landing_page-logo
  1. Home
  2. »All Job Categories
  3. »Security Jobs

Auto-apply to these security jobs

We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Information Systems Security Officer (Isso)-logo
Information Systems Security Officer (Isso)
Contact Government ServicesFargo, ND
ISSO Employment Type: Full-Time, Experienced Department:Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success: Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. Maintain responsibility for managing cybersecurity risk from an organizational perspective. Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership. Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies. Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO). Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes. Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF. Provide subject matter expertise for cyber security and trusted system technology. Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems. Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring. Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications: Bachelor's Degree. A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc. eMASS experience. Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher. Strong desktop publishing skills using Microsoft Word and Excel. Experience with industry writing styles such as grammar, sentence form, and structure. Ability to multi-task in a deadline-oriented environment. Ideally, you will also have: CISSP, CASP, or a similar certificate is preferred. Master's Degree in Cybersecurity or related field. Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking. Demonstrated ability to work well independently and as a part of a team. Excellent work ethic and a high commitment to quality. Our Commitment: Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. Health, Dental, and Vision Life Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board: https://cgsfederal.com/join-our-team/ For more information about CGS please visit: https://www.cgsfederal.com or contact: Email: info@cgsfederal.com $92,213.33 - $125,146.66 a year

Posted 30+ days ago

Sentinel Principal Systems Security Engineer -14306-logo
Sentinel Principal Systems Security Engineer -14306
Northrop GrummanColorado Springs, CO
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: Secret TRAVEL: Yes, 10% of the Time Description At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. Northrop Grumman Defense Systems - Sentinel (GBSD) Systems Security Engineering Team (SSE) is seeking a highly motivated and qualified Principal Systems Engineer (Level 3) for Program Protection and Supply Chain Risk Management. You will be responsible for performing system security threat assessments and risk mitigation for the overall program, supply chain elements, processes, and actors and provide results. This position is located in Colorado Springs, CO and may offer a competitive relocation package. Specific duties to include, but are not limited to the following: Designs and implements security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Establishes and implements system security designs; additionally, you will assess and mitigate system security threats and risks throughout the program life cycle. Validates system security requirements definition and analysis. Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities. Execute completion Statement of Work requirements, Program Milestone Exit Criteria, and program maturity commitments. Self-starters compelled to act in the workplace without requiring prompting from supervisors. Support MDT with other duties as assigned. Travel: 10% In addition to technical skills, you will be a self-starter with strong time management skills. Your organizational skills and ability to anticipate future challenges will serve you well. Basic Qualifications: Bachelor's degree in a Science, Technology, Engineering or Mathematics (STEM) discipline from an accredited university and 5 years of experience with Bachelor's degree, 3 years of experience with Master's degree, or 1 year of experience with a PhD. Must be a US Citizen with an active DoD Secret Clearance with an investigation date within the last 6 years Must be able to be successfully screened for Enhanced Security Clearances, within a reasonable amount of time as determined by the company to meet its business needs Minimum 3 years of applying and understanding Systems Security Engineering principles applicable to US Government Defense and/or US Military Programs. Minimum 3 years of experience with any of the following: operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Minimum 3 years in researching, interpreting, and developing mitigations for threats and vulnerabilities. Minimum 3 years in showing the ability to communicate effectively and clearly present technical approaches and findings. Preferred Qualifications: Active Top-Secret clearance with SAP Access. Direct experience with Intercontinental Ballistic Missile Systems. Direct Experience applying Program Protection principles to US Government Defense Programs and applied knowledge in the application of SSE principles across a broad spectrum of security measures (Cybersecurity, Counterfeit Awareness, Anti-Tamper, HW/SW Assurance, OPSEC, etc.) to protect critical program information (CPI) Experience developing Systems Security Engineering requirements for hardware and software assurance Experience with Risk Management (identification and development of risks) and driving risk mitigations to closure. Experience with assessment and analysis of threats, vulnerabilities, and risk for identified mission-critical functions and critical components. Experience with Model-based Systems Engineering (MBSE) concepts and tools (CAMEO, DOORS) Direct experience conducting supply chain risk management and/or program protection. Demonstrated experience with vulnerability management. Knowledge of acquisition threat analysis and protection initiatives for acquisition programs. Military Intelligence, Law Enforcement, or other USG Intelligence agency experience preferred. Position Benefits: As a full-time employee of Northrop Grumman, you are eligible for our robust benefits package including Medical, Dental & Vision coverage Educational Assistance Life Insurance Employee Assistance Programs & Work/Life Solutions Paid Time Off Health & Wellness Resources Employee Discounts This positions standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off. This role may offer a competitive relocation assistance package. #Sentinelsystems Salary Range: $81,300.00 - $115,900.00 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business. The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates. Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit http://www.northropgrumman.com/EEO . U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.

Posted 30+ days ago

Security - Officer PT-logo
Security - Officer PT
Bally's CorporationAtlantic City, NJ
Why Bally's? Bally's Corporation is a global casino-entertainment company with a growing omni-channel presence, currently owning and managing 15 casinos across 10 states, a golf course in New York, a horse racetrack in Colorado, and having access to OSB licenses in 18 states. The recent acquisition of Aspers Casino in Newcastle, UK, further expands its international footprint and enhances its diverse entertainment offerings. It also owns Bally's Interactive International, formerly Gamesys Group, a leading, global, interactive gaming operator, Bally Bet, a first-in-class sports betting platform, and Bally Casino, a growing iCasino platform. With 10,600 employees, the Company's casino operations include approximately 15,300 slot machines, 580 table games, and 3,800 hotel rooms. Bally's also has rights to developable land in Las Vegas post the closure of the Tropicana. Upon completion of the announced merger with The Queen Casino & Entertainment Inc. ("Queen"), the above portfolio is expected to be supplemented with four additional casinos across three states, one of which will be an additional state that expands Bally's jurisdiction of operations to include the state of Iowa. Queen will also add over 900 employees, and operations that currently include approximately 2,400 slot machines, 50 table games, and 150 hotel rooms to the Bally's portfolio. Bally's will also become the successor of Queen's significant economic stake in a global lottery management and services business through its investment in Intralot S.A. (ATSE: INLOT). The Role: Performs duties in compliance with all company and regulatory regulations and requirements. Responsibilities: Maintains an upbeat and positive attitude, creates positive energy with gestures and sustains enthusiasm from one interaction to the next. Creates an atmosphere of luck and celebrates guests' wins. Is ready to serve and is informed of daily information; builds relationships by greeting guests with a warm, friendly verbal greeting. Anticipates needs and provides fast, flawless service. Checks for satisfaction and effectively resolves service breakdowns when they exist. Promotes programs and card membership. Provides a warm farewell and thanks guests for visiting. Enforces company security/safety regulations. Guards transfer of money and chips. Performs all security/safety related duties for Casino/Hotel. Represents company and its property to ensure all Casino regulations are adhered to at all times. Operates motorized vehicle, i.e., company van. Participates in the supervision, operation and/or support the multi-casino Bad Beat system. Other duties as assigned. Qualifications: Interpersonal and communication skills. Physically able to stand and walk for long periods of time regardless of weather conditions. Must have a valid NJ State Driver's License. CPR certified or the ability to obtain certification required. What's in it for you: Competitive Salary with annual performance reviews Comprehensive health coverage plan that includes medical, dental, and vision 401(K)/ Company Match Access Perks and Childcare discounts Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice. Let Bally's Bet on You - We can't wait to meet you! Premier is an equal opportunity employer subject to the rules and regulations of the NJDGE".

Posted 30+ days ago

Court Security Officer, Grand Junction, CO-logo
Court Security Officer, Grand Junction, CO
Walden SecurityGrand Junction, CO
Walden Security is currently recruiting experienced Court Security Officers. CSOs will provide armed security to courthouses under the USMS contract. Essential Duties and Responsibilities: Includes the following and other duties may be assigned: Perform entrance control: Enforce the District's entry and identification system which includes operating security screening equipment to detect weapons, contraband, and prohibited items, checking items such as handbags, briefcases, computers, packages, baby carriages, wheelchairs, etc. Perform roving patrol: Patrol court facilities and grounds of the facility in accordance with applicable post orders. Perform stationary post assignments: Stand guard at stationary posts which include (but not limited to) monitoring closed-circuit television, duress alarm systems and other security equipment, courtrooms, judge chambers, and jury rooms. Perform escort duties: When directed, provide armed escort services for judges, court personnel, jurors, and other designated individuals. Perform garage parking and pedestrian control: Where applicable, direct traffic and control lights on court facility properties, as described in the post orders and/or standard operating procedures. Enforce law and order: Enforce federal law while in the performance of assigned duties. This includes (but not limited to) detaining any person attempting to gain unauthorized access to Government property, or a court proceeding(s), or attempting to commit acts that imperil the safety and security of Government employees, property, and the public. Prepare reports and records: Prepare various reports and records regarding contract performance issues, such as labor hours worked, accidents, fire, bomb threats, unusual incidents, or unlawful acts that occurred within the court facility area. Court attendance: Responsible for securing unattended courtrooms, an inspection of courtrooms prior to a proceeding, testing of security devices, and other duties concerning security of the court area. Preserve order: Responsible for providing security presence in the courtroom, enforcing federal law and judicial orders within the courtroom, enforcing local court rules regarding prohibited items, and providing protection to court proceedings as circumstances dictate. Requirements Education and/or Experience: High school diploma or general education degree (GED). At least three (3) calendar years of verifiable experience as a certified law enforcement officer or its military equivalency (Master-at-Arms, CGPD, Security Forces Specialist, etc.); all three (3) years must have occurred within the last seven (7) years. The experience must have included general arrest authority. Language Skills: Must have the ability to read, write, speak, and understand English. Must possess the ability to understand, explain, interpret, and apply rules, regulations, directives, and procedures. Certificates, Licenses, Registrations: Must have a valid driver's license from state of residency and a safe driving record for the past five years; Must receive clearance from the Department of Justice. Must have completed or graduated from certified Federal, state, county, local or military law enforcement training academy and able to provide certification as proof. Other Qualifications: Must be at least 21 years of age; Ability to pass a pre-employment drug screen and criminal background check. Physical Demands: Must meet medical standards as specified by the United States Marshal Service (USMS); The physical demands are based on the contract and must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. "Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws. " EOE/AAP/Minorities/Females/Vet/Disabled VEVRAA Federal Contractor #CourtSecurity #PriorLawEnforcement #FederalServices

