landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Information Technology Jobs

Auto-apply to these information technology jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Barbaricum logo
BarbaricumPhiladelphia, Pennsylvania
Barbaricum is a rapidly growing government contractor providing leading-edge support to federal customers, with a particular focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the latest in technology and the highest caliber of talent. Headquartered in Washington, DC's historic Dupont Circle neighborhood, Barbaricum also has a corporate presence in Tampa, FL, Bedford, IN, and Dayton, OH, with team members across the United States and around the world. As a leader in our space, we partner with firms in the private sector, academic institutions, and industry associations with a goal of continually building our expertise and capabilities for the benefit of our employees and the customers we support. Through all of this, we have built a vibrant corporate culture diverse in expertise and perspectives with a focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is seeking a Compliance Specialist to support cybersecurity and assurance activities across Navy enterprise systems. This role will provide STIG enforcement, vulnerability assessment, and secure configuration guidance to maintain accreditation and cyber readiness. Responsibilities: Conduct vulnerability scans and analysis for Windows and Linux/UNIX systems Enforce STIG controls and implement corrective actions for audit findings Collaborate with system owners to assess security postures and compliance status Develop and maintain IA documentation packages for Navy cybersecurity environments Participate in accreditation and re-accreditation cycles Support privileged and non-privileged user access control evaluations as required Qualifications: Active DoD Secret clearance; TS eligible Bachelor’s degree or qualifying CNSSI/military training certification 3+ years of experience in IA Compliance (Specialty Area 61) Certification required: CCNA, CAP, Security+ (CE), or ENSA Familiarity with NAVEDTRA watch station evaluation pathways Commitment to maintaining 40+ hours of cybersecurity continuing education annually EEO Commitment All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.

Posted 30+ days ago

Agile Defense logo
Agile DefenseRidgecrest, California
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests. Requisition #: 1103 Job Title : Information System Security Officer Location: 1 Administrative Circle Ridgecrest, California 93555 Clearance Level: Active DoD - Interim Secret Salary Range: $80,000 - $110,000 Required Certification(s): · IAM II Level Certified (e.g. Sec+; CAP; CASP+; CCISO; CISM; CISSP; GSLC; HCISPP) SUMMARY The Naval Air Warfare Center Weapons Division (NAWCWD) conducts research, development, acquisition, and test & evaluation of Naval air-to-air, air-to-ground and surface launched weapon systems; conducts weapons systems integration, and weapons, mission, and life-cycle cost analysis; and provides weapons and armament life-cycle services in support of the operating forces, Department of Defense (DoD), and the Missile Defense Agency (MDA). The Naval Air Systems Command (NAVAIR) and the NAWCWD, Digital Information Technology Analysis and Cyber (DITAC) Department Cyber Security Support Services (CSSS) primary purpose is to sustain the analysis, design, development, test, integration, deployment and operations of Information Technology (IT) systems and services including but not limited to the required certification and accreditation services, configuration management, technical information assurance, network monitoring, defense and security, and support for the Cyber Security workforce. JOB DUTIES AND RESPONSIBILITIES ·Managing packages in eMASS. -Reviewing Nessus scans. -Maintaining hardware/software lists. -Ensure the Reviewing and verifying STIGs are complete. -Collaborate with System Administrators, Network Operations, etc. to address system vulnerabilities, track progress and ensure security measures are implemented effectively. -Provide support for the continuous monitoring efforts in relation to Authority to Operate (ATO) for multiple labs; reviewing logs, alerts and other security monitoring tools to identify and address potential threats. -Must have a solid understanding of the job. Previous Department of Defense (DoD) experience preferred. -Assist in planning, implementation, upgrading, and/or monitoring of security measures which make up the protection of corporate or government computer networks. -Capable of performing independently. -Must have eMASS, government DoD experience. ADDITIONAL SKILLS & QUALIFICATIONS Required Skills ·BS – Computer Science or other technical field or -4-6 yrs relevant work experience -IAM II Level Certified (e.g. Sec+; CAP; CASP+; CCISO; CISM; CISSP; GSLC; HCISPP) WORKING CONDITIONS Environmental Conditions Contractor site with 0%-10% travel possible. Possible off-hours work to support releases and outages. General office environment. Work is generally sedentary in nature, but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available. Strength Demands · Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met. Physical Requirements · Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse). Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are. We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section. Happy - Be Infectious. Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do. Helpful - Be Supportive. Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated. Honest - Be Trustworthy. Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support. Humble - Be Grounded. Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task. Hungry - Be Eager. Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges. Hustle - Be Driven. Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

Posted 2 days ago

Parsons logo
ParsonsChantilly, Virginia
In a world of possibilities, pursue one with endless opportunities. Imagine Next!When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We’ve got what you’re looking for. Job Description: Parsons is looking for a talented Level 2 ISSO to join our growing team! In this role you will develop, maintain, and implement information security standards, procedures, and guidelines for applications and databases. In addition, you will ensure that systems and organizational databases are protected from unauthorized access and use, and monitor systems, identify threats, and handle disaster recovery operations. What You'll Be Doing: Performs assessments of systems and networks within the networking environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). Establishes strict program control processes to ensure mitigation of risks and supports for obtaining certification and accreditation of systems. This includes process support, analysis support, coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits. Assists in the implementation of required government policy (e.g.,, NISPOM, DCID 6/3), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and recommends additional security requirements and safeguards where required. Supports the formal Security Test & Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts a review of each system’s audits and monitors corrective actions until all actions are closed. Demonstrates advanced subject matter expertise in job family. Contributes to and may lead the planning and implementation of large programs in the function, and regularly interfaces with senior management and executive leadership. Plays a role in overall functional strategic planning. What Required Skills You'll Bring: Active Top Secret/SCI with CI Polygraph. Bachelors degree with typically 2+ years of relevant experience. Candidates with a Masters degree require 1+ year(s) of relevant experience, and additional years of experience can qualify in lieu of a degree for non-degreed candidates. ​ An active CASP+, CECCNP, Security+, CISA, CISSP, GCED, GCIH, CCSP or CISSP or must be willing to obtain / maintain within 6 months of hire. What Desired Skills You'll Bring: Strong leadership skills Management experience Ability to coach and develop junior ISSO's Security Clearance Requirement: An active Top Secret SCI w/Polygraph security clearance is required for this position.​This position is part of our Federal Solutions team.The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what’s next to deliver the solutions our customers need now.Salary Range: $86,700.00 - $151,700.00We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.We truly invest and care about our employee’s wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest—APPLY TODAY! Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to https://www.parsons.com/fraudulent-recruitment/ .

