes of connection and collaboration. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. MCG is a leading healthcare organization dedicated to patient-focused care. We value our employees' unique differences and are an Equal Employment Opportunity (EEO) employer. Our diverse workforce helps us achieve our goal of providing the right care to everyone. We welcome all qualified applicants without regard to race, religion, nationality, gender, sexual orientation, gender identity, age, marital status, veteran status, disability, pregnancy, parental status, genetic information, or political affiliation. We are committed to improving equity in healthcare and believe that a diverse workplace fosters curiosity, innovation, and business success. We are happy to provide accommodations for individuals. Please let us know if you require any support.

Posted 2 weeks ago

C logo
Credit GenieNew York, New York
Company Credit Genie is a mobile-first financial wellness platform designed to help individuals take control of their financial future. We leverage artificial intelligence to provide personalized insights and are building a financial ecosystem by offering tools and services that provide instant access to cash, and building credit. Our goal is to empower every customer to achieve long-term financial stability. Founded in 2019 by Ed Harycki , former Swift Capital Founder ( acquired by PayPal in 2017 ). Backed by Khosla Ventures and led by industry pioneers from companies such as; PayPal, Square, and Cash App, we are well positioned to build the future of inclusive finance through cutting-edge technology and customer-centric solutions. Overview As Chief Information Security Officer (CISO), you will be the primary leader responsible for developing and implementing our information security strategy. You’ll protect our systems, data, and customer trust by overseeing cybersecurity operations, ensuring compliance with regulatory standards, and mitigating risks in a dynamic fintech environment. This role demands a visionary leader with deep expertise in cybersecurity, preferably in fintech, and a passion for securing innovative financial products. What you'll do Develop and execute a comprehensive cybersecurity strategy to protect our platform, customer data, and intellectual property. Ensure compliance with fintech and data privacy regulations, including GDPR, CCPA, PCI-DSS, and other relevant standards. Oversee the design, implementation, and monitoring of security controls for payment processing, lending platforms, and other financial products. Lead incident response, including managing and mitigating cybersecurity breaches, vulnerabilities, and regulatory inquiries. Collaborate with product, engineering, and compliance teams to embed security-by-design principles into new features and services. Build and maintain a robust security framework for credit and lending operations, ensuring protection against fraud and data breaches. Conduct risk assessments and implement mitigation strategies for emerging threats in the fintech landscape. Manage relationships with external security vendors, auditors, and regulatory bodies. Develop and lead a high-performing security team, fostering a culture of proactive risk management. Support international expansion by aligning security practices with global data protection and financial regulations. Stay ahead of cybersecurity trends, advising the executive team on evolving threats and technologies. Who you are Bachelor’s or Master’s degree in Computer Science, Cybersecurity, Information Technology, or a related field. 10+ years of progressive experience in cybersecurity, with at least 5 years in a senior leadership role at a fintech or high-growth tech company. Deep expertise in securing credit and lending platforms, preferably in the fintech industry, with knowledge of fraud prevention, secure payment processing, and regulatory compliance (e.g., Truth in Lending Act, Fair Credit Reporting Act). Proven track record in designing and implementing security architectures for cloud-based systems, APIs, and financial applications. Strong understanding of data privacy, encryption, and consumer protection laws in a fintech context. Experience leading incident response, penetration testing, and vulnerability management programs. Exceptional communication skills, with the ability to explain complex security concepts to non-technical stakeholders, from engineers to board members. Strategic mindset with the ability to balance security rigor with business innovation in a fast-paced startup environment. Nice to have Experience at a fintech company with exposure to payment processing, lending, or brokerage platforms. Familiarity with SOC 2, ISO 27001, or other cybersecurity certifications and frameworks. Knowledge of international cybersecurity regulations to support global operations. Experience building and scaling security teams in high-growth environments. Benefits and Perks Our goal is to provide a comprehensive offering of benefits and perks that promote better financial, mental, and physical wellness. We believe working alongside each other in person is the best way to build a great product and foster a strong company culture. Our expectation is that employees are in the office five days a week, allowing for optimal collaboration, inclusivity, and productivity. At the same time, we understand that life happens and recognize the importance of flexibility. We are committed to supporting our employees when circumstances arise that require remote work or adjusted schedules. Our goal is to ensure everyone can effectively balance personal and professional responsibilities while maintaining our collaborative and productive environment. Here are some highlights of our benefits and perks offerings, feel free to ask your recruiting partner for more details on our comprehensive offering for employees. 100% company-paid medical, dental, and vision coverage for you and your dependents on your first day of employment. Monthly fitness reimbursement up to $100 or a full membership to LifeTime Fitness 401(k) with a 2.5% match and immediate vesting Meal program for breakfast, lunch, and dinner Life and accidental insurance Flexible PTO Your actual level and base salary will be determined on a case-by-case basis and may vary based on the following considerations: job-related knowledge and skills, education, and experience. Base salary is just one part of your total compensation and rewards package at Credit Genie. You may also be eligible to participate in the bonus and equity programs. You will also have access to comprehensive medical, vision, and dental coverage, a 401(k) retirement plan with company match, short & long term disability insurance, life insurance, and flexible PTO along with many other benefits and perks. Credit Genie is a proud Equal Opportunity Employer where we welcome and celebrate differences. We are committed to providing a workspace that is safe and inclusive, where everyone feels supported, connected, and inspired to do their best work. If you require any accommodations to participate in our recruitment process, please inform us of your needs when we contact you to schedule an interview.

Posted 30+ days ago

Synergy ECP logo
Synergy ECPColumbia, Maryland

$180,000 - $230,000 / year

Founded in 2007 and headquartered in Columbia, Maryland, Synergy ECP is a leading provider of cybersecurity, software and systems engineering and IT services to the U.S. intelligence and defense communities. The company leverages its expertise in data transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation’s security. In an ultra-competitive environment, Synergy ECP has thrived by adhering to our name, making sure excellence is displayed by our E mployees, to our C ustomers and by Improving P erformance (ECP). It’s what sets us apart, enabling us to be an autonomous yet agile business that delivers huge results—showing we’re ready to meet our customers’ evolving demands. Synergy ECP has earned a client list that includes numerous Fortune 100 companies, in addition to multiple branches of the US government and military services. Description: Provide management support for a program, organization, system, or enclave’s Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with NSA/CSS Risk Management Framework (RMF) process and DoD Information Assurance Certification and Accreditation Process (DIACAP). Capabilities: ·Perform requirements gathering and analysis of said requirements ·Perform functional analysis to identify required tasks and their interrelationships ·Identify and map current security infrastructure as a foundation to define future programs ·Collaborate with engineers on systems integration efforts ·Plan and coordinate implementation of IT security programs and policies ·Analyze user needs to determine functional and cross-functional requirements ·Gather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the multi-level security arena ·Perform functional allocation and identify resources required for each task ·Perform risk analysis that also includes risk assessment ·Enable Government planning, coordination, and oversight of organizational implementation of information security services ·Enable design and implementation of future IT systems and related security ·Assist Program Managers with administrative and technical oversight with specific program's within the portfolio ·Facilitate issue resolution through integrated product teams and Technical Exchange Meetings (TEM) ·Provide support for a program, organization, system, or enclave’s information assurance program ·Provide daily oversight and direction to contractor ISSOs ·Oversee efforts of engineering staff to design, develop, engineer and implement solutions to security requirements ·Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives ·Serve as the Program's ISSM ·Enable the Government with the development and implementation of NSA IT security services ·Collaborate with engineers on systems integration and life cycle requirements ·Advise Program Managers on administrative and technical oversight matters in regards to portfolio programs Qualifications: ·Ten (10) years of work-related experience in the field of security authorization is required. Experience in the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. In lieu of a Bachelor’s degree, an additional four (4) years of work-related experience may be substituted. ·DoD 8570 compliance with IAM II is required. CLEARANCE REQUIRED: · TS/SCI w/ Polygraph Other Requirements: U.S. Citizenship Compensation Spotlight: For this role, our typical salary range starts at $180,000 and stretches up to $230,000. But here's the deal – we're not about capping your potential. We're committed to snapping up the best and brightest, and we're ready to put our money where our mouth is. So, if you're one of the rare exceptions to the status quo with the education, experience, and that extra something special, we're not afraid to go above and beyond to secure your talent. Because for us, it's not just about a salary. It's about the complete rewards package, the culture, and the opportunity to make a real impact. Taking Care of the People Who Take Care of The Nation Compensation : We offer highly competitive compensation that is consistently recognized by our employees as being generous! Health & Retirement : We offer a comprehensive Health Benefits package and 401K Retirement plan so you can take care of yourself and your family... both now and in the future. Other health-related benefits include an employee Gym wellness benefit, People Partners who will help you navigate both personal and professional worlds, as well as strong wellness related resources offered through our healthcare provider. Education : Individual growth is a priority at Synergy ECP. Employees are encouraged to take advantage of our company-sponsored continuing education program so they can get their degree or that next certification needed to propel them towards the next level. Not sure what's best for your career plans, we'll help you navigate it all! Work/Life Balance : A healthy work/life balance is essential for building and executing your work effectively at Synergy ECP, but it’s also necessary to allow you the room to pursue everything you want to develop in your personal life. We offer a generous Paid Time Off benefit and 11 paid holidays a year. Synergy ECP also provides flexible work options that work with your schedule and lifestyle. Philanthropy: With the help of our amazing employees, Synergy ECP participates annually in building awareness, volunteering and contributing to dozens of organizations. We believe that giving back creates a sense of purpose, engagement, and fulfillment. Have a cause you are passionate about? We bet you'll find others here that care about it just as much! Great Corporate Facilities : Come by our corporate office and enjoy a weekly happy hour, take a drive to nearby restaurants, grab a snack or coffee in our café, or utilize our collaborative office space and conference rooms. SkillBridge: Our SkillBridge Program takes the incredible experience our servicemembers already have and shows them how to apply it within corporate environments. We are fanatical about helping our Military! Synergy ECP is committed to providing equal employment opportunities to all qualified individuals. Employment decisions are based on merit, qualifications, and business needs. We do not discriminate on the basis of race, color, sex, national origin, religion, age, disability, or any other status protected by applicable law. We welcome candidates from all backgrounds and are dedicated to maintaining a professional and respectful workplace where every employee can succeed.

Posted 30+ days ago

AHU Technologies logo
AHU TechnologiesWashington, District of Columbia

$60 - $65 / hour

Role :Information Assurance and Security Specialist Client : DC Government Location : Washington, D.C. (Onsite) Job Description : Duties and Responsibilities: Provide support of incoming requests via telephone, web portal, email to ensure courteous, timely, and effective resolution of end-user issues. Provisioning and system setup for new hires. Prioritize incidents and service requests according to defined processes to meet defined SLAs. Use remote tools and diagnostic utilities to aid in resolving support requests. Perform hands-on fixes at the desktop level when remote tools are not appropriate, including hardware repairs, delivery of peripherals, or other fixes as determined. Installing and configuring hardware and software components throughout various network infrastructure devices. Install antivirus software and ensure virus definitions are up to date. Server administration via Active Directory, File & Print services, DNS, DHCP. Network firewall and switch administration and maintenance. Perform preventative maintenance, including checking and cleaning of workstations, printers, and peripherals. Establishing good relationships with all departments and colleagues. Ensuring company safety and security standards are met. Some network and server solution design and architecture. Education:a. College diploma or university degree in the field of Computer Science and/or 5 years equivalent work experienceb. CompTIA Net+ and/or CompTIA Security+ certifications preferred Requirements: Exceptional written and oral communication skills. Experience with desktop and server operating systems including Windows 10, Windows 11, Office 365, macOS, iPhone Strong understanding of technology and business productivity systems. Active Directory knowledge and experience. Kaseya Exceptional interpersonal skills, with a focus on rapport building, listening, and questioning skills. Good problem-solving skills. Excellent customer service skills. Ability to work under moderate supervision.. Microsoft Desktop operating systems certification preferred. Valid Driver License and ability to drive to customer locations when required. Compensation: $60.00 - $65.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 6 days ago

C logo
Centra CareerColumbus, Indiana
Thank you for your interest in a career with Centra. A career at Centra Credit Union is more than a job; it is an opportunity to make a meaningful impact in our Members’ financial lives and our communities. Centra was established in 1940 and is headquartered in Columbus, Indiana. Centra is ranked among the top five largest credit unions in Indiana and among the most financially sound institutions in the United States. Centra serves Membership throughout central and southern Indiana as well as other areas like Jamestown, NY, and Whitakers, NC. Centra Team Members enjoy excellent benefits, an atmosphere that fosters family and work-life integration, a heritage of strong values, a high level of Team Member engagement in the achievement of results, and the opportunity for growth with the Centra Family. Credit Unions are Not for Profit, Not for Charity, But for Service. If these are the things that matter to you then please read on, we look forward to hearing from you. Centra has an exciting opportunity for a Vice President (VP) Information Security Officer in Columbus, Indiana. This position is responsible for the strategic planning, execution, and oversight of the Credit Union’s information security and cyber risk program. Responsible for building and sustaining a comprehensive information security program that supports the Credit Union’s strategic goals, aligns with regulatory requirements, and is within the Credit Union’s risk tolerance. Key responsibilities include assessing cyber risk, overseeing threat intelligence programs, incident response processes, and promoting a culture of cybersecurity awareness across the Credit Union. This position has the critical responsibility of safeguarding sensitive information and ensuring the integrity, security, and resilience of the Credit Union’s information systems and digital assets. Spanish/English interpreters may be eligible for an interpreting differential. ESSENTIAL FUNCTIONS : This position may be required to perform additional duties as requested. Reasonable accommodations may be made to enable individuals with disabilities to perform. Leads the development, implementation, and maintenance of the organization’s information security program, ensuring adherence to federal and state regulations (NIST, PCI, GLBA, FFIEC). Defines, leads and sustains a forward-looking information security strategy that aligns with the Credit Union’s vision and business strategy. Establish security roadmaps, budget requirements, and risk management protocols that reflect emerging threats and ensure industry best practices. Administers and manages information security policies and procedures including regular, routine audits and assessments. Utilizes vendors for audits, engagements and monitoring, penetration and vulnerability testing needs. Oversee third-party providers to ensure the implementation of appropriate security measures. Review and evaluate partner connections, independent audit reports, vulnerability assessments, and security programs to ensure compliance with internal standards. Assesses information security risks and implements programs to manage and mitigate these risks proactively. Conducts risk assessments, communicates trends in information security risks to senior management, and provides actionable insights to mitigate risks and improve the organization's information security posture. Serves as subject matter expert and advisor for risk prioritization, mitigation strategies, and resource allocation for cybersecurity initiatives. Communicates risks and information security initiatives in a business-centric, non-technical manner. Promotes information security risk and threat awareness across the credit union through training programs and frequent communication to build an information security-conscious culture and collaborates to ensure lines of businesses, projects, and products to create secure business practices. Leads incident response planning, including team coordination, investigation methodologies, testing, and timely reporting for internal and external stakeholders. Leads and collaborates with Incident Response Team during a rapidly evolving incident where crisis management is required. Responsible for investigation of information security incidents, identifying root cause, triage containment, remediation, recovery and prevention of recurrence. Provides subject matter expertise and direction to IT department for overseeing deployment and management of information security technologies, such as by working with information security vendors or software. Ensures that information security operations are optimized for effective threat detection, monitoring, and response. Monitors, researches, and seeks knowledge of IT advancements, information security trends, emerging technologies, and regulatory changes that can impact Centra, Team Members, and Members. Leads initiatives that leverage new technology and improved practices to enhance the credit union’s information security posture, aligning with Centra’s risk appetite and is evergreen to evolving information security needs and practices. Collaborates with VP Network Infrastructure to ensure strategic information security plans and programs are implemented and working effectively with the enterprise-wide network and systems and determines vulnerabilities. Collaborates with IT, Risk Management, and Compliance to integrate information security into business processes, addressing common security challenges. Administers and continuously improves business continuity and disaster recovery plans to ensure organizational resilience. Liaisons with BSA Officer to ensure compliance with BSA requirements. Demonstrates leadership and impact while continuously demonstrating and cultivating Centra’s Vision, Mission, Culture, and Core Values. EDUCATION & EXPERIENCE – (Equivalent combination of Education & Experience will be considered.) Bachelor’s Degree in Computer Science, Information Security or a related field. Five to 8 years of similar or related experience, including preparatory expertise. Centra is an Equal Opportunity Employer.

Posted 30+ days ago

AHU Technologies logo
AHU TechnologiesWashington, District of Columbia

$65+ / hour

Role : SIS ASPEN Technical Specialist SeniorClient : DC GovernmentLocation : Washington, D.C (Onsite)Job Description: The primary focus of responsibilities will encompass customer support, monitoring application operations and security, Operations & Maintenance (O&M), enhancements, system-to-system data interfaces, and integrating Commercial off-the-shelf(COTS) solutions. Within Operations & Maintenance (O&M), specific duties will involve maintaining the system through upgrades, patching, identifying issues, troubleshooting, developing resolutions, testing, and deploying fixes. Additionally, the role includes generating and managing operational and security compliance documentation. Additional areas of focus include project management support, training, and mentoring of staff in Aspen configuration best practices. On top of technical skills, the individual must have a strong sense of curiosity as a critical part of the role will be to help come up with the future long-term vision for DCPS and contribute to planning out what should be built to implement that vision. Serve as a Paas administrator for evaluating customers' needs and develop processes to automate testing utilizing cloud-native database services. Develop and maintain policies and procedures related to developing and governance content created within the ASPEN ecosystem. Work closely with Project Managers, Information Systems and Solutions, and the ASPEN Account Management team to perform scoping, requirements gathering, application installation, and configuration, and provide input on the application design of the COTS environment. Develop workflow management process and create technical documentation. Collaborate with internal and external parties to transform high-level technical objectives into comprehensive technical requirements. Establish and maintain database policies and standards. Provide sustainment of customer web and application tier systems to include testing, hardening of systems per STIG guidance and industry best practices, and SSL certificate management. Work closely with customer developers for regular project releases and code deployments. Provide troubleshooting assistance for any reported issues. Assist with identifying and planning potential new cloud services, features, and capabilities. Make recommendations for improvements to security, scalability, manageability, and performance across a wide variety of network, storage, compute, and mid-tier technologies. Perform routine administration duties for the maintenance of DCPS students' records. Develop high-quality, high-reliability content using industry best practices. Minimum Requirements: Bachelor's degree in engineering/science/information technology discipline: or Minimum 15 years of relevant experience Must have 11+ years experience in the design, implementation, and operations and maintenance support of client/server applications with an underlying database. MUST have 9+ years of Application Administration experience with students' records management systems. Have 5+ years of SQL experience and understanding of database design. 7+ years of progressive experience in K12 customer-facing systems support role. 5+ years of experience with user training with user information management systems. 11+ years of a Strong attention to detail and the ability to translate high-level technical and business initiatives and goals into discrete tasks and specific timelines. Preferred Job Requirements: Experience managing the delivery of small and medium size projects. Previous "Team Lead" experience is a plus. Understanding and working knowledge of basic Internet protocols such as HTTP, SMTP, SOAP, SSL, and TLS. Experience with PowerApps is a plus. Compensation: $65.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 1 week ago

G logo
gTANGIBLE CorporationArlington, Virginia
Description gTANGIBLE Corporation (gTC), www. gtangible.com, is a C corporation and a registered Government contractor that provides services and solutions in: National Security Programs Professional, Administrative, and Management Support Mission and Warfighter Support We are a Service Disabled Veteran Owned Small Bu siness (SDVOSB) and the founder has years of successful experience in the Government contracting arena. Our leadership team is an exceptional group of Government contr acting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Full Time Position Status: Contingent Position Title : Information System Security Officer Support IT Pro ject Manager Location: National Capital Region Security Clearance: Secret Duties and Responsibilities The Information System Security Officer ( ISSO ) Support P ro ject Manager supports this Transportation Security Administration Information Technology (TSA IT) Task Order (TO) by providing project management support for Information Assurance and Cybersecurity Division ’s (IAD) ISSO branch with mostly ad-hoc tasks assigned to the ISSOs. D uties include the following: Provide support for managing activities as required by the IAD ISSO branch who support approximately 50 Federal Information Security Modernization Act ( FISMA ) systems. Ensure contractor resource assignment, tracking of dates associated with individual activities, consolidation of weekly report listing all task and sub-task activities for entire contract, identification of issues preventing or hindering execution of IAD activities, and submission of deliverables are provided to IAD federal staff on time and in an error-free format. Report problems, issues, and deviations within their managed projects to IAD federal personnel by no later than the next business day. Participate in the weekly status meeting that will be arranged by the Program Manager to discuss weekly activities with appropriate IAD branch personnel . Manage software deployment and coverage expansion projects for IAD enterprise toolsets, or for other toolsets as needed by other IAD branches. Manage other IT-related projects with which IAD branches may require project management support. Manage and maintain all project documentation, both for managing the projects themselves, as well as any documentation created in the course of executing the project (for example: build documents, or design decisions). Manage project resource access requests to ensure that requisite access is granted for all project team members to necessary hardware or software assets. This is typically performed for Security Testing engagements where contractor personnel will require some level of elevated access to assets within TSA’s network. Obtaining elevated user access requires submission of Privileged Access Requests (PAR), and Project Managers will be expected to manage completion, submission, and tracking progress of these PARs to ensure testing engagement remain on-schedule. Ensure technical correctness of deliverables being provided to IAD. This is expected to include some level of quality assurance for all deliverables. Support ah-hoc IT Project Management activities of a non-standard nature as they are identified to provide a benefit to IAD’s security requirements. Knowledge and Qualifications At least eight ( 8 ) years of experience performing project management of IT projects. At least three ( 3 ) years of experience performing project management as a contractor supporting, or employee of, the Federal Government. At least three (3) years of experience performing an IT related job (not project management) to ensure they have at least a base level of knowledge of IT related concepts and requirements. Experience with managing ISSO tasks for opened and closed systems. Experience in getting multiple individuals/teams to work together towards a common goal. Experience with the creation and maintenance of project schedules using both Microsoft Project and Excel. Industry standard IT security certifications or an Information Technology Bachelor’s degre e. Possess industry standard project management certification. The Project Management Professional (PMP) certificate would be desirable. gTANGIBLE Corporation is an equal opportunity employer and does not discriminate against any employee or applicant because of race, age, sex, color, physical or mental disability, religion, sexual orientation, marital status, national origin, or political affiliation.

Posted 1 week ago

Strategic Growth Partners logo
Strategic Growth PartnersDoral, Florida
SGP Recruiting provides both operations and strategic support to Tribal 8(a) and commercial organizations. Our client is a CVE-verified Veteran-Owned Small Business (VOSB) and a proud ISO 9001:2015 certified organization specializing in systems integration and enterprise management solutions. As a trusted GSA MAS contract holder, they deliver mission-critical telecommunications, network infrastructure, and IT services to Federal, State, and Local Government agencies, the U.S. Military, and private-sector clients. They are seeking a motivated, career and customer-oriented Information Security Analyst in Doral, FL. Possible other locations for this position: Key West, Newport (FL), and Naval Station Guantánamo Bay (NSGB). Join a team dedicated to Meeting today’s mission demands requires more than just technology — it requires the right people, the right expertise, and the right partners working together with precision and purpose. Propel your career forward and be part of something extraordinary. Salary Range - $85 – 90K Annually. Employment - Full time Worksite Type - Onsite Security Clearance Required – Secret Responsibilities include but are not limited to: · Design, development, and maintenance of insightful and actionable. The Cybersecurity Analyst is responsible for the design, development, and maintenance of insightful and actionable dashboards using the ConstantView platform dashboards using the ConstantView platform. · Possess a high level of expertise in ConstantView’s functionalities, data visualization techniques, and data analysis methodologies. · Lead the development of dashboards that effectively translate complex data into clear and concise visual representations, enabling stakeholders to gain valuable insights and make informed decisions. · Includes collaborating with business users to understand their information needs, identifying relevant data sources, and designing dashboards that align with business objectives. · Manipulate and transform data, apply appropriate visualizations, and ensure the accuracy and reliability of dashboard outputs. · They also maintain existing dashboards, troubleshoot issues, and implement enhancements based on user feedback and evolving business requirements. · They possess a strong understanding of data modeling, SQL querying, and data governance principles and can communicate technical concepts to non-technical audiences. · The Information Systems Specialist III provides direction and mentorship to subordinate staff. Minimum Qualifications: · Bachelor’s degree in information systems, Computer Science, Data Analytics, or 4+ years of additional experience related field in lieu of a required Bachelor's degree · 9+ years of relevant Information Systems Specialist experience. · Experience in data analysis and reporting, with a significant portion focused on dashboard development. · Proven expertise in using Constant View for dashboard creation and maintenance. · Strong understanding of data visualization principles and best practices. · Experience with data manipulation and transformation techniques using SQL or other tools. Experience with data modeling and database design concepts. Relevant ConstantView certifications (e.g., developer, administrator). Training or certifications in data visualization tools and techniques. Desired Qualifications: · Master’s degree in a relevant field. Experience with other data visualization platforms (e.g., Tableau, Power BI). · Experience with data storytelling and presentation skills. Experience with data governance and data quality management. · Experience with agile-informed development methodologies. · Experience with statistical analysis and data mining techniques. · Certifications in relevant programming languages (e.g., Python, R). Certifications in data science or data engineering. · Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired. Our client provides a variety of benefits including company-paid health, dental & vision insurance coverage, as well as additional employee-paid health insurance options; company-paid life and disability insurance; 401k retirement savings plan with employer match; 10 company paid holidays per year, and paid time off. Our client also considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.