Posted 30+ days ago

Network Security Engineer-logo
Network Security Engineer
Sub-Zero and WolfCedar Rapids, IA
This is an onsite opportunity and can be located at one of the following sites: Fitchburg, WI, Cedar Rapids, IA or Goodyear, AZ Sub-Zero, Wolf, and Cove the leading manufacturer of luxury kitchen appliances is a longstanding, family-owned company in the Madison area. Icons of design and paragons of performance and quality, Sub-Zero, Wolf, and Cove are the refrigeration, cooking, and dishwashing specialists found in world's most luxurious homes. We look for team members who are driven by innovation and excellence, striving to serve our customers by doing what is right-with integrity, teamwork, and accountability. The Sub-Zero Information Security Team works closely together to mitigate threats and reduce risk to the organization. This position reports to the Sr. IT Manager - Security and will align with other Network Security Engineers and our Security Architect. Growth and development are important aspects of this position. Whether you aspire to be a leader or a technical expert, this position will set you up for success in the future. Primary Responsibilities Deploy, manage, and maintain security systems and their corresponding or associated software, including firewalls, intrusion detection systems and network access control systems Proactively monitor firewall and other logs Respond to alerts and alarms Participate in the design and execution of vulnerability assessments, penetration tests and security audits Develop standards for the network team to follow for secure configuration of networking equipment Assess security issues, develop resolutions, and analyze trends for ways to prevent future problems Participate in the planning and design of enterprise security architecture Interact and negotiate with vendors, outsourcers, and contractors to obtain services and products Develop and audit Public Cloud network security controls and architecture Assist in creation of security policies We value our employees by providing: Competitive compensation based on skills Industry leading health, dental, and vision plans Generous 401 (K) savings and profit sharing On-site UW Health clinic, fitness center, and walking paths Education assistance and internal training programs Electric vehicle charging Maternity & paternity leave Interested in learning more on our robust benefits package we offer? Click here! This position requires a pre-employment drug/alcohol test and background check, which will be administered after a conditional job offer is extended. A negative drug/alcohol test result is required for employment. Refusal to take the test or a positive result may disqualify a candidate from further consideration. All drug testing will be conducted in accordance with federal and state laws.

Posted 1 week ago

Cybersecurity Officer- Manager Cloud Security-logo
Cybersecurity Officer- Manager Cloud Security
Metropolitan Transportation AuthorityNew York, NY
Position at MTA Headquarters JOB TITLE: Cybersecurity Officer- Manager Cloud Security SALARY RANGE: $144,450.00 - $191,000.00 HAY POINTS: 805 DEPT/DIV: Information Technology / Cybersecurity SUPERVISOR: Cybersecurity Director LOCATION: Various/ 2 Broadway New York, NY 10004 HOURS OF WORK: 9:00 am - 5:30 pm (7.5 hours or as required) This position is eligible for telework which is currently two day per week. New hires are eligible to apply 30 days after their effective date of hire. Summary of Job The purpose of this position is to provide technical leadership and management of MTA's cyber security program in one or more technical domains. This role deals with both internal and external threats to the MTA systems which can affect both safety of employees and customers, system integrity, and availability of operations. As part of managing the program, the Cybersecurity Officer will need expertise in managing a complex program with highly skilled staff, contracts, and processes associated with risk management that are essential to maintaining electronic and physical safety for MTA's business in all areas that utilize technology (Corporate, Customer Facing and Informational, Fare Payment/PCI, Operational Technologies, 3rd Party Managed, Vendors, etc.). The Cybersecurity Officer will be responsible for managing and developing staff, technology, and processes to reduce risk with the evolved cyber threat landscape and changing technology portfolio. This position works across multiple technology and cybersecurity domains to ensure cybersecurity is looked at holistically from user, data and component, and systems perspectives. The position also considers all risk assessments, data driven analytics, and actively seeks to develop and maintain standards, reference architectures, and reduce risk of the MTA through emerging technologies and trends in the industry. The position is expected to have a level of expertise in one or more domains of technology effective management. There is a long list of these specialized domains in the cybersecurity field and this list is growing and everchanging as the field evolves and as risks and circumstances change. Preferred skills: Cloud security expertise Cybersecurity knowledge Risk assessment and management Compliance and regulations knowledge Identity and Access Management (IAM) Encryption and data protection Incident response and forensics Security architecture Security monitoring and SIEM Cloud-specific security tools Communication and leadership Vendor management Continuous learning Collaboration Problem-solving Business acumen Adaptability Knowledge of cloud-native application platforms Project management principles Cloud computing proficiency Responsibilities Leadership Provide leadership to a strong talent pool of technical professionals Lead a team of multi-functional technical staff planning, building, and maintaining cybersecurity tools, configurations and risk mitigation to support Information and Operational Technology applications and/or infrastructure products Lead others, as appropriate, and when necessary, that will consist of one or more agile coaches, data analytic researchers and other cybersecurity personnel provide leadership in development of inter-team communication and cohesiveness; sustain culture and supporting assigned staff during organizational growth/changes. Provide direction on evaluation, selection, implementation, and maintenance of cybersecurity tools, processes, and techniques for their assigned cyber domains and products, ensuring appropriate investment in strategic and operational systems. Leads teams to complete projects when a project manager has not been assigned. Attain significant achievements managing technical teams, contractors and vendors. Human Resource Management Attract, develop, coach and retain high-performance team members, empowering them to elevate their level of responsibility, span of control and performance in conjunction with the Cybersecurity Management and IT Workforce Planning & Workload Management office. Build staff expertise and competence to meet evolving demands within the Enterprise Product Management unit. Financial Management Demonstrate consistent understanding of funding, communications and systems; recommend timelines and resources needed to achieve the program goals. Collaborates with IT Business Management Services to identify procurement contracts to support program related activities. Strategy & Planning Assesses and makes recommendations on the improvement and re-engineering within the IT Department and work with the stakeholders at keeping the total cost of ownership down. Promote the use of employee self -service and mobile connectivity within products to reduce the reliance of paper. Recommends and supports automation of business process creating in-line forms and approvals, reducing the reliance on manual approvals that could be untimely. Uses judgment to form conclusions that may challenge conventional wisdom Acquisition & Deployment Coordinates and facilitates consultation with stakeholders to define business and systems requirements for new technology implementations, developing business case and cost justifications for such initiatives. Provides direction on evaluation, selection, implementation and maintenance of information systems, ensuring appropriate investment in strategic and operational systems. Advises MTA IT management, as information becomes available, in the changing trends and emerging technology and their potential use within the MTA. Directs the development of the analysis required to determine if Information Technology projects should follow a "Build" (develop with in-house staff) or "Buy" (cloud or packaged solution) methodology. Manages the development and implementation of new modules within assigned products. Advises on the selection, prioritization, development and implementation on products as they relate to the selection, acquisition, development, and installation of MTA IT and OT Security, applications and infrastructure. Management and Oversight Participates in overall business planning bringing a current knowledge and future vision of technology and systems as related to the company's goals. Responsible for leading and reporting on various product progress and deliverables ensuring that the IT/OT needs of the MTA are met on time and within budget, including identifying weekly, monthly and annual performance targets to show progress on IT product work and OT objectives. Ensure continuous delivery of product services through oversight of service level agreements with end users and monitoring of product performance. Responsible for the recruitment, development, motivation, training and retention of a diverse and high performing multi-level IT/OT team professionals, conforming to budgetary objectives and Human Resources policy and programs in conjunction with the IT Workforce Planning & Workload Management office. Develop business case justifications and cost/benefit analyses for IT spending and initiatives keeping customizations to a minimum and total cost of ownership down. Cybersecurity Officer-Specific Accountabilities Planning Manage and plan the future technical architecture, providing insight into the future of their area of technology in order to continually improve effectiveness and efficiency. Manage and plan the development of roadmaps related to their area(s) of expertise to manage and meet identified technology needs. Manage and plan the evaluation of new technologies relative to their domain(s) to determine applicability to and best meet the needs of MTA and constituent agencies. Manage and ensure disaster recovery and contingency plans for their domain(s) to provide users with minimal interruptions in service. Architecture Oversees architectural direction for domains under management to meet senior management and cybersecurity goals. Understand, review, and approve Cybersecurity Reference Architectures and Solutions for applying them Revalidates systems to most recent reference architectures to determine gaps, develop and manage programs to align systems to newest standards and reference architectures Contracts/Vendor Management Contribute and own technical elements of RFPs and RFIs and negotiates with vendors on technical issues to ensure results are delivered in line with user and organization requirements. Manages contracts and expenses to ensure SLAs and contract renewals are processed timely Provide contract management support to ensure vendor deliverables are met Manage and lead major projects and assigned service providers with technical expertise to address mission critical issues, evaluates ongoing vendor service level and enforces SLAs and penalties. Documentation Ensure detailed and updated documentation is in place for cybersecurity systems and user processes. Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate. Guidance, Communications and Training Support Provides timely and relevant updates to appropriate stakeholders and decision makers Communicates investigation findings to relevant business units to help improve the information security posture Provides technical guidance to project managers and senior leadership on cybersecurity and technology strategies Ensure quality and review and guidance on tests of new systems and manage cybersecurity risks and remediation system testing, baseline, and best practices Provide escalation support to project teams in their area of expertise to promote technical understanding and talent development Provide guidance and take input from Analysts, Engineers, Architects and Technology Subject Matter Experts on cybersecurity and technology best practices, current threat landscape, and a risk management approach for optimal alignment Provides sound cybersecurity recommendations Operations Provide leadership and advisement when necessary during incident response and provide continuous improvement updates to threat model for risks to the business and systems Ensure specific monitoring points are continually updated to assess performance of technologies in their domain(s). Identify and manage the necessary actions to ensure optimal performance and reliability. Research & Analysis Validates and maintains incident response plans and processes to address potential threats Compiles and analyzes data for management reporting and metrics Research emerging technologies and process improvements to stay current and plan for evolving threat landscape to ensure strategy meetings current threats Monitors relevant information sources to stay up to date on current attacks and trends Ensure cybersecurity technology solutions meet strategy meets security framework objectives and business objectives. Hypothesizes new threats and indicators of compromise Qualifications: Experience Bachelor's Degree in Computer Science or related fields or equivalent experience. An equivalent combination of education and experience may be considered in lieu of degree. CISSP, CISM, or other advanced security-related certification preferred Certifications in technology subdomains preferred (ie. Cloud, Applications, Infrastructure, Security Technology, etc.). A minimum of 4 plus years of relevant experience. Requires prior experience with installing, maintaining and troubleshooting technology systems. Experience in Project Management Principles (Waterfall and Agile) preferred. Competencies Must possess a deep understanding of technology and cybersecurity domain principles. Proven ability to manage projects and initiatives. Proven ability to manage people. Proven ability to add value to a team. Understanding of Operating Systems, Cloud, Mobile, and Applications. Understanding of TCP/IP (OSI Layers 1- 4) and Internet and Intranet technologies required (OSI Layers 5-7) required. Some Scripting or programming skills (PERL, Python, PowerShell, etc.) preferred as needed. Proficient in Productivity Tools (ie. Office 365, Gsuite). Experience with Spreadsheets and Data Analysis. Successful track record in design of software systems to meet the current and future needs of a complex organization OR successful track record in design and implementation of IT Infrastructure and related hardware and software technologies to meet the current and future needs of a complex transportation organization. Strong Verbal/written communications skills. Financial/budgeting planning and management experience a plus. Ability to fit in with the constant shifting needs and demands of the business Departments. Core Competency Proficiency Level Competency Definition Collaborates Expert Building partnerships and working collaboratively with others to meet shared objectives Cultivates Innovation Expert Creating new and better ways for the organization to be successful Customer Focus Expert Building strong customer relationships and delivering customer-centric solutions Communicates Effectively Expert Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences Tech Savvy N/A Anticipating and adopting innovations in business-building digital and technology applications Technical Skills N/A Specialized knowledge and expertise on tools, programs, domains, platforms, and products used for specific tasks Values Diversity Expert Recognizing the value that different perspectives and cultures bring to an organization GENERAL: May need to work outside of normal work hours (i.e., evenings and weekends) Travel may be required to other MTA locations or other external sites Pursuant to the New York State Public Officers Law & the MTA Code of Ethics, all employees who hold a policymaking position must file an Annual Statement of Financial Disclosure (FDS) with the NYS Commission on Ethics and Lobbying in Government (the "Commission"). MTA and its subsidiary and affiliated agencies are Equal Opportunity Employers, including with respect to veteran status and individuals with disabilities. The MTA encourages qualified applicants from diverse backgrounds, experiences, and abilities, including military service members, to apply.