Posted 6 days ago

Tevora logo
TevoraFairfax, Virginia
Information Security Analyst (SOC 2 Compliance) at Tevora Irvine, CA or Fairfax, VA If you haven’t heard of Tevora, it’s because we’ve done our job! Tevora is a tight-knit community of professionals with a shared passion for our craft. Every day, we combine in-depth knowledge of cybersecurity, technology, and compliance to help create more secure digital environments. To Tevorans, every problem is a puzzle in need of solving. We strongly believe that if we put smart, driven people in a room together, they will accomplish great things. We maintain a supportive culture that celebrates continuous learning, diverse perspectives, and sharing the wins. That's why we have our eyes on you. What’s the role? Tevora is seeking an Information Security Analyst to join the SOC Compliance team. This role on the SOC Compliance team is looking for a passionate individual who has a solid balance between business acumen and technical expertise. Comfortable across various disciplines of information security, this consultant will be responsible for assessing System and Organization Controls (SOC) compliance, for SOC 1 and SOC 2, on a wide variety of client projects for some of the world's largest organizations. Other compliance frameworks this role will work on may include ISO 27001 and PCI as well as GRC support for clients. This role will also provide mentorship to junior team members and participate in ongoing training opportunities. The successful candidate for this role will be detail-orientated, have a solution-focused attitude, and possess strong written and verbal communication skills. A day in the life could include: Participating in and leading IT and Compliance assessments, audits, gap analyses, and remediation. Leading and actively contributing to projects in the areas of System and Organization Controls (SOC 1 & SOC 2) Compliance assessments. Communicating with project stakeholders to effectively convey the requirements of technical and process improvements. Supporting various information security compliance projects, such as PCI or ISO gap assessments. Assisting in the development of customized policies, procedures, controls, disaster recovery plans and other documentation for applications, systems, and infrastructure for our clients. Managing policy exceptions, including working directly with the teams to document exceptions, and identifying compensating controls and remediation action plans. Take on additional responsibilities as needed or as new opportunities arise. Proactively support the team with tasks and projects that emerge over time. Necessary skills and qualifications: Completed minimum 2 years of experience in information security, information technology, business consulting, enterprise risk, or compliance field. Demonstrated experience in at least 1 year of SOC 2 Compliance assessments. Hold at least one Auditing, Risk, or IT certification from the following list: CISSP, CISA, CISM, CRISC, ISO Lead Auditor. Possess knowledge of common IT and security concepts such as firewall management, server management, access control, and authentication. Ability to connect easily with clients and colleagues to communicate effectively across business and technical boundaries- to offer recommendations as an expert with best practices. Ability to work independently without detailed guidance. Proficient in writing executive-level reports and technical documentation. Proficient in MS Office tools and basic professional acumen. Bonus Points Hold a bachelor’s degree from an accredited 4-year university Demonstrated experience in at least one other information security compliance assessment (ISO 27001, PCI Level 1, HITRUST) Prior or current CPA license Commitment to continued learning We’ve got you covered! Comprehensive benefits including: Medical, Dental, Vision & Basic Life Insurance Paid Vacations, Sick Time, & Holidays 401 (k) with discretionary company match Vibrant work culture Additional requirements: Eligibility to work in the United States. $92,400 - $115,000 a year DOE EEOC Statement Tevora is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, disability status, or other applicable legally protected characteristics.

Posted 30+ days ago

Prisma Health logo
Prisma HealthColumbia, South Carolina
Inspire health. Serve with compassion. Be the difference. Job Summary Maintains and oversees the efficient operation of the coding processes, coordinates and supports the activities of Outpatient Coding. Monitors workload and processes to ensure timely resolution of accurate coding and charging as appropriate. Reviews performance standards with each team member to ensure compliance with departmental benchmarks and goals. Hires, trains, coaches, and counsels staff members in an effort to develop staff and improve teamwork, morale, and departmental results. Assists the HIM Outpatient Manager of Coding Services to assure corporate financial goals for DNFB, accounts receivables, and coding compliance are met. Participates in the recruitment of new employees and in performance management activities. Suggests topics for continuing education and collaborates in the development of training materials. Codes medical records as needed. Essential Functions All team members are expected to be knowledgeable and compliant with Prisma Health's values: Inspire health. Serve with compassion. Be the difference. Monitors, prioritizes, and manages work volumes and work assignments. Identifies needs and assigns resources to maximize departmental efficiency and results. Trains, supervises, and mentors assigned staff. Participates in the recruitment of new employees and in performance management activities. Provides regular and timely feedback. Routinely meets with direct reports to review their individual results and identifies opportunities to improve performance productivity and quality. Reviews performance standards with each team member to ensure compliance with departmental benchmarks and goals. Suggests topics for continuing education and collaborates in the development of training materials. Assists in the development and implementation of coding policies, procedures and standard operating procedures. Serves as highly skilled operator, super-user, project manager, and on-site trainer for systems used by coding. Identifies and suggests education topics, collaborating with team members in the preparation and delivery of educational materials and sessions. Collaborates with other Health Information Management (HIM) team members and departments to support goal attainment and coding compliance. Codes charts as needed. Evaluates processes and use of technology to identify opportunities for improvement and assure best practice. Provides backup support to address coding questions/concerns, staffing shortages, time management, and payroll functions, reporting, and other leadership functions Analyzes and interprets data for statistical, process improvement, and planning purposes. Performs other duties as assigned. Supervisory/Management Responsibilities This is a supervisor job which may have direct supervision of team members which may include hire/termination authority, disciplinary authority, and performance management responsibilities. May have budget input or responsibilities. Job is not considered a member of management staff. Minimum Requirements Education - Associate degree in Health Information Management Experience - Five (5) years c oding experience in acute care setting. Two (2) years leading teams or progressive management in Health Information Management of a multi-entity healthcare delivery organization. Experience in multi-system health system preferred. Experience coding in academic medical centers, cancer centers, and other specialized coding systems preferred. In Lieu Of NA Required Certifications, Registrations, Licenses Registered Health Information Technician (RHIT), Registered Health Information Administrator (RHIA), Certified Coding Specialist (CCS), CPC, CPC-H, COC, other approved coding credential. Knowledge, Skills and Abilities Knowledge of International Classification of Diseases-10 (ICD-10), CPT, and HCCs. Maintains current expertise on coding, charging, and reimbursement guidelines. Maintains expertise in coding applications and Epic workflow. Stays up to date with external policies and regulations that affect coding from agencies such as Office of Inspector General (OIG), Centers for Medicare and Medicaid Services (CMS) and other payers; communicates changes and impact on the coding teams. Knowledge of Hierarchical Condition Categories (HCC), appropriate Quality Indicators, formal and informal coding audit processes. Communication skills Customer service skills. Problem-solving and critical thinking skills Change management skills. Ability to work effectively, independently and manage multiple demands consistently. Knowledge of diagnostic and procedural terminology, ICD and CPT/ HCPCS coding systems, and billing compliance rules. Knowledge of office equipment (fax/copier) Proficient computer skills (word processing, spreadsheets, database) Work Shift Day (United States of America) Location Corporate Facility 7001 Corporate Department 70017512 HIM Coding Share your talent with us! Our vision is simple: to transform healthcare for the benefits of the communities we serve. The transformation of healthcare requires talented individuals in every role here at Prisma Health.