Posted 30+ days ago

T logo
TriState Health CareerClarkston, Washington
Responsible for processing release of information requests in hybrid environment that includes electronic, paper and other electronic media. Assist patients and representatives with accurate completion of Authorization to Release Information forms. Assists other staff members with release of information questions. Maintains security of medical records to protect patient privacy and confidentiality. Ability to read, analyze and understand the content of the medical record. Assists in covering other duties in HIM, as needed, such as Switchboard Operator. Position is full-time, Monday-Friday, 8am-5pm. Education and Training: High School graduate or GED. Graduate of a two-year program in Medical Records preferred. Experience: Two years previous provider office experience preferred. Knowledge of HIPAA laws preferred. Skills and Abilities: Familiarity with medical terminology, anatomy and physiology preferred. Strong verbal and written communication skills, excellent phone etiquette, strong interpersonal skills. Strong computer skills including Word, Excel, other office software. Benefits Overview: Paid Time Off Medical, Dental, and Vision Flexible Health Spending Account and Dependent Care Spending Account Retirement - 403(b) with matching contributions Employee Assistance Program Tuition Reimbursement Life Insurance Employee Wellness Program

Posted 30+ days ago

Boeing logo
BoeingOklahoma City, Oklahoma

$117,300 - $158,700 / year

Cybersecurity - Information System Security Manager (ISSM) Company: The Boeing Company East Region Classified Cybersecurity is currently seeking a highly motivated Cybersecurity – Information System Security Manager (ISSM) to join the team in Oklahoma City, OK . The selected candidate will rely on cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSM is responsible for ensuring all Information System Security policies, standards, and directives are enforced to support assessment, authorization and continued operation of information systems processing classified information. Position Responsibilities: Perform security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards Lead and implement the Assessment and Authorization (A&A) processes under the Risk Managed Framework (RMF) for new and existing information systems Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Letters (RAL) and support Continuous Monitoring (CONMON) Configure management of assigned systems; auditing systems to ensure security posture integrity Lead staff with assessments and test/analysis data to document state of compliance with security requirements Conduct risk assessments and investigations, implement appropriate risk mitigations, and coordinate incident response activities Conduct periodic hardware/software inventory assessments Serve as organization spokesperson on sophisticated projects and programs Acts as advisor to management and customers on sophisticated technical research studies Collaborate with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements Supervises the development and deployment of program information security for all program systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures Handles assigned team to facilitate effective execution of Risk Management Framework (RMF) Provides guidance and mentor to support team within Information Security Leads and performs security compliance continuous monitoring Coordinates and participates in security assessments and audits Prepares, reviews, and presents technical reports and briefings Identifies root causes, prioritizes threats and recommends and/or implements corrective action Explores the enterprise and industry for evolving state of industry knowledge and methods regarding information security best practices Leads development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple partner organizations Basic Qualifications (Required Skills/Experience): Currently hold certification in good standing to satisfy IAM Level III (CISSP, GSLC, or CISM) 5+ years of experience in cybersecurity policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, CNSSI 1253, ICD-503, JSIG, or NIST SP 800 series Preferred Qualifications (Desired Skills/Experience): 5+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs 5+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS 5+ years of experience in assessing and documenting test or analysis data to show cyber security compliance Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies . Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $117,300 – $158,700 Language Requirements: Not Applicable Education: Not Applicable Relocation: Relocation assistance is not a negotiable benefit for this position. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position requires an active U.S. Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E – Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)

Posted 1 week ago

Tiber Technologies logo
Tiber TechnologiesAnnapolis Junction, Maryland
Description When You Love the Work You Do, Any Mission Is Possible Position: Information Assurance Specialist ( 6 years of experience required) ***(Active Clearance with a Full Scope Poly Required) We’re on multiple contracts and have many opportunities. It is encouraged if applicants don’t meet all the technical requirements to still apply. Join Our Team: Investing in our employee’s growth is a cornerstone of our philosophy. Joining Tiber means access to ongoing learning opportunities, mentorship, and a supportive environment that supports professional development. We believe in providing the tools and resources for our team to thrive and excel in their careers. We recognize that our collective strength lies in the diversity of our talents. Our collaborative work environment encourages cross functional teamwork, idea sharing, and a collective pursuit of excellence. Your skills and perspectives will be integral to our shared success. Position Description: We are seeking a skilled and motivated Information Assurance Specialist to support advanced research, analysis, and development . This role requires deep knowledge of COMSEC, INFOSEC, and Information Assurance (IA) to help secure and assess complex telecommunications and computer networks. Key Responsibilities Conduct and coordinate COMSEC, INFOSEC, and Information Assurance research and development activities. Identify and analyze target communications within global networks. Research techniques, trends, and informatio n capabilities. Develop and maintain databases tracking information tools and trends. Build automated analysis tools to extract technical insights . Perform all-source intelligence analysis by compiling, integrating, and open-source data. Support the development of secure architectures for telecommunications and computer systems. Requirements: Must be a U.S. citizen. Must hold an active clearance with a Full Scope Polygraph Bachelor’s degree in computer science, engineering, or related field 6 years of professional experience Physical Requirements: This position involves sedentary work with physical requirements expected for at least 50% of the time. Essential functions include prolonged periods of sitting, standing, walking, and talking. Reasonable accommodation may be made to enable individuals with disabilities to perform essential functions. EEO Employer: Tiber Technologies is an Equal Opportunity and Affirmative Action Employer. As a company who is committed to inclusion and diversity in the workplace, it is our policy to prohibit discrimination and harassment of any kind based on race, color, sex, religion, sexual orientation, national origin, disability, pregnancy, veteran status, or any other protected characteristic as outlined by federal, state, and local laws. Our hiring decisions are based solely on merit, qualifications and business needs at the time. This policy applies to all employment practices within our organization including recruiting, hiring, promotion, layoff, compensation, benefits, and training.

Posted 30+ days ago

H logo
HoustonHouston, Texas
SALARY: $70 - 75K DOE OVERVIEW: The Manager supervises and supports a team of Information & Referral Specialists who answer incoming calls to the 211 Texas/United Way HELPLINE. The Manager is primarily responsible for providing monthly call monitoring, on-going feedback, and performance evaluations. Trains staff on how to answer calls or respond to other channels (email, text, or chat). Answers 211 calls (min. 5 hours/week) to maintain familiarity with current caller issues and concerns. Assists Specialists with difficult calls. Oversees staff scheduling to ensure proper coverage at all times. Serves as on-call supervisor after hours and weekends on an alternating basis. Ensures that qualified staff are prepared to pass the Inform USA certification examination. Work is carried out in a call center environment. PRINCIPAL DUTIES & RESPONSIBILITES: Supervises Team Leads and Call Specialists, providing monthly call monitoring, on-going feedback, and evaluations of their work. Coaches staff on how to answer calls or respond to other channels (email, text, or chat) according to professional standards and protocols. Assists with production and implementation of general training for current and incoming call center staff. Ensures that qualified staff are prepared to pass the Inform USA certification examination, and that new staff certify as soon as eligible. Actively coordinates 211 Texas/United Way HELPLINE activities and services in key focus areas, providing training in area of expertise and serving as United Way representative to key internal and external committees/collaborative groups. Oversees staff scheduling to ensure proper coverage at all times. Assumes on-call supervisory coverage after hours and weekends and troubleshooting call center issues on an alternating basis with Managers and Directors. Answers 211 calls (minimum of five hours weekly) to maintain familiarity with current caller issues and concerns; assists I&R Specialists with difficult calls; responds to special campaign information and referral requests. Assists with other duties and special projects as assigned. Must perform external speaking engagements, lead tours and participate in local outreach events, and participate in regional and national information and referral professional organizations. Other duties include disaster response. As an essential employee, may be required to work extended hours and/or times other than usual.

