your help. Our Team is looking for a InformationSystems Security Officer (ISSO). In this role you will get to focus on the cybersecurity aspects of system design to deal with cyber-related disruptions, minimizing misuse and malicious behavior, while supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … IATT), and Authority to Connect (ATC) for all existing and new InformationSystems (IS) that require accreditation to include on premise and cloud platforms. Maintain and develop System Security Plans (SSP), Security Controls Traceability Matrices (SCTM), Risk Assessment Reports (RAR), Continuous Monitoring Plans (ConMon), Security Assessment Reports (SAR), and Plan of Actions and Milestones (POA&M). … Ability to Develop and update documentation, policy and procedures such as: Ports Protocols and Services Management (PPSM) worksheets, system and network diagrams/descriptions, and SOPs. Coordinate and perform security audits and system updates to identify nonstandard events and maintain system and information integrity. Play an active role in conducting continuous monitoring activities More ❯
United, Pennsylvania, United States Hybrid / WFH Options
Trinity Health
cannot sponsor an H1b visa nor support a STEM OPT EAD for this role.) POSITION PURPOSE Responsible for enterprise level support, standards and best practices for identity access management (IAM) and IAM related services. These include … Microsoft Azure Active Directory, Microsoft Active Directory, SailPoint IdentityNow, Certificate Services (PKI), M365 and CyberArk. The primary job responsibilities of the Multi-Platform Engineer are to participate in technical system design and deploy customer projects and activations. Deploy new technologies and implementation and configuration of systems and applications. Provide knowledge of the interactions between technologies and applications across product … lines. Work in coordination with the TIS Product management, Product Engineering and Service Optimization teams to develop and deploy technology-based business solutions. This includes applications and infrastructure leveraging Trinity Enterprise Data Centers and Cloud resources (i.e., IDaaS, PaaS, IaaS and SaaS). Serves as a subject matter expert for solutions in one or more of the following More ❯
Experience Required Qualifications: 5+ years of experience in system administration, network administration, or a related role Excellent problem-solving skills and communication skills, with the ability to interact effectively with both technical and non-technical users and collaborate across multiple teams and external entities Experience managing multiple concurrent tasks, projects, and priorities to meet customer deadlines Excellent organizational skills … in maintaining documentation of system configurations and procedures, and providing reports on system performance, incidents, and maintenance activities Experience providing technical support to end users: monitoring system performance, troubleshooting and resolving hardware/software issues, optimizing network performance, managing system backups and recovery processes, and implementing necessary upgrades and patches Ability to install, configure, administer, manage … Familiarity with database managementsystems (MySQL, PostgreSQL, SQL Server) and web servers (Apache, Nginx, IIS) Ability to assist in planning and executing IT projects, such as system upgrades, migrations, or new technology deployments Ability to communicate and work collaboratively with team members, government clients, and stakeholders across teams to problem solve and recommend and implement systemMore ❯
Experience & Strategic Planning: Collaborates with senior leadership to align IT/OT and Information Technology strategy with broader organizational goals. Collaborates with IT/OT stakeholders and system owners to seamlessly integrate information technology initiatives into IT and OT infrastructure, ensuring alignment with organizational goals and security standards. Supports and coordinates the planning and implementation … least-privilege access, and real-time threat mitigation across IT and OT infrastructures. Provides guidance and mentorship to junior analysts and staff. Risk Management & Compliance: Consults with system owners to review risk assessments for IT and OT systems, identify vulnerabilities, and provide governance-focused recommendations for mitigation strategies in compliance with RMF and NIST standards. Supports system … from Army policies and DoD directives to the OT environment. Security Documentation & Reporting: Provides clear, concise reports on risk posture to senior leadership. Incident Response & Mitigation: Supports and advises system owners in responding to security incidents across IT and OT environments, offering guidance on the development of incident response protocols and procedures. Assists with reviewing and analyzing post-event More ❯
cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Senior Information Assurance Analyst will support the Overseas Buildings Operations (OBO) InformationSystem Security Officer (ISSO). The Senior Analyst will act as a subject matter expert (SME) for Federal Assessments & Authorizations (A&A); provides sound advice and recommendations to lower risk … part of the Department's Information Assurance policy and Federal Information Security Management Act (FISMA) implementation efforts Conduct risk assessments, vulnerability assessments, and system audits to identify potential security threats to OBO information systems. Provide recommendations to mitigate identified risks and ensure compliance with applicable regulations and standards. Provide support for … A&A process in support of obtaining Authority to Operate (ATO) approvals of OBO systems Perform Security Impact Analysis (SIA) review of change requests and provide reporting requirements to system owners Update expired security controls in ArchAngel to support security findings and reporting Analyze and report on security findings identified during assessment Create Plan of Action & Milestones (POAMs) for More ❯
U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone's Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as … human intelligence, and critical missions and networks. DevOps Systems Engineer Job Description DevOps Systems Engineer Herndon, VA Work directly with the DevOps team and Senior DevOps manager to understand system deployment and installation processes. Manage all computer systems and oversee the daily performance, keeping an eye out for issues and inefficiencies. Respond to user issues, answering inquiries and resolving … more complicated issues firsthand. Maintain records of system performance, combining raw information into a useful and beneficial performance report for monthly board meetings. Create training material whenever new recruits are hired to explain the correct and most efficient way to operate the implemented systems. Other duties as assigned. Required Experience: Must hold an Active TS/SCI More ❯
Experience & Strategic Planning: Collaborates with senior leadership to align IT/OT and Information Technology strategy with broader organizational goals. Collaborates with IT/OT stakeholders and system owners to seamlessly integrate information technology initiatives into IT and OT infrastructure, ensuring alignment with organizational goals and security standards. Supports and coordinates the planning and implementation … least-privilege access, and real-time threat mitigation across IT and OT infrastructures. Provides guidance and mentorship to junior analysts and staff. Risk Management & Compliance: Consults with system owners to review risk assessments for IT and OT systems, identify vulnerabilities, and provide governance-focused recommendations for mitigation strategies in compliance with RMF and NIST standards. Supports system … from Army policies and DoD directives to the OT environment. Security Documentation & Reporting: Provides clear, concise reports on risk posture to senior leadership. Incident Response & Mitigation: Supports and advises system owners in responding to security incidents across IT and OT environments, offering guidance on the development of incident response protocols and procedures. Assists with reviewing and analyzing post-event More ❯
JPC Partners is looking for an Application System Engineer that will work on IT projects, collaborating with cross-functional teams to implement solutions, perform application upgrades, and troubleshoot issues. In addition, you'll be responsible for evaluating, troubleshooting, and supporting various business process solutions, constantly seeking opportunities to optimize performance and recommend improvements. Key responsibilities: Serve as the subject … matter expert for multiple business solutions used by Finance, Knowledge Management, and various practice groups. Configure, maintain, enhance, and support software packages, internally developed legal applications, and web services. Apply patches, customizations, and new features to software packages, ensuring compliance with industry standards. Maintain the day-to-day operations of various legal applications, ensuring smooth functioning for critical … technical support, demonstrating strong communication and problem-solving skills. Experience supporting COTS software packages. Strong problem-solving; analytical skills as well as project management skills. Experience with system administration and configuration management. Experience with troubleshooting and performance monitoring. Experience with scripting and automation; cloud computing platforms and managing software packages deployed in the cloud (AWS, Azure, GCP More ❯
Philadelphia, Pennsylvania, United States Hybrid / WFH Options
Morgan Lewis
leading global law firms with offices in strategic hubs of commerce, law, and government across North America, Asia, Europe, and the Middle East, is seeking to hire an Applications System Engineer reporting to the Manager of Application Services. This role will be a key resource on IT projects, collaborating with cross-functional teams to implement solutions, perform application upgrades … our Philadelphia office with a hybrid working schedule. Key responsibilities include: Subject Matter Expertise: Serve as the subject matter expert for multiple business solutions used by Finance, Knowledge Management, and various practice groups at the firm. This emphasizes your legal industry understanding. Support Software & Systems: Configure, maintain, enhance, and support legal-specific software packages, internally developed legal applications … and problem-solving skills. Experience supporting COTS software packages. Strong problem-solving; analytical skills as well as project management skills. Excellent communication and interpersonal skills. Experience with system administration and configuration management. Experience with troubleshooting and performance monitoring. Experience with scripting and automation; cloud computing platforms and managing software packages deployed in the cloud (AWS, Azure, GCP More ❯
multi-cloud environment. You will play a vital role in engineering solutions and maintaining compute and storage infrastructures, delivering efficiency through automation, and ensuring scalability, flexibility, and compliance. Responsibilities • System administration tasks for Windows Server 2022 and RHEL 8 including regular platform upgrades, vulnerability management, troubleshooting, automation with native scripting languages, performance management, application inventory … native services and deployments. • Administer the lifecycle of SSL certificates and associated infrastructure and domains. • Manage and test data backups and disaster recovery policies. • Active Directory • Manage human and system identity lifecycles including onboarding, offboarding, role management, just-in-time privilege escalation, and regular access reviews. • Implement, update, and regulate group policy and identities in Active Directory … and CIDR whitelists/blacklists. • Collaboration • Communicate effectively and promptly with DevSecOps teams to implement appropriate cloud-native solutions and maintain accurate and up-to-date documentation of the system and network infrastructure including diagrams, configuration details, and operational procedures. • Participate in in-house training programs to foster and spread knowledge and awareness to project teams, promote and empower More ❯
Chicago, Illinois, United States Hybrid / WFH Options
Early Warning Services
At Early Warning, we've powered and protected the U.S. financial system for over thirty years with cutting-edge solutions like Zelle, Paze , and so much more. As a trusted name in payments, we partner with thousands of institutions to increase access to financial services and protect transactions for hundreds of millions of consumers and small businesses. Positions located … to work in the United States, for any employer, at the date of hire. This position is ineligible for employment Visa sponsorship. Overview The Principal Engineer - PKI & Certificate Management is a technical domain expert as well as a critical program manager responsible for managing and monitoring all aspects of public key infrastructure (PKI) services at EWS. Initially, this … external certificate authorities and installing certificates on systems, and building out and maintaining certificate authority databases, as well as designing, deploying, and supporting the use of smart cards for system authentication. Sound knowledge and experience in Enterprise Architecture, Strategy, and IT Security. Strong understanding of IAM domain including Access Management, Authentication, and Key Management implementations. More ❯
Information Security Specialist opportuntiy in Washington, DC Public Trust will be required We are seeking a proactive, detail-oriented Information Security Specialist to join our growing team. In this role, you will be responsible for implementing and maintaining our organization's security posture, monitoring for threats, and ensuring compliance with relevant frameworks and regulations. The ideal … Ensuring security updates are current across all systems • Implement and manage security tools (e.g., SIEM , endpoint protection). • Monitor for compliance with security standards such as NIST Risk Management Framework (RMF), • Collaborate with IT and Engineering teams to embed security in infrastructure and applications. • Investigate security breaches and document findings and recommendations. • Participate in security awareness training and … programs. • Stay current with emerging threats, trends, and technologies. Required Qualifications: • Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience). • 3+ years of hands-on experience in cybersecurity roles. • Strong understanding of networking, operating systems (Windows, Linux), and cloud security (AWS/Azure,). • Hands-on experience with tools such as Splunk More ❯
Network Knowledge Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: We are seeking an experienced ITIL Network Knowledge Management Quality Assurance Analyst to join … our IT service management team. The ideal candidate will ensure the quality, accuracy, and effectiveness of our network knowledge management processes in alignment with ITIL best practices . Responsibilities: Assist in developing, implementing, and maintaining ITIL-based knowledge management processes for network … operations Develop and enforce quality standards for network knowledge articles and documentation Monitor, manage, and maintain knowledge articles within ServiceNow Conduct regular audits of the knowledge managementsystem to ensure compliance with customer's policies, procedures, governance and ITIL guidelines Collaborate with network teams to capture, validate, and organize knowledge effectively Analyze and report on knowledge usage More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
premise and in the cloud to ensure design implementation, safeguarding Experian's assets. You'll assess control design, performance, and compliance with standards and regulations, reporting to the Information Security Control Assurance Testing Manager. Identifying gaps, documenting findings, and recommending improvements to mitigate risks are important responsibilities. Using data-driven testing techniques and a defined methodology, you'll … lessons learned by integrating partner feedback to improve the control testing program. About Experian About us, but we'll be brief Experian is the world's leading global information services company, unlocking the power of data to create more opportunities for consumers, businesses, and society. Experian is a global data and technology company, powering opportunities for people and … technologies, experienced people, and new ideas to help all our clients maximize every opportunity. Experience and Skills What your background is A bachelor's degree in computer science, managementinformationsystems, or a relevant field, or equivalent demonstrable experience. 5+ years' of experience in Information Security or Information Technology 3+ years' experience More ❯
Collierville, Tennessee, United States Hybrid / WFH Options
FedEx
Provide analysis and assistance in planning and organizing projects that impact or enhance the department Job Description: We are seeking a driven and highly organized Sr. Project Management Analyst with high technical aptitude to manage AMP - Enterprise, Tooling and Governance cross-functional Business with Tech, Lifecycle Management, and Local Enhancement demand. This role requires a problem … and deliver OCM communications and learning programs that empower technical teams to build skills and drive project success. Balance demand priorities while simultaneously, demonstrating exceptional organizational and time management skills. Perform other duties as assigned. Knowledge, Skills, and Abilities: Project management. Communication. Advanced verbal and written communication skills Financial management & Data analytics SAFe Agile Practices and … Project Management Knowledge Ability to develop project plans, manage individual deadlines and goals Highly organized with excellent time management skills Customer service orientation, and strong interpersonal and communication skills Flexibility and adaptability in a rapidly changing environment Proficiency with SaaS Enterprise Tooling suites Strong communication and stakeholder management skills, with the ability to influence More ❯
New York City (Manhattan), New York, United States Hybrid / WFH Options
Antech Diagnostics
annually. At Antech, pay decisions are determined using factors such as relevant job-related skills, experience, education, training and budget. Job Summary: The Senior Identity and Access Management (IAM) Engineer is responsible for designing, implementing and maintaining the Identity and Access Management program as part of the Cybersecurity function. The IAM engineer will work closely with … Human Resources, Business Stakeholders, and Information technology teams to make the identity lifecycle management process effective and efficient throughout the SDx division. This individual will serve as the subject matter expert for SDx identity infrastructure, implementing identity solutions for authentication, authorization, user management and centralized SDx resources and IAM practices. Key Responsibilities: Lead the … Access Governance (IGA) strategy with IAM solutions (and related technologies) in coordination with Mars GDO including Okta, Azure AD/Entra ID, Active Directory, Customer Identity and Access Management (CIAM), and other identity-based solutions across SDx. Lead and manage SDx role-based access control policies, federation of identities and any technologies related including SSO, OAuth, SAML, OpenID More ❯
Paid Leave, and much more. Join us and make a difference in National Security! Experience with classified IC dissemination platforms, information sharing rules, and Intelligence Community Markings System Register and Manual Standards. You must have an active TS/SCI Polygraph up front. No exceptions and no sponsorship available, unfortunately. Come join a high performing agile team … to support a fast-paced, complex program! Program execution follows DEVOPS best practices and employs robust development, test and production environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain … capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system with exacting interface, performance and security requirements. You will become part of a team of Security Engineers working on providing improvements to our operational, test, integration, and development systems and solving challenging issues on a More ❯
Paid Leave, and much more. Join us and make a difference in National Security! Experience with classified IC dissemination platforms, information sharing rules, and Intelligence Community Markings System Register and Manual Standards. You must have an active TS/SCI Polygraph up front. No exceptions and no sponsorship available, unfortunately. Come join a high performing agile team … to support a fast-paced, complex program! Program execution follows DEVOPS best practices and employs robust development, test and production environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain … capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system with exacting interface, performance and security requirements. You will become part of a team of Security Engineers working on providing improvements to our operational, test, integration, and development systems and solving challenging issues on a More ❯
seeking a highly experienced Senior Patch Engineer with specialized expertise in using Qualys for vulnerability management and patching. The ideal candidate will have a strong background in system security, patch management, and IT infrastructure. This role involves ensuring the security and stability of our IT environment by managing and deploying patches across various systems and … systems comply with security policies, standards, and regulatory requirements. Implement best practices for vulnerability management and patching. Assist in audits and assessments related to security and compliance. System Administration: Troubleshoot and resolve issues related to patching and vulnerability management. Collaborate with other IT teams to ensure seamless integration of security practices. Documentation and Reporting: Create and maintain … Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or equivalent work experience. Experience: Minimum of 7 years of experience in IT security, system administration, or a similar role. At least 3 years of hands-on experience with Qualys or similar vulnerability management tools. Technical Skills: Strong understanding of patch managementMore ❯
events and potential threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Develop procedures to ensure system users are aware of their CS responsibilities before granting access to DoD information Systems. Process and review DD-2875s. Support Risk Management Framework (RMF) system categorization process and memorandum for Confidentiality, Integrity, and Availability impact level determinations Ensure that CS requirements are integrated into the Continuity of Operations Plan (COOP) for that system or DoD Component. Ensure that CS security requirements are appropriately identified in computer environment operation procedures. Develop security requirements and maintain list of hardware, software, and services acquisitions specific to … CS security programs. Ensure that IA and IA enabled software, hardware, and firmware comply with appropriate security configuration guidelines, policies, and procedures. Create and review System Security Plans (SSP), as required Prepare for Assess and Authorize (A&A) and Security Control Assessor (SCA) validations and/or inspections and ensure that CS inspections, tests, and reviews are coordinated. Qualifications More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … contributing to the overall efficiency, reliability, and scalability of the customer's technology infrastructure. Working with third-party tools to manage scripts and automate and monitor deployment workflows, enhancing system reliability and scalability. Proactively monitoring the health of deployments, identifying and resolving issues, and redeploying after remediation. Working with system architects and lead engineer to maintain and improve … management. Planning, evaluating, and executing capacity optimization, updates, upgrades and other lifecycle activities associated with the solution; troubleshooting of functional and performance problems. Creating and maintaining detailed and accurate system documentation, including design and configuration plans, design diagrams, task-oriented procedures, operations and maintenance plans, etc. Designing, developing, deploying, and maintaining data flow pipelines to integrate applications and federate More ❯
and continuous monitoring efforts during deployment, Operations and Sustainment Supporting offensive architecture analysis and design of defense-in-depth solutions Supporting Development Security Operations (DevSecOps) integration Developing and assessing system security plans including, security concepts of operation, risk management matrix, security control traceability matrix, security test procedures, and plan of action and milestones Conducting and analyzing vulnerability … assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) Analyzing static code scans and dynamic code scans to validate Application Security and Development STIG compliance This position may require business travel to customer locations in support of customer meetings, product demonstration, Integration and/or systems testing. Required Education, Experience, & Skills … industry partners, and teammates Demonstrated leadership skills (supervisory experience, building teams, building customer relationships) Ability to support proposal and cost activities Working knowledge of Earned Value ManagementSystem (EVMS) systems and Project management tools such as Cost Performance Index (CPI) and Integrated Master Schedule (IMS) Experience with leading and coordinating security test events to achieve More ❯
RMF) for the Air Force Information Technology (IT), and the "DoD Program Manager's Guidebook for Integrating the Cybersecurity Risk Management Framework (RMF) into the System Acquisition Lifecycle" Supports efforts to integrate Cybersecurity throughout the lifecycle of IT systems. This includes the development and review of Cybersecurity-related artifacts, including System Security Plans, Cyber … policy improvements Leads the development of security policies, plans, and procedures to meet government regulations and industry best practices Coordinates and reviews technical assessments Uses automated tools to analyze system security control compliance Collaborates with technical managers to ensure required controls are implemented and security processes are followed Builds collaborative internal relationships with program and project teams, as well … and explain technical systems and data Experience with matrix organizations Project Management Professional (PMP) Certification or similar Lean Six Sigma Certification or similar Experience as a DoD System Program Manager Experience working with senior organizational leaders, including Authorizing Officials and senior customer leadership Recent experience working cybersecurity in a DoD environment Pay Information Full-Time More ❯
code, software listings, test files, installation procedures, technical documentation, flow charts, and designs. Sponsor standard configuration management practices, information security and governance policies for implementing system-level requirements that address Sponsor and/or Product Owner mission needs, or as directed by legislation or policy changes. Propose business use cases to inform the Sponsor Leadership … transformed into a data and software architecture at a concept level, and at a detailed level. Develop features and functionalities utilizing both Primavera and a Workforce ManagementSystem, ensuring seamless integration and performance. Develop RESTful APIs to validate data types, conduct business logic to transform data and transfer data to other systems. Develop automated test scripts to … technical documentation for software components and development processes. Continuously learn and apply new technologies and methodologies to improve software development practices. Open to learn other Workforce ManagementSystem coding constructs and infrastructure configuration. Recommend cloud-based infrastructure requirements based on capacity planning, performance, and Sponsor goals and strategies. Comply with coding standards when developing software modules that More ❯
Charleston, South Carolina, United States Hybrid / WFH Options
Imagine One Technology & Management Ltd
technical experience supporting C4ISR engineering, software development, integration programs, or similar USMC/Navy efforts, to include: Compiling source code using various automation tools and processes Knowledge of operating system scripting, interactive software loading scripts, and backup and restore scripts, as well as knowledge of Information Assurance Vulnerabilities Management and software updates as well as … patching necessary to repackage software Schema development, software assurance code review and integration, finding remediation, adherence to standardized secure coding guidelines and practices, maintenance support for system imaging and software selection applications, software development for deficiency corrections/fixes or changes to existing code Expertise and support to the government concerning system design and interoperability in order to … and/or supporting one or more of the following programs of record: Command and Control Personal Computer (C2PC), Army Data Dissemination Service (DDS), Advanced Field Artillery Tactical Data System (AFATDS), Global Command and Control System - Tactical Combat Operations (GCCS-TCO), Tactical COP Server (TCS), Joint Tactical Common Operation Picture (COP) Workstation (JTCW), Tactical Service Oriented Architecture (TSOA More ❯