Posted 2 days ago

Mini-Circuits logo
Mini-CircuitsBrooklyn, New York
Description Mini-Circuits designs, manufactures and distributes integrated circuits, modules, and sub-systems for high-performance radio frequency (RF) and microwave applications. With design, sales and manufacturing locations in over 30 countries, Mini-Circuits’ products are used in a range of wired and wireless communications applications. Our products are also used in detection, measurement and imaging applications, including military communication, guidance and electronic countermeasure systems, commercial, scientific, military land, sea and aircraft; automotive systems, medical systems, and industrial test equipment. Mini-Circuits’ sells its products to over 20,000 customers globally through our direct sales force, applications engineering staff, sales representatives, as well as through our extensive website. Position Summary: The primary function of the Information Security Analyst is to foster a culture of Cyber Security at Mini-Circuits by developing and managing the Information Security Program. The security program manager must understand the IT risks faced by the enterprise, create and drive execution and realization of the security initiatives. This position also requires technical proficiency on the IBM System i to assess security controls and the business risks associated with the mission critical ERP server. Salary Range: $155,000 - $175,000 per year Job Function: Lead the Information System Security Program and align with organization’s mission, goals, and business strategy. Develop guiding principles, policies, standards, procedures, and technical documentation based on current Security Control frameworks and Industry standards. Align execution roadmap with IT strategy for implementation, compliance, and internal assessment with NIST frameworks 800-53, 800-171 and CMMC Perform risk assessments, maintain the IT risk register, and measure continuous improvement Perform vulnerability assessments and test security controls, use findings to develop new security initiatives and improvement Collaborate with partners and IT infrastructure team to address IT security risks, vulnerabilities by implementation of controls to mitigate the same Identify, classify data assets, and determine controls required for data security and appropriate data handling procedures Deliver security awareness to users, run simulated phishing campaigns Research solutions for implementing technical controls using secure design principles Implement controls for managing Identification and authentication, including privilege access management, and creating procedures for continuous assessment of control Perform Security incident response activities in support of the Enterprise systems and assist the infrastructure team to remediate the incident Develop and test Disaster recovery plans for Enterprise Systems, including use of tabletop exercises Complete the due diligence questionnaires regarding Information Security posture for customers Perform administration, and maintenance of the IBM i server and Infor XA ERP application. Perform code reviews to assess security of changes made for ERP application modules. Qualifications : Bachelor’s degree in Computer Science/Computer Engineering. Master's degree in Management of Information Systems preferred. CISSP or equivalent certification required. Ability to prioritize effectively. Good verbal and written communication skills for documentation and presentations when working with users. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfullyperform theessentialfunctionsofthisjob.Whileperformingthedutiesofthisjob,theemployee is regularlyrequired to talk and hear. The employee frequently is required to stand, walk, sit and use hands to operate a computer keyboard. The employee is occasionallyrequired to reach with hands and arms.The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision, and ability to adjust focus. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Additional Requirements/Skills: Comply,understand,andsupportcorporatesafetyinitiativestoensureasafework environment. Ability and willingness to abide by Company’s Code of Conduct. Valid driver's license and ability to drive for extended periods of time. Occasional travel, some overnight, as required. Disclaimer: The listed qualifications and requirements for each position are intended as guidelines. Mini-Circuits reserves the right to hire outside of these guidelines at Management’s discretion. Mini-Circuits is an Equal Opportunity Employer and does not discriminate on the basis of actual or perceived age, race, creed, color, national origin, sexual orientation, military status, sex, disability, predisposing genetic characteristics, marital status, familial status, gender identity, gender dysphoria, pregnancy-related condition, and domestic violence victim status or protected class characteristic, or any other protected characteristic as established by federal or state law.

Posted 3 weeks ago

M logo
MRO CareersBoise, Idaho
The Site Supervisor is responsible for managing the daily scheduling of the ROI Specialists at specific client site. The Site Supervisor will act as the liaison between MRO and Client Management staff to ensure that all ROI activities are compliant with established client policies, federal and state regulations and are completed in a timely manner. This is an On Site position Candidate is eligible for a $1,500 sign on bonus paid out over the first 30 and 90 days. TASKS AND RESPONSIBILITIES: Manages workflow among on-site employees to ensure maximum productivity and quality standards are met. Adjusts work assignments as needed to cover peak periods, leave and vacancies. Prioritizes work to ensure completion of ROI function. Adjusts work assignments as needed to cover peak periods, leave and vacancies at the staffed hospital sites. Provides coverage in event of backlogs, illness, vacation or leave of absence of medical record staff. Performs Quality Assurance monitoring of work performance for the ROI Specialists. Conducts productivity and work performance reviews for ROI Specialists in accordance with MRO/customer policies and procedures and Federal/State law. Monitors performance and provides performance feedback and evaluations for ROI Specialists. Monitors and approves paid time off and schedules for all staff. Promotes a positive self-image of MRO with emphasis on customer service by treating patients, co-workers, and medical center personnel with courtesy and respect. Responds to customer needs in a positive and efficient manner. Provides support to the Area Manager, as needed. SKILLS|EXPERIENCE: Minimum Qualifications: High School Diploma/GED required. Bachelor’s and/or Associates Degree in Health Information Management, Business Administration or health related field or equivalent experience is preferred. 1 years supervisory/management experience in acute care setting. Knowledge of HIPAA privacy information standards required. Demonstrates excellence in written communication and interpersonal skills. Proficiency in Microsoft Office Applications required. Physical Requirements: Position requires standing, sitting, lifting up to 20 pounds. Position is performed in office and hospital settings. *This job description reflects management’s assignment of essential functions. It does not prescribe or reflect the tasks that may be assigned. INDMP

Posted 3 weeks ago

CACI logo
CACIDenver, Colorado
Information Assurance EngineerJob Category: EngineeringTime Type: Full timeMinimum Clearance Required to Start: TS/SCI with PolygraphEmployee Type: RegularPercentage of Travel Required: Up to 10%Type of Travel: Continental USAnticipated Posting End: 10/27/2025 The Opportunity: CACI's SAFFIRE team is seeking a highly motivated Information Assurance Engineer to help manage critical Intelligence solutions for our NGA customers as part of the SAFFIRE program. You will be a critical element, working closely with users, our user support team and CACI’s development teams ensuring that systems supporting the national security of our country remain available to their user base. Work with the internal development and systems teams, and development release train, as well as the government security experts, doing work that matters for some of the U.S. Government’s most critical missions, and utilizing the latest technologies in Cloud Computing, AI/ML, and DevSecOps. Maintain accurate reporting and documentation of software security platform identifiers (SPIDs), supporting the ATO Accreditation lifecycle. Responsibilities: Maintain accurate reporting and documentation of software security platform identifiers (SPIDs), supporting the ATO Accreditation lifecycle. Participate in systems design process to ensure implementation of appropriate systems security requirements using applicable baseline security controls (NIST) as one of the sources for security requirements. Analyze technical information to determine the best cyber protection technologies; AND recommend implementations for software programs. Perform technical analysis to determine the system security posture impact level, evaluate assigned security controls, conduct a technical security assessment and establish roadmaps for mitigation of vulnerabilities, and produced artifacts to successfully achieve an Authority to Operate from an Authorizing Official. Perform assessment and compliance activities by using the assessment tools and procedures within the Xacta IA Manager to manage security compliance and risk, upload artifacts, and track projects as they flow through the RMF process. Interface with the Program Management Office (PMO) and Systems Team lead while completing security controls implementation, self-compliance tests, security test plans, and creating/updating the Plan of Actions and Milestones (POA&M). Provide final approval of all account creation request ensuring the proper documents and certificates are included; perform annual verification. Qualifications: Required: Active TS/SCI security clearance with CI Polygraph Experience with evaluating Information Assurance compliance of a system against current RMF and expertise DoW Cybersecurity policies as outlined in NIST SP 800-37 and 800-53, rev 4. Experience with vulnerability and compliance assessment scanning tools and reporting, along with intrusion detection technologies, intrusion prevention technologies, and Host-Based Security System (HBSS) DOD Directive 8570 IAT II certification (Security+ or equivalent). Experience managing the security accreditation of several platforms supporting DoW and/or Intelligence Community workflows. Comfortable briefing key stakeholders, government program office, and government security professionals on timelines, milestones, and current security posture. Desired: Proven track record in leading end-to-end Risk Management Framework (RMF) processes for DoD and Intelligence Community systems, including developing mitigation roadmaps, conducting technical security assessments, and producing ATO artifacts to achieve Authority to Operate accreditation Experience implementing security controls in AWS, Azure, or similar cloud environments, including identity access management and encryption strategies. Proficiency in Python, PowerShell, or Bash for automating vulnerability scans, compliance checks, and security reporting tasks. Experience supporting development teams in architecting and managing security platforms - ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you’ll be part of a high-performing group dedicated to our customer’s missions and driven by a higher purpose – to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You’ll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground — in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here . Since this position can be worked in more than one location, the range shown is the national average for the position. The proposed salary range for this position is: $82,100-$172,400 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.