Posted 1 week ago

Boeing logo
BoeingTukwila, Washington

$99,450 - $134,550 / year

Cybersecurity- Information System Security Officer (ISSO) Company: The Boeing Company Boeing Classified Cybersecurity is currently seeking a Cybersecurity- Information System Security Officer (ISSO) to join the team in Tukwila, WA . The selected candidate will rely on Cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSO is responsible for maintaining and implementing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information. Position Responsibilities: Contribute to the development and deployment of program information security for assigned systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures Implement Risk Management Framework (RMF) processes, product development and product maintenance for assigned systems Perform security compliance continuous monitoring Participate in security assessments and audits Prepare and present technical reports and briefings Contribute to the identification of root causes, the prioritization of threats, and recommend/ implement corrective action Provide mentoring and technical leadership within the information security program team Explore the enterprise and industry for the evolving state of industry knowledge and methods regarding information security best practices Support development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple stakeholder organizations Basic Qualifications (Required Skills/Experience): Successfully completed Tier 5 Investigation (T5), formerly known as a Single Scope Background Investigation (SSBI) by the federal government within the last 5 years, or requires candidate to have been enrolled in a Continuous Vetting program within the last 5 years IAM Level 1 DoD 8140.01 (previously 8570.01) compliant certification (i.e. CAP, GSLC, Security+ CE, CISSP, CASP, CISM, GSLC) 1+ years of experience in cybersecurity policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, CNSSI 1253, ICD-503, JSIG, or NIST SP 800 series 1+ years of experience implementing the Joint Special Access Program Implementation Guide (JSIG) Ability to obtain access to Special Access Programs (SAP) Preferred Qualifications (Desired Skills/Experience): 1+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs 1+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS 1+ years of experience assessing and documenting test or analysis data to show cyber security compliance Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies . Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $99,450 - $134,550 Language Requirements: Not Applicable Education: Not Applicable Relocation: Relocation assistance is not a negotiable benefit for this position. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position requires an active U.S. Top Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E – Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)

Posted 1 day ago

A logo
American Financing CorporationAurora, Colorado
Compensation: $200 to $300k base plus bonus potential for up to $400k total comp annually Prefer local candidates but are open to considering strong remote applicants as well At American Financing, we're innovators with imagination. We do what it takes to help customers achieve their financial goals. And we stay ahead of the competition by challenging ourselves to become more efficient. We are one of the fastest-growing national mortgage lenders because we don't follow the status quo. See what it's like to work for a national mortgage lender that truly values its employees. Wherever your passions lie, you can find rewarding work and new opportunities here. Casual work environment Hybrid schedule for local employees Family-owned, Customer-focused Denver Post Top Workplace Top 50 Family-Owned Business Best of Colorado Business Inc. 5000 Fastest-growing Private Company Job Summary The Chief Information Officer (CIO) will develop, plan, and implement a forward-looking information technology (IT) strategy that aligns with American Financing’s mission, drives efficiency, and delivers strong return on investment—while ensuring security, compliance, and resilience. This senior leadership role is not for a first-time CIO. We are seeking a proven executive technology leader with deep experience in financial services, mortgage, banking, or FinTech. The CIO will shape the company’s technology future, build and lead high-performing teams, and serve as a trusted partner to the executive team. Key Responsibilities Develop and execute a technology roadmap that supports company growth and innovation. Lead and inspire large, cross-functional teams across engineering, product, systems, information security, QA, and IT support. Oversee efficient modernization, upgrades, and operational stability of all systems. Collaborate with the executive team to align technology with business and financial goals. Ensure compliance with government regulations, industry standards, and information security requirements. Lead business continuity, disaster recovery, and risk management practices. Partner in vendor management and contract negotiations to maximize ROI. Manage the IT budget and conduct cost-benefit analyses to guide investments. Stay ahead of emerging technologies, assessing their potential to improve operations and customer experiences. Required Skills & Abilities Excellent verbal and written communication skills. Excellent managerial and leadership skills, with ability to inspire and scale teams. Strong conceptual ability to set long-term business goals and design orderly processes to achieve them. Thorough understanding of information technology systems, architecture, and security practices. Proficiency with Microsoft Office Suite or equivalent productivity tools. Education & Experience Master’s degree in Business Administration, Computer Science, or Information Technology required. At least 10 years of progressive leadership experience in information systems/technology. Minimum 5–10 years of executive-level leadership, including prior experience as a CIO or equivalent. Proven success leading technology teams in financial services, banking, mortgage, investment, or FinTech. Experience with Agile Software Development Life Cycle. Background in vendor management, contract negotiation, and delivering complex technology initiatives. Technical Background (Preferred) Experience with modern frameworks (e.g., .NET or similar). Familiarity with cloud platforms (AWS, Azure, GCP). Proficiency with containerization and orchestration (Docker, Kubernetes). Exposure to enterprise service bus architecture. Experience with contact center, CRM, and loan management systems. Familiarity with generative AI and emerging technologies. WHAT WE BRING Medical, Dental, Vision, 401k Paid time off and sick days Paid holidays Long-term paid disability Paid maternity and bonding leave Full desk equipment provided American Financing Corporation (AFC) is an Equal Opportunity Employer. AFC does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis protected by law. All employment is decided on the basis of qualifications, merit and business need.

Posted 30+ days ago

Boeing logo
BoeingBerkeley, Missouri

$125,800 - $170,200 / year

Cybersecurity – Information System Security Manager (ISSM) Company: The Boeing Company Boeing Classified Cybersecurity is currently seeking a highly motivated Cybersecurity – Information System Security Manager (ISSM) to join the team in Berkeley, MO or Hazelwood, MO . The selected candidate will rely on cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSM is responsible for ensuring all Information System Security policies, standards, and directives are enforced to support assessment, authorization and continued operation of information systems processing classified information. This position will directly support the A-PX Program. Position Responsibilities: Perform security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards Lead and implement the Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF) for new and existing information systems Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acknowledgement Letters (RAL) and support Continuous Monitoring (CONMON) Supervise configuration management of assigned systems; auditing systems to ensure security posture integrity Lead staff with assessments and test/analysis data to document state of compliance with security requirements Conduct risk assessments and investigations, implement appropriate risk mitigations, and coordinate incident response activities Conduct periodic hardware/software inventory assessments Serve as organization spokesperson on sophisticated projects and programs Act as advisor to management and customers on sophisticated technical research studies Collaborate with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements Additional Responsibilities: Supervise the development and deployment of program information security for all program systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures Handle assigned team to facilitate effective execution of Risk Management Framework (RMF) Provide guidance and mentor to support team within Information Security Lead and perform security compliance continuous monitoring Coordinate and participate in security assessments and audits Prepare, review, and present technical reports and briefings Identify root causes, prioritize threats and recommend and/or implement corrective action Explore the enterprise and industry for evolving state of industry knowledge and methods regarding information security best practices Lead development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple partner organizations Basic Qualifications (Required Skills/Experience): Successfully completed Tier 5 Investigation (T5), formerly known as a Single Scope Background Investigation (SSBI) by the federal government within the last 5 years, or requires candidate to have been enrolled in a Continuous Vetting program within the last 5 years Ability to obtain access to Special Access Programs (SAP) Currently hold certification in good standing to satisfy IAM Level III (CISSP, GSLC, or CISM) 5+ years of experience with cyber security policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, CNSSI 1253, ICD-503, JSIG, or NIST SP 800 series 5+ years of experience working within Special Access Programs Preferred Qualifications (Desired Skills/Experience): 5+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs 5+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS 5+ years of experience assessing and documenting test or analysis data to show cyber security compliance Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies . Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $125,800 - $170,200 Language Requirements: Not Applicable Education: Not Applicable Relocation: This position offers relocation based on candidate eligibility. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position requires an active U.S. Top Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E – Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)

Posted 5 days ago

Leidos logo
LeidosAnnapolis Junction, Maryland

$131,300 - $237,350 / year

Leidos is seeking Information Security Professionals for programs in our National Security Sector's (NSS) Cyber & Analytics Business Area (CABA) . Our talented team is at the forefront in Security Engineering, Computer Network Operations (CNO), Mission Software, Analytical Methods and Modeling, Signals Intelligence (SIGINT), and Cryptographic Key Management. At Leidos , we offer competitive benefits , including Paid Time Off, 11 paid Holidays, 401K with a 6% company match and immediate vesting, Flexible Schedules, Discounted Stock Purchase Plans, Technical Upskilling, Education and Training Support, Parental Paid Leave, and much more. Join us and make a difference in National Security! Information Systems Security Officers (ISSO) and Information Systems Security Engineers (ISSE) will support our Leidos-led Prime Programs supporting the Ft. Meade, MD customer. Our work locations range from North and South Laurel, Columbia, Annapolis Junction, Linthicum and Ft. Meade, MD. ISSO Job Summary: The Information System Security Officer (ISSO) is integral to our mission of safeguarding our information systems. The ISSO collaborates with cross-functional teams to develop and maintain a robust security framework, protecting our systems against threats and vulnerabilities. This role requires a proactive approach to managing security policies, performing assessments, and supporting security authorization processes. Primary Responsibilities: Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies. Maintain the operational security posture for information systems to ensure policies, standards, and procedures are established and followed. Manage security aspects of information systems and perform daily security operations. Evaluate security solutions to ensure they meet requirements for processing classified information and perform vulnerability/risk assessments to support certification and accreditation. Provide configuration management for information system security software, hardware, and firmware, and manage changes to systems, assessing their security impact. Prepare and review security documentation, including System Security Plans (SSPs) and Assessment and Authorization packages. Manage and coordinate security authorization activities in accordance with Government regulations, Department of Defense and National Institute of Standards and Technology Risk Management Framework and standards, and customer-specific information security policies, processes, and procedures. ISSE Job Summary The Information Systems Security Engineer (ISSE) is crucial in designing, developing, and implementing secure information systems. The ISSE collaborates with architects and developers to integrate robust security measures into systems, ensuring they are resilient against threats and vulnerabilities. This role requires a deep understanding of security engineering principles and a proactive approach to risk management throughout the system lifecycle. Primary Responsibilities: Perform and review technical security assessments to identify vulnerabilities and ensure compliance with information assurance (IA) standards and regulations. Validate and verify system security requirements, establish system security designs, and integrate system security capabilities for various environments. Build cybersecurity into systems deployed to operational environments, ensuring uniform application of security policies and enterprise solutions. Assess and mitigate system security threats and risks throughout the program life cycle, contributing to security planning, assessment, risk analysis, and risk management. Apply system security engineering expertise in areas such as system security design, life cycle, risk management, and security testing, using industry system security engineering methodologies. Enforce the design and implementation of trusted relations among external systems and architectures and manage changes to systems while assessing security impact. Support security authorization activities in accordance with Government regulations, Department of Defense and National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) standards, and customer-specific information security policies, processes, and procedures. Basic Qualifications Bachelors Degree, candidates with out higher level education will be considered if they have extensive relevant ISSO or ISSE experience DoD 8570 Certification compliance related to level of position. This could include one or more of the following IAT II, IAM I, II or III or IASAE I, II or III: Security+ CE CISSP CASP+ CE ISSEP Five (5) or more years of experience as an ISSO or ISSE Five (5) or more years of experience with MD customer security suite Clearance Required: Must have an active TS/SCI with Polygraph. CONMD KQW If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares. Original Posting: January 17, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $131,300.00 - $237,350.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Posted 4 days ago

U logo
Uintah Basin Healthcare current open positionsRoosevelt, Utah
Job Summary: The Manager of Health Information Management (HIM) is responsible for the security and integrity of electronic patient data by managing and securing patient records. The HIM Manager will be expected to comply with federal mandates and regulations on patient information. They will be responsible for managing the daily operations of the HIM department. The HIM Manager also acts as the liaison between hospital senior leadership, department managers, and information technology leadership. A key constituent of the revenue cycle organization-wide, this position contributes to Uintah Basin Healthcare's financial strength, compliance, and overall performance by serving in a directorial capacity for coding, abstracting, and related functions. As such, this position is responsible for monitoring and facilitating improvement in the overall quality, timeliness, completeness, and accuracy of coding processes for assigned facilities. Additionally, this individual is responsible for ensuring adherence to applicable governmental and payer regulations and maintaining a coding compliance plan to avoid penalties. The incumbent assumes responsibility for operational management as well as administrative and fiscal matters related to medical coding functions. Duties and Responsibilities: Coordinate and facilitate communication between the HIM department, department leadership, and end users as required. Establish and enforce medical record policies and procedures necessary for effective and efficient processes. Ensure prompt completion, filing, and retrieval of medical records. Supervises the release of information to persons and agencies according to regulations. Partner with the key leaders to monitor and audit clinical documentation and charting. Recruitment, retention, development, and management of HIM support teams. Responsible for the yearly coding changes, adherence to changes, and maintenance of computer systems to ensure compliance. Maintain necessary controls and appropriate reviews of medical coding to ensure accuracy and compliance. Determine appropriate staffing levels, conduct compensation analysis, and establish hiring, onboarding, and training practices for HIM staff. Designs and implements coding policies and procedures to ensure departmental facility operations comply with state and federal regulations, organizational policy, and compliance/accreditation requirements for contracted payers. Plays an instrumental role in setting organizational performance objectives for coding and guides staff to assist them in meeting team and organizational goals. Creates and maintains performance dashboards and reporting for medical coding areas as required by executive leadership. Assesses performance by overseeing regular (e.g., quarterly) audits of coding department(s), as well as annual compliance audits to evaluate risk based on the OIG work plan for the upcoming year. Conducts department-wide meetings at least once a month to maintain two-way communication, problem solving, and information passing. Interacts positively with members of the medical staff by cultivating liaisons and promoting interaction. Develops and launches coding improvement initiatives based on areas of opportunity identified through audits and other assessments; monitors and contributes to the success of improvement plans. Works with IT to facilitate updates to existing medical record and coding technology (e.g., computer-assisted coding systems) and continually investigates additional solutions that could be leveraged to improve efficiency and accuracy in medical coding. Owns and executes ICD-10 strategy, spanning from conversion preparations to ongoing performance management and optimization after implementation. Maintains up-to-date knowledge of medical coding/documentation rules and guides subordinates on how requirements set forth by CMS and other third-party payers affect operations. Serves as a liaison and works with departmental and clinical leadership to resolve issues affecting coding and documentation. As the HIPAA Privacy Officer, I will be responsible for developing and implementing our organization's privacy policies and procedures. She/he will provide training to all staff members and will advise leaders in determining and applying sanctions to staff members who violate privacy policies and procedures. She/he will be the contact person for fielding complaints and providing information to individuals of our organization's privacy policies and procedures. Demonstrates professionalism in interacting with colleagues, business partners, and individuals outside the organization, such as patients and families. Performs financial planning and budgeting, developing and implementing strategies for reducing costs and improving service levels. Professional Requirements: Ensures that appearance and personal conduct are professional at all times. Excellent attendance record. Wears appropriate clothing for job functions. Works at maintaining a good rapport and a cooperative working relationship with physicians, administration, and staff. Represents the organization positively and professionally in the community. Maintains patient confidentiality at all times. Complies with all organizational policies regarding ethical business practices. Regulatory Requirements: Bachelor's degree in Health Information Management, Health Administration, or related field. A master's degree is preferred but not required. Certified as a Registered Health Information Administrator (RHIA) or Registered Health Information Technician (RHIT). Three to five years experience in healthcare information management or a related healthcare information field. At least three years of managerial experience in the coding, medical records, or health information management setting. Uintah Basin Healthcare is an Equal opportunity Employee including Disabilities/Vets This AD will run until Aug 14th, 2025 or until filled

Posted 2 weeks ago

Viva Health logo
Viva HealthBirmingham, Alabama
Manager of Information Security Location: Birmingham, AL Why VIVA HEALTH? VIVA HEALTH, part of the renowned University of Alabama at Birmingham (UAB) Health System, is a health maintenance organization providing quality, accessible health care. Our employees are a part of the communities they serve and proudly partner with members on their healthcare journeys. VIVA HEALTH has been recognized by Centers for Medicare & Medicaid Services (CMS) as a high-performing health plan and has been repeatedly ranked as one of the nation's Best Places to Work by Modern Healthcare. Benefits Comprehensive Health, Vision, and Dental Coverage 401(k) Savings Plan with company match and immediate vesting Paid Time Off (PTO) 9 Paid Holidays annually plus a Floating Holiday to use as you choose Tuition Assistance Flexible Spending Accounts Healthcare Reimbursement Account Paid Parental Leave Community Service Time Off Life Insurance and Disability Coverage Employee Wellness Program Training and Development Programs to develop new skills and reach career goals Employee Assistance Program See more about the benefits of working at Viva Health - https://www.vivahealth.com/careers/benefits Job Description The Manager of Information Security oversees and mentors a team of security engineers while remaining hands-on in designing, implementing, and monitoring security measures that safeguard the organization's digital assets. This individual will need a broad and strategic knowledge of principles, practices, and procedures in information security to plan, design, develop, execute, and support critical systems and projects. This role will lead the planning, design, enforcement, and audit of enterprise-wide security policies and procedures which safeguard the integrity of and access to enterprise systems, files, and data elements while actively engaging in tactical execution. This position will continuously assess, refine, and implement data security strategies proactively advising leadership with actionable risk assessments and security briefings. This individual evaluates and deploys emerging technologies, collaborates across IT Operations and Development, and strengthens organizational resilience by championing employee education, security culture, security best practice, and continuous improvement. This role drives value by balancing leadership responsibilities with direct technical contributions, ensuring scalable protection aligned with future business growth. Key Responsibilities Direct and actively contribute to day-to-day security operations. Perform hands on technical work in daily security operations while guiding team performance. Lead the development and enforcement of comprehensive, scalable security policies and frameworks. Recommend, implement, and optimize security protections across enterprise systems. Conduct and oversee vulnerability assessments, mitigation, and remediation strategies. Monitor and interpret threat intelligence using organizational tools. Research, identify, and deploy solutions that strengthen the organizations cyber defense posture. Detect, investigate, and resolve potential security breaches. Participate in the vetting and management of third-party vendors and business associates. Drive enterprise-wide risk assessments with quantifiable, business-aligned outcomes. REQUIRED QUALIFICATIONS : Bachelor’s Degree in Information Systems or related field or equivalent work experience 7 years of I.T. environment experience with progressive responsibilities 3+ years management experience in I.T. Expertise in risk assessment tools, methodologies, and data-driven decision-making Proficiency of security platforms such as: endpoint detection and response (EDR), internet traffic for both onsite remote users, and intrusion prevention (IDS/IPS/DLP) Knowledge of databases (MSSQL/MongoDB/MySQL) Advanced skills in Azure cloud including Purview and Defender Hands on experience in penetration testing and vulnerability management Knowledge of firewall and intrusion detection/prevention protocols Proven ability to lead system administration and security across diverse environments (Windows, UNIX, Linux) Skilled in drafting, enforcing, and scaling security policies, standards, and procedures Strong communicator who can translate complex security risks into actionable business terms for executives Ability to read and use the results of mobile code, malicious code, and anti-virus software PREFERRED QUALIFICATIONS: CISSP, CISM, or equivalent advanced certifications Knowledge of disaster recovery, computer forensic tools, technologies, and methods Strong understanding of software development frameworks and code review Knowledge of virtualization technology

Posted 30+ days ago

Sony Pictures Entertainment logo
Sony Pictures EntertainmentCulver City, California

$115,000 - $150,000 / year

The Information Security organization at Sony Pictures Entertainment is responsible for protecting our content, systems, and data from being stolen, damaged, or destroyed. To do so, we are continuously improving our tools, capabilities, and processes to stay ahead of evolving threats. The Manager, Information Security Productions is accountable for operationalizing the Information Security Productions program across all SPE U.S. productions. This includes driving consistent implementation of approved security standards, tools, and controls; ensuring data-driven visibility into production security risk; and supporting compliance and readiness reporting to leadership. Success in this role requires strong cross-functional collaboration across Information Security, IT, S3, and production teams to embed security into creative workflows without friction, while ensuring protection of SPE’s most valuable assets—our stories and intellectual property. This role will also ensure program consistency with regional and global counterparts, contribute to automation and standardization of key controls, and support ongoing improvement of information security for productions practices across the production lifecycle. Key indicators of success in this role will be: Business leaders have near real-time visibility into production information security risk using meaningful, actionable metrics that drive timely and effective decision-making. Consistent application of approved tools, workflows, and controls across productions, ensuring compliance and readiness reporting aligns with studio KPIs. Production teams trust SPE to provide a secure, highly available, and easy-to-use digital production environment that safeguards our content and data. Information Security, Physical Security, and IT operate as unified partners to protect SPE productions from concept to archive. Within this organization, we value learning, agility, and collaboration. The Manager, Information Security Productions (CC, US) will be a key contributor to Sony Pictures Entertainment’s goal of being the most trusted studio in the industry. Responsibilities Provide visibility and actionable insight into Information Security risk across active U.S. productions. Monitor, analyze, and report on production security posture and key control performance metrics for each production. Partner with global InfoSec, Risk, Threat Intelligence, Incident Response, Training, and Governance teams to align production needs with enterprise programs. Prepare and present dashboards and reports on security trends, compliance status, and improvement opportunities. Support the development of production-specific metrics and KPIs to measure control effectiveness. With IT and Physical Security, maintain security controls in place for productions to most effectively meet our business goals. Operationalize the Production Information Security Program across U.S. productions. Ensure consistent implementation of approved security tools, policies, and workflows within productions. Coordinate adoption of automated controls with productions, such as provisioning, watermarking, and access telemetry. Support the standardization and scalability of production security practices across production titles and business units. Ensure and track production security culture, awareness, and response readiness. Amplify the reach of security training and awareness initiatives by coordinating rollout to productions, ensuring consistent messaging and participation tracking. Gather feedback from productions to help refine information security for productions training and awareness efforts. Partner with Incident Response to ensure clear communications, timely follow-up, and closure of corrective actions. Track cultural and operational readiness indicators (e.g., onboarding rates, reporting engagement, post-incident improvements) to measure program maturity and continuous improvement. Qualifications 5+ Years of experience in Information Security, Information Technology or a related field 5+ Years of experience in an organization directly involved in movie, television and/or other entertainment production, or equivalent educational experience. Bachelor’s degree preferred Strong understanding of the technologies, tools and processes used in production of movies and/or television. Knowledge of Information Security frameworks, standards and best practices and their relevance to business success Specific knowledge of processes, tools and practices used to maintain confidentiality in the context of movie and television productions. Ability to develop and maintain meaningful metrics to track program and process effectiveness. Strong planning and analytical skills Strong communications skills The anticipated base salary for this position is $115,000-$150,000. This role may also qualify for annual incentive and/or comprehensive benefits. The actual base salary offered will depend on a variety of factors, including without limitation, the qualifications of the individual applicant for the position, years of relevant experience, level of education attained, certifications or other professional licenses held, and if applicable, the location of the position. Sony Pictures Entertainment is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, age, sexual orientation, gender identity, or other protected characteristics. SPE will consider qualified applicants with arrest or conviction records in accordance with applicable law. To request an accommodation for purposes of participating in the hiring process, you may contact us at SPE_Accommodation_Assistance@spe.sony.com.

Posted 2 weeks ago

Ingram Micro logo
Ingram MicroFort Worth, Texas

$84,500 - $143,700 / year

Accelerate your career. Join the organization that's driving the world's technology and shape the future. Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to business-to-business technology experts. Our market reach, diverse solutions and services portfolio, and digital platform Ingram Micro Xvantage™ set us apart. Learn more at www.ingrammicro.com Come join our team where you’ll make technology happen in surprising ways. Let’s shape tomorrow - it’ll be a fun journey! We have the flexibility of hiring this role in 3 markets: Irvine-CA, Dallas/Fort Worth-TX and Carol Stream, IL. The role has the opportunity to work up to two days remote per week. The Sr Information Security Compliance & Audit Analyst will report to our Sr Manager of Quality and will be part of the OpEx compliance team. The Analyst will support global activities as they relate to ISO27001, ISO9001 and ISO14001. You will be responsible for providing subject matter expertise in ISO27001 Information Security regarding compliance requirements. In addition, implementing, maintaining and improving the Information Security Management System at a corporate level for Ingram Micro facilities across North and Central America. The Information Security Compliance & Audit Analyst will perform and lead complex compliance reviews, within the IT audits including network, internet, applications, telecommunications, security administration, and contingency planning. Assess risks, develops detail audit/compliance programs, execute audit/compliance programs steps, analyses result and effectively communicates results to senior management. Your role: Manage and Support IT compliance activities for regional information security support of ISO27001 auditing, reporting and remediation where appropriate. Coordinate and communicate IT compliance activities to align with Global Information Security leadership in support and improvement of ISO27001 management system. Ensure regional Information Security compliance to Information security standards (ISO27001) requirements Plan and conduct complex IS and integrated audit/compliance projects, including preparation of an objective risk-based assessment and an effective audit/compliance approach. Leads and/or participates on audit/compliance activities of various locations and departments for compliance with plans, policies and procedures. Execute operational activities to support IS audit and compliance activities including technical validation processes. Execute collection of evidence to support compliance status Provide and present reporting including monthly metric delivery Manage escalation and enforcement for unresolved noncompliance issues Manage and Support External Audit activities and reporting Work with Information Security staff to ensure tools and reporting mechanisms are satisfactorily meeting statutory objectives Support compliance and security validation of all 3rd party IT providers Maintain strong working relationships with internal and external support teams including Global, Regional and Country Information Security associates Work on special projects as required by management Stay abreast of changes within the Information Security compliance areas including business change requirements and regulatory changes from an international perspective Support and enforce Information Security Policy, Standards, and Guidelines for business operations and technology implementations Work as the Subject Matter Expert (SME) on assigned projects and offers council regarding the intent of Compliance requirements What you bring to the role: Bachelor’s degree in computer science, engineering, or related science and math discipline with an information security or business emphasis is required. A minimum of 5 years of experience with IS compliance projects (specifically ISO27001) Understands key security concepts such as access management, vulnerability and patch management, security information event management, and encryption Strong understanding of TCP/ IP and other network protocols Understanding of the basic audit best practices, standards and methodologies Ability to formulate detailed technical documentation preferred ASQ Certified Engineer, Auditor or OE Managers preferred Experience using SharePoint, MS Excel, Word, PowerPoint and Visio Must possess a valid passport and be legally allowed to leave and return to originating country. Attributes we look for: The ability to work independently and in cross functional teams Actively looks for opportunities to develop new ideas to positively impact existing methods, services, or products. Understands, analyzes, and documents cost/benefit analysis where appropriate. Actively accepts individual and team responsibilities and meet commitments. Takes responsibility for own performance and actions and demonstrates responsibility and teamwork towards overall team/department goals. Ability to multi-task and work on projects concurrently and under tight deadlines Must be detail oriented and customer focused with excellent time management skills Takes and exhibits initiative to further develop technical and professional skills, by attending training and/or willingness to learn new systems or technologies in use by the Information Systems department. Possesses understanding of Ingram Micro’s business including knowledge of department names and business processes conducted by each, company global organization, and key customer and vendor segments. Behavorial Competencies: Communication Excellent verbal, written and inter-personal communication skills Strong communication skills; capable of explaining technical issues simply both verbally and in writing Keeps his/her manager informed of any problems, challenges, or unanticipated events affecting his/her work. Listens respectfully and avoids interrupting. Expresses ideas and suggestions in an organized and concise manner both orally and in written form. Solicits and readily accepts constructive feedback. Maintains composure when addressing an adversarial or hostile audience. Decision Making Researches and collects appropriate data points for effective decision making. Readily makes recommendations and includes necessary documentation and material to support conclusions. Develops Innovative Practices Identify, develop and manage innovative ideas and solutions to problems. Identify opportunities to reduce inefficiencies in work processes. Recognizes when it is appropriate to challenge the status quo and when it is not. Works as a Team Member Supports team decisions to implement changes, suggestions, improvements, and solutions. Encourages and supports the exploration and application of best practices. Offers assistance to others and shares information regardless of personal likes or dislikes. Acts with Integrity & Respect Prevents personal conflicts from interfering with his/her objectivity. Consistently arrives on time for meetings and appointments. Accepts responsibility for the results of his/her decisions and actions. Behaves in a way that is consistent with Ingram Micro’s values. #LI-Hybrid #LI-AH1 The typical base pay range for this role across the U.S. is USD $84,500.00 - $143,700.00 per year. The ranges above reflect the potential annual base pay across the U.S. for all roles; the applicable base pay range will depend on the candidate’s primary work location, pay grade, and variable compensation plan. Individual base pay within each range depends on various factors, in addition to primary work location, such as complexity and responsibility of role, job duties/requirements, and relevant experience and skills. Base pay ranges are reviewed and typically updated each year. Offers are made within the base pay range applicable at the time of hire. New hires starting base pay generally falls in the bottom half (between the minimum and midpoint) of a pay range. At Ingram Micro certain roles are eligible for additional rewards, including merit increases, annual bonus or sales incentives and long-term incentives. These awards are allocated based on position level and individual performance. U.S.-based employees have access to healthcare benefits, paid time off, parental leave, a 401(k) plan and company match, short-term and long-term disability coverage, basic life insurance, and wellbeing benefits, among others. This is not a complete listing of the job duties. It’s a representation of the things you will be doing, and you may not perform all these duties. Please be prepared to pass a drug test and successfully pass a pre-employment (post offer) background check. Ingram Micro Inc. is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, veteran status, or any other protected category under applicable law.