Posted 30+ days ago

Senior IT Security Engineer-logo
Senior IT Security Engineer
First Horizon Corp.New Orleans, LA
Location: On site in Memphis, TN, Maryville, TN, Birmingham, AL, Lafayette, LA, New Orleans, LA, Charlotte, NC, Raleigh, NC, or Dallas, TX We will not provide sponsorship for this role. Job Summary: The Senior IT Security Engineer will be responsible for protecting the company's information systems from internal and external threats. This person will support the IT Security Engineering Manager to ensure proper security functions are maintained to protect company and customer data. This position enables the company to meet its business objectives by increasing the security of the company's Hybrid Network while lowering the risk of misuse of information and denial of service. Essential Duties and Responsibilities: Design, implement and manage network security infrastructure (firewalls, IDS/IPS, load balancers, web proxies, etc.) Design, implement and manage cloud security solutions Work with vendors concerning security and network access requirements. Implement appropriate network access and ensure network security. Assess current and proposed network designs and proactively makes recommendations based on business requirements and security best practices. Conduct periodic audits of new and existing implementations to ensure compliance with corporate security standards. Develop technical solutions and execute measures to help mitigate security vulnerabilities and automate repeatable tasks. Education and/or Work Experience Requirements: Bachelor's degree in computer science, information systems, cyber security or a related field preferred but not required Active Information Security certifications (CISSP, SANS GIAC, etc.) preferred 5+ years of experience in cyber security / information security with emphasis on cloud and on-premises network security infrastructure in a high availability, high-capacity environment. Hands on experience in information security systems, including firewalls, intrusion detection/prevention systems, authentication systems, log management, web proxy / content filtering, Security Service Edge, etc. Extensive cloud security experience, especially focused on Microsoft Azure. Knowledge of infrastructure as code (IAC) tools like Terraform, Crossplane and Azure Resource Manager. Familiarity with containerization technologies (e.g., Docker, Kubernetes, Azure Container Instances). Advanced knowledge of cloud and on-premises network security standards/best practices, design, and implementation. Problem solving skills and ability to work under pressure Excellent communication skills both oral and written to clearly communicate with business partners and management. About Us First Horizon Corporation is a leading regional financial services company, dedicated to helping our clients, communities and associates unlock their full potential with capital and counsel. Headquartered in Memphis, TN, the banking subsidiary First Horizon Bank operates in 12 states across the southern U.S. The Company and its subsidiaries offer commercial, private banking, consumer, small business, wealth and trust management, retail brokerage, capital markets, fixed income, and mortgage banking services. First Horizon has been recognized as one of the nation's best employers by Fortune and Forbes magazines and a Top 10 Most Reputable U.S. Bank. More information is available at www.FirstHorizon.com. Benefit Highlights Medical with wellness incentives, dental, and vision HSA with company match Maternity and parental leave Tuition reimbursement Mentor program 401(k) with 6% match More -- FirstHorizon.com/First-Horizon-National-Corporation/Careers/Our-Benefits Follow Us Facebook X formerly Twitter LinkedIn Instagram YouTube

Posted 3 weeks ago

Triage Security Analyst - Intern-logo
Triage Security Analyst - Intern
Arctic Wolf NetworksPleasant Grove, UT
At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award. We're proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers' Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRN's Products of the Year award in the inaugural Security Operations Platform category. Join a company that's not only leading, but also shaping, the future of security operations. Our mission is simple: End Cyber Risk. We're looking for a Triage Security Analyst- Intern to be part of making that happen. About the Role The Triage Security Analyst Intern (TSA) is a first level Security Operations Center role, supporting our security services globally. The TSA Intern assesses inbound security data and communications, dealing with straightforward tasks and escalating to our Security Engineers as needed. This role also leverages network troubleshooting skills to assist customers in finding resolutions to their technical issues. Our TSA Interns work 20 hours per week onsite in our Pleasant Grove office. Responsibilities As a TSA Intern you will: Understand IT infrastructure and networking to be able to identify security incidents with the help and guidance of senior security engineers Triage customer requests, apply playbook driven solutions, initiate potential incident investigations through assignment to security engineers Effectively dispatch both security and communication triage events to the correct people in a timely manner Understand the processes and systems Arctic Wolf uses, this will be critical in helping the team handle customer requests Identifying new runbooks required to aid in expanding the knowledge of the team Continuously drive to learn new aspects of the security business Review customer configurations to ensure that the system is operating effectively. Resolve any issues that you find problematic leveraging documented procedures and playbooks Troubleshoot and resolve operational health of sensors and scanners in customer environments Investigate end-point agent installation and operational issues Resolve cloud sensor configuration and communication issues Who You Are Security basics with a demonstrated passion for networking and cybersecurity Customer facing experience in any fashion with strong communication skills and easily interact with a variety of different people and personalities Attention to process and a willingness to learn Recently completed, or within a semester of completing, a degree in Computer Science or Cyber Security discipline OR 2 years in the IT industry with cyber interest Preferred Qualifications Malware Network Routing and Switching Virtual environment experience with VMware or Hyper-V Firewalls and IDS/IPS Linux, Windows, Mac operating systems Windows and Active Directory Cloud technologies including AWS, Azure MCSE or Active Directory MCP certificates TCM PSAA, CompTIA Security +, Network +, A+ desirable You will be required to attend trainings, seminars or webinars relevant to job role to enhance current knowledge base and skill set in order to improve job performance and efficiency. Arctic Wolf Networks is a 24×7 work environment and our TSA Interns are critical in developing exciting new talent for our team. You will work with your manager to create a consistent and predictable schedule. This internship is an opportunity to grow your cyber knowledge with intent. Full-time career progression opportunities exist, encouraging development into a Security Analyst role; a shift work rotating position including 12 and 8 hour days, nights, and weekend shifts 24x7x365. About Arctic Wolf At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work- USA (2021-2024), Great Place to Work- Canada (2021-2024), Great Place to Work- UK (2024), and Kununu Top Company- Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry. Our Values Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that-by protecting people's and organizations' sensitive data and seeking to end cyber risk- we get to work in an industry that is fundamental to the greater good. We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here. We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities. Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing recruiting@arcticwolf.com. Security Requirements Conducts duties and responsibilities in accordance with AWN's Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies). Background checks are required for this position. This position may require access to information protected under U.S. export control laws and regulations, including the Export Administration Regulations ("EAR"). Please note that, if applicable, an offer for employment will be conditioned on authorization to receive software or technology controlled under these U.S. export control laws and regulations.

Posted 2 weeks ago

Senior Cloud Security Engineer (Remote)-logo
Senior Cloud Security Engineer (Remote)
Progressive LeasingOhio, IL
Progressive Leasing is a leading provider of in-store and e-commerce lease-to-own solutions. As an almost 20+ year old FinTech company that has gone from start-up to industry leader, we know how to innovate, simplify, and value all people. We are a company founded on our grit and we are constantly looking to the future. As an ever-evolving group of entrepreneurs and technologists, we strive to do the right thing period in all aspects of our work. We are a subsidiary of PROG Holdings (NYSE: PRG), an exciting FinTech holding company, with three business segments including Progressive, Vive Financial, and Four, a Buy Now Pay Later (BNPL) platform. We are seeking a Senior Cloud Security Engineer to drive the development, implementation, and management of cloud security strategies. You will play a critical role in designing, implementing, and maintaining robust security controls across our cloud environments (AWS, Azure). You'll collaborate with DevOps, Engineering, and Compliance teams to build secure-by-design solutions and continuously improve our cloud security. If you thrive in both strategic planning and hands-on execution, we want to hear from you! This role is a work from home position and can be performed remotely anywhere in the continental US or in our corporate headquarters in Utah. Your Day-to-day: Support the development and enforcement of cloud security policies, standards, and governance processes. Create solutions and processes to identify, resolve and mitigate cloud security risk. Lead the implementation of cloud security controls, ensuring compliance with best practices and industry standards. Ensure comprehensive logging, monitoring, and alerting coverage for cloud-based workloads and services. Evaluate and support both 3rd party and cloud native security capabilities to enhance visibility and protection. Collaborate with Security Operations on cloud incident response efforts and threat detection tuning. Perform threat modeling and security reviews for new and existing cloud services. Monitor and assess cloud security risks, ensuring adherence to compliance standards (NIST, SOC 2, PCI DSS). Work cross-functionally with IT to enhance cloud security. Collaborate with DevOps teams to integrate automation of security controls into CI/CD pipelines (DevSecOps). Design cloud security metrics, dashboards, and reporting for senior leadership. Advocate for cloud security best practices across the organization. You'll Bring: 5+ years of experience in cloud security, infrastructure security, or a related field. Deep expertise with AWS preferred. Strong understanding of automation tools and infrastructure-as-code (Terraform, CloudFormation, etc.). Hands-on experience with CNAPP and other related 3rd party cloud security capabilities. Familiarity with cloud-native security services (e.g., AWS GuardDuty, Azure Defender). Strong knowledge of IAM, network security, encryption, data protection, and logging and monitoring best practices in AWS and Azure. Experience with container security (Kubernetes, Docker, EKS). Exposure to governance and policy development aligned with standards like NIST, SOC 2, PCI DSS, or CIS Benchmarks. Strong problem-solving skills and ability to lead cloud security initiatives independently. Excellent communication skills to present cloud security insights to technical and non-technical stakeholders. Why Join Us Enterprise Impact- Partnering to develop cloud security strategy and influence security at scale. Collaborative Culture- Join a team that offers the opportunity to collaborate with outstanding people, while promoting innovation and security best practices. Gain well rounded experience- Progressive Leasing offers a diverse and dynamic environment where you will get the chance to work across multiple areas of the business. What We Offer Fully Remote Competitive Compensation Full Health Benefits; Medical/Dental/Vision/Lif Insurance + Paid Parental Leave Company Matched 401k Paid Time Off + Paid Holidays + Paid Volunteer Hours Employee Resource Groups (Black Inclusion Group, Women in Leadership, PRIDE, Adelante) Employee Stock Purchase Program Tuition Reimbursement Charitable Gift Matching Progressive Leasing welcomes and encourages diversity in the workplace. We do not discriminate in any aspect of employment on the basis of race, color, religion, national origin, ancestry, gender, sexual orientation, gender identity and/or expression, age, veteran status, disability, or any other characteristic protected by federal, state, or local employment discrimination laws where Progressive Leasing does business.