Posted 2 days ago

AHU Technologies logo
AHU TechnologiesWashington, District of Columbia
Job Description: Short Description: Information Assurance and Security Specialist – Journeyman (IA & SS – Jrny) FT, Hybrid Position - Only DMV-based candidates will be considered Complete Description: Duties: · As part of the Client technology team, the Security Specialist (Infrastructure Group) will be maintaining and monitoring day to day operation of the Client IT infrastructure – Security. · The IT Consultant will help and performs, monitoring, maintenance, and security IT infrastructure (physical, virtual and cloud). · IT consultant will perform OS, security and application upgrades of servers and network to keep them up to date. · IT consultant will develop, implements, maintains and enforces documented standards and procedures for the design, development, installation, modification, and documentation of assigned systems. · IT consultant will plan, coordinates, and monitors project activities for Client Infrastructure group and duties as assigned. · Log analysis of Firewall, AD, Switches and other deployed security products Knowledge of vulnerability assessment tools to identify and mitigate issues. · Research, analyze, and patch required systems to comply with Client compliance mandates. · Respond to escalation calls from the Help desk, Desktop support, and other teams to debug and resolve security and perform maintenance. · Understands security troubleshooting processes and cooperates with another team. · Assists Service Desk technicians as needed with Tier I and Tier II troubleshooting and patching of desktop systems, software (MS Office, Java, Adobe), printer issues, and server related issues as needed. Provides trouble-shooting assistance on production and non-production supported systems. · May recommend methods and techniques for obtaining solutions. · Initiates preventive maintenance for the technical system. · Responsibilities: · Determines enterprise information assurance and security standards. · Develops and implements information assurance/security standards and procedures. · Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirements. · Identifies, reports, and resolves security violations. · Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands. · Supports customers at the highest levels in the development and implementation of doctrine and policies. · Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures. · Performs analysis, design, and development of security features for system architectures. · Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers. · Designs, develops, engineers, and implements solutions that meet security requirements. · Provides integration and implementation of the computer system security solution. · Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems. · Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle. · Ensures that all information systems are functional and secure Qualifications: · 6-10 years of experience developing, maintaining, and recommending enhancements to IS policies/requirements (Required) · 6-10 years of experience performing vulnerability/risk analyses of computer systems/apps (Required) · 6-10 years of experience identifying, reporting, and resolving security violations (Required) · Patching Server 2008 / 2012 /2016 (Required) · Patching Desktop Windows 10 / 7 (Required) · Firewall management CISCO NGFW (Required) · Vulnerability assessment tools Nessus, Tripwire (Desired) · VMware 5.5 / 6.0 (Required) · Production support (Required) · Server and Desktop troubleshooting (Required) · NIST 800-53 experience (Desired) · Splunk (Desired) · Cloud experience (MS Azure) (Desired) Education: a. Bachelor’s Degree in IT or related field or equivalent experience (Required) b. Security+, CISSP, other security certifications (Preferred) Skills Matrix: • 6-10 years of experience developing, maintaining, and recommending enhancements to IS policies/requirements. Required • 6-10 years of experience performing vulnerability/risk analyses of computer systems/apps. Required • 6-10 years of experience identifying, reporting, and resolving security violations. Required • Patching Server 2008 / 2012 /2016. Required • Patching Desktop Windows 10 / 7. Required • Firewall management CISCO NGFW. Required • VMware 5.5 / 6.0. Required • Production support. Required • Server and Desktop troubleshooting. Required • Bachelor’s Degree in IT or related field or equivalent experience. Required • Security+, CISSP, other security certifications. Desired Flexible work from home options available. Compensation: $58.00 - $65.00 per hour About Us AHU Technologies INC. is an IT consulting and permanent staffing firm that meets and exceeds the evolving IT service needs of leading corporations within the United States. We have been providing IT solutions to customers from different industry sectors, helping them control costs and release internal resources to focus on strategic issues. AHU Technologies INC. was co-founded by visionary young techno-commercial entrepreneurs who remain as our principal consultants. Maintaining working relationships with a cadre of other highly skilled independent consultants, we have a growing number of resources available for development projects. We are currently working on Various projects such as media entertainment, ERP Solutions, data warehousing, Web Applications, Telecommunications and medical to our clients all over the world.

Posted 30+ days ago

CACI logo
CACIChantilly, Virginia
Information Systems Security EngineerJob Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: SecretEmployee Type: RegularPercentage of Travel Required: Up to 10%Type of Travel: Continental US* * * The Opportunity: As a SIPR Information Systems Security Engineer, you will have in-depth knowledge and be responsible for analyzing, designing, implementing, and documenting robust security measures to protect the organization's information systems and data assets. Your primary focus will be on identifying vulnerabilities, analyzing security threats, and implementing effective security solutions to ensure the confidentiality, integrity, and availability of sensitive information. Working closely with the cybersecurity team and IT staff, you will play a key role in maintaining a secure and compliant information technology environment. Responsibilities: Security Implementation: Design, deploy, and configure security configurations, such as MFA, centralized logging, encryption mechanisms, and access control systems, to protect the organization's information systems. Vulnerability Assessment and Audits: Conduct regular vulnerability assessments and audits to identify weaknesses in the IT infrastructure and applications. Analyze results and collaborate with IT teams to remediate identified security gaps. Incident Response and Threat Mitigation: Develop and implement incident response procedures to respond effectively to security incidents. Monitor and analyze security logs and alerts to detect and mitigate potential threats promptly. Security Policy and Standards Development: Assist in the creation, review, and enforcement of information security policies, standards, and guidelines. Ensure compliance with industry best practices and regulatory requirements. Security Compliance Monitoring: Monitor and track compliance with security policies and procedures, conducting periodic audits and assessments to ensure adherence to established security standards. Secure Network Architecture: Design and implement secure network architectures, segmenting critical data and systems from less sensitive resources to minimize attack surfaces and potential impact. Security Incident Investigation: Lead investigations into security breaches, identifying the root cause and recommending preventive measures to enhance security posture. Data Protection and Privacy: Implement data protection measures, encryption techniques, and privacy controls to safeguard sensitive data and comply with relevant data protection regulations. Qualifications: Required: 12+ Years of relevant experience (bachelor’s degree in applicable field may be substituted for 5 years of experience). Required DoD 8140 IAT level II compliant certification such as CompTIA Security+ ability to obtain Secret Clearance Proven experience as a Security Engineer or in a similar role, with expertise in information security practices and technologies. Strong knowledge of network security, operating systems, databases, and application security principles. Familiarity with industry security standards and frameworks such as NIST or DoD Controls Experience with vulnerability scanning and penetration testing tools. Ability to analyze security incidents, perform root cause analysis, and propose effective solutions. Knowledge of encryption technologies, access controls, and identity and access management (IAM) principles. Excellent communication and problem-solving skills to collaborate effectively with cross-functional teams. Experience working in secure areas and on configuring classified systems. Other relevant cybersecurity certifications like Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM), are a plus. Understanding of regulatory requirements related to information security (e.g., GDPR, HIPAA) is advantageous. Familiarity with cloud security concepts and solutions is a plus. Dedication to staying current with emerging cybersecurity trends and threats. - ________________________________________________________________________________________ What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of everything we do. As a valued team member, you’ll be part of a high-performing group dedicated to our customer’s missions and driven by a higher purpose – to ensure the safety of our nation. An environment of trust. CACI values the unique contributions that every employee brings to our company and our customers - every day. You’ll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality. A focus on continuous growth. Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground — in your career and in our legacy. Your potential is limitless. So is ours. Learn more about CACI here. ________________________________________________________________________________________ Pay Range : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here . The proposed salary range for this position is: $103,800 - $218,100 CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.

