Post job

Certified information systems security professional jobs near me - 306 jobs

jobs
Let us run your job search
Sit back and relax while we apply to 100s of jobs for you - $25
  • Radar: Real-Time Identity Security Engineer (Remote | Equity)

    Workos

    Remote certified information systems security professional job

    A technology company is seeking a skilled software engineer to join their Radar team, focusing on building systems for real-time identity event processing. The ideal candidate will have over 5 years of experience in software development, a background in large-scale systems, and strong collaboration skills. This position offers flexible remote work and comprehensive benefits, including healthcare coverage, equity grants, and generous paid time off. Join a growing team committed to delivering a seamless identity security platform. #J-18808-Ljbffr
    $114k-163k yearly est. 4d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Defense ML Engineer - AI for National Security, Remote

    Phase2 Technology 3.9company rating

    Remote certified information systems security professional job

    A leading technology firm in McLean, Virginia is seeking a Machine Learning Engineer to develop mission-critical AI solutions. You'll collaborate with data engineers and scientists to deploy models that enhance national security. The ideal candidate should have over 3 years of experience in artificial intelligence and a strong proficiency in Python and machine learning techniques. This role offers flexible work arrangements and comprehensive benefits. #J-18808-Ljbffr
    $89k-120k yearly est. 2d ago
  • Senior Security Operations Analyst

    Extend A Care for Kids 3.5company rating

    Remote certified information systems security professional job

    About Extend: Extend is revolutionizing the post-purchase experience for retailers and their customers by providing merchants with AI-driven solutions that enhance customer satisfaction and drive revenue growth. Our comprehensive platform offers automated customer service handling, seamless returns/exchange management, end-to-end automated fulfillment, and product protection and shipping protection alongside Extend's best-in-class fraud detection. By integrating leading-edge technology with exceptional customer service, Extend empowers businesses to build trust and loyalty among consumers while reducing costs and increasing profits. Today, Extend works with more than 1,000 leading merchant partners across industries, including fashion/apparel, cosmetics, furniture, jewelry, consumer electronics, auto parts, sports and fitness, and much more. Extend is backed by some of the most prominent technology investors in the industry, and our headquarters is in downtown San Francisco. What You'll Do: Serve as a core member of Security Operations, monitoring and triaging alerts from platforms such as SentinelOne and Wiz. Perform end-to-end investigations to identify, contain, and remediate threats and incidents, driving timely, appropriate response. Proactively identify and assess vulnerabilities in infrastructure and code, working with development and other cross functional teams to address issues. Contribute to the end-to-end detection lifecycle: model attacker behaviors (MITRE ATT&CK), write and test detections as code across security programs and tooling (SentinelOne, Wiz, Okta, AWS CloudTrail), and continuously enrich to reduce false positives and improve MTTD. Support data quality and telemetry onboarding, maintain response playbooks, and provide threat validation assistance across the business. Assist teams with the application of secure configuration baselines and best practices in accordance with CIS Benchmarks, NIST, vendor hardening guides, and applicable compliance standards across all company computing assets. Correlate endpoint and infrastructure telemetry to identify emerging threats. Curate and operationalize intelligence (IOCs, TTPs) into detections and response playbooks, and maintain vetted intelligence feeds. Assist GRC initiatives by mapping controls to internal policies and frameworks (e.g., SOC 2, NIST CSF, NYC DFS 500), identifying gaps, supporting audits and evidence collection, tracking remediation, and maintaining policies and control documentation. Work with engineering and business teams to champion security best practices, communicate risks to accountable owners, and assist with mitigation planning and execution. What We Are Looking For: 3+ years experience in a Security Analyst / Security Operations role 3+ years experience with AWS CloudFormation, or other infrastructure-as-code systems (like Terraform) 3+ years experience or certification in AWS serverless technologies (API Gateway, Lambda, S3, DynamoDB) Certifications (one or more preferred): CISSP, CCSP, GIAC (GCIH/GCIA/GMON/GCED/GCFA/GREM), cloud security (AWS or cloud agnostic security specialty) or equivalent experience. Proficiency with hands on management and use of SIEM, CNAPP, EDR, Vulnerability Management tooling, and Detection Engineering strategies. Proficiency with AI technologies and the corresponding threat landscape and strategies for mitigation. Understands agentic workflows such as AWS Bedrock, MCP based workflows (or similar technologies) Working Knowledge of best practices around security roles and responsibilities for AWS IAM Experience working with observability services and tooling (including Coralogix, CloudWatch, OpenTelemetry) Ability to perform in a high energy environment with dynamic job responsibilities and priorities Nice to Haves: Experience with AWS Cloud Development Kit(CDK) Experience with Mastra AI Expected Pay Range: $157,000 - $182,000 per year salaried* * The target base salary range for this position is listed above. Individual salaries are determined based on a number of factors including, but not limited to, job-related knowledge, skills and experience. Life at Extend: Working with a great team from diverse backgrounds in a collaborative and supportive environment. Competitive salary based on experience, with full medical and dental & vision benefits. Stock in an early-stage startup growing quickly. Generous, flexible paid time off policy. 401(k) with Financial Guidance from Morgan Stanley. Extend CCPA HR Notice
    $157k-182k yearly Auto-Apply 60d+ ago
  • Senior Backend Engineer - Identity Security & Agentic Systems

    Veza Technologies, Inc.

    Remote certified information systems security professional job

    At Veza, we're building the next generation of Access Identity Security - and we're bringing GenAI into the core of that mission. We're seeking a Senior Backend Engineer who is excited to work on multi-agent systems, LLM-based automation, and Model Context Protocols (MCP) to transform how access control intelligence is built and delivered. This is a rare opportunity to operate at the frontier of LLM research and backend systems engineering, contributing to both the design of scalable architectures and the implementation of intelligent agents that reason, decide, and act. You will: Building APIs and backend services, test and evaluation frameworks in Python/Golang to support agentic workflows. Prototyping and productizing LLM-based capabilities into the identity access pipeline. Developing agent orchestration layers and working with frameworks like LangGraph or AutoGen. Designing systems around context-awareness, memory, and autonomous decision-making. You Have: Education: Bachelor's or Master's degree in Computer Science, Engineering, or a related field. Experience: 5+ years of backend development experience. Strong proficiency in one or more programming languages, such as Python, Golang, or Java. Experience designing and implementing RESTful APIs and Microservices Architectures. Experience with cloud platforms, such as AWS, Azure, or Google Cloud Platform, and familiarity with IAM services and features. Curiosity and/or experience with GenAI technologies, multi-agent systems, or prompt orchestration. Strong communication and interpersonal skills, with the ability to effectively communicate technical concepts to both technical and non-technical stakeholders. Strong sense of Product feature Ownership - from Ideation to Deployment The compensation for this role depends on several factors such as the candidate's skills, qualifications, experience, and work location. For candidates offered a position at the posted job level, the provided range is the expected base salary. This does not include any additional variable compensation, such as commission. Compensation Disclosure $154,000-$210,000 USD Our Culture We're driven to build a strong company culture and are looking for individuals with solid alignment with the following: Ownership Mindset Act with Integrity Guardians of our Customers Opinionated Humility Build Trust, Earn Trust At Veza, your base pay is one part of your total compensation package. For this position, the reasonably expected pay range can be discussed with your recruiter for the level at which this job has been scoped. Your base pay will depend on several factors, including your experience, qualifications, education, location, and skills. In the event that you are considered for a different level, a higher or lower pay range would apply. This position is also eligible for equity and a competitive benefits package. Veza is proud to be an equal opportunity employer. We are committed to equal employment opportunities regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, veteran status, or other applicable legally protected characteristics. We also consider qualified applicants according to applicable federal, state, and local laws. If a candidate with a disability requires an accommodation during the recruitment process, please email ******************* About Veza Veza is the identity security company. Identity and security teams use Veza to secure identity access across SaaS apps, on-prem apps, data systems, and cloud infrastructure. Veza solves the blind spots of traditional identity tools with its unique ability to ingest and organize permissions metadata in the Veza Authorization Graph. Global enterprises like Blackstone, Wynn Resorts, and Expedia trust Veza to visualize access permissions, monitor permissions activity, automate access reviews, and remediate privilege violations. Founded in 2020, Veza is headquartered in Redwood City, California, and is funded by Accel, Bain Capital, Ballistic Ventures, GV, Norwest Venture Partners, and True Ventures. Visit us at veza.com and follow us on LinkedIn, Twitter, and YouTube.
    $154k-210k yearly Auto-Apply 60d+ ago
  • Sr. Information Systems Security Engineer

    Lanteris Space

    Remote certified information systems security professional job

    Please review the job details below. Lanteris Space Systems is seeking a Sr. Information Systems Security Engineer (ISSE) to join our team in Palo Alto, CA. This position may also be performed remotely within the United States. In this role, you will act as an ISSE supporting multiple programs and internal teams. The ISSE is responsible for system security design, requirements development, control implementation, assessment, and compliance support. You will have the opportunity and responsibility to drive technical excellence while ensuring our successful space missions through effective security design and balancing cost and schedule following program requirements. Responsibilities: Perform end-to-end space and ground system security assessments, control implementation, and development of mitigation plans; support the concept of operations, system architecture and design, integration and test environments, and continuous monitoring. Develop system security implementation plans and means of meeting security reporting requirements. Develop policies, procedures, and standards in alignment with NIST standards (e.g., NIST 800-53/800-171) and industry best practices. Perform risk-based security assessments, identify appropriate control and mitigation strategies, and derive and allocate security requirements to the system hardware and software elements. Actively participate in design reviews, technical interchange meetings, and working groups to ensure compliance with security and control requirements. Support trade studies as required to meet system security requirements. Support the Authorization to Operate (ATO) process by generating necessary reporting and accreditation documents, such as Plans of Action and Milestones (POA&Ms). Lead/Facilitate internal and Customer Security Reviews to present security requirements, system assessment, control implementation, and mitigation methods. Ability to validate system hardening based on current DISA STIGs and/or CIS Level 2 benchmarks. Lead and participate in vulnerability tracking, remediation, and closure. Perform system architecture and engineering design, including networking, identity and access management, application and data security, and system design. Minimum Requirements: Must be a U.S. citizen with the willingness and ability to obtain a security clearance Bachelor's degree in computer science, information systems, engineering, business, or related scientific or technical discipline. An additional four years of experience may be substituted for a degree. 8 years of experience in information systems, cyber security, space systems, or related security disciplines. Technical background with practical experience in designing and constructing secure systems, networks, and supporting infrastructure. Experience developing and implementing security controls for commercial, international, and/or U.S. government programs. Experience working with the National Institute of Standards and Technology (NIST) cybersecurity standards (NIST 800-171, NIST 800-53), including the Cybersecurity Maturity Model Certification (CMMC). Understanding and history of performing risk management activities as outlined in the NIST 800-30 and NIST 800-37 Preferred Qualifications: Experience designing and implementing security controls in cloud service providers (AWS, Azure). Working knowledge of industry-standard Cloud Security Posture Management (CPSM) tools. Relevant Cloud Certifications (e.g. CCSP, AWS Cloud Practitioner, AWS Security, Azure Security Engineer Associate). Experience architecting, building, and deploying cloud assets for AWS and Azure. DOD 8570 IAT or IAM Level 3 compliant professional certification (i.e., CISSP or Associate, CASP CE, CCNP Security, CISA, GCED, GCIH, CISM, or GSLC). Experience with security assessment and authorization activities required for Federal systems (e.g., RMF, CMMC, ICD-503, DIACAP) and security development. Proficiency in using cyber-related tools (such as Nessus, NMAP, or Splunk), network scanning, vulnerability scanning, and other penetration testing tools. Significant experience with NIST risk analysis processes and mitigation methods. In support of pay transparency at Lanteris Space Systems, we disclose salary ranges on all U.S. job postings. The successful candidate's starting pay will fall within the salary range provided below and is determined based on job-related factors, including, but not limited to, the experience, qualifications, knowledge, skills, geographic work location, and market conditions. Candidates with the minimum necessary experience, qualifications, knowledge, and skillsets for the position should not expect to receive the upper end of the pay range. ● The base pay for this position within Colorado is: $124,000.00 - $206,000.00 annually.● The base pay for this position within New Jersey is: $124,000.00 - $206,000.00 annually.● The base pay for this position within Delaware is: $124,000.00 - $206,000.00 annually.● The base pay for this position within the Washington, DC metropolitan area is: $137,000.00 - $228,000.00 annually.● The base pay for this position within California is: $143,000.00 - $238,000.00 annually. For all other states, we use geographic cost of labor as an input to develop market-driven ranges for our roles, and as such, each location where we hire may have a different range. We offer a comprehensive package of benefits including paid time off, health and welfare insurance, and 401(k) to eligible employees. More information on our benefits will be shared with candidates as they move forward in the recruitment process. Additionally, this position is incentive eligible with a target based on contribution, company performance, and/or individual results achieved; the specific incentive plan and target amount will be determined based on the role and breadth of contributions. The application window is three days from the date the job is posted and will remain posted until a qualified candidate has been identified for hire. If the job is reposted regardless of reason, it will remain posted three days from the date the job is reposted and will remain reposted until a qualified candidate has been identified for hire. The date of posting can be found on the Lanteris Space Systems Career page at the top of each job posting. To apply, submit your application via the Lanteris Space Systems Career page. Lanteris Space Systems values diversity in the workplace and is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law.
    $143k-238k yearly Auto-Apply 2d ago
  • Information Security Compliance Senior Analyst

    Crypto.com 3.3company rating

    Remote certified information systems security professional job

    At Crypto.com, our dedication to user security is led by our highly experienced Security Team. Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors. The team includes holders of international patents for technologies integrated in our security architecture. Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS. Our Chief Information Security Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy. Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning. The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base. About the Role As our Security Compliance Senior Analyst, you will be tasked with security compliance activities along with our journey. You are expected to take the initiative to assist us with several security compliance programs and certifications. You are required to address and review compliance gaps and give recommendations and support on remediation activities. You will also be trusted to provide technical advice to ensure that security compliance requirements are met throughout all business units. This role requires technical knowledge of network security, especially on-prem and cloud native architectures. A familiarity with US derivatives regulatory frameworks would be advantageous. Job Responsibilities: Assist in our security compliance programs, including ISO27001, ISO27701, PCI-DSS, SOC2 Type 2, and local regulations Participate in internal security and privacy assessments, internal and external audits, compliance certifications, and risk management Provide complete and accurate responses to internal and third-party enquiries on security compliance Perform security compliance assessment activities, including periodic technical, organizational, and third-party risk and control assessments, and managing remediation activities to completion Design and manage necessary control and framework required to comply with international standards and US local regulations Identify and drive process improvements for streamlining global security compliance operations Qualifications: 3-5 years of experience in information security, privacy, IT audit or IT risk management related roles. Prefer experience with one or more of the following: In-house security and privacy operations, conducting security control assessments, risk assessments or audits. Prefer experience with any of the following: ISO27001, ISO27701, SOC1, SOC2, PCI, SOX, COSO, cloud technologies, and data protection regulations and requirements. Ability to analyze and review US and Global privacy and information security compliance and provide guidance. Holders of security-related certifications/qualifications will be an advantage: CISSP, CRISC, CISM, CISA, ISO27001 LA, CIPT, CIPP/E, or other relevant certifications Experience leading compliance initiatives and working with auditors and/or external regulators It's a plus if you: Have experience in information security and privacy management in virtual assets, fintech, online services, platform services, or global services. Have experience in establishing information security and privacy framework to meet US regulations, (CFTC, FINRA, SEC, and other US based regulators.) Are a strong commitment to personal learning and development Are detail minded with an analytical mindset Have good communication skills with an ability to explain complex technical issues to non-technical business users Have prior experience with project management Have an interest and understanding of Blockchain and AI technologies ***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope. Are you ready to kickstart your future with us? BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope. Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team. About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem. Learn more at ******************* Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team. Personal data provided by applicants will be used for recruitment purposes only. Please note that only shortlisted candidates will be contacted.
    $81k-120k yearly est. Auto-Apply 15d ago
  • Senior Security Analyst

    Blackcloak 3.5company rating

    Remote certified information systems security professional job

    BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity. Ready to be on the front lines of cybersecurity? BlackCloak is looking for a sharp and proactive Security Analyst to join our team. In this role, you'll be the first responder, monitoring and triaging security alerts from a variety of sources and leading the charge on security incidents. You'll play a critical part in our continuous compliance program, help develop our threat detection capabilities, and analyze emerging threats. If you're passionate about protecting against cyber threats and thrive in a fast-paced environment, we want to hear from you.What You Will Do Monitor and triage security alerts from a variety of sources including SIEM (SecOps, Sentinel), EDR (SentinelOne, CrowdStrike) and cloud security platforms like Wiz, Orca. Serve as a primary responder for security incidents, executing the incident response lifecycle from initial detection and containment to eradication and recovery. Support development of threat detection library, including incorporating threat intelligence, tuning within security tools, and SOAR response actions. Maintain and draft SOP's and supporting documents for the Incident Response Plan and strategy Analyze phishing attempts, malware, and other cyber threats; partner with Security Engineering to devise additional security controls, administer email security, EDR, ZTNA, and other security tooling configurations to block emerging threats. Participate in a 24/7 on-call rotation to respond to critical security incidents. Support triage and response for compliance alerts and requests, enabling the continuous compliance program at BlackCloak using tools such as Vanta, Drata. Prepare and present detailed incident reports and security metrics to technical and leadership audiences. What You Need To Be Successful 4-6 years of direct experience in a Security Operations Center, incident response, threat intelligence, or similar cybersecurity role. Ability to navigate complex problems, stay cool under pressure, and be highly inquisitive. Hands-on experience with SIEM, SOAR, and other security platforms for log analysis, correlation, automated response, and maturation of detections/runbooks. Deep understanding and practical experience with Endpoint Detection and Response (EDR) tools and their investigative capabilities. Good knowledge of cloud security principles and services in AWS, Azure, or GCP, including experience with security tools like Wiz or Prisma Cloud. Solid understanding of network protocols, operating systems (Windows, Linux, mac OS), and common attack vectors (OWASP, MITRE) Familiarity with identity and access management concepts, including SAML, OAuth, and role-based access control (RBAC) Relevant industry certifications are highly desirable, such as GIAC (GCIH, GCFA), CISSP, or CompTIA Security+. Excellent problem-solving skills and the ability to communicate complex technical concepts to both technical and non-technical audiences. $100,000 - $130,000 a year Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above. About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries. BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes: - 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic. Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: ******************************************************************************************************* #liremote
    $100k-130k yearly Auto-Apply 60d+ ago
  • Senior Security GRC Analyst

    Lambda 4.2company rating

    Remote certified information systems security professional job

    Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU. If you'd like to build the world's best AI cloud, join us. *Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday. What You'll Do Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives Manage IT Risk Register including risk identification, tracking, and prioritization. Assist with and drive remediation of control deficiencies and gaps Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.) Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires Assist control owners with root cause analysis and track risk management action plan progress. Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements You Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives Nice to Have Experience in the machine learning or computer hardware industry Experience with Security by Design and/or Privacy by Design principles Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks. Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) Certified in Risk and Information Systems Control (CRISC) Experience in the AI infrastructure, machine learning and/or computer hardware industry Salary Range Information The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description. About Lambda Founded in 2012, with 500+ employees, and growing fast Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG Our values are publicly available: ************************* We offer generous cash & equity compensation Health, dental, and vision coverage for you and your dependents Wellness and commuter stipends for select roles 401k Plan with 2% company match (USA employees) Flexible paid time off plan that we all actually use A Final Note: You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills. Equal Opportunity Employer Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
    $93k-129k yearly est. Auto-Apply 60d+ ago
  • Information System Security Officer

    Zermount

    Remote certified information systems security professional job

    MILITARY FRIENDLY & PREFERRED - HOH SPONSOR The Information Systems Security Officer (ISSO) is responsible for supporting the full lifecycle of security assessment and authorization (A&A) activities for information systems. The ISSO ensures that assigned systems comply with federal cybersecurity standards and maintain their Authority to Operate (ATO) through continuous monitoring and documentation. The ISSO will be responsible for developing and providing risk assessments, Security Control Assessments (SCA), A&A documentation and various reports, based on NIST guidelines and client's policies, procedures and request. The ISSO will be responsible for providing security recommendations on any system changes or new technologies, analysis on vulnerability scans, conducting continuous monitoring activities, and provide mitigation recommendations for any risks or threats. RESPONSIBILITIES: Lead and conduct Pre-Security Assessment and Authorization (A&A) activities, including stakeholder identification, change request submissions, appointment memorandums, and IT Security Kickoff meetings. Supports the ISBO in day-to-day IT security activities. Assists the ISBO with reviews of the security posture of the system and report any findings to the ISBO, CISO, and the AO. Conduct Information System Categorization by identifying information types, completing FIPS-199 assessments, and facilitating Business Impact Analyses (BIA), Privacy Threshold Analyses (PTA), and Privacy Impact Assessments (PIA). Develop and maintain system security documentation, including: System Administration Plan (SAM) Configuration Management Plan (CMP) IT Contingency Plan (ITCP) Information Security Continuous Monitoring (ISCM) Plan Incident Response Plan (IRP) Security Assessment Report (SAR) System Security Plan (SSP) Coordinate initial and annual ITCP testing in collaboration with the OCIO Business Continuity and Disaster Recovery (BCDR) Office. Develop and manage inter-agency agreements and documentation such as MOUs, MOAs, ISAs, IT Security Waivers, and Risk Acceptance Memorandums. Document and maintain Security Control Implementation details, ensuring updates are made according to required frequency. Coordinate vulnerability and compliance scans, Security Control Assessments (SCA), and track remediation efforts with the IT Security Test Team. Manage and update Plan of Action and Milestones (POA&M) entries, submitting remediated findings for closure. Prepare and present SAR to Authorizing Officials to obtain or renew ATO. Perform Information Security Continuous Monitoring (ISCM) activities to ensure ongoing compliance and security posture of systems. Develop and update project schedule, including A&A / SCA task and milestones, task dependencies, and personnel resources. Conduct A&A activities and tasks and obtain ATO in line with NIST and client guidance and directives. Determining the baseline IT Security requirements for IT Systems, identifying system boundaries, determining information categories, assisting with FIPS-199. Ensure that IT Systems are operated, used, maintained, and disposed of in accordance with internal security policies and practices. Enforce security policies and safeguards on all personnel having access to the IT System for which the ISSO has responsibility. Ensure users and system support personnel have the required authorization and need-to-know; have been indoctrinated; and are familiar with internal security practices before access to the IT System. Implement security controls based on IT System FIPS categorization. Document security control implementation in the system's Security Plan using the client's GRC tool. Document system's risk assessment per client directives and requirements. Review and monitoring system security and audit logs. Develop and maintain Plan of Actions and Milestones (POA&Ms) for IT systems. Update A&A documentation and artifacts on a regular basis (e.g. annually, after approved change). QUALIFICATIONS: A minimum of five (5) years of demonstrated experience in the Information Security or IT field. Demonstrates a proficiency with developing, maintaining and managing SA&A packages. Experience with developing and managing POA&M's. Strong problem solving and analysis skills, self-motivated, and able to work and communicate in a team environment. Strong understanding of federal cybersecurity frameworks (e.g., NIST RMF, FIPS-199, FISMA). Experience in developing and maintaining security documentation and plans. Possess experience conducting CPT's. Experience conducting audit log reviews. Technical experience with conducting vulnerability management, compliance scanning, and providing mitigation techniques. Excellent communication and coordination skills with technical and non-technical stakeholders. Ability to manage multiple systems and projects simultaneously in a dynamic environment. Excellent communication (written and verbal) skills. CERTIFICATION: A minimum of at least one (1) certification that meet DOD 8570 IAT Level II (e.g., Security+, GSEC, CASP) requirements or any equivalent or more advanced. CLEARANCE: Client Suitability and Public Trust LOCATION and HOURS: Location: Primary location is at Zermount HQ (Arlington, VA) and the Client Site (Washington, D.C.). Remote work is authorized. Onsite work at the primary location., may be occasionally required. Hours of Operation (Business Hours): 8:00 am ET - 5:30 pm ET
    $78k-105k yearly est. 60d+ ago
  • Senior Security Compliance Analyst

    Onestudyteam

    Remote certified information systems security professional job

    At OneStudyTeam (a Reify Health company), we specialize in speeding up clinical trials and increasing the chance of new therapies being approved with the ultimate goal of improving patient outcomes. Our cloud-based platform, StudyTeam, brings research site workflows online and enables sites, sponsors, and other key stakeholders to work together more effectively. StudyTeam is trusted by the largest global biopharmaceutical companies, used in over 6,000 research sites, and is available in over 100 countries. Join us in our mission to advance clinical research and improve patient care. One mission. One team. That's OneStudyTeam. We are seeking a Senior Security Compliance Analyst with expertise in Governance, Risk, and Compliance (GRC) to support and enhance our security and compliance programs within the healthcare industry. This role is critical in ensuring adherence to industry regulations, responding to customer audits, and maintaining compliance with ISO 27001, HIPAA, and other security frameworks. The ideal candidate will be a detail-oriented compliance expert who can navigate complex regulatory environments, assist with internal/external audits, and drive continuous improvement in security governance. The ideal candidate must be able to operate independently while delivering on the following duties. What You'll Be Working On: Lead and support customer security audits, responding to security questionnaires and demonstrating compliance with security frameworks. Prepare, coordinate, and manage ISO 27001 audits, including evidence collection, control implementation, and auditor engagement. Ensure ongoing compliance with HIPAA, NIST CSF, and other regulatory requirements applicable to healthcare data security. Develop and maintain policies, procedures, and security documentation to meet regulatory and contractual obligations. Perform gap analyses and risk assessments to identify and remediate compliance risks. Manage and improve security governance frameworks, ensuring alignment with industry best practices and business objectives. Conduct third-party vendor risk assessments, ensuring compliance with security policies and contractual obligations. Monitor security controls, ensuring effectiveness and continuous improvement in alignment with security frameworks. Support security awareness training initiatives, ensuring employees understand compliance responsibilities. Stay current on ISO 27001, HIPAA, NIST 800-53, and other relevant standards, translating them into actionable security controls. Assist in defining security metrics and reporting on compliance status and risk posture to leadership. Work closely with legal, security, IT, and business teams to align compliance requirements with security operations. What You'll Bring to OneStudyTeam: Bachelor's degree in Information Security, Computer Science, Risk Management, or related field (or equivalent experience). 8+ years of progressive experience in GRC, compliance, or security audit roles. Experience in healthcare or regulated industries strongly preferred. Certifications strongly preferred: ISO 27001 Lead Auditor/Implementer, CISSP, CISM, CISA, HITRUST CCSFP, CRISC. Experience leading ISO 27001, SOC2, or HITRUST audits, including ISMS implementation and external audit coordination. Strong understanding of NIST CSF, SOC 2, GDPR, and other security frameworks. Hands-on experience with customer security audits, including responding to security questionnaires and managing security assessments. Ability to perform risk assessments, policy reviews, and compliance gap analyses. Strong written and verbal communication skills, with the ability to explain technical concepts to non-technical stakeholders. Detail-oriented with excellent organizational and project management skills. Ability to work independently and collaboratively in a remote environment. Familiarity with GRC tools (e.g., OneTrust, LogicGate, Archer, Vanta, Drata) is a plus. We value diversity and believe the unique contributions each of us brings drives our success. We do not discriminate on the basis of race, sex, religion, color, national origin, gender identity, age, marital status, veteran status, or disability status. Note: OneStudyTeam is unable to sponsor work visas at this time. If you are a non-U.S. resident applicant, please note that OneStudyTeam works with a Professional Employer Organization. As a condition of employment, you will abide by all organizational security and privacy policies. This organization participates in E-Verify (E-Verify's Right to Work guidance can be found here).
    $89k-119k yearly est. Auto-Apply 15d ago
  • Senior Security GRC Analyst

    Lambda Labs

    Remote certified information systems security professional job

    Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU. If you'd like to build the world's best AI cloud, join us. * Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday. What You'll Do * Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives * Manage IT Risk Register including risk identification, tracking, and prioritization. * Assist with and drive remediation of control deficiencies and gaps * Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.) * Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting * Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires * Assist control owners with root cause analysis and track risk management action plan progress. * Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements You * Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements * Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks * Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations * Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives Nice to Have * Experience in the machine learning or computer hardware industry * Experience with Security by Design and/or Privacy by Design principles * Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks. * Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems * Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management * Certified Information Systems Auditor (CISA) * Certified Information Security Manager (CISM) * Certified Information Systems Security Professional (CISSP) * Certified in Risk and Information Systems Control (CRISC) * Experience in the AI infrastructure, machine learning and/or computer hardware industry Salary Range Information The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description. About Lambda * Founded in 2012, with 500+ employees, and growing fast * Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove * We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG * Our values are publicly available: ************************* * We offer generous cash & equity compensation * Health, dental, and vision coverage for you and your dependents * Wellness and commuter stipends for select roles * 401k Plan with 2% company match (USA employees) * Flexible paid time off plan that we all actually use A Final Note: You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills. Equal Opportunity Employer Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
    $89k-119k yearly est. 60d+ ago
  • Information Systems Security Officer (ISSO) - Mid Level (TS required, eligible for SCI)

    Redtrace Technologies Inc.

    Remote certified information systems security professional job

    Job Description SECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY This position requires onsite work. However, due to COVID-19, remote work on a rotational schedule is temporarily available. REQUIRES US CITIZENSHIP*** Program Description: The program provides support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a federal customer. The contract's support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: We are seeking a Junior Level ISSO to carry out the following duties and responsibilities: Services to support IS Security performed by the Information System Security Officer (ISSO) at a minimum, shall consist of to the following activities: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS Provide liaison support between the system owner and other IS security personnel Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Conduct required IS vulnerability scans according to risk assessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs) Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an agency IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR Provide baseline security controls to the system owner, contingent upon the IS's security categorization, type of information processed and entity type Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems' impact levels and ISs' authorization boundary Ensure that new entities are created in the GRC application with the security categorization of agency ISs Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS Perform an independent review of the System Security Plan (SSP) and make approval decisions Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the agency Authorizing Official Schedule security control assessments in coordination with the system owner. Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number Advise the agency Authorizing Official of IS vulnerabilities and residual risks. Ensure that all POA&M actions are completed and tested Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official Ensure the removal and retirement of agency ISs being decommissioned, in coordination with the SO, ISSO, and ISSR Qualifications: Required: Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility Must be a U.S Citizen 5+ years serving as an Information Systems Security Officer (ISSO) at a cleared facility Minimum of 5 years of work experience in a computer science or Cybersecurity related field Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP) Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 Information Assurance Management (IAM) Level I proficiency Desired: A bachelor's and/or advanced degree in computer science, business management, or IT-related discipline Employee Benefits: Competitive salary for well qualified applicants 401(k) plan Annual performance bonus Certification and advanced degree attainment bonuses Student Loan / Tuition reimbursement Health Care Insurance (medical, dental, vision) Up to four weeks of paid vacation 11 Federal Holidays, and 3 Floating Holidays Team bonding events RedTrace Technologies is an EOE employer. Powered by JazzHR 7XfJyOFTho
    $70k-94k yearly est. 2d ago
  • Information Security Specialist/Analyst III - Information Solutions (Remote)

    Musckids

    Remote certified information systems security professional job

    The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support. Entity Medical University Hospital Authority (MUHA) Worker Type Employee Worker Sub-Type Regular Cost Center CC005101 SYS - IS Tidelands Integration Pay Rate Type Salary Pay Grade Health-29 Scheduled Weekly Hours 40 Work Shift We are seeking a highly skilled and experienced Senior Information Security Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards. Key Responsibilities: 45% - Network Security Monitoring and Incident Response: Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired. Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches. Perform cyber security incident handling, tracking and reporting. Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts. Respond to relevant service requests received from end users (e.g. for investigation of security events). Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents. 20% - Security Technology management: Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities. Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements. 10% - Vulnerability Management: Conduct vulnerability assessments to identify security risks and report findings to system owners. Manage workflows to ensure that protected assets are properly assessed in a timely manner. 15% - Threat Analysis Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs). Perform risk assessments and translate business requirements into effective security controls. Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner. 10% - Security Awareness: Create and deliver security awareness training for technical and non-technical audiences. Additional Job Description Required Education/Skills/Work Experience: A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required. Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.). Strong analytical and problem-solving skills with the ability to make decisions under pressure. Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools. Familiarity with cloud security (Azure, AWS) and identity management solutions. Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices. Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language. Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks. Highly Desired Certifications: CISSP, CISM, GIAC, or equivalent. Physical Requirements Mobility & Posture Standing: Continuous Sitting: Continuous Walking: Continuous Climbing stairs: Infrequent Working indoors: Continuous Working outdoors (temperature extremes): Infrequent Working from elevated areas: Frequent Working in confined/cramped spaces: Frequent Kneeling: Infrequent Bending at the waist: Continuous Twisting at the waist: Frequent Squatting: Frequent Manual Dexterity & Strength Pinching operations: Frequent Gross motor use (fingers/hands): Continuous Firm grasping (fingers/hands): Continuous Fine manipulation (fingers/hands): Continuous Reaching overhead: Frequent Reaching in all directions: Continuous Repetitive motion (hands/wrists/elbows/shoulders): Continuous Full use of both legs: Continuous Balance & coordination (lower extremities): Frequent Lifting & Force Requirements Lift/carry 50 lbs. unassisted: Infrequent Lift/lower 50 lbs. from floor to 36”: Infrequent Lift up to 25 lbs. overhead: Infrequent Exert up to 50 lbs. of force: Frequent Examples: Transfer 100 lb. non-ambulatory patient = 50 lbs. force Push 400 lb. patient in wheelchair on carpet = 20 lbs. force Push patient stretcher one-handed = 25 lbs. force Vision & Sensory Maintain corrected vision 20/40 (one or both eyes): Continuous Recognize objects (near/far): Continuous Color discrimination: Continuous Depth perception: Continuous Peripheral vision: Continuous Hearing acuity (with correction): Continuous Tactile sensory function: Continuous Gross motor with fine motor coordination: Continuous Selected Positions: Olfactory (smell) function: Continuous Respirator use qualification: Continuous Work Environment & Conditions Effective stress management: Continuous Rotating shifts: Frequent Overtime as required: Frequent Latex-safe environment: Continuous If you like working with energetic enthusiastic individuals, you will enjoy your career with us! The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need. Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
    $82k-116k yearly est. Auto-Apply 15d ago
  • Senior Systems Engineer SAP Security & GRC

    Cloudscouts Software Solutions LLC

    Remote certified information systems security professional job

    Job DescriptionSenior Systems Engineer SAP Security & GRC, immediate start. I am working with a Pharmaceutical client with an urgent requirement for a Senior Systems Engineer to own and drive their SAP Security & GRC roadmap across S/4HANA and adjacent platforms (Ariba, MDG, BTP). What you'll do: Define and maintain SAP security guidelines, SoD frameworks, and compliance controls (SOX, GxP, ITGC) Lead SAP GRC 12.x (ARM, ARA, BRM, EAM, access certifications) implementations, role design, and CHARM workflows Support upgrades, Greenfield implementations, and security enhancements Serve as primary contact for audits, KPI reporting, and continuous improvement initiatives Explore AI/ML solutions for predictive access analytics and compliance automation The ideal consultant will have: 78 years of SAP Security & GRC experience, including S/4HANA and Fiori-role design Hands-on experience with SAP GRC 12.x modules and CHARM processes Deep knowledge of access-management principles, SoD analysis, SOX/GxP compliance, and ITGCs Experience across SAP applications: Ariba, MDG, GTS, BTP, ATTP Excellent troubleshooting, communication, and stakeholder collaboration skills Work remote temporarily due to COVID-19.
    $81k-114k yearly est. 15d ago
  • Senior Information System Security Officer

    Onyx Point

    Remote certified information systems security professional job

    TO BE CONSIDERED FOR THIS POSITION YOU MUST HAVE AN ACTIVE TS/SCI W/ POLYGRAPH SECURITY CLEARANCE (U.S. CITIZENSHIP REQUIRED). Please see the following ISSO requirements. Provides aid to the program, organization, system, or enclave's information assurance program. Lends assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). What Sets You Apart: Bachelor of Science degree in Computer Science, Information Assurance, Information Security, or related discipline and 12 or more years of related experience. Minimum of 7+ years of experience as an ISSO supporting IC or DoD programs and contracts of similar scope, type, and complexity. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate) Clearance Required: Active TS/SCI with Polygraph Security Clearance Compensation: We are committed to providing fair and competitive compensation. The salary range for our positions vary depending on accepted contractual position skill level. These salaries fall within the range of $78,000 to $275,000 per year. This range reflects the compensation offered across the locations where we hire. The exact salary will be determined based on the candidate's work location, specific role, skill set, and level of expertise. Benefits: We offer a comprehensive benefits package, including: • Health Coverage: Medical, dental, and vision insurance • Additional Insurance: Basic Life/AD&D, Voluntary Life/AD&D, Short and Long-Term Disability, Accident, Critical Illness, Hospitalization Indemnity, and Pet Insurance • Retirement Plan: 401(k) plan with company match • Paid Time Off: Generous PTO, paid holidays, parental leave, and more • Wellness: Access to wellness programs and mental health support • Professional Development: Opportunities for growth, including tuition reimbursement Additional Perks: • Flexible work arrangements, including remote work options • Flexible Spending Accounts (FSAs) • Employee referral programs • Bonus opportunities • Technology allowance • A diverse, inclusive, and supportive workplace culture
    $65k-88k yearly est. 60d+ ago
  • IT Security Specialist 4/ITSS2 (39604)

    Idealforce

    Certified information systems security professional job in Columbus, OH

    IDEALFORCE has a CONTRACT position available immediately for a IT Security Specialist(ITSS2) to join our customer in Columbus, OH. This is an ONSITE position and require in person interview. Please find below additional details about this job. Job Description Security Consultant to help IT Augment the security staff until OIT can take over all Security related needs for the agency. This position will function as a highly skilled Security Consultant with specific responsibilities that include: -Monitor network and information system activity. -Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.) Uses creativity and innovation to automate and streamline processes and procedures. -Understands customer support, likes to work with people and can ensure that the customer is satisfied. -Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc. -Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT -Perform specialized security functions (e.g. forensics for incident response). -Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services. -Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc. SPECIAL NOTE: Client is running a 24/7 operation. Consultant may need to come in during incident or emergency situations. During the interview process with the ODPS staff, the resource consultant must demonstrate competence/experience in their specific area(s) of project assignment. The resource's experience must also be documented for review and verification. Offered resources not showing technical or functional competence/experience will be sufficient reason to reject the Offeror's proposal. It is the responsibility of the Offeror to pre-screen their candidates to ensure compliance. Resource will have a background check conducted by ODPS. Qualifications -1-2 Years SIEM (Q-Radar preferred) -8 years customer service experience -8 Years Troubleshooting experience -8+ years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP. -8 years' experience with Active Directory. -4 Years experience with Web and Email Filtering and Security (Ironport) -5+ Years experience with Imperva (DAM/WAF) -1 years of Vulnerability scanning experience (Qualys) -3 years A/V suite experience McAfee -3 years IPS (IBM) -Contributes to continuous process improvements to increase the efficiency of section. -Excellent communication skills both written and oral. -Strong communication/ leadership skills. -Strong influence, collaboration and negotiation experience. -Ability to collaborate with supporting resources across business and/or functional lines. -Have excellent oral and written skills/possess strong meeting and work session facilitation skills. -Have the ability to work independently and as part of a team, the ability to manage time and resources to meet assigned deadlines. -Have strong understanding of prioritization stemming from the elicitation of system and/or user requirements. -Have excellent organizational skills, proven analytical, planning, problem solving, and decision-making skills. -Must be knowledgeable in the English language/speak clearly and understandably use the English language. Desired Skills -Q-Radar -Ironport Web and Email Security -Imperva -Certifications in Microsoft -Powershell 3.0 scripting background. -Qualys -McAfee Enterprise solutions -IPS -Splunk -Other security related tools. -ITIL Knowledge and ITSM Tools. Additional Information Additional Information : - "All your information will be kept confidential according to EEO guidelines". - All candidates who are authorized to work in US are encouraged to apply. - Candidates must clear the Background check prior to commencing the assignment. THIRD PARTY CANDIDATES: Email your candidate/s resume to joseph dot shelton at idealforce.com along with the following details: Rate, Current location and Availability. Disclaimer : The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
    $71k-100k yearly est. 60d+ ago
  • Information Security Specialist/Analyst III - Information Solutions (Remote)

    MUSC (Med. Univ of South Carolina

    Remote certified information systems security professional job

    The Information Security Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the Information Security Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support. Entity Medical University Hospital Authority (MUHA) Worker Type Employee Worker Sub-Type Regular Cost Center CC005101 SYS - IS Tidelands Integration Pay Rate Type Salary Pay Grade Health-29 Scheduled Weekly Hours 40 Work Shift We are seeking a highly skilled and experienced Senior Information Security Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards. Key Responsibilities: 45% - Network Security Monitoring and Incident Response: * Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired. * Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches. * Perform cyber security incident handling, tracking and reporting. * Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts. * Respond to relevant service requests received from end users (e.g. for investigation of security events). * Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents. 20% - Security Technology management: * Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities. * Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements. 10% - Vulnerability Management: * Conduct vulnerability assessments to identify security risks and report findings to system owners. * Manage workflows to ensure that protected assets are properly assessed in a timely manner. 15% - Threat Analysis * Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs). * Perform risk assessments and translate business requirements into effective security controls. * Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner. 10% - Security Awareness: * Create and deliver security awareness training for technical and non-technical audiences. Additional Job Description Required Education/Skills/Work Experience: * A Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required. * Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.). * Strong analytical and problem-solving skills with the ability to make decisions under pressure. * Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools. * Familiarity with cloud security (Azure, AWS) and identity management solutions. * Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices. * Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language. * Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks. Highly Desired Certifications: * CISSP, CISM, GIAC, or equivalent. Physical Requirements * Mobility & Posture * Standing: Continuous * Sitting: Continuous * Walking: Continuous * Climbing stairs: Infrequent * Working indoors: Continuous * Working outdoors (temperature extremes): Infrequent * Working from elevated areas: Frequent * Working in confined/cramped spaces: Frequent * Kneeling: Infrequent * Bending at the waist: Continuous * Twisting at the waist: Frequent * Squatting: Frequent * Manual Dexterity & Strength * Pinching operations: Frequent * Gross motor use (fingers/hands): Continuous * Firm grasping (fingers/hands): Continuous * Fine manipulation (fingers/hands): Continuous * Reaching overhead: Frequent * Reaching in all directions: Continuous * Repetitive motion (hands/wrists/elbows/shoulders): Continuous * Full use of both legs: Continuous * Balance & coordination (lower extremities): Frequent * Lifting & Force Requirements * Lift/carry 50 lbs. unassisted: Infrequent * Lift/lower 50 lbs. from floor to 36": Infrequent * Lift up to 25 lbs. overhead: Infrequent * Exert up to 50 lbs. of force: Frequent * Examples: * Transfer 100 lb. non-ambulatory patient = 50 lbs. force * Push 400 lb. patient in wheelchair on carpet = 20 lbs. force * Push patient stretcher one-handed = 25 lbs. force * Vision & Sensory * Maintain corrected vision 20/40 (one or both eyes): Continuous * Recognize objects (near/far): Continuous * Color discrimination: Continuous * Depth perception: Continuous * Peripheral vision: Continuous * Hearing acuity (with correction): Continuous * Tactile sensory function: Continuous * Gross motor with fine motor coordination: Continuous * Selected Positions: * Olfactory (smell) function: Continuous * Respirator use qualification: Continuous * Work Environment & Conditions * Effective stress management: Continuous * Rotating shifts: Frequent * Overtime as required: Frequent * Latex-safe environment: Continuous If you like working with energetic enthusiastic individuals, you will enjoy your career with us! The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need. Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
    $65k-92k yearly est. 14d ago
  • Senior Information Systems Security Engineer (ISSE) Philadelphia, PA

    Watershed Security

    Remote certified information systems security professional job

    Watershed Security, is a Veteran Owned Small Business with over 20 years' Cybersecurity and Government Contracting experiencing. Watershed is looking for a Journeyman Information Systems Security Engineer (ISSE) to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidates will have experience coordinating and enacting required security changes, with in various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting. REQUIRED QUALIFICATIONS Bachelor's degree in Computer Science, IT, or equivalent technical degree. Must have at least one of the following active certifications: CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP Years of Experience: 7 years practical experience in a cybersecurity or A&A related field. Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards. Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems. Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership. Provide guidance on best practices and recommend improvements to the organization's security posture. Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats. Support continuous monitoring of information systems and provide regular status reports on security compliance. Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices. Clearance Level: SECRET; US Citizen. Ability to possibly provide onsite support in Philadelphia PA. Some/all remote work may be an option, however the norm will be onsite support. This will be dependent upon customer needs and classification level of work being performed. Some travel may be required. Experience with the Navy RMF Process Guide (RPG), and Navy A&A tools such as ACAS, eMASS and eMASSter. Proficient with Microsoft Office Suite (Word, Excel, Teams, Project). Self Starter; detail oriented; able to brief senior level staff. DESIRED QUALIFICATIONS Experience supporting 5 or more Navy Packages (achieving and/or maintaining ATO) Experience with the NAVSEA RMF Business Rules Contingent upon award PAY RANGE Final salary is influenced by factors such as location, contract labor categories, experience, skills, education, and certifications. Watershed offers competitive compensation, medical and dental benefits, educational reimbursement, 401K plans with matching, 15 days of PTO to start and 11 paid holidays per year. The proposed salary range for this position is: $70,000.00 - $90,000.00 USD. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $70k-90k yearly Auto-Apply 60d+ ago
  • Information Security Expert

    Cyberthink 4.2company rating

    Certified information systems security professional job in Columbus, OH

    Title: Information Security SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years .NET development experience Required 5 Years Thanks Naimesh Solanki Sr. Technical Recruiter Phone: ************ x 6578 Qualifications Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years Additional Information All your information will be kept confidential according to EEO guidelines.
    $62k-80k yearly est. 22h ago
  • Information Security Controls Analyst

    United Community Bank 4.5company rating

    Remote certified information systems security professional job

    United Community is seeking an experienced Information Security Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization. What You'll Do Review and document the adequacy of security and technology controls across business and IT environments. Evaluate control posture through interviews, documentation reviews, and workflow analysis. Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls. Partner with risk management and security leadership to align controls with organizational risk tolerance. Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance. Document and advocate for control improvements that balance risk with operational efficiency. Support control development across testing, QA, and production environments. Present control effectiveness reports to senior risk leadership. Stay current on regulatory requirements, internal policies, and industry best practices. Requirements For Success Experience: 3+ years in cybersecurity or IT practitioner roles. 2+ years in IT risk or controls analysis. Practical experience with risk management and IT control frameworks. Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field. Required Skills: Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST). Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA). Experience with CIS CSC, ISO 2700, or NIST CSF. Excellent written and verbal communication across all organizational levels. Strong organizational skills and ability to meet SLAs. Sound judgment and decision-making in complex scenarios. High integrity, trustworthiness, and adaptability. Preferred Skills: Certifications such as CISSP, CISA, CRISC, or CISM. Technical experience with enterprise networks, applications, and directory services. Familiarity with enterprise GRC platforms. Conditions of Employment Must be able to pass a criminal background & credit check This is a full-time, non-remote position FLSA Status: Exempt We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
    $50k-77k yearly Auto-Apply 21d ago

Learn more about certified information systems security professional jobs

Browse computer and mathematical jobs