Posted 4 weeks ago

Senior Product Security Engineer II-logo
Senior Product Security Engineer II
Credit KarmaCharlotte, NC
Intuit Credit Karma is a mission-driven company, focused on championing financial progress for our more than 140 million members globally. While we're best known for pioneering free credit scores, our members turn to us for everything related to their financial goals, including identity monitoring, applying for credit cards, shopping for insurance and loans (car, home and personal) and savings accounts and checking accounts* - all for free. Credit Karma has grown significantly through the years: we now have more than 1,700 employees across our offices in Oakland, Charlotte, Culver City, San Diego, London, Bangalore, and New York City. Banking services provided by MVB Bank, Inc., Member FDIC As a Product Security Engineer, you will conduct security reviews, and design and prototype new tooling and features across the organization. You will work with architects and engineering teams to guide the implementation of secure practices across different areas like cloud, API, applications and mobile devices. You will provide training in security best practices, and enforce our policies and standards. You will identify trends and risks across multiple platforms, and engage with senior leadership to provide action plans and strategy. What You'll Do: Provide security expertise for cloud, web and mobile projects, helping teams meet the enterprise and IT security policies, industry regulations, and best practices. Implement company-wide programs that deploy security patterns and controls across applications and computing environments, together with business resiliency, privacy, and compliance frameworks. Work with security and engineering teams to maintain a security architecture that provides security controls throughout all platforms to mitigate risk, and to meet goals and regulatory requirements. Ensure the quality of our applications and products by guiding them through the Secure Development Lifecycle (SDL) process. Advocate, research, develop new tools to support our security patterns and standards. Monitor our exposure to, and assess the impact of, new security threats, vulnerabilities and risks. What we are looking for: 4+ years' experience in the application security industry, solving security problems in large-scale systems. Experience with security design reviews, and threat-modeling exercises for both traditional and AI systems. Expertise in verifying and measuring common security vulnerabilities, and demonstrated ability in communicating these concepts to your partners in engineering. From the OWASP Top Ten to more advanced concepts, you've seen it before, and can describe it with ease. Familiarity with the responsibilities and workflow of software developers and machine learning engineers. The Product Security team works with engineering to meet both business needs and security requirements. You can speak their language, and sympathize with their challenges. Facility with implementing standards, e.g., PCI-DSS, ISO, OAuth, NIST Cyber Security framework. Basic working knowledge of one or more of the following languages: Java, Scala, Node JS, Typescript, Python, Golang, Rust. Strong knowledge of security frameworks and standards (NIST, CIS, MITRE ATT&CK). What we would like to see: Exposure to most of the following technologies: Google Cloud, iOS, Android, CircleCI, IAM, Snyk, Consul, Kubernetes, Hashicorp Vault, PKI, OPA, React, GraphQL, Thrift, Kafka, and Splunk. Familiarity with AI-specific threats and secure AI development practices. Working familiarity with one or more LLM platforms: GPT, Gemini, Claude, Llama Experience defining security architecture patterns and standards in a large enterprise organization. Knowledge of cryptography including algorithms, standards, and their practical applications such as TLS and HMAC. Experience performing threat modeling of applications to identify potential security issues. Pay Transparency Notice: Credit Karma's mission of championing financial progress for all starts from within. That's why we implemented role-based compensation, which ensures people who are in the same role receive the same pay with variations for geographic location only. It's all part of a more comprehensive DEI strategy that helps level the playing field. The base salary range for this role is $190,000 - $240,000, plus equity and benefits. Benefits at Credit Karma Include: Medical and Dental Coverage Retirement Plan Commuter Benefits Wellness perks Paid Time Off (Vacation, Sick, Baby Bonding, Cultural Observance, & More) Education Perks Paid Gift Week in December Equal Employment Opportunity: Credit Karma is proud to be an Equal Employment Opportunity Employer. We welcome all candidates without regard to race, color, religion, age, marital status, sex (including pregnancy, childbirth, or related medical condition), sexual orientation, gender identity or gender expression, national origin, veteran or military status, disability (physical or mental), genetic information or other protected characteristic. We prohibit discrimination of any kind and operate in compliance with applicable fair chance laws. Credit Karma is also committed to a diverse and inclusive work environment because it is the right thing to do. We believe that such an environment advances long-term professional growth, creates a robust business, and supports our mission of championing financial progress for everyone. We offer generous benefits and perks with a single eye to nourishing an inclusive environment that recognizes the contributions of all and fosters diversity by supporting our internal Employee Resource Groups. We've worked hard to build an intensely collaborative and creative environment, a diverse and inclusive employee culture, and the opportunity for professional growth. As part of the Credit Karma team, your voice will be heard, your contributions will matter, and your unique background and experiences will be celebrated. Privacy Policies: Credit Karma is strongly committed to protecting personal data. Please take a look below to review our privacy policies: GDPR Privacy Policy U.S. Job Applicant Privacy Notice

Posted 1 week ago

Senior Principal Information Systems Security Engineer-logo
Senior Principal Information Systems Security Engineer
Concurrent TechnologiesColumbia, MD
Senior Principal Information Systems Security Engineer Concurrent Technologies Corporation Client Site - Columbia, MD area Minimum Clearance Required: TS/SCI with Fullscope Poly Clearance Level Must Be Able to Obtain: TS/SCI with Fullscope Poly CTC stays ahead of the latest technology advancements so we can help solve our clients' toughest challenges. As a part of the Information Technology (IT) Division, you will be strengthening our team of world-class experts aimed at providing our clients with the most effective solutions. Our expertise in achieving missions is unmatched, and we continue to have a major positive impact throughout the Department of Defense (DoD), Intelligence Community (IC), and beyond. Our IT solutions are at work in high-level, high-priority areas of the DoD and U.S. Government agencies. We are leaders in artificial intelligence and machine learning, cloud architecture and security, cross domain solutions, cybersecurity, edge node technology, synthetic environments, and more. We are honored to be a trusted provider of cutting-edge and customized solutions to our clients for decades. Our experts are leading the rapidly evolving IT industry with innovative work in a variety of disciplines, including DevSecOps, which underpins many of our efforts. With CTC's IT Division, you become part of a dedicated team committed to advancing the ever-growing possibilities in IT and meeting our clients' challenges with up-to-the-minute, customized, and powerful solutions. Key Responsibilities: To protect the interests of national security, cyber incidents must be coordinated among and across DoD organizations and sources outside the Department of Defense, and critical infrastructure and critical infrastructure sector Information Sharing and Analysis Centers (ISACs) via Tier I, Tier II, and Tier III support. CND response services include the actions taken to report, analyze, coordinate, and respond to any event or cyber incident for the purpose of mitigating any adverse operational or technical impact. Cyber incident reporting includes a well-defined framework for the timely reporting of any cyber event or incident. The report provides an accurate, meaningful, and complete understanding of the cyber incident from initial detection to analysis and remediation. This information feeds into the User-Defined Operational Picture, which provides local, intermediate, and DoD wide situational awareness of CND actions and their impact. Cyber incident analysis identifies several critical elements of an incident to determine and characterize its possible effects on DoD information networks, operational missions, and other defense programs. This activity relies on effective acquisition, preservation, and timely reporting of cyber incident data. Cyber incident response includes the coordinated development and implementation of courses of action (CO As) that focus on containment, eradication, and recovery. At the same time, it ensures the acquisition and preservation of data required for tactical analysis, strategic analysis, and/or LE investigations. Basic Qualifications: Bachelor's Degree from an accredited college or university in Computer Science or related discipline and 12 years of directly related experience or a Master's degree and 10 years of directly related experience, or a PhD and 8 years of directly related experience. Fourteen (14) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government is required The Information Systems Security Engineer shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, pro viding feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control DoD 8570 compliance with IASAE Level 2 (i.e. CISSP) is required Preferred Qualifications: Cybersecurity degree AWS Experience Why CTC? Our teams at CTC are passionate and thrive on collaboration in a team environment When we encounter a difficult problem, we have a variety of talented and diverse employees that work together to solve the toughest challenges Competitive salary and benefits package Although our work at CTC is extremely important, we also recognize the need for our employees to maintain a proper mix of work and personal life Visit www.ctc.com to learn more Benefits: The starting salary range for this position has been established as $184,000 - $240,000 Medical Insurance and Prescription Dental Insurance Vision Insurance Life and AD&D Insurance Short-Term/Long-Term Disability Insurance Employee Assistance Program (EAP) Voluntary Critical Illness and Accident Insurance Tuition Reimbursement Assistance Paid Leave Paid Holidays Bereavement Leave Retirement Plan The Concurrent Technologies Corporation pay range for this job level is a general guideline and not a guarantee of compensation or salary. Join us! CTC offers exceptional career growth, cutting edge technology, educational opportunities, and recognition for quality work. https://concurrent-technologies-corporation.breezy.hr/ Staffing Requisition: SR# 2025-0047 "We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, protected veteran status, or any other characteristic protected by law."

Posted 3 weeks ago

Incident Handler Cyber Security-logo
Incident Handler Cyber Security
PeratonFort Huachuca, AZ
Responsibilities Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO - Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E: Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information/point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU/A), Service Level Agreements (SLA).• Cyber Defense Operations (CDO) Support. Provide sufficient staffing to maintain on-site capability IAW PWS paragraph 5.4: Place of Work and Work Hours to work directly with GCC Operations personnel in conducting initial triage/cyber incident analysis to include, review correlated events, system/device logs, and SIEM event data to determine and recommend/take immediate DCO-IDM response actions. Immediate response actions can include submission of a cyber-incident response ticket, making an initial determined category of cyber incident (IAW Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510), and/or notifying DCO/ARCYBER/Higher Headquarters IAW Commander's Critical Information Requirements (CCIR) reporting requirements. All other CDO operations must have an on-call capability to take actions as required to respond to cyber incidents IAW policy and/or Government direction.• Incident Analysis and Mitigation. Provide incident analysis and mitigation support by conducting incident analysis and recommending mitigation measures in response to general or specific Advanced Persistent Threats (APT), (attempted exploits/attacks, malware delivery, etc.) on Army networks. In support of incident analysis and mitigation, the Contractor shall: • Block/deny access by hostile sites or restrict access by specific ports/protocols and/or applications. • Provide recommendations to the supporting operations and maintenance organization to take necessary action where the CSSP-D Division does not administratively control the sensor grid. • Provide justification of IDMs and/or operational impact (implied or accepted risk) to a Configuration Control Board (CCB) and/or Authorizing Official (AO), as required, for mitigation action (IDM) approval. If deemed appropriate (or as requested), the internal defensive measure may involve coordination of a Network Damage Assessment (NDA), Network Assistance Visit (NAVs), or other version of the Computer Defense Assistance Program (CDAP) mission.• Monitor all sensors and agents managed by the GCC for security event analysis and response and maintain/update the triage database with current threat data and response methods in real-time with follow-up recurring within 72 hours of last response. The Contractor shall respond to a detected event and perform triage, ensure proper handling of the associated trouble ticket (TT), and process events accordance with appropriate TTPs.• Provide all initial cyber incident reports to Law Enforcement and Counterintelligence (LE/CI) agencies and:• Maintain an up-to-date POC list for LE/CI agencies as routinely provided by the Major Cybercrimes Unit (MCU) and Cyber Counterintelligence agencies. • In cases where an active investigation will be opened, LE/CI agencies will provide written request that will include the official case number, specific data logs, and other required information IAW local TTPs. • Provide support and expertise include the provision of the required data along with a summary or analysis of the data. Data and answers provided in the analysis shall pertain specifically to requirements in the LE/CI official request or within CSSP-D TTPs. • Provide all initial cyber incident investigation reports to LE/CI .• Maintain a Master Station Log (MSL) to document high visibility cyber incidents, defined as events identified in an ARCYBER Task Order, a Named Operation, or a Category 1 (CAT1), with status, discuss DCO topics, share internal tasks between shifts, document call outs, and share any additional relevant instructions between shifts and up through GCC Leadership and Operations reporting channels. The MSL must be available for Government inspection at any given time to ensure accurate tracking of the above information. Qualifications Basic Qualifications: 9 years w/o BS/BA; 5 years with BS/BA; 3 years with MS/MA; 0 years with PhD Certifications: GIAC Certified Incident Handler AND DCWF code 531 Advanced: Certified Information Systems Security Professional (CISSP) or CompTIA Cybersecurity Analyst (CySA+) or CyberSec First Responder (CFR) or GIAC Certified Forensics Analyst (GCFA) or GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) or GIAC Defensible Security Architecture (GDSA) or GIAC Global Industrial Cyber Security Professional (GICSP) or GIAC Security Essentials Certification (GSEC) or Rocheston Certified Cybersecurity Engineer (RCCE) Level 1 Experience collecting and analyzing event information and performing threat or target analysis. Experience supporting operations related to persistent monitoring on a 24/7 basis of all designated networks, enclaves, and systems. Demonstrated competence in managing and executing first-level responses and addressing reported or detected incidents. Comfort level with reporting to and coordinating with external organizations and authorities. Background in coordinating and distributing directives, vulnerability, and threat advisories to identified consumers. U.S. citizenship required. Possess a Secret Clearance with the ability to obtain a TS/SCI Security Clearnace. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position based on experience and other factors. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.

Posted 30+ days ago

Security Officer II-logo
Security Officer II
West Virginia University Health SystemMartinsburg, WV
Welcome! We're excited you're considering an opportunity with us! To apply to this position and be considered, click the Apply button located above this message and complete the application in full. Below, you'll find other important information about this position. Provides a safe and secure environment for employees, patients, visitors, and property. Secures premises and personnel by patrolling property and monitoring systems and inspecting buildings. Works to prevent losses and damage by reporting irregularities and maintaining order. MINIMUM QUALIFICATIONS: EDUCATION, CERTIFICATION, AND/OR LICENSURE: High school diploma or equivalent Valid Driver's license. Obtain Defensive Tactics, OC Spray, Baton, and Taser certifications within 6 months of hire and maintain. EXPERIENCE: One (1) years of experience in Security field. PREFERRED QUALIFICATIONS: EDUCATION, CERTIFICATION, AND/OR LICENSURE: Associate's Degree with an emphasis on security management or criminal justice. EXPERIENCE: One (1) year experience in a healthcare security environment. CORE DUTIES AND RESPONSIBILITIES: The statements described here are intended to describe the general nature of work being performed by people assigned to this position. They are not intended to be constructed as an all-inclusive list of all responsibilities and duties. Other duties may be assigned. Communicates daily with security supervisor and/or other hospital personnel providing awareness of current activities, security needs and problem areas. Performs Security patrols of hospital buildings and grounds to work at preventing fire, theft, vandalism, and unauthorized entry. Manages security violations appropriately, calling for appropriate assistance when needed. Responds to requests for assistance from hospital personnel, students and visitors, e.g. available at shift changes to escort employees to designated parking areas. Assists with restraining violent patients or violent visitors using the appropriate use of force. Participates in investigations and interacts with police force, maintains records and prepares incident reports when indicated by the incident reporting procedure. Unlocked doors found during routine security patrols are secured and entered into computer log. Offices and areas are unlocked when requested if appropriate. Handles emergency and crisis situations effectively and efficiently. Safety and security of helicopter landing pad is maintained; when not in use area is kept clear and when in use area is kept clear of traffic and visitors. In addition, loading dock and emergency room entrance are always kept clear of obstruction. Responds to all burglary and duress alarms. Communicates and interacts with patients, families, visitors, physicians, departmental and hospital staff and the public in general in a manner that demonstrates professionalism and concern for the individuals' need(s). Ensures that all information relating to security and parking policies and communicated to all patients, visitors and staff. PHYSICAL REQUIREMENTS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Able to bend, stoop, reach and be capable of normal rotation, standing and walking for up to a 12-hour shift. Must be able to meet the Department of Labor's Medium Work Standard - Medium work involves lifting/exerting no more than 50 pounds at a time with frequent lifting or carrying of objects weighing up to 25 pounds. WORKING ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Ability to tolerate working with and around noxious odors. May be required to travel between facilities/buildings. May be scheduled to work various shifts based on departmental and patient needs. May frequently be exposed to outside weather conditions. SKILLS AND ABILITIES: Good communication and organizational skills. Additional Job Description: Scheduled Weekly Hours: 40 Shift: Exempt/Non-Exempt: United States of America (Non-Exempt) Company: BMC Berkeley Medical Center Cost Center: 608 BMC Security Address: 2500 Hospital Drive Martinsburg West Virginia Equal Opportunity Employer West Virginia University Health System and its subsidiaries (collectively "WVUHS") is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws. WVUHS strictly prohibits and does not tolerate discrimination against employees, applicants, or any other covered persons because of race, color, religion, creed, national origin or ancestry, ethnicity, sex (including gender, pregnancy, sexual orientation, and gender identity), age, physical or mental disability, citizenship, past, current, or prospective service in the uniformed services, genetic information, or any other characteristic protected under applicable federal, state, or local law. All WVUHS employees, other workers, and representatives are prohibited from engaging in unlawful discrimination. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, training, promotion, discipline, compensation, benefits, and termination of employment.

Posted 1 week ago

Named Account Executive, Salesforce National Security-logo
Named Account Executive, Salesforce National Security
Salesforce.com, Inc.Herndon, VA
To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts. Job Category Sales Job Details About Salesforce We're Salesforce, the Customer Company, inspiring the future of business with AI+ Data +CRM. Leading with our core values, we help companies across every industry blaze new trails and connect with customers in a whole new way. And, we empower you to be a Trailblazer, too - driving your performance and career growth, charting new paths, and improving the state of the world. If you believe in business as the greatest platform for change and in companies doing well and doing good - you've come to the right place. About Salesforce: Salesforce, the Customer Success Platform and world's #1 CRM, empowers companies to connect with their customers in a whole new way. The company was founded on three disruptive ideas: a new technology model in cloud computing, a pay-as-you-go business model, and a new integrated corporate philanthropy model. These founding principles have taken our company to great heights, including being named one of Forbes's "World's Most Innovative Company" seven years in a row and #1 on the FORTUNE '100 Best Companies to Work For' List. We are the fastest growing of the top 10 enterprise software companies, and this level of growth equals incredible opportunities to grow a career at Salesforce. Together, with our whole Ohana (Hawaiian for "family") made up of our employees, customers, partners and communities, we are working to improve the state of the world. Department and Role Description: Department Description: Computable Insights LLC, referred to as "Salesforce National Security"(SNS), is a wholly-owned subsidiary of Salesforce. SNS is Salesforce's contracting entity dedicated to the US Intelligence Community and US National Security market, and in this capacity is a major component of Salesforce's Global Public Sector. Salesforce Global Public Sector has dedicated teams supporting Federal Civilian Agencies, State & Local Agencies, the Department of Defense, and Government Contractors in addition to SNS.As an SNS Account Executive, you would be a key member of a team responsible for generating new business with specified US Intelligence Community customers. Your Impact: You will collaborate with your teammates and work closely with your customers as a trusted advisor to deeply understand their unique challenges and goals. You will consult with customers on the value of them using Salesforce Platform and evangelize solutions that will help them reach their goals and blaze new trails within their organizations. You will contribute to our business growth in a fast paced, collaborative and fun atmosphere, as a valued member of our Ohana focused on the National Security market. Roles & Top Qualifications: Strategic Account Executives must have 10+ years of quota carrying software or technology sales, account management and Enterprise-level sales experience and must have a proven track record with supporting the US Intelligence Community. A bachelor's degree is required and an advanced degree is strongly preferred. Qualification for this job is contingent upon acceptable results from a background investigation and maintaining the specific level U.S. government background investigation required for this role. All offers of employment are contingent upon Government approval of your TS/SCI with polygraph security clearance. We are looking for the following attributes: Consultative selling experience Prospecting Skills Strong Communication Skills Strong Business Acumen Has a competitive spirit Ability to collaborate Resourceful Coachable Drive for results Ability to work in fast-paced, team environment Strong Executive Presence Experience articulating ROI Solution Selling Ability Strong Discovery Skills Objection Handling Skills Planning and Closing Skills This candidate must be a U.S. citizen (U.S. born or naturalized) who does not hold dual citizenship and agrees to complete a U.S. federal government Minimum Background Investigation (MBI) for a Moderate Public Trust position. Accommodations If you require assistance due to a disability applying for open positions please submit a request via this Accommodations Request Form. Posting Statement Salesforce is an equal opportunity employer and maintains a policy of non-discrimination with all employees and applicants for employment. What does that mean exactly? It means that at Salesforce, we believe in equality for all. And we believe we can lead the path to equality in part by creating a workplace that's inclusive, and free from discrimination. Know your rights: workplace discrimination is illegal. Any employee or potential employee will be assessed on the basis of merit, competence and qualifications - without regard to race, religion, color, national origin, sex, sexual orientation, gender expression or identity, transgender status, age, disability, veteran or marital status, political viewpoint, or other classifications protected by law. This policy applies to current and prospective employees, no matter where they are in their Salesforce employment journey. It also applies to recruiting, hiring, job assignment, compensation, promotion, benefits, training, assessment of job performance, discipline, termination, and everything in between. Recruiting, hiring, and promotion decisions at Salesforce are fair and based on merit. The same goes for compensation, benefits, promotions, transfers, reduction in workforce, recall, training, and education.

Posted 3 weeks ago

Security Officer-logo
Security Officer
Children's Healthcare Of AtlantaAtlanta, GA
Note: If you are CURRENTLY employed at Children's and/or have an active badge or network access, STOP here. Submit your application via Workday using the Career App (Find Jobs). Work Shift Variable Work Day(s) Shift Start Time Shift End Time Worker Sub-Type Regular Children's is one of the nation's leading children's hospitals. No matter the role, every member of our team is an essential part of our mission to make kids better today and healthier tomorrow. We're committed to putting you first, and that commitment is at the heart of our company culture: People first. Children always. Find your next career opportunity and make a difference doing what you love at Children's. Job Description Manages the collaboration infrastructure and solutions to include design, planning, installing, troubleshooting, testing, monitoring, reporting, maintaining, and supporting in accordance with IS&T standards and industry best practices. Part of a team that is responsible for designing, developing, and maintaining a scalable, highly available collaboration and voice infrastructure, that meets the business objectives and identified SLAs. Multiple shifts available at multiple campus locations Experience 2 years of experience in security, law enforcement, fire, military, safety, EMS, or customer service Preferred Qualifications Some college Education High school diploma or equivalent Certification Summary Valid Georgia driver's license with clean driving record. at applicable location Heartsaver CPR or BLS CPR at orientation or within 3 months of employment Successfully pass crisis prevention and handcuffing training within 12 months of employment International Association for Healthcare Security and Safety basic certification within 6 months of employment Knowledge, Skills, and Abilities Excellent oral and written communication skills Ability to write complete, accurate, and concise incident reports Ability to function independently of constant supervision Ability to provide sound judgment and confidentiality in handling of sensitive information Attention to detail and organization Calm under stress Problem-solving Empathic listening Alertness and Observation Knowledge of Microsoft Word and the use of a personal computer Job Responsibilities Patrols assigned location on foot or in vehicle, checking and reporting irregularities of security and safety issues, policy compliance, parking concerns, and other important matters. Preserves order and may act to enforce regulations and directives for the hospital pertaining to personnel, visitors, patients, and premises. Protects evidence or scene of incident in the event of accidents, emergencies, or security investigations. Responds and acts as first responder to incidents of fire, medical emergencies, bomb threat, flooding, hazardous materials, inclement weather, and other incidents. Responds and intervenes in high stress crisis situations such as officer/medical staff needing assistance, patient elopement, physical assaults, behavioral health de-escalations and abductions. Assists Division of Family and Children Services, Risk Management, Safety, Nursing, Administration, law enforcement, and social workers in the protection and safety of personnel, patients, visitors, and property. Investigates incidents reported by employees, visitors, physicians, and patients and reports all incidents verbally or through incident reports by end of shift. Writes accurate, clear, concise, and grammatically correct incident reports and documents investigatory steps and results. Children's Healthcare of Atlanta is an equal opportunity employer committed to providing equal employment opportunities to all qualified applicants and employees without regard to race, color, sex, religion, national origin, citizenship, age, veteran status, disability or any other characteristic covered by applicable law. Primary Location Address 1571 Northeast Expy NE Job Family Security

Posted 30+ days ago

Cyber Security Threat Intelligence Analyst II-logo
Cyber Security Threat Intelligence Analyst II
Early Warning Services, LLCScottsdale, AZ
At Early Warning, we've powered and protected the U.S. financial system for over thirty years with cutting-edge solutions like Zelle, Paze℠, and so much more. As a trusted name in payments, we partner with thousands of institutions to increase access to financial services and protect transactions for hundreds of millions of consumers and small businesses. Positions located in Scottsdale, San Francisco, Chicago, or New York follow a hybrid work model to allow for a more collaborative working environment. Candidates responding to this posting must independently possess the eligibility to work in the United States, for any employer, at the date of hire. This position is ineligible for employment Visa sponsorship. Overall Purpose The Cyber Security Threat Intelligence Analyst II is part of a high-performance team, responsible for monitoring and analyzing internal and external threats facing the company networks and correlating those threats into actionable items for the organization. The core responsibility of this position is to better position the company against threats that are both unknown and known. Essential Functions Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of analyzing threats. Maintains awareness of current threat landscape, including adversary tactics, techniques, and procedures. Manages Threat Intelligence tools and configures and tunes alerting on known IOC matching Analyzes malware and large data sets to isolate trends and patterns; responds to alerts and provides recommendations to improve company's security posture. Escalates complex issues as needed. Performs network/system/application/log intrusion detection analysis to complement threat research Performs moderately complex analysis of potentially malicious activities and software Maintains awareness of trends in security, regulatory, technology, and operational requirements Creates documentation such as procedures and intelligence briefs and analysis on current threat trends and landscapes relevant to Early Warning Systems Represents the Security Operations team at internal and external threat intelligence and cybersecurity forums Performs on-call activities when required Ensures the company's commitment to protect the integrity and confidentiality of systems and data. Minimum Qualifications Education and/or experience typically obtained through completion of a Bachelor's degree or 2 year degree in Computer Science, Engineering, Math or Physical Science. Minimum 4 years of information security technology experience Proven analytical skills across various technologies Intermediate understanding of Networking and security concepts Intermediate understanding of Windows, Linux/Unix and Mac Operating Systems Intermediate understanding of Adversarial Tactics, Techniques and Common Knowledge framework (MITRE) and other threat modeling frameworks Working knowledge of Tool, Tactics and Procedures (TTPs) used by APT groups Experience with the incident response process Experience in tracking campaigns Experience in responding to malicious threats coming from various sources Ability to work within a team environment as well as independently Effective communication skills to speak and write for all technology experience levels. Effective interpersonal skills, able to comfortably present to peers, coworkers, and customers A propensity for continued development of skills though research and training Background and drug screen. Preferred Qualifications Additional related education, certifications and/or experience is beneficial Working experience in cloud technology security Experience utilizing Security Orchestration Automation Response (SOAR) tools The above job description is not intended to be an all-inclusive list of duties and standards of the position. Incumbents will follow instructions and perform other related duties as assigned by their supervisor. Physical Requirements Working conditions consist of a normal office environment. Work is primarily sedentary and requires extensive use of a computer and involves sitting for periods of approximately four hours. Work may require occasional standing, walking, kneeling and reaching. Must be able to lift 10 pounds occasionally and/or negligible amount of force frequently. Requires visual acuity and dexterity to view, prepare, and manipulate documents and office equipment including personal computers. Requires the ability to communicate with internal and/or external customers. Employee must be able to perform essential functions and physical requirements of position with or without reasonable accommodation. The pay scale for this position in: Phoenix, AZ/Chicago, IL in USD per year is: $115,000 - $130,000 New York, NY/San Francisco, CA in USD per year is: $125,000 - $145,000 This pay scale is subject to change and is not necessarily reflective of actual compensation that may be earned, nor a promise of any specific pay for any specific candidate, which is always dependent on legitimate factors considered at the time of job offer. Early Warning Services takes into consideration a variety of factors when determining a competitive salary offer, including, but not limited to, the job scope, market rates and geographic location of a position, candidate's education, experience, training, and specialized skills or certification(s) in relation to the job requirements and compared with internal equity (peers). The business actively supports and reviews wage equity to ensure that pay decisions are not based on gender, race, national origin, or any other protected classes. Additionally, candidates are eligible for a discretionary bonus, and benefits Some of the Ways We Prioritize Your Health and Happiness Healthcare Coverage- Competitive medical (PPO/HDHP), dental, and vision plans as well as company contributions to your Health Savings Account (HSA) or pre-tax savings through flexible spending accounts (FSA) for commuting, health & dependent care expenses. 401(k) Retirement Plan- Featuring a 100% Company Safe Harbor Match on your first 6% deferral immediately upon eligibility. Paid Time Off- Unlimited Time Off for Exempt (salaried) employees, as well as generous PTO for Non-Exempt (hourly) employees, plus 11 paid company holidays and a paid volunteer day. 12 weeks of Paid Parental Leave Maven Family Planning - provides support through your Parenting journey including egg freezing, fertility, adoption, surrogacy, pregnancy, postpartum, early pediatrics, and returning to work. And SO much more! We continue to enhance our program, so be sure to check our Benefits page here for the latest. Our team can share more during the interview process! Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. Early Warning Services, LLC ("Early Warning") considers for employment, hires, retains and promotes qualified candidates on the basis of ability, potential, and valid qualifications without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote equal employment opportunity and affirmative action, in accordance with all applicable federal, state, and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our employees.

Posted 4 days ago

Security Guard Per Diem-logo
Security Guard Per Diem
The Highlands at WyomissingWyomissing, PA
We're seeking a dependable Per Diem Security Guard to help maintain a safe, welcoming environment for residents, guests, and staff. This role includes monitoring building security, responding to emergencies, managing the reception desk and switchboard, and supporting daily campus operations. Ideal candidates are professional, detail-oriented, and comfortable with both administrative and security responsibilities. Join our team and make a meaningful impact-apply today! Summary of Responsibilities: The Security Guard serves as a liaison between residents, families, guests, and staff. The Security Guard is responsible for the switchboard, reception desk activities, and initiating response to facility and resident emergencies. They assist in ensuring a safe environment for residents, guests and employees by monitoring both interior and exterior areas of campus and buildings. They protect the privacy and confidentiality of all residents and co-workers. The content of this job description is intended to describe the general nature and level of work expectations performed by incumbents in this classification. All activities are completed in accord with the Core Focus, 10-Year Target, Core Values of the Company, following all policies, procedures, Equal Employment Opportunity laws, confidentiality, and other Federal, State and Local laws and regulations, as appropriate. Essential Functions/Duties: Adequately and accurately records the happenings from their shift onto the shift report sheet and transfers the appropriate information during change of shift. Checks emails on every shift and responds accordingly. Records information in the online resident database to ensure those working in other departments and on different shifts have needed information to provide the best quality of care and service to the residents. Answers the switchboard/multi-line telephone system promptly and in a professional and courteous manner. Identifies the needs of the caller and handles the call effectively and in an efficient manner. Delivers internal mail to villas as per procedure. Delivers to-go meals to villa residents if requested. Accepts, logs, and accurately distributes prescription medications to Residential Living residents. Accepts, logs, and accurately distributes packages and deliveries (i.e. flowers, dry cleaning, etc.) for residents and employees. Participates in department meetings and trainings. Conducts exterior patrols and inspects buildings, equipment, and access points to ensure the safety and security of residents, guests, and employees. Controls traffic/parking by directing drivers during large campus events. Prevents losses and damage and reports irregularities/safety concerns. Reports hazardous conditions resulting from inclement weather to the Grounds Department personnel. Monitors life safety monitoring equipment/panels (i.e. emergency alarm panels, villa alarm panels, security monitors, cameras, etc.) and responds accordingly. Responds to emergency alarms/ telephone calls or incidents. Accurately documents and maintains a log of emergency alarms/telephone calls or incidents. Escorts ambulances to the proper entrance door and residence for resident pickup. Understands how to locate and read Safety Data Sheets. Assist in maintaining current Safety Data Sheet Manuals when requested. Conducts and documents fire drills in accordance with regulatory requirements, policy/procedure/protocol. Accurately maintains a key log and records use of each key. Reports missing keys to the Resident and Community Safety Lead promptly. Reports safety concerns to the Facilities Director, Resident and Community Safety Lead, or affected Department and notifies the Facilities Director if a repair/remedy is needed. Monitors radio and Relay conversations and responds accordingly. Other Duties: As assigned by management Essential functions are not intended to be an exhaustive list of all position duties required and performed by the incumbent in the role. Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. Required Skills/Abilities: Excellent Customer Service and Communications Skills Excellent Interpersonal Skills Possesses excellent organizational skills Demonstrates good judgment and draws sound conclusions Remains calm in all situations and demonstrates problem solving abilities Maintains a high degree of confidentiality without compromise Microsoft Office products, general computer knowledge.

Posted 2 weeks ago

Workday Application Security & Controls Sr. Associate-logo
Workday Application Security & Controls Sr. Associate
PwCDallas, TX
Industry/Sector Not Applicable Specialism Workday Management Level Senior Associate Job Description & Summary A career in Enterprise Application Risk will allow you to develop and apply strategies that help clients leverage enterprise technologies so they can get a higher return on their investment, mitigate risks, streamline processes, and find operational inefficiencies. The work revolves around creative problem solving and applying innovative technologies to enable strategies that increase the value of the applications that run our client's business. Our focus is on creating effective and efficient design for the most important business, security and compliance processes for our clients. We touch on aspects of application security and areas prone to fraud and financial misstatement and on streamlining processes that are part of our client's core business so they can get a higher return on this key investment. Using innovative, and proprietary technologies, we help to bridge the gap between business stakeholders, compliance functions, and Information Technology teams to assist in understanding how to embrace new ways of working while limiting their financial and operational risk profile. We use knowledge of financial system design, risk mitigation, business process design, data integrity, security, and use of data analytics. Our clients make large investments in enterprise financial systems, and they need to design those systems to meet the needs of their business while providing capabilities to improve end user experiences while managing risk. Our team helps companies manage risks on their journey to a more digitally integrated environment which enables them to better harness cloud technologies. As part of our team, you will focus on helping clients gain value across their technology ecosystem by addressing risks tied to systems, security, data, reporting, and programs. To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future. As a Senior Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Use feedback and reflection to develop self awareness, personal strengths and address development areas. Delegate to others to provide stretch opportunities, coaching them to deliver results. Demonstrate critical thinking and the ability to bring order to unstructured problems. Use a broad range of tools and techniques to extract insights from current industry or sector trends. Review your work and that of others for quality, accuracy and relevance. Know how and when to use tools available for a given situation and can explain the reasons for this choice. Seek and embrace opportunities which give exposure to different situations, environments and perspectives. Use straightforward communication, in a structured way, when influencing and connecting with others. Able to read situations and modify behavior to build quality relationships. Uphold the firm's code of ethics and business conduct. Workday is what we do. As part of our Cyber Risk and Regulatory platform, we simplify Workday security and controls to protect businesses and their workforce. Our focus is on Workday security and internal control across finance and HR functions. We know Workday, and we use knowledge of financial system design, security, business processes, risk mitigation, and compliance to solve our customers' most important problems along their Workday journey. Job Requirements and Preferences: Basic Qualifications: Minimum Degree Required: Bachelor Degree Minimum Years of Experience: 3 year(s) of experience in ERP controls auditing, consulting and/or implementing with a minimum of 1 year of experience with Workday. Preferred Qualifications: Preferred Fields of Study: Accounting & Technology, Accounting, Business Application Programming, Business Administration/Management, Computer and Information Science, Computer and Information Science & Accounting, Computer Applications, Computer Engineering, Computer Management, Computer Programming, Computer Systems Analysis, Computer Systems Analysis & Accounting, Economics and Finance & Technology, Finance & Technology, Finance, Information CyberSecurity, Information Technology, Information Technology & Accounting, Management Information Systems, Management Information Systems & Accounting, Management of Technology, Risk Management, Systems Engineering, Systems Engineering & Accounting Certification(s) Preferred: CISA, CRISC or CGEIT CPA Workday Certification (HCM, FINS, Payroll, integrations, Extend, Reporting, PM) Preferred Knowledge/Skills: A Senior Associate works as part of a team of Workday certified experts helping to solve complex business issues. Candidates should demonstrate a thorough level of abilities with, and/or a proven record of success as both an individual contributor and team member designing, implementing, and/or assessing internal controls over Workday security and business cycles, to include: Knowledge of Workday configurable security, foundation data model (FDM), and module specific configurations; Experience interfacing with client roles across HR, IT, Finance, and Accounting to identify, evaluate and support the implementation of security and business process controls as part of a Workday implementation or post-deployment project; Knowledge of regulatory requirements with an emphasis on ICFR and industry specific control requirements, as aligned to controls over tenant security and business processes within Workday; Ability to collaborate with systems integrators in developing business requirements and business controls in Workday implementations; Ability to apply Workday security, configuration and control expertise to help customers protect their business and global workforce; Experience integrating internal control practices across Workday business cycles to mitigate risk and support compliance requirements; Experience working with customers to understand, document, and validate security objectives and internal control objectives; Experience supporting Workday security implementation and product configuration activities following the Workday deployment methodology; Experience actively participating in Workday Community by researching best practices and monitoring new and updated security functionality; Design, develop, test, and deploy Workday security required to meet business requirements; Design, document, test and monitor effective internal controls aligned to customer requirements and compliance stipulations; Plan, organize, and deliver Workday security and control solutions in a professional, client-focused manner; and, Earn and maintain Workday certifications in designated areas of expertise across Financial Management, HCM and other Workday areas. Travel Requirements Up to 40% Job Posting End Date Learn more about how we work: https://pwc.to/how-we-work PwC does not intend to hire experienced or entry level job seekers who will need, now or in the future, PwC sponsorship through the H-1B lottery, except as set forth within the following policy: https://pwc.to/H-1B-Lottery-Policy . As PwC is an equal opportunity employer, all qualified applicants will receive consideration for employment at PwC without regard to race; color; religion; national origin; sex (including pregnancy, sexual orientation, and gender identity); age; disability; genetic information (including family medical history); veteran, marital, or citizenship status; or, any other status protected by law. For only those qualified applicants that are impacted by the Los Angeles County Fair Chance Ordinance for Employers, the Los Angeles' Fair Chance Initiative for Hiring Ordinance, the San Francisco Fair Chance Ordinance, San Diego County Fair Chance Ordinance, and the California Fair Chance Act, where applicable, arrest or conviction records will be considered for Employment in accordance with these laws. At PwC, we recognize that conviction records may have a direct, adverse, and negative relationship to responsibilities such as accessing sensitive company or customer information, handling proprietary assets, or collaborating closely with team members. We evaluate these factors thoughtfully to establish a secure and trusted workplace for all. The salary range for this position is: $84,000 - $202,000, plus individuals may be eligible for an annual discretionary bonus. For roles that are based in Maryland, this is the listed salary range for this position. Actual compensation within the range will be dependent upon the individual's skills, experience, qualifications and location, and applicable employment laws. PwC offers a wide range of benefits, including medical, dental, vision, 401k, holiday pay, vacation, personal and family sick leave, and more. To view our benefits at a glance, please visit the following link: https://pwc.to/benefits-at-a-glance

Posted 1 week ago

Director, Product Management, AI Security-logo
Director, Product Management, AI Security
F5, IncSeattle, WA
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive. Revised Director, Product Mgt, AI Security Job Title: Director, Product Management, AI Security Opportunity Are you ready to lead the charge in defining the future of AI security? At F5, we're seeking a Director of Product Management, AI Security-an experienced, customer-obsessed leader who blends strategic vision with hands-on execution. If you're excited about the possibilities of AI and passionate about protecting how it's deployed in modern enterprises, this is your opportunity to make a game-changing impact. In this role, you'll own the strategy, execution, and success of groundbreaking AI security products that empower our customers to harness the power of generative AI-securely, efficiently, and at scale. From defining compelling product-market fit to building a roadmap that inspires action across teams, your leadership will shape F5's position in one of the most dynamic spaces in technology. About the Team At F5, we believe security and innovation must go hand-in-hand. Our cross-functional teams build products that secure critical applications without slowing down progress. We work closely with customers, dig deep into their toughest challenges, and continuously adapt to deliver world-class solutions. This is a passionate and driven team that thrives on curiosity, communication, and bold thinking. We embrace the fast pace of the evolving AI landscape and take pride in building products that deliver real, measurable value. How You'll Make an Impact As a product leader, you will: Own the Vision: Develop and communicate a bold product vision and roadmap for securing AI applications-from initial concept to customer adoption. Drive Product-Market Fit: Lead discovery and validation efforts to ensure product offerings solve high-value, real-world problems in AI and application security. Build What's Next: Collaborate across engineering, architecture, sales, and marketing to bring innovative AI security solutions to market-fast. Lead the Business: Take full ownership of the product line, from business case to growth strategy, and define meaningful success metrics to guide decision-making. Evangelize with Impact: Represent F5's AI security vision at customer meetings, industry events, and thought leadership forums. Lead and Grow: Guide a small team of product managers while fostering a culture of ownership, clarity, and accountability. Communication Effective communication is central to the success of this role. You'll need to influence across functions, align stakeholders, and translate complex ideas into compelling stories. We value humility, sincerity, clarity, and emotional intelligence. T-this role demands a leader who can build trust and bring people along on the journey with authenticity and purpose. What Will Your Day Look Like? Your daily activities may include: Meeting with enterprise customers to uncover unmet needs around AI application security. Crafting business cases and defining problem statements that drive investment decisions. Collaborating with engineers on product design and delivery trade-offs. Defining go-to-market strategy and enabling GTM teams with clear messaging and pricing models. Presenting at internal and external events to build credibility for theraise the profile of your product(s) and F5's role in the AI ecosystem. Monitoring key product KPIs and using insights to iterate rapidly. Your leadership won't just influence what gets built-it will shape how organizations securely deploy the future of AI. What You'll Bring to the Team This isn't just a job-it's a chance to define and lead a critical product area in a time of profound technological change. We're looking for someone with: Strategic Thinking: Ability to see the big picture and translate opportunities into a focused, actionable product strategy. AI and Security Expertise: Deep understanding of the intersection of AI/ML/NLP and enterprise security needs, particularly for infrastructure and application layers. Execution Excellence: Proven ability to bring new B2B or SaaS products to market with measurable success. Customer Focus: Passion for listening to users, solving real problems, and delivering value with every release. Leadership: Experience managing and mentoring product teams, with a collaborative and empowering leadership style. Strong Communication: Clear and persuasive communicator-comfortable with execs, engineers, analysts, and customers alike. Your Qualifications 8+ years of product management experience, with at least 2 years in a people leadership role. Demonstrated success launching and growing innovative infrastructure or security products. Proven track record defining product-market fit in AI/ML, NLP, or related domains. Hands-on experience with SaaS products and go-to-market strategies. Excellent storytelling, written communication, and presentation skills. Bachelor's degree in engineering, computer science, or a related field. Graduate degree in science, engineering, or business is a plus. Ready to Secure the Future of AI? If you're energized by emerging technologies, motivated by purpose, and excited to lead a mission-critical product area-this is your moment. Join us at F5 and help define how AI is safely and securely adopted across the globe. We value bold ideas, diverse perspectives, and a growth mindset. If you thrive in fast-paced environments and love turning vision into reality-let's build the future together. Let me know if you'd like a tailored version for a particular platform (like LinkedIn or your internal careers page), or if you want this shortened into a job posting blurb. #LI-JB1 The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. The annual base pay for this position is: $200,200.00 - $300,400.00 F5 maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, geographic locations, and market conditions, as well as to reflect F5's differing products, industries, and lines of business. The pay range referenced is as of the time of the job posting and is subject to change. You may also be offered incentive compensation, bonus, restricted stock units, and benefits. More details about F5's benefits can be found at the following link: https://www.f5.com/company/careers/benefits . F5 reserves the right to change or terminate any benefit plan without notice. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com). Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.

Posted 30+ days ago

Avp, Data Security Operations-logo
Avp, Data Security Operations
LPL Financial ServicesAustin, TX
Are you a team player? Are you interested in working on meaningful projects? Do you want to work with cutting-edge technology? Are you interested in being part of a team that is working to transform and do things differently? If you have a strong background in protecting data and are ready to take on new challenges in a fast-paced and collaborative environment, we would love to hear from you! Job Overview: LPL Financial is seeking an AVP Data Security Operations to work within its growing Information Security department reporting to the VP, Security Operations Center. The AVP, Data Loss Prevention Engineer will lead the enterprise-wide data loss prevention program within the Information Security organization. This role focuses on creating and modifying DLP and DSPM policies and rules to protect the organization's data, collaborating with cybersecurity teams and business stakeholders to define the data protection strategy and roadmap. This position will be responsible for leading a team to develop and implement policies and detections to mitigate the risk of data exfiltration, ensuring compliance with industry standards and regulations. Responsibilities: Be the technical team lead along with a team of security analysts, familiar with endpoint, web and email based DLP/DSPM technologies Drive enterprise-wide data protection operations to safeguard and secure the organization's data. This includes creating and modifying data protection policies and rules to identify, detect, and protect data Support the Data Protection product owner assisting with defining the scope, purpose, roadmap, and strategy to ensure execution and delivery of the data protection roadmap Support development and management of data protection metrics Partner closely with key stakeholders to ensure alignment of sensitive data to protect for data loss prevention capabilities Provide support for DLP/DSPM solutions, including endpoint, email, and cloud-based tools. Develop and implement process enhancements to improve service delivery and operational efficiency. Identify opportunities for process automation and standardization to reduce manual effort and minimize errors Monitor the health of data protection controls, ensuring systems are functioning optimally and in compliance with organizational standards Define, track, and report on key performance indicators to assess operational effectiveness and identify areas for improvement Build strong relationships with stakeholders to understand their needs and provide tailored support. Collaborate with cross-functional teams to resolve complex technical issues and align service delivery with organizational goals. Support the design, implementation, and maintenance of data protection controls to safeguard sensitive data. Collaborate with cybersecurity teams to ensure alignment with enterprise security policies Train and mentor junior security team members on automated processes and techniques Requirements: Bachelor's degree in computer science, information security or technology related field 5+ years of related experience leading technical team in information security, specifically hands on experience working in DLP/DSPM technologies 3+ years in Data Loss Prevention platforms (endpoint, web, email) Data Security Posture Management experience Core Competencies: Strong analytical and problem-solving skills are required Strong communication skills, both written and verbal Preferences: Relevant technical and security certifications such as CISSP, GIAC, DLP and Data Privacy certificates #LI-Hybrid #LI-PA Pay Range: $117,225-$195,375/year Actual base salary varies based on factors, including but not limited to, relevant skill, prior experience, education, base salary of internal peers, demonstrated performance, and geographic location. Additionally, LPL Total Rewards package is highly competitive, designed to support your success at work, at home, and at play - such as 401K matching, health benefits, employee stock options, paid time off, volunteer time off, and more. Your recruiter will be happy to discuss all that LPL has to offer! Company Overview: LPL Financial Holdings Inc. (Nasdaq: LPLA) was founded on the principle that the firm should work for advisors and institutions, and not the other way around. Today, LPL is a leader in the markets we serve, serving more than 23,000 financial advisors, including advisors at approximately 1,000 institutions and at approximately 580 registered investment advisor ("RIA") firms nationwide. We are steadfast in our commitment to the advisor-mediated model and the belief that Americans deserve access to personalized guidance from a financial professional. At LPL, independence means that advisors and institution leaders have the freedom they deserve to choose the business model, services, and technology resources that allow them to run a thriving business. They have the flexibility to do business their way. And they have the freedom to manage their client relationships, because they know their clients best. Simply put, we take care of our advisors and institutions, so they can take care of their clients. Join LPL Financial: Where Your Potential Meets Opportunity At LPL Financial, we believe that everyone deserves objective financial guidance. As the nation's leading independent broker-dealer, we offer an integrated platform of cutting-edge technology, brokerage, and investment advisor services. Why LPL? Innovative Environment: We foster creativity and growth, providing a supportive and responsive leadership team. Learn more about our leadership team here! Limitless Career Potential: Your career at LPL has no limits, only amazing potential. Learn more about our careers here! Unified Mission: We are one team on one mission-taking care of our advisors so they can take care of their clients. Learn more about our mission and values here! Impactful Work: Our size is just right for you to make a real impact. Learn more here! Commitment to Equality: We support workplace equality and embrace diverse perspectives and backgrounds. Learn more here! Community Focus: We care for our communities and encourage our employees to do the same. Learn more here! Benefits and Total Rewards: Our Total Rewards package goes beyond just compensation and insurance. It includes a mix of traditional and unique benefits, perks, and resources designed to enhance your life both at work and at home. Learn more here! Join the LPL team and help us make a difference by turning life's aspirations into financial realities. Please log in or create an account to apply to this position. Principals only. EOE. Information on Interviews: LPL will only communicate with a job applicant directly from an @lplfinancial.com email address and will never conduct an interview online or in a chatroom forum. During an interview, LPL will not request any form of payment from the applicant, or information regarding an applicant's bank or credit card. Should you have any questions regarding the application process, please contact LPL's Human Resources Solutions Center at (855) 575-6947. EAC1.22.25

Posted 30+ days ago

Contact Government Services logo
Information Systems Security Officer (Isso)
Contact Government ServicesFargo, ND
Apply

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

ISSO

Employment Type: Full-Time, Experienced

Department:Information Technology

CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.

CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.

Skills and attributes for success:

  • Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades.
  • Maintain responsibility for managing cybersecurity risk from an organizational perspective.
  • Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.
  • Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.
  • Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).
  • Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
  • Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.
  • Provide subject matter expertise for cyber security and trusted system technology.
  • Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.
  • Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes.
  • Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.
  • Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.

Qualifications:

  • Bachelor's Degree.
  • A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.
  • eMASS experience.
  • Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.
  • Strong desktop publishing skills using Microsoft Word and Excel.
  • Experience with industry writing styles such as grammar, sentence form, and structure.
  • Ability to multi-task in a deadline-oriented environment.

Ideally, you will also have:

  • CISSP, CASP, or a similar certificate is preferred.
  • Master's Degree in Cybersecurity or related field.
  • Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.
  • Demonstrated ability to work well independently and as a part of a team.
  • Excellent work ethic and a high commitment to quality.

Our Commitment:

Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.

For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.

Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.

We care about our employees. Therefore, we offer a comprehensive benefits package.

Health, Dental, and Vision

Life Insurance

401k

Flexible Spending Account (Health, Dependent Care, and Commuter)

Paid Time Off and Observance of State/Federal Holidays

Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Join our team and become part of government innovation!

Explore additional job opportunities with CGS on our Job Board:

https://cgsfederal.com/join-our-team/

For more information about CGS please visit: https://www.cgsfederal.com or contact:

Email: info@cgsfederal.com

$92,213.33 - $125,146.66 a year