Posted 4 days ago

Legacy logo
LegacyLake Nona, Florida
InnovaCare Partners, LLC Job Title - Information Systems Specialist Report to - Clinical Informatics Manager Job Summary The Information Systems Specialist (ISS) will work as a part of the EMR department, while providing system-level support of multi-users in clinical, and financial applications, as well as operating systems, hardware, software, and reporting tools; including installation, configuration, training, maintenance, and support of these systems. Your purpose as an Information Systems Specialist is to deliver support to end users in the organization about how to use various types of software programs efficiently and effectively in fulfilling business objectives of providing superior patient care. Responsibilities 1. Works under direct supervision on routine tasks as per established procedures. 2. Works with other team members and/or end-users to troubleshoot basic problems. 3. Participates in the development of basic solutions. 4. Acting as an IT liaison to administrators, physicians, and clinic staff regarding the EMR. 5. Provides efficient workflow and processing for end-users. 6. Assures systems development, maintenance, and enhancement, is performed in a timely manner. 7. Assists with generation of reports for administrators, MIPS, PCMH, and HEDIS staff members. 8. Collaborates with internal and external staff, vendors, and other stakeholders to identify requirements, assess technologies, and recommend viable solutions to our clinical and business needs. Skills and Specifications • Candidates must have experience with EMRs (Preferably eClinicalWorks). • Candidates must have an Associate’s degree. • Strong Microsoft Office skills, especially Excel and Visio. • Ability to work creatively and analytically in a problem-solving environment • Good organizational, multi-tasking, and time-management skills. • Candidates should be competent with: clinical systems, EMR, Order Entry, Lab, Registration, Billing, and Appointments. • Additional skills must include strong; project management, documentation, attention to detail and excellent customer service/communication skills. • Must be able to work with the clinical and business units, self-motivated and results oriented. • Bilingual preferred (English/Spanish).

Posted 30+ days ago

Indiana Farm Bureau Insurance logo
Indiana Farm Bureau InsuranceIndianapolis, Indiana
Primary Responsibilities: Strategic Security Leadership: Secure the introduction and adoption of new technology to support business goals while maintaining robust security posture. Enterprise Software Security Assessment: Evaluate and provide security guidance on enterprise software solutions, vendor risk assessments, and third-party integrations. Threat Management Enhancement: Work closely with team members and all areas of the organization to constantly enhance threat prevention, detection, and response capabilities. Security Architecture & Standards Development: Design comprehensive security architectures and develop security standards and governance frameworks for enterprise-wide adoption. Cross-Functional Collaboration: Serve as primary security liaison with business units, translating complex security requirements into actionable business solutions. Risk-Based Decision Making: Conduct advanced risk assessments and provide strategic and technical recommendations that balance security requirements with business objectives. Technical Thought Leadership: Maintain deep understanding of business needs and multiple technical disciplines including application development, network design, cloud, and infrastructure security. Knowledge and Requirements: 7-10 years of Information Security experience. 5-7 years of Cloud Security experience. Experience leading cloud security architecture decisions. Experience with cloud automation, cloud security tools, and terraform. Ability to mentor senior security engineers and domain architects. Ability to lead the cloud security team. #HO #LI-TH1

Posted 30+ days ago

Red Oak logo
Red OakCedar Park, Texas
Objectives : We are seeking an experienced Security Engineer to join the Engineering Team at Red Oak. The ideal candidate will be a strategic thinker with experience in managing complex security operations in an AWS environment. As Head of Information Security, you will have prime accountability for the design and implementation of our cybersecurity posture including oversight and management of our annual SOC 2 Type II audit, RFPs and annual client diligence requests. Key Responsibilities: Governance, Risk & Compliance. Own Red Oak’s SOC 2 Type II audit program, including control definition, gap assessments, evidence gathering, and renewals. Respond to customer RFPs, security questionnaires, and vendor risk reviews. Guide implementation and alignment with frameworks like NIST Cybersecurity. Framework (CSF), ISO 27001, and GDPR/CCPA. Maintain and evolve security policies, training programs, and internal documentation. Partner with Legal, Sales, and Engineering to ensure contractual and regulatory security obligations are met. Security Operations & Testing. Lead ongoing vulnerability management, penetration testing coordination, and threat modeling. Monitor security risks across infrastructure, application, and third-party services. Build or integrate with a lightweight Security Operations Center (SOC) model, including incident response playbooks and post-incident analysis. Drive adoption of security automation, alerting, and monitoring tools. Product & Application Security. Partner with Engineering on secure development practices, including code reviews, dependency scanning, and CI/CD hardening. Participate in architecture reviews to ensure secure-by-default system design. Help enforce PII handling standards, encryption policies, and access controls in line with privacy regulations. Strategy, Metrics & Leadership. Define and evolve Red Oak’s security roadmap, including tool selection, team growth, and control maturity. Track and report on key security KPIs (e.g., patch compliance, audit control health, incident response time). Represent Red Oak’s security posture to customers, partners, and executive stakeholders. Build and lead a security team over time as business needs grow. Skills & Qualifications 7+ years of experience in information security roles, with at least 2+ years in a leadership or principal-level position. Proven experience managing SOC 2 Type II or equivalent audit processes from end to end. Strong understanding of cloud-native security principles (especially AWS), infrastructure-as-code, and web application security. Familiarity with frameworks like NIST CSF, ISO 27001, and GDPR/CCPA. Experience coordinating penetration testing, vulnerability scanning, threat modeling, and secure CI/CD workflows. Excellent communication skills with both technical teams and external stakeholders. Certifications such as CISSP, CISM, or OSCP are highly preferred. Preference experience with security tools like AWS Security Hub, Snyk, Burp Suite, Terraform Sentinel, or Open Policy Agent (OPA). Familiarity with PCI-DSS, especially in the context of integrating with third-party payment providers is highly preferred Previous experience building or scaling a security program in a B2B SaaS product company is ideal.