Posted 30+ days ago

MCG Health logo

Associate Director, Information Security & Compliance

MCG HealthSeattle, Washington

$162,200 - $227,000 / year

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

At MCG, we lead the healthcare community to deliver patient-focused care. We have a mission-driven team of talented physicians and technical experts developing our evidence-based content and innovating our products to accelerate improvements in healthcare. If you are driven to enhance the US healthcare system, MCG is eager to have you join our team. We cultivate a work environment that nurtures personal and professional growth, and this is a thrilling time to become a part of our organization. With dynamic roles that offer meaningful impact, you'll be able to fully realize your potential. Plus, you'll enjoy world-class benefits and the security, stability, and resources of our parent company, Hearst, with over 100 years of experience.

The Associate Director, Information Security & Complianceis a security engineering leader who enables our teams to ship quickly and safely and ensures the integrity of our deployed productsYou will build paved roads and guardrails – codified as Infrastructure as Code (IaC), Policy as Code, and automated controls – so MCG’s SaaS products meet HIPAA/HITRUST while improving developer velocity. Partnering with Product, Engineering, and IT, you’ll integrate security into CI/CD, automate audit evidence, and turn security into an accelerator for frequent, reliable releases.

You Will: 

  • Build secure-by-default platforms
  • Define and own “paved roads” (golden paths) for service creation, deployment, and runtime with embedded controls
  • Express controls as code: IaC (Terraform), Policy-as-Code (Rego, Azure Policy as Code), Compliance-as-Code (automated evidence collection)
  • Embed security in the software lifecycle
  • Partner with engineering to shift left via CI/CD: SAST, SCA, container scanning, IaC scanning, DAST, SBOM, break-glass processes with audit trails
  • Integrate lightweight threat modeling into backlog/PRs; maintain secure coding standards and reference implementations
  • Automate compliance & audit readiness
  • Maintain HIPAA & HITRUST through continuous controls monitoring and automated evidence pipelines; reduce manual audit work with repeatable proofs
  • Create and maintain relevant documentation to support FedRAMP certification efforts
  • Harden cloud & runtime
  • Own CSPM/CNAPP baselines, least-privilege access IAM, network isolation, KMS/secret stores, container hardening, supply-chain security
  • Operational resilience
  • Define vulnerability SLAs risk-based by asset criticality; drive time to patch with automation and safe rollout patterns
  • Lead incident response readiness: playbooks, tabletop exercises, automated detections, and post-incident learning loops
  • AI & Data Protections
  • Govern data use and model safety for AI features (prompt/response logging controls, PII/PHI handling, third-party risk reviews) without slowing delivery
  • Partnership & Leadership
  • Coach engineers; measure and report outcomes (DORA + security KPIs). Foster a blameless, data-driven culture where secure choices are the easiest choices

What We're Looking For:

  • Bachelor’s degree in Information Security, Computer Science, or related field .
  • 6+ years of experience in product/applicationsecurity, compliance, or risk management for SaaS.
  • 2+ years of team or functional leadership experience .
  • Demonstrated success enabling frequent deployments in regulated environments (HIPAA/HITRUST/FedRAMP) and proven experience HIPAA and HITRUST controls .
  • Practical experience integrating security into CI/CD and operating SAST/SCA/DAST, and container/IaC scanners
  • Excellent judgment, communication, and stakeholder management.
  • Proven collaborator with Product/Engineering/IT with a track record of delivering automation

Licensure/Certifications/Registrations/Permits:

  • Certified Information Systems Security Professional (CISSP)Certified Information Security Manager (CISM), or equivalent certification .

Preferred Qualifications:

  • Demonstrated ability to earn and maintain customer trust preferred.
  • Experience with Policy as Code (OPA/Conftest/Sentinel) and compliance/automation pipelines preferred.
  • Familiarity with SBOM/signing, 
  • FedRAMP (Medium) compliance experience preferred.

This role prioritizes Seattle based talent with the expectation to come into the Seattle office.

Pay Range:$162,200 - $227,000

Other compensation:Bonus Eligible

Perks & Benefits:

💻 Hybrid work

🩺 Medical, dental, vision, life, and disability insurance

📈 401K retirement plan; flexible spending and health savings account

🏝️ 15 days of paid time off + additional front-loaded personal days

🏖️ 14 company-recognized holidays + paid volunteer days

👶 Up to 8 weeks of paid parental leave + 10 weeks of paid bonding leave

🌈 LGBTQ+ Health Services

🐶 Pet insurance 

📣 Check out more of our benefits here:https://www.mcg.com/about/careers/benefits/

We embrace diversity and equal opportunity and are committed to building a team that represents a variety of backgrounds, perspectives, and skills. Only with diverse thoughts and ideas will we be able to create the change we want in healthcare. The more inclusive we are, the better our work will be for it.

All roles at MCG are expected to engage in occasional travel to participate in team or company-sponsored events for the purposes of connection and collaboration. 

All roles at MCG are expected to engage in occasional travel to participate in team or company-sponsored events for the purposes of connection and collaboration. 

It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.

MCG is a leading healthcare organization dedicated to patient-focused care. We value our employees' unique differences and are an Equal Employment Opportunity (EEO) employer. Our diverse workforce helps us achieve our goal of providing the right care to everyone. We welcome all qualified applicants without regard to race, religion, nationality, gender, sexual orientation, gender identity, age, marital status, veteran status, disability, pregnancy, parental status, genetic information, or political affiliation. We are committed to improving equity in healthcare and believe that a diverse workplace fosters curiosity, innovation, and business success. We are happy to provideaccommodationsfor individuals. Please let us know if you require any support.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall