Cyber Security Analyst jobs at ASRC Federal - 2262 jobs
Information System Security Officer (ISSO)
ASRC Federal 4.2
Cyber security analyst job at ASRC Federal
ASRC Federal has an exciting opportunity for an Information System Security Officer (ISSO in) in Dayton, Ohio. This position offers a sign-on bonus. Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Responsibilities:
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
Report all security-related incidents to the ISSM
Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
Serve as member of the CCB, if designated by the ISSM;
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Responsibilities:
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or relatedfield
5-8 years demonstrated performance in related technology
Top Secret w/ SCI eligibility
Other duties as assigned
$65k-87k yearly est. 20d ago
Looking for a job?
Let Zippia find it for you.
Defense ML Engineer - AI for National Security, Remote
Phase2 Technology 3.9
McLean, VA jobs
A leading technology firm in McLean, Virginia is seeking a Machine Learning Engineer to develop mission-critical AI solutions. You'll collaborate with data engineers and scientists to deploy models that enhance national security. The ideal candidate should have over 3 years of experience in artificial intelligence and a strong proficiency in Python and machine learning techniques. This role offers flexible work arrangements and comprehensive benefits.
#J-18808-Ljbffr
$89k-120k yearly est. 1d ago
Senior Security Engineer - Public Sector, Honolulu Onsite
Google Inc. 4.8
Urban Honolulu, HI jobs
A leading technology company is seeking a Senior Security Engineer for the Google Public Sector team in Honolulu, Hawaii. This role requires strong expertise in security assessments and engineering, along with 5 years of relevant experience. The engineer will implement security monitoring and incident response plans while collaborating closely with various teams. A Bachelor's degree and active Security Clearance are mandatory, as well as the ability to conduct client-facing work five days a week. Competitive salary up to $244,000 plus benefits.
#J-18808-Ljbffr
$244k yearly 1d ago
Lead Security Engineer, GovCloud
Salesforce, Inc. 4.8
San Francisco, CA jobs
*To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.*Job CategorySoftware EngineeringJob Details****About Salesforce****Salesforce is the #1 AI CRM, where humans with agents drive customer success together. Here, ambition meets action. Tech meets trust. And innovation isn't a buzzword - it's a way of life. The world of work as we know it is changing and we're looking for Trailblazers who are passionate about bettering business and the world through AI, driving innovation, and keeping Salesforce's core values at the heart of it all.**About the team** Salesforce is looking to hire a Lead Security Engineer for Government Cloud Services. We prioritize security and data protection to ensure the confidentiality, integrity, and availability of our systems and information. As we continue to expand our operations, we are seeking a skilled and experienced Lead SecurityAnalyst to join our dynamic team and play a pivotal role in safeguarding our organization against evolving cyber threats. As the Lead Security Engineer, you will be responsible for driving the overall security posture of our organization. You will work closely with cross-functional teams to assess risks, implement security measures, monitor security systems, and respond to security incidents. Your expertise in security frameworks, technologies, and best practices will be critical in developing and executing strategies to protect our critical assets and infrastructure. **What you will be doing:*** Apply security policies to meet security objectives of the system.* Assess adequate access controls based on principles of least privilege and need-to-know.* Assess all the configuration management (change configuration/release management) processes.* Assess the effectiveness of security controls.* Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.* Develop and implement comprehensive security policies, procedures, and guidelines to ensure the protection of company assets and compliance with applicable regulations.* Conduct (or coordinate with third party partners) regular security risk assessments, vulnerability assessments, and penetration tests to identify potential weaknesses in systems, networks, and applications and coordinate remediation of findings. Drive related mitigations.* Collaborate with stakeholders to design and implement security controls, including firewalls, intrusion detection systems, access controls, and encryption technologies.* Conduct analysis of logs and events, identify gaps for deeper analysis as needed, and coordinate with Detection and Response teams on detection and alerting betterment efforts and uplift.* Stay up-to-date with the latest security trends, vulnerabilities, and threat intelligence, and provide recommendations to proactively address emerging risks.* Liaison with Incident Response teams on incidents and response efforts, recommend and/or instigate remediation actions to prevent future occurrences.* Develop and deliver security awareness and training programs to educate employees on security best practices and promote a culture of security across the organization.* Collaborate with external vendors, partners, and auditors to ensure compliance with security standards and regulations. Further, implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation* Maintain documentation of security procedures, incident response plans, and security incident reports.**What you should have:*** Experience with using cloud infrastructure as code (IaC), including Terraform, CloudFormation, or Azure Resource Manager to deploy secure cloud infrastructure, and using version control based on Git* Professional certifications such as CISSP, CISM, CEH, or similar are highly desirable.* Proven experience (5+ years) in a securityanalyst role, with a focus on information security, incident response, and vulnerability management.* Must be US Citizen operating on US Soil and pass both enhanced background check as long as Criminal Justice background check.* Strong understanding of security frameworks such as ISO 27001, NIST, or CIS Controls, and their practical application.* Extensive knowledge of security technologies, including firewalls, IDS/IPS, SIEM, DLP, antivirus, and endpoint protection systems.* Hands-on experience with vulnerability assessment tools, network scanning tools, and penetration testing methodologies.* Experience with using cloud infrastructure as code (IaC), including Terraform, CloudFormation, or Azure Resource Manager to deploy secure cloud infrastructure, and using version control based on Git“* Proficiency in log analysis, incident response, and forensic investigation techniques.* Excellent communication skills, both written and verbal, with the ability to articulate complex security concepts to technical and non-technical stakeholders.* Demonstrated leadership abilities, with the capacity to motivate and inspire a team.* Strong analytical and problem-solving skills, with the ability to think strategically and develop innovative solutions to security challenges.Joining Salesforce Government Cloud as a Lead Security Engineer provides an exciting opportunity to make a significant impact on the organization's security posture and contribute to its overall success. If you are passionate about security, possess strong leadership skills, and thrive in a fast-paced environment, we encourage you to apply for this challenging and rewarding position.Unleash Your PotentialWhen you join Salesforce, you'll be limitless in all areas of your life. Our benefits and resources support you to find balance and *be your best*, and our AI agents accelerate your impact so you can *do your best*. Together, we'll bring the power of Agentforce to organizations of all sizes and deliver amazing experiences that customers love. Apply today to not only shape the future - but to redefine what's possible - for yourself, for AI, and the world.AccommodationsIf you require assistance due to a disability applying for open positions please submit a request via this .Posting StatementAny employee or potential employee will be assessed on the basis of merit, competence and qualifications - without regard to race, religion, color, national origin, sex, sexual orientation, gender expression or identity, transgender status, age, disability, veteran or marital status, political viewpoint, or other classifications protected by law. This policy applies to current and prospective employees, no matter where they are in their Salesforce employment journey. It also applies to recruiting, hiring, job assignment, compensation, promotion, benefits, training, assessment of job performance, discipline, termination, and everything in between. Recruiting, hiring, and promotion decisions at Salesforce are fair and based on merit. The same goes for compensation, benefits, promotions, transfers, reduction in workforce, recall, training, and education.In the United States, compensation offered will be determined by factors such as location, job level, job-related knowledge, skills, and experience. Certain roles may be eligible for incentive compensation, equity, and benefits. Salesforce offers a variety of benefits to help you live well including: time off programs, medical, dental, vision, mental health support, paid parental leave, life and disability insurance, 401(k), and an employee stock purchasing program. More details about company benefits can be found at the following link: ******************************************* to the San Francisco Fair Chance Ordinance and the Los Angeles Fair Chance Initiative for Hiring, Salesforce will consider for employment qualified applicants
#J-18808-Ljbffr
A global technology consulting firm is seeking a Senior SecurityAnalyst to support governance in the enterprise security program. The role involves monitoring service provider activities, facilitating audits, and providing expertise on security issues. Ideal candidates should have strong self-management skills, familiarity with security technologies, and security certifications are preferred. This position comes with a comprehensive benefits package and competitive compensation in New York, with a compensation range between $65,586 and $121,980.
#J-18808-Ljbffr
$65.6k-122k yearly 5d ago
Senior Security Analyst
Capgemini 4.5
New York, NY jobs
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired bya collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizationsunlock the value of technology and build a more sustainable, more inclusive world.
The Senior SecurityAnalyst supports the governance of service provider activities in the enterprise security program, monitoring and escalating problems and providing information on security issues. Undertakes security assurance and audit activities to ensure compliance and to identify risks and opportunities. Provides information to senior managers and executives to ensure that they are aware of any security-related risks or opportunities. Provides subject matter expertise, consultancy and training in security-related matters. Must be able to function in a fast-paced, multi-vendor outsourced environment, facilitating conference calls among other subject matter experts and the client.
Responsibilities
Handles monthly reporting duties for the Information Risk Management team.
Facilitates audit planning and audit remediation activities of the service providers, leading calls and documenting and reporting progress.
Has familiarity with security technologies and controls; expertise not required, but the ability to escalate to more senior subject matter experts is important.
Develops work plans to structure solutions and communications.
Involves client and vendor staff appropriately in resolving security problems.
Participates effectively within the business' security governance framework.
Tracks the corrective and preventive actions being taken to improve security to closure.
Possesses strong communication skills to communicate technical and security risk information to management.
Experience
Ability to self-manage with little interaction from other management staff.
Flexible and able to adapt to manage a fast‑changing environment.
Ability to solve complex issues and provide recommendations and advice regarding remediations.
Experience with security architecture, security software, or security policy.
Ability to organize agendas, lead conference calls, and track action items to completion.
Security and Audit certifications such as SSCP, CISSP, CISA, CISM, CGEIT, CRISC, Security+ are preferred.
Job Description - Grade Specific
The base compensation range for this role in the posted location is: $65,586-121,980.
Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The base compensation range listed for this position reflects the minimum and maximum target compensation Capgemini, in good faith, believes it may pay for the role at the time of this posting. This range may be subject to change as permitted by law.
The actual compensation offered to any candidate may fall outside of the posted range and will be determined based on multiple factors legally permitted in the applicable jurisdiction.
These may include, but are not limited to: Geographic location, Education and qualifications, Certifications and licenses, Relevant experience and skills, Seniority and performance, Market and business consideration, Internal pay equity.
It is not typical for candidates to be hired at or near the top of the posted compensation range.
In addition to base salary, this role may be eligible for additional compensation such as variable incentives, bonuses, or commissions, depending on the position and applicable laws.
Capgemini offers a comprehensive, non‑negotiable benefits package to all regular, full‑time employees. In the U.S. and Canada, available benefits are determined by local policy and eligibility and may include:
Paid time off based on employee grade (A-F), defined by policy: Vacation: 12‑25 days, depending on grade, Company paid holidays, Personal Days, Sick Leave
Medical, dental, and vision coverage (or provincial healthcare coordination in Canada)
Retirement savings plans (e.g., 401(k) in the U.S., RRSP in Canada)
Life and disability insurance
Employee assistance programs
Other benefits as provided by local policy and eligibility
Important Notice: Compensation (including bonuses, commissions, or other forms of incentive pay) is not considered earned, vested, or payable until it becomes due under the terms of applicable plans or agreements and is subject to Capgemini's discretion, consistent with applicable laws. The Company reserves the right to amend or withdraw compensation programs at any time, within the limits of applicable legislation.
Disclaimers
Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. Capgemini also participates in the Partnership Accreditation in Indigenous Relations (PAIR) program which supports meaningful engagement with Indigenous communities across Canada by promoting fairness, accessibility, inclusion and respect. We value the rich cultural heritage and contributions of Indigenous Peoples and actively work to create a welcoming and respectful environment. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law.
Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodation does not pose an undue hardship. Capgemini is committed to providing reasonable accommodation during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact.
Ref. code 385096-en_US
Posted on 05 Jan 2026
Contract type Permanent
Location Atlanta, Austin, Bellevue, Berwyn, Bridgewater, Brooklyn, Burlington, Chicago, Columbia, Dallas, Dayton - Sogeti US, Guaynabo, Houston, Irving, Mclean, Nashville, New York, San Francisco, Santa Clara, Seattle, Southfield, Tampa, Westerville
#J-18808-Ljbffr
$65.6k-122k yearly 5d ago
Senior Security Engineer, Google Public Sector
Google Inc. 4.8
Urban Honolulu, HI jobs
Apply
Must be a US Citizen to meet customer and compliance requirements, including potential access to classified information. This position requires onsite client-facing work 5 days a week in Honolulu, Hawaii.
Bachelor's degree in Computer Science, IT, or related field or equivalent practical experience.
5 years of experience with security assessments, security design reviews, or threat modeling.
5 years of experience with security engineering, computer and network security, and security protocols.
Experience delivering comprehensive security solutioning through design, coding, configuration, and deployment.
Must possess an active Top Secret/SCI Security Clearance.
Must currently have or be able to obtain advanced DoD 8140 DCWF certification.
Preferred qualifications
Certifications in CISSP, CISM, GCIH, GCIA, or OSCP.
Experience in a regulated industry (e.g., finance, healthcare, government).
Experience securing cloud environments (Cloud Computing Platform, Google Cloud Platform).
Understanding of cloud security principles and best practices.
About the job
Security is at the core of Google's design and development process: it is built into the DNA of our products. The same is true of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't come at the expense of customer service - you will be our bodyguard (and our long lost pal).
The GPS Cyber Defense and Security Operations Group leads our Security Operations (SECOPs) function for a range of GPS platforms and services. Combining Mandiant's deep security experience with Google technologies, our team sets the standard in Security Engineering, Assessment, and Operations across Government Cloud programs.
Google Public Sector brings the magic of Google to the mission of government and education with solutions purpose-built for enterprises. We focus on helping United States public sector institutions accelerate their digital transformations, and we continue to make significant investments and grow our team to meet the complex needs of local, state and federal government and educational institutions.
The US base salary range for this full-time position is $166,000-$244,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
Implement security monitoring strategies, incident response plans, and security awareness programs.
Oversee the deployment and operation of security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS) and other security tools.
Leverage cyber threat intelligence to conduct ongoing network hunt activities and identify active and dormant threats within the environment.
Develop and implement custom-built AI-driven security detections and workflows.
Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See also Google's EEO Policy, Know your rights: workplace discrimination is illegal, Belonging at Google, and How we hire.
Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting.
To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes.
#J-18808-Ljbffr
$123k-155k yearly est. 1d ago
Security Analyst
Matlen Silver 3.7
Charlotte, NC jobs
Title: SecurityAnalyst
Duration: 1 year, contract to hire
Environment: 5 Days onsite (NON NEGOTIABLE)
Pay: $52-$65/hour W2 (NO C2C)
** Due to client requirements, US Citizen or Green Card Holders ONLY**
Requirements:
Minimum 7+ years of professional related experience
Previous experience in financial services, banking, wealth management, credit card, or payment processing: preferably in enterprise level environment
Lead and drive cybersecurity initiatives across a range of projects, balancing scope, priorities, and business needs while operating in a fast-paced, multi-tasking environment.
Bring strong hands-on experience with Identity Governance and Administration (IGA) platforms such as SailPoint, Saviynt, Oracle Identity Governance (OIG), or ForgeRock, with the ability to identify and resolve access and security issues.
Apply strong analytical skills to work with complex data, including writing SQL queries, Python, and shell scripts to extract, analyze, and validate information from databases and file systems.
Design, build, and maintain meaningful dashboards and metrics that provide insight into security posture, performance, and operational effectiveness.
Collaborate closely with IAM teams, business users, and leadership to remediate issues, improve processes, and support access governance objectives.
Mentor and train junior analysts, helping to improve workflows, consistency, and overall team capability.
Nice to have: 7+ years of experience with any IGA Platforms
Responsibilities:
This project focuses on reviewing user access on a daily basis to confirm it aligns with established controls and application requirements. The team works closely with application owners and business partners to address access issues, follow through on remediation, and escalate items when needed. Team members are supported and coached on the process to ensure work is completed accurately and consistently. Overall, the effort helps maintain strong access governance while keeping day-to-day operations running smoothly.
$52-65 hourly 1d ago
Senior Security Engineer, AWS Security
Amazon 4.7
San Francisco, CA jobs
Amazon Web Services (AWS) is the leading cloud provider, providing virtualized infrastructure, storage, networking, messaging, and many other services to customers all over the world. AWS runs a globally distributed environment, operating at massive levels of scale. Businesses, from start-ups to enterprises, run their operations and applications on AWS' multi-tenant infrastructure.
Key Job Responsibilities
As a Senior Security Engineer, you'll help to build and manage services that detect and automate the mitigation of cybersecurity threats across Amazon's infrastructure. You'll work with data scientists, software development engineers, and other security engineers across multiple teams to develop innovative security solutions. Our services protect the AWS cloud for all customers and preserves our customers' trust in us. You'll get to use the full power and breadth of AWS technologies to build services that proactively protect AWS customers, both internally and externally, from security threats.
You will be working in a team of industry-leading security experts working with UK customers to operate and continuously improve industry-leading security programs and processes. This team manages the underlying security programs and processes for personnel security, physical and logical accreditations, education, awareness and training, assurance, and cybersecurity. This position will have visibility at senior levels of government agencies, commercial institutions, and AWS including interaction with CISOs, CTOs, their staffs, and AWS senior leadership.
In addition to a strong understanding of security technologies, tool development, offensive and defensive security tactics, and ideally some experience with distributed systems, you'll need a number of other qualities to be successful in this role. The team has a mix of experience levels, and we're building an environment that celebrates knowledge sharing and mentorship. Our senior engineers, data scientists, and managers truly enjoy mentoring junior engineers, data scientists, and engineers from non-traditional backgrounds through one‑on‑one mentoring and thorough, but kind, code reviews.
You will need to be a UK national and able to obtain and maintain a UK Government Security Clearance. Further details found here: *******************************************************************************************
About the Team
Diverse Experiences: Amazon Security values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying.
Why Amazon Security? At Amazon, security is central to maintaining customer trust and delivering delightful customer experiences. Our organization is responsible for creating and maintaining a high bar for security across all of Amazon's products and services. We offer talented security professionals the chance to accelerate their careers with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations, and physical stores.
Inclusive Team Culture: AWS values curiosity and connection. Our employee‑led and company‑sponsored affinity groups promote inclusion and empower our people to take pride in what makes us unique. Our inclusion events foster stronger, more collaborative teams. Our continual innovation is fueled by the bold ideas, fresh perspectives, and passionate voices our teams bring to everything we do.
Training & Career Growth: We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge‑sharing, training, and other career‑advancing resources here to help you develop into a better‑rounded professional.
Work/Life Balance: We value work‑life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve.
Basic Qualifications
Extensive experience performing security investigations, penetration testing, and/or incident response in the context of large organisations
In‑depth understanding of security threats, hands‑on experience detecting and defending from cyber attacks, and experience using big data analytics and orchestration to address security challenges. Ability to develop code with at least one modern language such as Java, Go, TypeScript, Python, Rust and security code review
Demonstrated technical leadership in security (e.g., tech lead, developed security architecture for a product or system, led technical component of security project, etc.) Experience leading and coaching junior security engineers to improve their skills and effectiveness
Preferred Qualifications
BS or MS in a STEM related field. Understanding of the Mitre ATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow)
Have awareness and understanding of current cybersecurity threats, actors and their techniques. Experience with data science, big data analytics technology stack, analytic development for endpoint and network security, and streaming technologies (e.g., Kafka, Spark Streaming, and Kinesis)
Strong sense of ownership combined with collaborative approach to overcoming challenges and influencing organisational change
Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We make recruiting decisions based on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice (**************************************** to know more about how we collect, use and transfer the personal data of our candidates.
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit ********************************************************* for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Posted: January 24, 2026 (Updated 2 days ago)
#J-18808-Ljbffr
A leading cloud provider is seeking a Senior Security Engineer to help build and manage services that detect and mitigate cybersecurity threats. Candidates should have extensive experience in security investigations, a deep understanding of security threats, and be proficient in code development using various languages. The role involves mentoring junior engineers and improving security programs within AWS. Strong leadership skills and a collaborative approach are essential for success in this position.
#J-18808-Ljbffr
$147k-192k yearly est. 3d ago
Senior Network & Security Consultant - Remote
Thales Group 4.5
Palo Alto, CA jobs
A leading global security company in California is seeking a Consultant for Network & Security. Key responsibilities include acting as a technical advisor, defining architecture for solutions, and supporting operational teams. Ideal candidates should have expertise in firewalls, encryption, and IT security practices. The role offers hybrid working conditions and emphasizes continuous learning and coaching.
#J-18808-Ljbffr
A leading cybersecurity firm in California is seeking a Senior Consultant for Network Security Engineering. This role involves designing and implementing secure network solutions across various environments. The ideal candidate will have a strong background in network security, experience with technologies like Palo Alto and Cisco, and a focus on delivering risk-based recommendations. This position offers a hybrid work model, competitive remuneration, and opportunities for professional development.
#J-18808-Ljbffr
$104k-138k yearly est. 3d ago
Staff Cyber Security Engineer
Infovision Inc. 4.4
Dallas, TX jobs
As a Staff CyberSecurity Engineer, you will collaborate closely with the Engineering Organization, IT, Information Security, Software Engineers, and our DevOps departments.
Your team will ensure our embedded platforms, back-end and front-end services, cloud infrastructure, DevOps pipelines, data pipelines, and software are secured in the most efficient manner.
You will work to develop new systems and procedures to counteract threat vectors that arise within our cloud and embedded environments.
The ideal candidate is passionate about understanding complex architectures they work in and is adept at translating non-functional security requirements to red-team actions.
The ideal candidate is also a meticulous problem solver who can work under pressure when required and remains current with the latest attack trends and technologies.
Preferred Qualifications:
Master's degree in Computer Science or relevant field of study.
Cyber related certifications such as CompTIA CySA+, CISSP, CHFI, OSCP.
Experience in digital forensics.
Working experience within a DevSecOps environment.
Minimum Qualifications
Expertise in secure API integration design and implementation
Expertise in the OWASP top 10 for web applications, and LLMs along with mitigation and remediation techniques
Bachelor's degree in Computer Science, Information Technology, or a related field.
Extensive experience in cybersecurity within software engineering environments.
Experience with a programming language (C/C++, Python, Go, JavaScript / TypeScript, Rust)
Proficiency in cloud security, threat detection, data analysis, and incident response.
Expertise with security tools such as BurpSuite, PyRIT, Garak, MitM, Metasploit, Wireshark, Wiz, Sonarqube
Experience standing up Security tooling to automate security hygiene, analysis, reporting or otherwise host tools or enhance intel capabilities
Strong technical knowledge of microservice architecture, content distribution networks, data lakes, serverless functions, and databases.
Familiarity with various cloud platforms and DevOps tools.
Excellent analytical and problem-solving skills.
Strong communication skills, both written and verbal.
Ability to independently develop and implement security solutions.
Experience in developing and implementing automated security testing functions.
$77k-100k yearly est. 22h ago
Senior Security Engineer
OSI Engineering 4.6
Mountain View, CA jobs
A globally leading consumer device company headquartered in Mountain View, CA is looking for a Senior Offensive Security Engineer to proactively identify, exploit, and help eliminate security weaknesses across our web platforms and AI/ML systems. In this role, you will think like an attacker, operate with engineering rigor, and work closely with product, platform, and AI teams to raise the security bar across the organization. You will lead complex penetration tests, design novel attack techniques for web and modern AI-powered applications, and influence secure-by-design architecture at scale.
Responsibilities:
• Conduct offensive security assessments on large-scale web applications, REST APIs, and cloud-backed services.
• Identify and validate vulnerabilities including injection flaws, access control
issues, authentication/authorization weaknesses, SSRF, deserialization, and logic
bugs.
• Evaluate LLM-based systems and AI agents for prompt injection, data exfiltration, model abuse and jailbreaks
• Design and execute red team-style engagements simulating real-world adversaries.
• Develop custom exploitation tools, PoCs, and fuzzers for web and AI attack surfaces.
• Identify systemic security weaknesses and collaborate with engineering teams to drive long-term mitigations.
• Review architectures and designs for new products with an attacker mindset.
• Produce clear, actionable security reports and present findings to technical and executive stakeholders.
Minimum Qualifications:
• Master's degree in Computer Science, Computer Engineering, Information Security, or a closely related technical field.
• Doctorate (PhD) in a relevant field is a plus but not required.
• 5+ years of experience in offensive security, penetration testing, or red teaming.
• Deep expertise in web application security.
• Strong understanding of API security.
• Hands-on experience testing AI/ML or LLM-based systems, or strong motivation with demonstrated research in this area.
• Proficiency in at least one scripting or programming language (Python, Go, JavaScript, or similar).
• Strong knowledge of common exploitation techniques and attacker tooling.
Preferred Qualifications:
• Prior work on adversarial ML, red-teaming AI systems, or secure LLM pipeline
design.
• Experience with cloud security (AWS, GCP, Azure) and containerized environments.
• Background in security research, published CVEs, CTF experience, blog posts, or conference talks.
• OSCP, OSEP, OSWE, CRTO, or similar.
What We Look For:
• An attacker-first mindset with strong engineering discipline.
• Ability to go beyond scanners and find novel, high-impact vulnerabilities.
• Clear communicator who can translate complex exploits into actionable fixes.
• Curiosity about emerging threats, especially in AI security.
• Ownership mentality and comfort operating in ambiguous problem spaces.
Type: Contract
Duration: 12 months with extension
Work Location: Mountain View, CA (on site)
Pay Range: $ 85.00 - $ 100.00 (DOE)
$85-100 hourly 3d ago
Security Engineer
TSR Consulting 4.9
San Francisco, CA jobs
6 months +Contract-San Francisco CA
Remote role
Pay $100 on w-2
Key Management Engineer
Role Overview: We are seeking a skilled Key Management Engineer to join our team, with expertise in the architecture and tools for both symmetric and asymmetric key management, including Public Key Infrastructure (PKI). This role requires experience managing cryptographic keys for applications, databases, infrastructure, including storage subsystems, and working with cloud-based tools and solutions. A solid understanding of infrastructure utilizing cryptographic keys, experience with Hardware Security Modules (HSMs), basic development skills in Java and Python, and strong documentation and execution abilities are essential.
Key Responsibilities:
• Design and implement architectures for symmetric and asymmetric key management solutions with a focus on PKI.
• Manage and maintain cryptographic key infrastructure services, including key lifecycle management processes from creation to retirement.
• Deploy and secure cryptographic keys for applications, databases, infrastructure, and storage subsystems, ensuring adherence to security standards and best practices.
• Utilize and configure tools and products for key management, including those used in cloud environments such as AWS KMS, Azure Key Vault, and Google Cloud Key Management Service.
• Integrate key management solutions into existing infrastructure, collaborating with cross-functional teams to ensure comprehensive security measures.
• Configure, deploy, and manage Hardware Security Modules (HSMs) for secure key storage and operations, utilizing products like Thales, Gemalto, or SafeNet.
• Develop scripts and applications using Java and Python to automate key management tasks and processes.
• Document key management procedures, policies, and architecture designs to enhance operational efficiency and facilitate effective knowledge transfer.
• Conduct regular assessments and audits of cryptographic systems to ensure compliance with industry best practices and standards.
• Provide training and guidance to technical teams on key management best practices and security protocols.
Qualifications:
• Proven experience in designing and implementing key management solutions, with emphasis on symmetric and asymmetric cryptography, including PKI.
• Experience in key lifecycle management processes, involving key creation, distribution, rotation, and revocation.
• Ability to deploy and secure cryptographic keys effectively for applications, databases, infrastructure, and storage subsystems.
• Strong understanding of key management infrastructure and protocols, including HSM configurations and operations.
• Experience with cloud-based key management tools like AWS KMS, Azure Key Vault, and Google Cloud Key Management Service.
• Basic development skills in Java and Python with the ability to script and automate routine processes.
• Hands-on experience with key management tools and products such as Thales HSM, Gemalto HSM, SafeNet, Microsoft Active Directory Certificate Services, OpenSSL, etc.
• Excellent documentation skills, able to produce clear and comprehensive technical documents and user guides.
• Strong analytical and problem-solving skills to troubleshoot complex issues.
• Demonstrated experience working in environments requiring strict security and compliance standards, familiar with frameworks like NIST, ISO 27001, and CIS.
Technical Skills:
• Familiarity with network security concepts and secure communication protocols.
• Understanding of cloud security concepts and practices.
• Knowledge of network security concepts and secure communication protocols.
• Experience with security standards and frameworks (e.g., NIST, ISO 27001).
Preferred Qualifications:
• Bachelor's degree in Computer Science, Information Security, or a related field.
• Experience with security operations tools and best practices.
• Application Process: Interested candidates should submit their resume along with a cover letter detailing relevant experience and qualifications. This role represents an excellent opportunity to contribute substantially to the security infrastructure
$126k-171k yearly est. 3d ago
Consultant Network & Security
Thales Group 4.5
Palo Alto, CA jobs
Consultant Network & Security page is loaded## Consultant Network & Securityremote type: Hybrid or Remotelocations: Contern\_EXCtime type: Full timeposted on: Posted 30+ Days Agojob requisition id: R0287400Les entreprises et les gouvernements comptent sur Thales pour apporter de la confiance aux milliards d'interactions numériques qu'ils établissent avec les utilisateurs. L'Activité Mondiale Identité & Sécurité Numériques (DIS) fournit des technologies et services (des logiciels sécurisés en passant par la biométrie ou encore le cryptage), qui permettent aux entreprises ainsi qu'aux gouvernements de vérifier des identités, et de protéger les données afin qu'elles restent sûres.**Tasks and responsibilities*** Act as the dedicated technical advisor towards the customer in the limit of the scope of skills of the consultant* Gather technical needs from customer and propose the most adapted solutions to customer* Define architecture and participate to conception of technical solutions* Realize advisory and expertize missions* Support Account Managers during the presales phase of writing offers to customers such as “Proof of Concept” realization, writing Statements of Work, technical solutions presentations, preparation of technical aspects for all call for tenders* Implement and support operational teams during rollout phases* Manage and ensure engagement on deliverables in due time in the limit of the scope of skills of the consultant* Maintain updated general skills on network security (best practices, protocols, security fundamentals, risks identification, methodology etc.)* Technical skills to maintain updated (certifications / self-training / trainings to follow) further to the Personal targets defined* Skills, tailor made trainings and knowledge transfer towards customers* Skills, tailor made trainings and knowledge transfer towards team mates (to ensure coverage in case of absence)* Coaching junior consultants in order to make them grow up in terms of soft and technical skills* Coaching trainees (manage and follow up of the whole internship of the trainees)* Creativity in problem solving on a constant basis in day to day tasks and in exceptional tasks (such as incidents) in the limit of the scope of skills of the consultant* Detect and evaluate level of importance of any crisis situation* Escalate any crisis situation (previously detected and evaluated by the junior consultant himself) to confirmed and senior peers when necessary* Reporting and documentation (French and English)* Act the role of Back-Up for 1rst/2nd line support Engineer* Act the role of 3rd line for the SOD in the limit of the scope of skills of the consultant**Prerequisite**Expertise in one or more of the following areas:* Firewalls,* Web and Database Application firewalls,* Protection systems against unknown threats (Sandboxing* Messaging Security,* Strong authentication and SAML identity federation, OpenID Connect, …* Encryption (IPSEC VPN, data encryption, …),* Hardware Security Module (HSM),* More specifically, you are familiar with the technologies of the following manufacturers,* Firewalls: Checkpoint, Palo Alto Networks, Fortinet,* Web Proxy: Bluecoat ProxySG, McAfee Web Gateway R,* Load Balancing / WAFF: F5, Netscaler, DenyAll, Imperva,* Email Security: Cisco, TrendMicro, Trustwave,* Strong authentication: RSA, Gemalto, RCDevs,* HSM: Gemalto, Thales,* Sandboxing: BlueCoat MAA, TrendMicro,* Identity Federation: Microsoft ADFS, auth0, okta.**Security*** In-depth knowledge of IT security practices, including identity and access management, vulnerability management, network and operating system security, and application security* Competence in cryptography and data security* Knowledge of information security standards and regulations* Experience in detecting and responding to information security incidents, including compliance management and conducting information security audits**Back-up**Other Senior consultants / Practice Leader/ Team LeaderThales, entreprise Handi-Engagée, reconnait tous les talents. La diversité est notre meilleur atout. Postulez et rejoignez nous !remote type: Hybrid or Remotelocations: Contern\_EXCtime type: Full timeposted on: Posted 30+ Days Ago
#J-18808-Ljbffr
$104k-138k yearly est. 5d ago
Senior Security Engineer
Loft Orbital, Inc. 4.0
San Francisco, CA jobs
Loft Orbital is revolutionizing access to space by building reliable, shareable satellites that drastically reduce the time and complexity traditionally required to get to orbit. We operate satellites, fly customer payloads, and handle entire missions from end‑to‑end. We're a close‑knitted team of space enthusiasts, software experts, and cutting‑edge technologists, all working together to make space simple for our customers.
As a Senior Security Engineer on our Security and Compliance Team, your mission will be to ensure that our highly automated, containerized, and globally distributed infrastructure remains secure throughout its lifecycle, from architecture to incident response. You'll be at the heart of our DevSecOps efforts, collaborating directly with infrastructure, software, product, and solution teams to scale Loft's security maturity while embracing our startup agility and culture.
This is a hands‑on, deeply collaborative role, offering broad scope, rapid growth opportunities, and yes, a chance to contribute to space missions.
About the Role:
Champion DevSecOps best practices by designing and implementing security controls directly into our CI/CD pipelines (e.g., GitLab CI).
Lead and automate application and infrastructure security assessments, including threat modeling and code review.
Partner with developers and SREs to identify, remediate, and prevent vulnerabilities through secure design and practical guidance.
Design, build, and maintain secure architecture patterns for containerized, cloud‑native, and distributed workloads.
Develop and maintain automated security tooling, such as container image scanning, IaC validation, and policy‑as‑code.
Collaborate on automated security tooling for container image scanning, IaC validation, and RBAC compliance.
Support incident response workflows, including detection, forensics, root cause analysis, and post‑mortems.
Provide technical mentorship and real‑time enablement to help teams adopt a “secure‑by‑default” mindset.
Contribute to internal security tools and automation using Python, Go, or other modern languages.
Continuously improve how we measure and scale security across our SRE and infrastructure platforms.
Must Haves:
Deep experience with cloud security in AWS, Azure, or GCP environments.
Strong knowledge of container and Kubernetes security in production environments.
Proficiency in at least one modern programming language (e.g., Python, Go, C++).
Hands‑on experience with zero‑trust architecture, service mesh, and software‑defined networking.
Solid understanding of DevSecOps pipelines, IaC tools, and secure build processes.
Hands‑on experience with vulnerability scanning, SAST/DAST tools, and automated security testing.
Proven success in fast‑paced, highly collaborative environments, ideally at a startup or scale‑up.
Comfortable working closely with developers and SREs in an enablement‑first security culture.
Clear, concise communication and documentation skills.
Ability to thrive in a multicultural, globally distributed engineering team.
Nice to Haves:
Practical experience with policy‑as‑code (OPA, Sentinel, etc.).
Understanding of software‑defined networking and security policy enforcement in mesh environments.
Familiarity with modern SRE practices, observability, and resilience engineering.
Contributions to open‑source security tools or frameworks.
Interest or experience in space operations or aerospace systems.
Some of Our Awesome Benefits:
100% company‑paid medical, dental, and vision insurance option for employees and dependents
Flexible Spending (FSA) and Health Savings (HSA) Accounts offered with an employer contribution to the HSA
100% employer paid Life, AD&D, Short‑Term, and Long‑Term Disability insurance
Flexible Time Off policy for vacation and sick leave, and 12 paid holidays
401(k) plan and equity options
Daily catered lunches and snacks in office
International exposure to our team in France
Fully paid parental leave; 14 weeks for birthing parent and 10 weeks for non‑birthing parent
Carrot Fertility provides comprehensive, inclusive fertility healthcare and family‑forming benefits with financial support
Off‑sites and many social events and celebrations
Relocation assistance when applicable
$140,250 - $190,000 a year
State law requires us to tell you the base compensation range for this role, which is $140,250- $190,000 per year. This is determined by your education, experience, knowledge, skills, and abilities. The salary range for this role is intentionally wide as we evaluate individuals based on their unique experience and abilities to fit our needs. Most importantly, we are excited to meet you, and see if you are a great fit for our team. What we can't quantify for you are the exciting challenges, supportive team, and amazing culture we enjoy.
* Research shows that while men apply to jobs where they meet an average of 60% of the criteria, women and other underrepresented people tend to only apply when they meet 100% of the qualifications. At Loft, we value respectful debate and people who aren't afraid to challenge assumptions. We strongly encourage you to apply, even if you don't check all the boxes.
Who We Are
Loft: Space Made Simple.
Founded in 2017, Loft provides governments, companies, and research institutions with a fast, reliable, and flexible way to deploy missions in orbit.
We integrate, launch, and operate spacecraft, offering end‑to‑end missions as a service across Earth observation, IoT connectivity, in‑orbit demonstrations, national security missions, and more. Leveraging our existing space infrastructure and an extensive inventory of satellite buses, Loft is reducing years‑long integration and launch timelines to months. With more than 25 missions flown, Loft's flight heritage and proven technologies enable customers to focus on their mission objectives.
At Loft, you'll be given the autonomy and ownership to solve significant challenges, but with a close‑knot and supportive team at your back. We believe that diversity and community are the foundation of an open culture. We are committed to hiring the best people regardless of background and make their time at Loft the most fulfilling period of their career.
We value kind, supportive and team‑oriented collaborators. It is also crucial for us that you are a problem solver and a great communicator. As our team is international, you will need strong English skills to better collaborate, easily communicate complex ideas and convey important messages.
With 4 satellites on‑orbit and a wave of exciting missions launching soon, we are scaling up quickly across our offices in San Francisco, CA | Golden, CO | and Toulouse, France.
As an international company your resume will be reviewed by people across our offices so please attach a copy in English.
#J-18808-Ljbffr
$139k-189k yearly est. 4d ago
Principal Offensive Security Engineer, Hardware
Openai 4.2
San Francisco, CA jobs
A leading AI research company in San Francisco is hiring a Principal Offensive Security Engineer. In this role, you will craft attack simulations and collaborate with teams to strengthen security posture across products. The ideal candidate has over 7 years of experience, exceptional programming skills, and a strong background in identifying vulnerabilities. This position offers an opportunity to influence security strategy and contribute to innovative projects in a dynamic environment.
#J-18808-Ljbffr
$125k-175k yearly est. 2d ago
Offensive Security Engineer, Hardware
Openai 4.2
San Francisco, CA jobs
Security is at the foundation of OpenAI's mission to ensure that artificial general intelligence benefits all of humanity. The Security team protects OpenAI's technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.
About the Role
We're seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI's security posture. This role isn't your typical red team job - it's an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization.
You have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting-edge technologies, and use your unique attacker perspective to shape our security strategy. This role will be primarily focused on continuously testing our hardware products and related services.
In this role you will:
Collaborate proactively with engineering teams to enhance security and mitigate risks in hardware, firmware, and software.
Perform comprehensive penetration testing on our diverse suite of products.
Leverage advanced automation and OpenAI technologies to optimize your offensive security work.
Present insightful, actionable findings clearly and compellingly to inspire impactful change.
Influence security strategy by providing attacker-driven insights into risk and threat modeling.
You might thrive in this role if you have:
7+ years of hands‑on experience or exceptional accomplishments demonstrating equivalent expertise.
Exceptional skill in code review, identifying novel and subtle vulnerabilities.
Demonstrated mastery assessing complex technology stacks, including:
Proven ability to reverse engineer bootrom images, firmware, or silicon‑level components.
Deep familiarity with low‑level kernel operations, secure boot processes, and hardware‑software interactions.
Hands‑on experience building and validating secure boot chains and threat models.
Proficiency with hardware debugging tools (UART, JTAG, SWD, oscilloscopes, logic analyzers).
Solid programming skills in C/C++, Python, or assembly for embedded systems.
Industry experience securing consumer hardware (e.g., mobile devices, IoT, chipsets).
Excellent written and verbal communication skills for technical and non‑technical audiences.
Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts.
Excellent coding skills, capable of writing robust tools and automation for offensive operations.
Ability to communicate complex technical concepts effectively through compelling storytelling.
Proven track record of not just finding vulnerabilities but actively contributing to solutions in complex codebases.
Prior experience working in tech startups or fast‑paced technology environments.
Experience in related disciplines such as Software Engineering (SWE), Detection Engineering, Site Reliability Engineering (SRE), Security Engineering, or IT Infrastructure.
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general‑purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with applicable law, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non‑public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non‑compliant, please submit a report through this form . No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.
#J-18808-Ljbffr
$125k-175k yearly est. 2d ago
Information System Security Officer (ISSO)
ASRC Federal Holding Company 4.2
Cyber security analyst job at ASRC Federal
ASRC Federal has an exciting opportunity for an Information System Security Officer (ISSO in) in Dayton, Ohio. This position offers a sign-on bonus. Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Responsibilities:
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
Report all security-related incidents to the ISSM
Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
Serve as member of the CCB, if designated by the ISSM;
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Responsibilities:
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or relatedfield
5-8 years demonstrated performance in related technology
Top Secret w/ SCI eligibility
Other duties as assigned