Posted 4 weeks ago

Election Systems & Software logo
Election Systems & SoftwareMillard, NE
Description Election Systems & Software (ES&S) is located in Omaha, Nebraska. ES&S is the leading provider of voting machines and systems in North America. OUR VISION: Our vision at ES&S is simple and unwavering - we provide products and services of exceptional quality and value to maintain voter confidence and enhance the voting experience. INTERNSHIP PROGRAM DESCRIPTION: This is a full-time, 12-week internship from May 18 to August 7, 2026. Summer interns typically work from 8:00 am-5:00 pm, Monday through Friday - approximately 40 hours per week. While contributing to department initiatives, interns will also engage in educational experiences that help prepare them for workplace life. EDUCATIONAL BACKGROUND: Junior or senior undergraduate students majoring in Computer Science fields will be considered for this internship. COMPENSATION: $22 per hour LOCATION: On-site at our office in Omaha, Nebraska. This is not a remote opportunity. PROFESSIONAL EXPECTATION: ES&S views the Internship Program as a professional learning opportunity. Interns will be held to the same professional standards as all full-time employees. Interns are involved in division, team, and project meetings, take on tasks that impact department goals, and learn new skills. SUMMARY/OBJECTIVE: A technical internship with Information Systems offers an opportunity to get hands-on experience in the creation and configuration of business solutions. Interns will be given the opportunity to solve real world problems through software engineering. Interns will learn how to understand an issue, design a plan, and build a solution. SKILLS REQUIRED: Solid Understanding of Object Oriented Programming Knowledge of major IDEs (Visual Studio, VS Code, Eclipse, etc) Experience in at Least One Major Language (C#, Java, JS, Python, etc) Understanding of SQL Syntax (Queries, DDL, DML,DCL) Experience in Oracle or MS Sql Server Excellent Communication Skills Strong Microsoft Office Skills Creative Thinking Strong interest in learning and self-development. Be a self-starter. JOB FUNCTIONS: Create Sql Queries Design Reports Create ERP Configurations Create Restful API Write Technical documentation Election Systems & Software, LLC is an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, color, creed, religion, national origin, ancestry, citizenship status, age, sex or gender (including pregnancy, childbirth and pregnancy-related conditions), gender identity or expression (including transgender status), sexual orientation, marital status, military service and veteran status, physical or mental disability, genetic information, or any other characteristic protected by applicable federal, state or local laws and ordinances. Election Systems & Software, LLC's management team is dedicated to this policy with respect to recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, access to facilities and programs and general treatment during employment.

Posted 3 days ago

K2 Space logo
K2 SpaceLos Angeles, California
K2 Space is building large, high-powered spacecraft for the next generation of space development. Backed by Lightspeed Venture Partners, Altimeter Capital, and many others ($200M raised to date) , we intend to mass produce the highest-powered satellite platforms ever built for missions across LEO to Deep Space. The rise of launch vehicles like Falcon 9 and Starship enables the move from an era of mass constraint to one of mass abundance. We believe this new era requires spacecraft with a fundamentally different design in order to fully utilize the massive rockets coming to market. We’re a team that believes the future lies in building large, high-powered satellites that can handle multiple orbits. This is a necessity if we ever want to develop the solar system, and become a Kardashev Type II (K2) civilization. If you are a motivated individual who thrives in a fast-paced environment and you're excited about contributing to the success of a groundbreaking Series B space startup, we’d love for you to apply. The Role As an Information Systems Security Manager (ISSM) at K2 Space you will oversee and maintain compliance with cybersecurity regulations and best practices for our space systems and infrastructure. The ISSM will be responsible for developing, implementing, and managing security policies, risk assessments, and security controls to protect classified and unclassified information systems. Our ideal candidate is self-motivated and able to coordinate with our national security stakeholders to meet their unique requirements for safeguarding classified information across the spectrum of sensitivities from controlled unclassified information to top secret special access programs. K2 Space is a fast-paced startup environment and as ISSM you must be able to quickly adapt and implement solutions in a dynamic workplace. Responsibilities Ensure compliance with NIST, RMF, and other relevant cybersecurity frameworks. Develop, implement, and enforce information security policies and procedures. Conduct risk assessments, vulnerability analyses, and security audits. Manage security authorization packages and maintain system accreditation. Work closely with IT, engineering, program management and government agencies to ensure secure operations. Provide security training and awareness programs for employees. Investigate and respond to security incidents and implement corrective actions. Qualifications Bachelor’s degree in cybersecurity, IT, or a related field (or equivalent experience). 5+ years working information assurance for national security systems Experience with NIST 800-53, RMF, and other DoD cybersecurity policies. Strong understanding of system security architecture and risk management. Experience as an ISSM, ISSO, or ISSE Active TS/SCI Clearance Exceptional written and verbal communication skills Nice to Have CISSP, CISM, or similar certification. Experience standing up new secure networks at a commercial organization (SCI or SAP). Experience obtaining Authority to Operate (ATO) of an operational aerospace system (satellite, aircraft, etc) Compensation and Benefits: Base salary range for this role is $120,000 - $180,000 + equity in the company Salary will be based on several factors including, but not limited to: knowledge and skills, education, and experience level Comprehensive benefits package including unlimited paid time off, medical/dental/vision coverage, life insurance, paid parental leave, and many other perks If you don’t meet 100% of the preferred skills and experience, we encourage you to still apply! Building a spacecraft unlike any other requires a team unlike any other and non-traditional career twists and turns are encouraged! If you need a reasonable accommodation as part of your application for employment or interviews with us, please let us know. Export Compliance As defined in the ITAR, “U.S. Persons” include U.S. citizens, lawful permanent residents (i.e., Green Card holders), and certain protected individuals (e.g., refugees/asylees, American Samoans). Please consult with a knowledgeable advisor if you are unsure whether you are a “U.S. Person.” The person hired for this role will have access to information and items controlled by U.S. export control regulations, including the export control regulations outlined in the International Traffic in Arms Regulation (ITAR). The person hired for this role must therefore either be a “U.S. person” as defined by 22 C.F.R. § 120.15 or otherwise eligible for a federally issued export control license. Equal Opportunity K2 Space is an Equal Opportunity Employer; employment with K2 Space is governed on the basis of merit, competence and qualifications and will not be influenced in any manner by race, color, religion, gender, national origin/ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability or any other legally protected status.

Posted 3 weeks ago

Geisinger logo
GeisingerDanville, Pennsylvania
Location: Geisinger Medical Center (GMC) Shift: Days (United States of America) Scheduled Weekly Hours: 40 Worker Type: Regular Exemption Status: No Job Summary: Processes all requests for the release of medical information contained in patients’ electronic medical record and any legacy medical record information the organization owns and maintains. Job Duties: Processes requests for information from patient health record. Validate compliance with a properly executed authorization or request with Pennsylvania State and Federal Privacy Regulations to determine compliance. Reviews and selects information within all medical record formats according to patient or patient’s legal representative’s request. Able to review and identify hyper-protected health information and additional requirements needed for appropriate disclosure. Obtains clarification of the medical information requesting writing where appropriate. Process requests for medical information related to continuation of care, disability, payment review. Maintains computer log of requests and current status of request using release of medical information software. Receives, reviews, validates and processes all requests for medical information for the organization with all State and Federal regulation related to all legal requests such as attorney requests, subpoenas, court orders, and search warrants. Assists medical staff with identification of information needed by requestor and coordinates completion. Prepares encrypted compact disks to provide to patient or 3rd party as required. Acts as liaison with internal and external customers such as patient, executors, power of attorney, attorneys, or other 3rd party requestors and answer specific questions related to government regulations and disclosure policies. Uses multitude of computer programs including, but not limited to, Microsoft programs, electronic health record, legacy electronic medical record systems, microfilm, paper, and off-site storage requests Work is typically performed in an office environment. Accountable for satisfying all job specific obligations and complying with all organization policies and procedures. The specific statements in this profile are not intended to be all-inclusive. They represent typical elements considered necessary to successfully perform the job. *Relevant experience may be a combination of related work experience and degree obtained (Associate’s Degree = 2 years; Bachelor’s Degree = 4 years). Position Details: Education: High School Diploma or Equivalent (GED)- (Required) Experience: Minimum of 2 years-Relevant experience* (Required) Certification(s) and License(s): Skills: Communication, Computer Literacy, Customer Service, Mathematics, Organizing OUR PURPOSE & VALUES: Everything we do is about caring for our patients, our members, our students, our Geisinger family and our communities. KINDNESS: We strive to treat everyone as we would hope to be treated ourselves. EXCELLENCE: We treasure colleagues who humbly strive for excellence. LEARNING: We share our knowledge with the best and brightest to better prepare the caregivers for tomorrow. INNOVATION : We constantly seek new and better ways to care for our patients, our members, our community, and the nation. SAFETY: We provide a safe environment for our patients and members and the Geisinger family. We offer healthcare benefits for full time and part time positions from day one, including vision, dental and domestic partners. Perhaps just as important, we encourage an atmosphere of collaboration, cooperation and collegiality. We know that a diverse workforce with unique experiences and backgrounds makes our team stronger. Our patients, members and community come from a wide variety of backgrounds, and it takes a diverse workforce to make better health easier for all. We are proud to be an affirmative action, equal opportunity employer and all qualified applicants will receive consideration for employment regardless to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or status as a protected veteran.

Posted 3 days ago

R logo
ReaDublin, Ohio
Description Rea is a growing Top 100 business advisory & accounting firm providing our clients services in tax, accounting, and business consulting. We have a ‘People First’ culture and we focus on our employees’ well-being and professional development. With over 400 professionals and locations throughout Ohio, our firm has a culture that respects a work-life balance for our team. We also provide competitive compensation and a robust benefits plan. The Information Security Manager is responsible for overseeing and improving the firm’s information security program to protect systems, data, and infrastructure. This role focuses on managing security risk, compliance, incident response, and continuous improvement of security posture. The Information Security Manager collaborates cross-functionally with IT and other business and practice areas to implement effective security controls and foster a culture of security awareness. Responsibilities Develop, implement, and maintain the firm’s information security program and initiatives roadmap Develop, implement, maintain, and monitor security policies, procedures, and standards in alignment with industry best practices and regulatory requirements Conduct regular risk assessments, vulnerability scans, and security reviews to identify and mitigate potential threats and vulnerabilities Identify, build, and implement data protection processes and technologies Work with the firm’s third-party service providers to help manage firm information security risk Coordinate the firm’s incident response efforts, including investigation, documentation, communication, and post-incident analysis Evaluate and recommend security tools and technologies to enhance protection and visibility Manage the third-party risk program, including vendor security assessments and reviews Maintain compliance with applicable laws, regulations, and contractual obligations by leading audits, gap analyses, and remediation efforts Lead security awareness training initiatives and phishing simulations to educate employees and promote secure behavior Collaborate with IT teams to ensure secure configuration and management of systems, networks, and cloud environments Track, report, and present security metrics to leadership and stakeholders Serve as the internal subject matter expert on cybersecurity, privacy, and data protection Other duties as assigned Knowledge, Skills, and Abilities Expert-level understanding of information security risks and controls, including the zero-trust model Advanced knowledge of information security audit and assessment methodologies and best practices Expert-level knowledge of information security frameworks, risk management, and incident response Strong experience with security tools and platforms (e.g., vulnerability scanners, firewalls, endpoint protection) Strong understanding of security principles in cloud (e.g., Azure, AWS), on-prem, and hybrid environments Thorough understanding of compliance programs (e.g., SOC 2, HIPAA) Ability to stay current with emerging technologies and architectures Solid understanding of IT enterprise architecture in a security context Highly self-motivated Exceptional written, oral, interpersonal, and presentational skills Strong analytical and trouble-shooting abilities Keen attention to detail Ability to effectively prioritize and participate in simultaneous projects of moderate to high complexity Knowledge of analysis, requirements gathering, and industry best practices and tools Ability to effectively communicate between business and IT stakeholders Ability to use discretion and handle confidential information Requirements Post-secondary education in the field of computer science, information systems, networking, information security, or related discipline 5+ years of full-time work experience in cybersecurity, information security, or information technology preferred Preferred: CISSP, CISM, CISA, Security+ certification Benefits Rea offers a wide variety of benefits to help support our employees' health, wellness and financial goals. Health Care Plan (Medical, Dental & Vision) Retirement Plan (401k) Life Insurance (Basic, Voluntary & AD&D) Paid Time Off (Vacation, Sick & Holidays) Four (4) weeks PTO Twelve (12) paid holidays, of which three (3) are floating holidays Family Leave (Maternity, Paternity) Short Term & Long Term Disability Training & Development Wellness Resources Rea does not accept unsolicited resumes from individual recruiters or third-party recruiting agencies without pre-approval from Rea’s Talent team. Pre-approval is required before any external candidate can be submitted. Rea will not be responsible for fees related to unsolicited resumes and for candidates who are sent directly to our hiring managers.

Posted 1 week ago

NexThreat logo
NexThreatAlexandria, Virginia
Job Title: The Information System Security Officer (ISSO) Location: Alexandria , VA, remote Job Category: Information Technology Time Type: Full-time Clearance Requirement: No clearance required Employee Type: W2 or 1099 Citizenship: US Citizen, no Dual Citizenship NexThreat is seeking an Information System Security Officer (ISSO). The perfect candidate will be responsible for overseeing the security of information systems within the organization. The ISSO ensures compliance with applicable security policies and regulations, including but not limited to the Risk Management Framework (RMF) and various cybersecurity standards. This position demands a proactive approach to risk management and incident response within a cloud computing environment. Key Responsibilities: Provide Risk Management Framework (RMF) Support · Maintain and renew existing Impact Level 4 (IL4) cloud ATO. · Update records in the Enterprise Mission Assurance Support Service (eMASS), CWBI Hub, and Confluence to include system management information, security controls, implementation plans, control status continuous assessments, and a continuous monitoring plan. · Analyze Personally Identifiable Information (PII) and Controlled Unclassified Information (CUI) within CWBI and prepare Privacy Impact Assessments and System of Record Notices (SORN). · Maintain and update Record Management Surveys (RMS) and supporting documents. · Coordinate with SCA-V or DoD Continuous Monitoring program for assessments. · Perform post-assessment actions, including creating a Plan of Action and Milestones (POA&M), Security Assessment Reports (SAR), and coordinating finalized authorization decisions with USACE CIO/G-6 and the Authorizing Official. · Facilitate CWBI change management activities utilizing standard DevSecOps solutions. · Track change management items from reception to completion. · Conduct security impact assessments for proposed changes. · Analyze CWBI modules for configuration changes using automated means. · Establish and maintain baseline hardware and software configurations, as well as documentation for ports, protocols, and services management (PPSM). · Update CWBI system documentation in eMASS, Army Portfolio Management Solution (APMS), CWBI Hub, and Confluence as required. Provide Tier 3 Cyber Security Service Provider (CSSP) Support · Conduct Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), and Army Endpoint Security Solution (AESS) scanning. · Coordinate system access for necessary scans. · Compile and analyze monthly vulnerability reports, categorizing impact levels and assisting CWBI PMO in prioritizing work to mitigate risks. · Provide code vulnerability testing, dynamic code scanning, and cloud storage management services compatible with tools such as Burp Suite, Cloudberry, and ThunderScan, ensuring any licenses are the property of USACE. · Conduct Security Content Automation Protocol (SCAP), Security Technical Implementation Guide (STIG), and Federal Risk and Authorization Management Program (FedRAMP) analyses. · Perform quarterly SCAP and STIG assessments and analyze results for impacts/risks. · Upload results into eMASS and assist CWBI PMO with risk prioritization. · Continuously monitor system security events via logging and monitoring tools. · Process event log notifications and create service tickets for appropriate technical groups. · Track service ticket resolutions until successful completion. Qualifications · Bachelor's degree in Computer Science, Information Systems, or a related field. · Relevant certifications (e.g., CISSP, CISM, Security+) preferred. · Proven experience in cybersecurity, RMF, or a related field. · Familiarity with cloud security compliance requirements and configurations. · Strong analytical and problem-solving skills.

Posted 30+ days ago

A logo
American Financing CorporationAurora, Colorado
Compensation: $200 to $300k base plus bonus potential for up to $400k total comp annually Prefer local candidates but are open to considering strong remote applicants as well At American Financing, we're innovators with imagination. We do what it takes to help customers achieve their financial goals. And we stay ahead of the competition by challenging ourselves to become more efficient. We are one of the fastest-growing national mortgage lenders because we don't follow the status quo. See what it's like to work for a national mortgage lender that truly values its employees. Wherever your passions lie, you can find rewarding work and new opportunities here. Casual work environment Hybrid schedule for local employees Family-owned, Customer-focused Denver Post Top Workplace Top 50 Family-Owned Business Best of Colorado Business Inc. 5000 Fastest-growing Private Company Job Summary The Chief Information Officer (CIO) will develop, plan, and implement a forward-looking information technology (IT) strategy that aligns with American Financing’s mission, drives efficiency, and delivers strong return on investment—while ensuring security, compliance, and resilience. This senior leadership role is not for a first-time CIO. We are seeking a proven executive technology leader with deep experience in financial services, mortgage, banking, or FinTech. The CIO will shape the company’s technology future, build and lead high-performing teams, and serve as a trusted partner to the executive team. Key Responsibilities Develop and execute a technology roadmap that supports company growth and innovation. Lead and inspire large, cross-functional teams across engineering, product, systems, information security, QA, and IT support. Oversee efficient modernization, upgrades, and operational stability of all systems. Collaborate with the executive team to align technology with business and financial goals. Ensure compliance with government regulations, industry standards, and information security requirements. Lead business continuity, disaster recovery, and risk management practices. Partner in vendor management and contract negotiations to maximize ROI. Manage the IT budget and conduct cost-benefit analyses to guide investments. Stay ahead of emerging technologies, assessing their potential to improve operations and customer experiences. Required Skills & Abilities Excellent verbal and written communication skills. Excellent managerial and leadership skills, with ability to inspire and scale teams. Strong conceptual ability to set long-term business goals and design orderly processes to achieve them. Thorough understanding of information technology systems, architecture, and security practices. Proficiency with Microsoft Office Suite or equivalent productivity tools. Education & Experience Master’s degree in Business Administration, Computer Science, or Information Technology required. At least 10 years of progressive leadership experience in information systems/technology. Minimum 5–10 years of executive-level leadership, including prior experience as a CIO or equivalent. Proven success leading technology teams in financial services, banking, mortgage, investment, or FinTech. Experience with Agile Software Development Life Cycle. Background in vendor management, contract negotiation, and delivering complex technology initiatives. Technical Background (Preferred) Experience with modern frameworks (e.g., .NET or similar). Familiarity with cloud platforms (AWS, Azure, GCP). Proficiency with containerization and orchestration (Docker, Kubernetes). Exposure to enterprise service bus architecture. Experience with contact center, CRM, and loan management systems. Familiarity with generative AI and emerging technologies. WHAT WE BRING Medical, Dental, Vision, 401k Paid time off and sick days Paid holidays Long-term paid disability Paid maternity and bonding leave Full desk equipment provided American Financing Corporation (AFC) is an Equal Opportunity Employer. AFC does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis protected by law. All employment is decided on the basis of qualifications, merit and business need.

Posted 3 weeks ago

Strategic Data Systems logo
Strategic Data SystemsDahlgren, VA
Senior Information Management Specialist Dahlgren Naval Surface Warfare Center, Dahlgren, VA Salary negotiable (Dependent on experience level) - Full Time with Benefits Flexible Start-Date – Contingent on contract award Strategic Data Systems (SDS) is seeking an experienced Information Management Specialist (Data Governance) to support a DoN customer. Strategic Data Systems is an experienced technical solutions provider for the Navy, Marine Corps, DoD, and other federal customers. Our mission is to provide exceptional technical capabilities, management, and support to the warfighter. Requirements High School degree required. Bachelor’s degree strongly preferred Secret clearance or above (T3/T3R investigation) Six (6) years of professional experience in a broad-base Automatic Data Processing (ADP) services environment. CompTIA Security+ with an Operating System (OS) certification or equivalent IAT II compliant certifications Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. Knowledge of key decision-support needs and questions to drive prioritization of data efforts. Skill in labeling data to make it more discoverable and understandable. Responsibilities Develops and maintains plans, policies, and processes for data management, data governance, security, quality, accessibility, use, and disposal. Support establishing and implementing a comprehensive data architecture, the design and engineering of consolidated and consistent data management solutions, development and deployment of data integration analytics solutions, and the design and development of end-user data visualization capabilities. Provide lifecycle support of software, applications, endpoints, and cybersecurity artifacts. This requires analysis, design, development, deployment and user support, and operations and maintenance of ISs, business applications, and supporting integrating capabilities. his shall include products such as Data Warehouse, business applications, visualizations, documentation, and supporting integrating capabilities such as interfaces to standard systems and special analyses and studies related to IT, IM, and IS capabilities Consult with customers and key stakeholders to evaluate functional requirements for AI and data applications. Review feedback on customer satisfaction and internal service performance to foster continual improvement. Assist integrated project teams to identify, curate, and manage data. This will have a CWF designation at 424 Work Role Code with the proficiency level of Intermediate or higher Strategic Data Systems provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.

Posted 30+ days ago

Barbaricum logo

Information Assurance Compliance Specialist – Navy Systems Audit & STIG Enforcement

BarbaricumPhiladelphia, Pennsylvania

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Barbaricum is a rapidly growing government contractor providing leading-edge support to federal customers, with a particular focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the latest in technology and the highest caliber of talent.

Headquartered in Washington, DC's historic Dupont Circle neighborhood, Barbaricum also has a corporate presence in Tampa, FL, Bedford, IN, and Dayton, OH, with team members across the United States and around the world. As a leader in our space, we partner with firms in the private sector, academic institutions, and industry associations with a goal of continually building our expertise and capabilities for the benefit of our employees and the customers we support. Through all of this, we have built a vibrant corporate culture diverse in expertise and perspectives with a focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team.

Barbaricum is seeking a Compliance Specialist to support cybersecurity and assurance activities across Navy enterprise systems. This role will provide STIG enforcement, vulnerability assessment, and secure configuration guidance to maintain accreditation and cyber readiness.

 

Responsibilities:

  • Conduct vulnerability scans and analysis for Windows and Linux/UNIX systems
  • Enforce STIG controls and implement corrective actions for audit findings
  • Collaborate with system owners to assess security postures and compliance status
  • Develop and maintain IA documentation packages for Navy cybersecurity environments
  • Participate in accreditation and re-accreditation cycles
  • Support privileged and non-privileged user access control evaluations as required

 

Qualifications:

  • Active DoD Secret clearance; TS eligible
  • Bachelor’s degree or qualifying CNSSI/military training certification
  • 3+ years of experience in IA Compliance (Specialty Area 61)
  • Certification required: CCNA, CAP, Security+ (CE), or ENSA
  • Familiarity with NAVEDTRA watch station evaluation pathways
  • Commitment to maintaining 40+ hours of cybersecurity continuing education annually

 

EEO Commitment

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall