Remote certified information systems security professional job
A technology company is seeking a skilled software engineer to join their Radar team, focusing on building systems for real-time identity event processing. The ideal candidate will have over 5 years of experience in software development, a background in large-scale systems, and strong collaboration skills. This position offers flexible remote work and comprehensive benefits, including healthcare coverage, equity grants, and generous paid time off. Join a growing team committed to delivering a seamless identity security platform.
#J-18808-Ljbffr
$114k-163k yearly est. 4d ago
Looking for a job?
Let Zippia find it for you.
Defense ML Engineer - AI for National Security, Remote
Phase2 Technology 3.9
Remote certified information systems security professional job
A leading technology firm in McLean, Virginia is seeking a Machine Learning Engineer to develop mission-critical AI solutions. You'll collaborate with data engineers and scientists to deploy models that enhance national security. The ideal candidate should have over 3 years of experience in artificial intelligence and a strong proficiency in Python and machine learning techniques. This role offers flexible work arrangements and comprehensive benefits.
#J-18808-Ljbffr
$89k-120k yearly est. 2d ago
Senior Security Operations Analyst
Extend A Care for Kids 3.5
Remote certified information systems security professional job
About Extend:
Extend is revolutionizing the post-purchase experience for retailers and their customers by providing merchants with AI-driven solutions that enhance customer satisfaction and drive revenue growth. Our comprehensive platform offers automated customer service handling, seamless returns/exchange management, end-to-end automated fulfillment, and product protection and shipping protection alongside Extend's best-in-class fraud detection. By integrating leading-edge technology with exceptional customer service, Extend empowers businesses to build trust and loyalty among consumers while reducing costs and increasing profits.
Today, Extend works with more than 1,000 leading merchant partners across industries, including fashion/apparel, cosmetics, furniture, jewelry, consumer electronics, auto parts, sports and fitness, and much more. Extend is backed by some of the most prominent technology investors in the industry, and our headquarters is in downtown San Francisco.
What You'll Do:
Serve as a core member of Security Operations, monitoring and triaging alerts from platforms such as SentinelOne and Wiz. Perform end-to-end investigations to identify, contain, and remediate threats and incidents, driving timely, appropriate response.
Proactively identify and assess vulnerabilities in infrastructure and code, working with development and other cross functional teams to address issues.
Contribute to the end-to-end detection lifecycle: model attacker behaviors (MITRE ATT&CK), write and test detections as code across security programs and tooling (SentinelOne, Wiz, Okta, AWS CloudTrail), and continuously enrich to reduce false positives and improve MTTD. Support data quality and telemetry onboarding, maintain response playbooks, and provide threat validation assistance across the business.
Assist teams with the application of secure configuration baselines and best practices in accordance with CIS Benchmarks, NIST, vendor hardening guides, and applicable compliance standards across all company computing assets.
Correlate endpoint and infrastructure telemetry to identify emerging threats. Curate and operationalize intelligence (IOCs, TTPs) into detections and response playbooks, and maintain vetted intelligence feeds.
Assist GRC initiatives by mapping controls to internal policies and frameworks (e.g., SOC 2, NIST CSF, NYC DFS 500), identifying gaps, supporting audits and evidence collection, tracking remediation, and maintaining policies and control documentation.
Work with engineering and business teams to champion security best practices, communicate risks to accountable owners, and assist with mitigation planning and execution.
What We Are Looking For:
3+ years experience in a Security Analyst / Security Operations role
3+ years experience with AWS CloudFormation, or other infrastructure-as-code systems (like Terraform)
3+ years experience or certification in AWS serverless technologies (API Gateway, Lambda, S3, DynamoDB)
Certifications (one or more preferred): CISSP, CCSP, GIAC (GCIH/GCIA/GMON/GCED/GCFA/GREM), cloud security (AWS or cloud agnostic security specialty) or equivalent experience.
Proficiency with hands on management and use of SIEM, CNAPP, EDR, Vulnerability Management tooling, and Detection Engineering strategies.
Proficiency with AI technologies and the corresponding threat landscape and strategies for mitigation. Understands agentic workflows such as AWS Bedrock, MCP based workflows (or similar technologies)
Working Knowledge of best practices around security roles and responsibilities for AWS IAM
Experience working with observability services and tooling (including Coralogix, CloudWatch, OpenTelemetry)
Ability to perform in a high energy environment with dynamic job responsibilities and priorities
Nice to Haves:
Experience with AWS Cloud Development Kit(CDK)
Experience with Mastra AI
Expected Pay Range: $157,000 - $182,000 per year salaried*
* The target base salary range for this position is listed above. Individual salaries are determined based on a number of factors including, but not limited to, job-related knowledge, skills and experience.
Life at Extend:
Working with a great team from diverse backgrounds in a collaborative and supportive environment.
Competitive salary based on experience, with full medical and dental & vision benefits.
Stock in an early-stage startup growing quickly.
Generous, flexible paid time off policy.
401(k) with Financial Guidance from Morgan Stanley.
Extend CCPA HR Notice
$157k-182k yearly Auto-Apply 60d+ ago
Senior Backend Engineer - Identity Security & Agentic Systems
Veza Technologies, Inc.
Remote certified information systems security professional job
At Veza, we're building the next generation of Access Identity Security - and we're bringing GenAI into the core of that mission. We're seeking a Senior Backend Engineer who is excited to work on multi-agent systems, LLM-based automation, and Model Context Protocols (MCP) to transform how access control intelligence is built and delivered.
This is a rare opportunity to operate at the frontier of LLM research and backend systems engineering, contributing to both the design of scalable architectures and the implementation of intelligent agents that reason, decide, and act.
You will:
Building APIs and backend services, test and evaluation frameworks in Python/Golang to support agentic workflows.
Prototyping and productizing LLM-based capabilities into the identity access pipeline.
Developing agent orchestration layers and working with frameworks like LangGraph or AutoGen.
Designing systems around context-awareness, memory, and autonomous decision-making.
You Have:
Education:
Bachelor's or Master's degree in Computer Science, Engineering, or a related field.
Experience:
5+ years of backend development experience.
Strong proficiency in one or more programming languages, such as Python, Golang, or Java.
Experience designing and implementing RESTful APIs and Microservices Architectures.
Experience with cloud platforms, such as AWS, Azure, or Google Cloud Platform, and familiarity with IAM services and features.
Curiosity and/or experience with GenAI technologies, multi-agent systems, or prompt orchestration.
Strong communication and interpersonal skills, with the ability to effectively communicate technical concepts to both technical and non-technical stakeholders.
Strong sense of Product feature Ownership - from Ideation to Deployment
The compensation for this role depends on several factors such as the candidate's skills, qualifications, experience, and work location. For candidates offered a position at the posted job level, the provided range is the expected base salary. This does not include any additional variable compensation, such as commission.
Compensation Disclosure $154,000-$210,000 USD
Our Culture
We're driven to build a strong company culture and are looking for individuals with solid alignment with the following:
Ownership Mindset
Act with Integrity
Guardians of our Customers
Opinionated Humility
Build Trust, Earn Trust
At Veza, your base pay is one part of your total compensation package. For this position, the reasonably expected pay range can be discussed with your recruiter for the level at which this job has been scoped. Your base pay will depend on several factors, including your experience, qualifications, education, location, and skills. In the event that you are considered for a different level, a higher or lower pay range would apply. This position is also eligible for equity and a competitive benefits package.
Veza is proud to be an equal opportunity employer. We are committed to equal employment opportunities regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, veteran status, or other applicable legally protected characteristics. We also consider qualified applicants according to applicable federal, state, and local laws. If a candidate with a disability requires an accommodation during the recruitment process, please email *******************
About Veza
Veza is the identity security company. Identity and security teams use Veza to secure identity access across SaaS apps, on-prem apps, data systems, and cloud infrastructure. Veza solves the blind spots of traditional identity tools with its unique ability to ingest and organize permissions metadata in the Veza Authorization Graph. Global enterprises like Blackstone, Wynn Resorts, and Expedia trust Veza to visualize access permissions, monitor permissions activity, automate access reviews, and remediate privilege violations. Founded in 2020, Veza is headquartered in Redwood City, California, and is funded by Accel, Bain Capital, Ballistic Ventures, GV, Norwest Venture Partners, and True Ventures. Visit us at veza.com and follow us on LinkedIn, Twitter, and YouTube.
$154k-210k yearly Auto-Apply 60d+ ago
Sr. Information Systems Security Engineer
Lanteris Space
Remote certified information systems security professional job
Please review the job details below.
Lanteris Space Systems is seeking a Sr. InformationSystemsSecurity Engineer (ISSE) to join our team in Palo Alto, CA. This position may also be performed remotely within the United States. In this role, you will act as an ISSE supporting multiple programs and internal teams. The ISSE is responsible for systemsecurity design, requirements development, control implementation, assessment, and compliance support. You will have the opportunity and responsibility to drive technical excellence while ensuring our successful space missions through effective security design and balancing cost and schedule following program requirements.
Responsibilities:
Perform end-to-end space and ground systemsecurity assessments, control implementation, and development of mitigation plans; support the concept of operations, system architecture and design, integration and test environments, and continuous monitoring.
Develop systemsecurity implementation plans and means of meeting security reporting requirements.
Develop policies, procedures, and standards in alignment with NIST standards (e.g., NIST 800-53/800-171) and industry best practices.
Perform risk-based security assessments, identify appropriate control and mitigation strategies, and derive and allocate security requirements to the system hardware and software elements.
Actively participate in design reviews, technical interchange meetings, and working groups to ensure compliance with security and control requirements.
Support trade studies as required to meet systemsecurity requirements.
Support the Authorization to Operate (ATO) process by generating necessary reporting and accreditation documents, such as Plans of Action and Milestones (POA&Ms).
Lead/Facilitate internal and Customer Security Reviews to present security requirements, system assessment, control implementation, and mitigation methods.
Ability to validate system hardening based on current DISA STIGs and/or CIS Level 2 benchmarks.
Lead and participate in vulnerability tracking, remediation, and closure.
Perform system architecture and engineering design, including networking, identity and access management, application and data security, and system design.
Minimum Requirements:
Must be a U.S. citizen with the willingness and ability to obtain a security clearance
Bachelor's degree in computer science, informationsystems, engineering, business, or related scientific or technical discipline. An additional four years of experience may be substituted for a degree.
8 years of experience in informationsystems, cyber security, space systems, or related security disciplines.
Technical background with practical experience in designing and constructing securesystems, networks, and supporting infrastructure.
Experience developing and implementing security controls for commercial, international, and/or U.S. government programs.
Experience working with the National Institute of Standards and Technology (NIST) cybersecurity standards (NIST 800-171, NIST 800-53), including the Cybersecurity Maturity Model Certification (CMMC).
Understanding and history of performing risk management activities as outlined in the NIST 800-30 and NIST 800-37
Preferred Qualifications:
Experience designing and implementing security controls in cloud service providers (AWS, Azure).
Working knowledge of industry-standard Cloud Security Posture Management (CPSM) tools.
Relevant Cloud Certifications (e.g. CCSP, AWS Cloud Practitioner, AWS Security, Azure Security Engineer Associate).
Experience architecting, building, and deploying cloud assets for AWS and Azure.
DOD 8570 IAT or IAM Level 3 compliant professionalcertification (i.e., CISSP or Associate, CASP CE, CCNP Security, CISA, GCED, GCIH, CISM, or GSLC).
Experience with security assessment and authorization activities required for Federal systems (e.g., RMF, CMMC, ICD-503, DIACAP) and security development.
Proficiency in using cyber-related tools (such as Nessus, NMAP, or Splunk), network scanning, vulnerability scanning, and other penetration testing tools.
Significant experience with NIST risk analysis processes and mitigation methods.
In support of pay transparency at Lanteris Space Systems, we disclose salary ranges on all U.S. job postings. The successful candidate's starting pay will fall within the salary range provided below and is determined based on job-related factors, including, but not limited to, the experience, qualifications, knowledge, skills, geographic work location, and market conditions. Candidates with the minimum necessary experience, qualifications, knowledge, and skillsets for the position should not expect to receive the upper end of the pay range.
● The base pay for this position within Colorado is: $124,000.00 - $206,000.00 annually.● The base pay for this position within New Jersey is: $124,000.00 - $206,000.00 annually.● The base pay for this position within Delaware is: $124,000.00 - $206,000.00 annually.● The base pay for this position within the Washington, DC metropolitan area is: $137,000.00 - $228,000.00 annually.● The base pay for this position within California is: $143,000.00 - $238,000.00 annually.
For all other states, we use geographic cost of labor as an input to develop market-driven ranges for our roles, and as such, each location where we hire may have a different range.
We offer a comprehensive package of benefits including paid time off, health and welfare insurance, and 401(k) to eligible employees. More information on our benefits will be shared with candidates as they move forward in the recruitment process.
Additionally, this position is incentive eligible with a target based on contribution, company performance, and/or individual results achieved; the specific incentive plan and target amount will be determined based on the role and breadth of contributions.
The application window is three days from the date the job is posted and will remain posted until a qualified candidate has been identified for hire. If the job is reposted regardless of reason, it will remain posted three days from the date the job is reposted and will remain reposted until a qualified candidate has been identified for hire.
The date of posting can be found on the Lanteris Space Systems Career page at the top of each job posting.
To apply, submit your application via the Lanteris Space Systems Career page.
Lanteris Space Systems values diversity in the workplace and is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law.
$143k-238k yearly Auto-Apply 2d ago
Information Security Compliance Senior Analyst
Crypto.com 3.3
Remote certified information systems security professional job
At Crypto.com, our dedication to user security is led by our highly experienced Security Team. Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors. The team includes holders of international patents for technologies integrated in our security architecture. Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS. Our Chief InformationSecurity Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy.
Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning. The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base.
About the Role
As our Security Compliance Senior Analyst, you will be tasked with security compliance activities along with our journey. You are expected to take the initiative to assist us with several security compliance programs and certifications. You are required to address and review compliance gaps and give recommendations and support on remediation activities. You will also be trusted to provide technical advice to ensure that security compliance requirements are met throughout all business units. This role requires technical knowledge of network security, especially on-prem and cloud native architectures. A familiarity with US derivatives regulatory frameworks would be advantageous. Job Responsibilities:
Assist in our security compliance programs, including ISO27001, ISO27701, PCI-DSS, SOC2 Type 2, and local regulations
Participate in internal security and privacy assessments, internal and external audits, compliance certifications, and risk management
Provide complete and accurate responses to internal and third-party enquiries on security compliance
Perform security compliance assessment activities, including periodic technical, organizational, and third-party risk and control assessments, and managing remediation activities to completion
Design and manage necessary control and framework required to comply with international standards and US local regulations
Identify and drive process improvements for streamlining global security compliance operations
Qualifications:
3-5 years of experience in informationsecurity, privacy, IT audit or IT risk management related roles.
Prefer experience with one or more of the following: In-house security and privacy operations, conducting security control assessments, risk assessments or audits.
Prefer experience with any of the following: ISO27001, ISO27701, SOC1, SOC2, PCI, SOX, COSO, cloud technologies, and data protection regulations and requirements.
Ability to analyze and review US and Global privacy and informationsecurity compliance and provide guidance.
Holders of security-related certifications/qualifications will be an advantage: CISSP, CRISC, CISM, CISA, ISO27001 LA, CIPT, CIPP/E, or other relevant certifications
Experience leading compliance initiatives and working with auditors and/or external regulators
It's a plus if you:
Have experience in informationsecurity and privacy management in virtual assets, fintech, online services, platform services, or global services.
Have experience in establishing informationsecurity and privacy framework to meet US regulations, (CFTC, FINRA, SEC, and other US based regulators.)
Are a strong commitment to personal learning and development
Are detail minded with an analytical mindset
Have good communication skills with an ability to explain complex technical issues to non-technical business users
Have prior experience with project management
Have an interest and understanding of Blockchain and AI technologies
***************** Empowered to think big. Try new opportunities while working with a talented, ambitious and supportive team.Transformational and proactive working environment. Empower employees to find thoughtful and innovative solutions.Growth from within. We help to develop new skill-sets that would impact the shaping of your personal and professional growth.Work Culture. Our colleagues are some of the best in the industry; we are all here to help and support one another.One cohesive team. Engage stakeholders to achieve our ultimate goal - Cryptocurrency in every wallet. Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us - our internal mobility program offers employees a new scope.
Are you ready to kickstart your future with us?
BenefitsCompetitive salary Attractive annual leave entitlement including: birthday, work anniversary 401(k) plan with employer match Eligible for company-sponsored group health, dental, vision, and life/disability insurance Work Flexibility Adoption. Flexi-work hour and hybrid or remote set-up Aspire career alternatives through us. Our internal mobility program can offer employees a diverse scope.
Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
About Crypto.com:Founded in 2016, Crypto.com serves more than 150 million customers and is the world's fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet™. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering the next generation of builders, creators, and entrepreneurs to develop a fairer and more equitable digital ecosystem.
Learn more at *******************
Crypto.com is an equal opportunities employer and we are committed to creating an environment where opportunities are presented to everyone in a fair and transparent way. Crypto.com values diversity and inclusion, seeking candidates with a variety of backgrounds, perspectives, and skills that complement and strengthen our team.
Personal data provided by applicants will be used for recruitment purposes only.
Please note that only shortlisted candidates will be contacted.
$81k-120k yearly est. Auto-Apply 15d ago
Information Systems Security Officer (ISSO) - Mid Level (TS required, eligible for SCI)
Redtrace Technologies
Remote certified information systems security professional job
SECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY
This position requires onsite work. However, due to COVID-19, remote work on a rotational schedule is temporarily available.
REQUIRES US CITIZENSHIP***
Program Description:
The program provides support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a federal customer. The contract's support functions are: IA Management, Federal InformationSecurity Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
Position Description:
We are seeking a Junior Level ISSO to carry out the following duties and responsibilities:
Services to support IS Security performed by the InformationSystemSecurity Officer (ISSO) at a minimum, shall consist of to the following activities:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
Provide liaison support between the system owner and other IS security personnel
Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Ensure that systemsecurity documentation is developed, maintained, reviewed, and updated on a continuous basis
Conduct required IS vulnerability scans according to risk assessment parameters.
Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs)
Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO)
Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an agency IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
Provide baseline security controls to the system owner, contingent upon the IS's security categorization, type of information processed and entity type
Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems' impact levels and ISs' authorization boundary
Ensure that new entities are created in the GRC application with the security categorization of agency ISs
Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS
Perform an independent review of the SystemSecurity Plan (SSP) and make approval decisions
Request and negotiate the level of testing required for an IS with the Enterprise InformationSecurity Section and the agency Authorizing Official
Schedule security control assessments in coordination with the system owner.
Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision
Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number
Advise the agency Authorizing Official of IS vulnerabilities and residual risks.
Ensure that all POA&M actions are completed and tested
Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official
Ensure the removal and retirement of agency ISs being decommissioned, in coordination with the SO, ISSO, and ISSR
Qualifications:
Required:
Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility
Must be a U.S Citizen
5+ years serving as an InformationSystemsSecurity Officer (ISSO) at a cleared facility
Minimum of 5 years of work experience in a computer science or Cybersecurity related field
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications
Hold at least one of the following certifications:
CertifiedInformationSystemsSecurityProfessional (CISSP)
Global InformationSecurityProfessional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 Information Assurance Management (IAM) Level I proficiency
Desired:
A bachelor's and/or advanced degree in computer science, business management, or IT-related discipline
Employee Benefits:
Competitive salary for well qualified applicants
401(k) plan
Annual performance bonus
Certification and advanced degree attainment bonuses
Student Loan / Tuition reimbursement
Health Care Insurance (medical, dental, vision)
Up to four weeks of paid vacation
11 Federal Holidays, and 3 Floating Holidays
Team bonding events
RedTrace Technologies is an EOE employer.
$80k-110k yearly est. Auto-Apply 5d ago
Senior Security Analyst
Blackcloak 3.5
Remote certified information systems security professional job
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
Ready to be on the front lines of cybersecurity? BlackCloak is looking for a sharp and proactive Security Analyst to join our team. In this role, you'll be the first responder, monitoring and triaging security alerts from a variety of sources and leading the charge on security incidents. You'll play a critical part in our continuous compliance program, help develop our threat detection capabilities, and analyze emerging threats. If you're passionate about protecting against cyber threats and thrive in a fast-paced environment, we want to hear from you.What You Will Do
Monitor and triage security alerts from a variety of sources including SIEM (SecOps, Sentinel), EDR (SentinelOne, CrowdStrike) and cloud security platforms like Wiz, Orca.
Serve as a primary responder for security incidents, executing the incident response lifecycle from initial detection and containment to eradication and recovery.
Support development of threat detection library, including incorporating threat intelligence, tuning within security tools, and SOAR response actions.
Maintain and draft SOP's and supporting documents for the Incident Response Plan and strategy
Analyze phishing attempts, malware, and other cyber threats; partner with Security Engineering to devise additional security controls, administer email security, EDR, ZTNA, and other security tooling configurations to block emerging threats.
Participate in a 24/7 on-call rotation to respond to critical security incidents.
Support triage and response for compliance alerts and requests, enabling the continuous compliance program at BlackCloak using tools such as Vanta, Drata.
Prepare and present detailed incident reports and security metrics to technical and leadership audiences.
What You Need To Be Successful
4-6 years of direct experience in a Security Operations Center, incident response, threat intelligence, or similar cybersecurity role.
Ability to navigate complex problems, stay cool under pressure, and be highly inquisitive.
Hands-on experience with SIEM, SOAR, and other security platforms for log analysis, correlation, automated response, and maturation of detections/runbooks.
Deep understanding and practical experience with Endpoint Detection and Response (EDR) tools and their investigative capabilities.
Good knowledge of cloud security principles and services in AWS, Azure, or GCP, including experience with security tools like Wiz or Prisma Cloud.
Solid understanding of network protocols, operating systems (Windows, Linux, mac OS), and common attack vectors (OWASP, MITRE)
Familiarity with identity and access management concepts, including SAML, OAuth, and role-based access control (RBAC)
Relevant industry certifications are highly desirable, such as GIAC (GCIH, GCFA), CISSP, or CompTIA Security+.
Excellent problem-solving skills and the ability to communicate complex technical concepts to both technical and non-technical audiences.
$100,000 - $130,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
- 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: *******************************************************************************************************
#liremote
$100k-130k yearly Auto-Apply 60d+ ago
Senior Security GRC Analyst
Lambda 4.2
Remote certified information systems security professional job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding informationsecurity control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of informationsecurity requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
CertifiedInformationSystems Auditor (CISA)
CertifiedInformationSecurity Manager (CISM)
CertifiedInformationSystemsSecurityProfessional (CISSP)
Certified in Risk and InformationSystems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
$93k-129k yearly est. Auto-Apply 60d+ ago
Information System Security Officer
Zermount
Remote certified information systems security professional job
MILITARY FRIENDLY & PREFERRED - HOH SPONSOR
The InformationSystemsSecurity Officer (ISSO) is responsible for supporting the full lifecycle of security assessment and authorization (A&A) activities for informationsystems. The ISSO ensures that assigned systems comply with federal cybersecurity standards and maintain their Authority to Operate (ATO) through continuous monitoring and documentation.
The ISSO will be responsible for developing and providing risk assessments, Security Control Assessments (SCA), A&A documentation and various reports, based on NIST guidelines and client's policies, procedures and request. The ISSO will be responsible for providing security recommendations on any system changes or new technologies, analysis on vulnerability scans, conducting continuous monitoring activities, and provide mitigation recommendations for any risks or threats.
RESPONSIBILITIES:
Lead and conduct Pre-Security Assessment and Authorization (A&A) activities, including stakeholder identification, change request submissions, appointment memorandums, and IT Security Kickoff meetings.
Supports the ISBO in day-to-day IT security activities.
Assists the ISBO with reviews of the security posture of the system and report any findings to the ISBO, CISO, and the AO.
Conduct InformationSystem Categorization by identifying information types, completing FIPS-199 assessments, and facilitating Business Impact Analyses (BIA), Privacy Threshold Analyses (PTA), and Privacy Impact Assessments (PIA).
Develop and maintain systemsecurity documentation, including:
System Administration Plan (SAM)
Configuration Management Plan (CMP)
IT Contingency Plan (ITCP)
InformationSecurity Continuous Monitoring (ISCM) Plan
Incident Response Plan (IRP)
Security Assessment Report (SAR)
SystemSecurity Plan (SSP)
Coordinate initial and annual ITCP testing in collaboration with the OCIO Business Continuity and Disaster Recovery (BCDR) Office.
Develop and manage inter-agency agreements and documentation such as MOUs, MOAs, ISAs, IT Security Waivers, and Risk Acceptance Memorandums.
Document and maintain Security Control Implementation details, ensuring updates are made according to required frequency.
Coordinate vulnerability and compliance scans, Security Control Assessments (SCA), and track remediation efforts with the IT Security Test Team.
Manage and update Plan of Action and Milestones (POA&M) entries, submitting remediated findings for closure.
Prepare and present SAR to Authorizing Officials to obtain or renew ATO.
Perform InformationSecurity Continuous Monitoring (ISCM) activities to ensure ongoing compliance and security posture of systems.
Develop and update project schedule, including A&A / SCA task and milestones, task dependencies, and personnel resources.
Conduct A&A activities and tasks and obtain ATO in line with NIST and client guidance and directives.
Determining the baseline IT Security requirements for IT Systems, identifying system boundaries, determining information categories, assisting with FIPS-199.
Ensure that IT Systems are operated, used, maintained, and disposed of in accordance with internal security policies and practices.
Enforce security policies and safeguards on all personnel having access to the IT System for which the ISSO has responsibility.
Ensure users and system support personnel have the required authorization and need-to-know; have been indoctrinated; and are familiar with internal security practices before access to the IT System.
Implement security controls based on IT System FIPS categorization.
Document security control implementation in the system's Security Plan using the client's GRC tool.
Document system's risk assessment per client directives and requirements.
Review and monitoring systemsecurity and audit logs.
Develop and maintain Plan of Actions and Milestones (POA&Ms) for IT systems.
Update A&A documentation and artifacts on a regular basis (e.g. annually, after approved change).
QUALIFICATIONS:
A minimum of five (5) years of demonstrated experience in the InformationSecurity or IT field.
Demonstrates a proficiency with developing, maintaining and managing SA&A packages.
Experience with developing and managing POA&M's.
Strong problem solving and analysis skills, self-motivated, and able to work and communicate in a team environment.
Strong understanding of federal cybersecurity frameworks (e.g., NIST RMF, FIPS-199, FISMA).
Experience in developing and maintaining security documentation and plans.
Possess experience conducting CPT's.
Experience conducting audit log reviews.
Technical experience with conducting vulnerability management, compliance scanning, and providing mitigation techniques.
Excellent communication and coordination skills with technical and non-technical stakeholders.
Ability to manage multiple systems and projects simultaneously in a dynamic environment.
Excellent communication (written and verbal) skills.
CERTIFICATION:
A minimum of at least one (1) certification that meet DOD 8570 IAT Level II (e.g., Security+, GSEC, CASP) requirements or any equivalent or more advanced.
CLEARANCE:
Client Suitability and Public Trust
LOCATION and HOURS:
Location: Primary location is at Zermount HQ (Arlington, VA) and the Client Site (Washington, D.C.). Remote work is authorized.
Onsite work at the primary location., may be occasionally required.
Hours of Operation (Business Hours): 8:00 am ET - 5:30 pm ET
$78k-105k yearly est. 60d+ ago
Information Systems Security Officer (ISSO)
Contact Government Services, LLC
Remote certified information systems security professional job
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an InformationSystemsSecurity Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and informationsystemsecurity oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for informationsystemsecurity software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professionalsecuritycertification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
$78k-105k yearly est. Auto-Apply 38d ago
Senior Security Compliance Analyst
Onestudyteam
Remote certified information systems security professional job
At OneStudyTeam (a Reify Health company), we specialize in speeding up clinical trials and increasing the chance of new therapies being approved with the ultimate goal of improving patient outcomes. Our cloud-based platform, StudyTeam, brings research site workflows online and enables sites, sponsors, and other key stakeholders to work together more effectively. StudyTeam is trusted by the largest global biopharmaceutical companies, used in over 6,000 research sites, and is available in over 100 countries. Join us in our mission to advance clinical research and improve patient care.
One mission. One team. That's OneStudyTeam.
We are seeking a Senior Security Compliance Analyst with expertise in Governance, Risk, and Compliance (GRC) to support and enhance our security and compliance programs within the healthcare industry. This role is critical in ensuring adherence to industry regulations, responding to customer audits, and maintaining compliance with ISO 27001, HIPAA, and other security frameworks.
The ideal candidate will be a detail-oriented compliance expert who can navigate complex regulatory environments, assist with internal/external audits, and drive continuous improvement in security governance. The ideal candidate must be able to operate independently while delivering on the following duties.
What You'll Be Working On:
Lead and support customer security audits, responding to security questionnaires and demonstrating compliance with security frameworks.
Prepare, coordinate, and manage ISO 27001 audits, including evidence collection, control implementation, and auditor engagement.
Ensure ongoing compliance with HIPAA, NIST CSF, and other regulatory requirements applicable to healthcare data security.
Develop and maintain policies, procedures, and security documentation to meet regulatory and contractual obligations.
Perform gap analyses and risk assessments to identify and remediate compliance risks.
Manage and improve security governance frameworks, ensuring alignment with industry best practices and business objectives.
Conduct third-party vendor risk assessments, ensuring compliance with security policies and contractual obligations.
Monitor security controls, ensuring effectiveness and continuous improvement in alignment with security frameworks.
Support security awareness training initiatives, ensuring employees understand compliance responsibilities.
Stay current on ISO 27001, HIPAA, NIST 800-53, and other relevant standards, translating them into actionable security controls.
Assist in defining security metrics and reporting on compliance status and risk posture to leadership.
Work closely with legal, security, IT, and business teams to align compliance requirements with security operations.
What You'll Bring to OneStudyTeam:
Bachelor's degree in InformationSecurity, Computer Science, Risk Management, or related field (or equivalent experience).
8+ years of progressive experience in GRC, compliance, or security audit roles.
Experience in healthcare or regulated industries strongly preferred.
Certifications strongly preferred: ISO 27001 Lead Auditor/Implementer, CISSP, CISM, CISA, HITRUST CCSFP, CRISC.
Experience leading ISO 27001, SOC2, or HITRUST audits, including ISMS implementation and external audit coordination.
Strong understanding of NIST CSF, SOC 2, GDPR, and other security frameworks.
Hands-on experience with customer security audits, including responding to security questionnaires and managing security assessments.
Ability to perform risk assessments, policy reviews, and compliance gap analyses.
Strong written and verbal communication skills, with the ability to explain technical concepts to non-technical stakeholders.
Detail-oriented with excellent organizational and project management skills.
Ability to work independently and collaboratively in a remote environment.
Familiarity with GRC tools (e.g., OneTrust, LogicGate, Archer, Vanta, Drata) is a plus.
We value diversity and believe the unique contributions each of us brings drives our success. We do not discriminate on the basis of race, sex, religion, color, national origin, gender identity, age, marital status, veteran status, or disability status.
Note: OneStudyTeam is unable to sponsor work visas at this time. If you are a non-U.S. resident applicant, please note that OneStudyTeam works with a Professional Employer Organization.
As a condition of employment, you will abide by all organizational security and privacy policies.
This organization participates in E-Verify (E-Verify's Right to Work guidance can be found here).
$89k-119k yearly est. Auto-Apply 15d ago
Senior Security GRC Analyst
Lambda Labs
Remote certified information systems security professional job
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
* Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
* Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
* Manage IT Risk Register including risk identification, tracking, and prioritization.
* Assist with and drive remediation of control deficiencies and gaps
* Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
* Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
* Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
* Assist control owners with root cause analysis and track risk management action plan progress.
* Create risk metrics for management regarding informationsecurity control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of informationsecurity requirements
You
* Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
* Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
* Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
* Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
* Experience in the machine learning or computer hardware industry
* Experience with Security by Design and/or Privacy by Design principles
* Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
* Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
* Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
* CertifiedInformationSystems Auditor (CISA)
* CertifiedInformationSecurity Manager (CISM)
* CertifiedInformationSystemsSecurityProfessional (CISSP)
* Certified in Risk and InformationSystems Control (CRISC)
* Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
* Founded in 2012, with 500+ employees, and growing fast
* Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
* We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
* Our values are publicly available: *************************
* We offer generous cash & equity compensation
* Health, dental, and vision coverage for you and your dependents
* Wellness and commuter stipends for select roles
* 401k Plan with 2% company match (USA employees)
* Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
$89k-119k yearly est. 60d+ ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
Musckids
Remote certified information systems security professional job
The InformationSecurity Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the InformationSecurity Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior InformationSecurity Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and SecurityInformation Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
Perform cyber security incident handling, tracking and reporting.
Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
Respond to relevant service requests received from end users (e.g. for investigation of security events).
Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
Conduct vulnerability assessments to identify security risks and report findings to system owners.
Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
Perform risk assessments and translate business requirements into effective security controls.
Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
A Bachelor's degree in informationsecurity, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in informationsecurity or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in informationsecurity, information assurance, computer science, or a related field, and 3 years of IT security experience required.
Advanced knowledge of informationsecurity principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
Strong analytical and problem-solving skills with the ability to make decisions under pressure.
Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
Familiarity with cloud security (Azure, AWS) and identity management solutions.
Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
CISSP, CISM, GIAC, or equivalent.
Physical Requirements
Mobility & Posture
Standing: Continuous
Sitting: Continuous
Walking: Continuous
Climbing stairs: Infrequent
Working indoors: Continuous
Working outdoors (temperature extremes): Infrequent
Working from elevated areas: Frequent
Working in confined/cramped spaces: Frequent
Kneeling: Infrequent
Bending at the waist: Continuous
Twisting at the waist: Frequent
Squatting: Frequent
Manual Dexterity & Strength
Pinching operations: Frequent
Gross motor use (fingers/hands): Continuous
Firm grasping (fingers/hands): Continuous
Fine manipulation (fingers/hands): Continuous
Reaching overhead: Frequent
Reaching in all directions: Continuous
Repetitive motion (hands/wrists/elbows/shoulders): Continuous
Full use of both legs: Continuous
Balance & coordination (lower extremities): Frequent
Lifting & Force Requirements
Lift/carry 50 lbs. unassisted: Infrequent
Lift/lower 50 lbs. from floor to 36”: Infrequent
Lift up to 25 lbs. overhead: Infrequent
Exert up to 50 lbs. of force: Frequent
Examples:
Transfer 100 lb. non-ambulatory patient = 50 lbs. force
Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
Push patient stretcher one-handed = 25 lbs. force
Vision & Sensory
Maintain corrected vision 20/40 (one or both eyes): Continuous
Recognize objects (near/far): Continuous
Color discrimination: Continuous
Depth perception: Continuous
Peripheral vision: Continuous
Hearing acuity (with correction): Continuous
Tactile sensory function: Continuous
Gross motor with fine motor coordination: Continuous
Selected Positions:
Olfactory (smell) function: Continuous
Respirator use qualification: Continuous
Work Environment & Conditions
Effective stress management: Continuous
Rotating shifts: Frequent
Overtime as required: Frequent
Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$82k-116k yearly est. Auto-Apply 15d ago
Information Systems Security Officer Skill Level 3
Onyx Point
Remote certified information systems security professional job
TO BE CONSIDERED FOR THIS POSITION YOU MUST CURRENTLY HAVE AN ACTIVE TS/SCI WITH POLYGRAPH SECURITY CLEARANCE WITH THE FEDERAL GOVERNMENT. (U.S. CITIZENSHIP REQUIRED).
Responsibilities Include:
Enhancing security posture by supporting the program, organization, system, or enclave's information assurance initiatives and enforcing security policies, standards, and methodologies.
Overseeing security operations for informationsystems, managing daily security aspects, evaluating security solutions for classified processing, and conducting vulnerability and risk assessments for accreditation.
Managing configuration and system integrity by administering configuration management (CM) for security software, hardware, and firmware, ensuring compliance with security controls, and assessing the impact of system changes.
Developing and maintaining security documentation, including SystemSecurity Plans (SSPs), Risk Assessment Reports, Certification & Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
Ensuring compliance with security authorization activities following the InformationSystemCertification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF).
Providing technical expertise in security policies and operations, supporting the implementation and maintenance of security measures, and collaborating with stakeholders to strengthen the security posture.
Driving continuous improvement by assessing existing security processes, identifying vulnerabilities, and implementing proactive solutions to enhance system resilience.
Basic Qualifications:
Bachelor of Science degree in Computer Science, Information Assurance, InformationSecurity, or a related discipline, plus 12+ years of relevant experience. In lieu of a degree, an additional 4 years of experience may be considered on a case by case basis.
Industry Expertise: 7+ years of ISSO experience supporting IC or DoD programs and contracts of similar scope, type, and complexity.
Experience with customer Info Security tool suite, as well: Latteart, Biscoti, Xacata
Certifications & Compliance: DoD 8570 compliance with IAM Level II or IAT Level III (CASP, CISSP, or Associate).
Clearance Requirement: Must hold an active TS/SCI with Polygraph
Compensation:
We are committed to providing fair and competitive compensation. The salary range for our positions vary depending on accepted contractual position skill level. These salaries fall within the range of $78,000 to $275,000 per year. This range reflects the compensation offered across the locations where we hire. The exact salary will be determined based on the candidate's work location, specific role, skill set, and level of expertise.
Benefits:
We offer a comprehensive benefits package, including:
Health Coverage: Medical, dental, and vision insurance
Additional Insurance: Basic Life/AD&D, Voluntary Life/AD&D, Short and Long-Term Disability, Accident, Critical Illness, Hospitalization Indemnity, and Pet Insurance
Retirement Plan: 401(k) plan with company match
Paid Time Off: Generous PTO, paid holidays, parental leave, and more
Wellness: Access to wellness programs and mental health support
Professional Development: Opportunities for growth, including tuition reimbursement
Additional Perks:
Flexible work arrangements, including remote work options
Flexible Spending Accounts (FSAs)
Employee referral programs
Bonus opportunities
Technology allowance
A diverse, inclusive, and supportive workplace culture
$65k-88k yearly est. 60d+ ago
IT Security Specialist 4/ITSS2 (39604)
Idealforce
Certified information systems security professional job in Columbus, OH
IDEALFORCE has a CONTRACT position available immediately for a IT Security Specialist(ITSS2) to join our customer in Columbus, OH. This is an ONSITE position and require in person interview. Please find below additional details about this job.
Job Description
Security Consultant to help IT Augment the security staff until OIT can take over all Security related needs for the agency. This position will function as a highly skilled Security Consultant with specific responsibilities that include:
-Monitor network and informationsystem activity.
-Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.) Uses creativity and innovation to automate and streamline processes and procedures.
-Understands customer support, likes to work with people and can ensure that the customer is satisfied.
-Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc.
-Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT
-Perform specialized security functions (e.g. forensics for incident response).
-Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services.
-Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc.
SPECIAL NOTE: Client is running a 24/7 operation. Consultant may need to come in during incident or emergency situations.
During the interview process with the ODPS staff, the resource consultant must demonstrate competence/experience in their specific area(s) of project assignment. The resource's experience must also be documented for review and verification. Offered resources not showing technical or functional competence/experience will be sufficient reason to reject the Offeror's proposal. It is the responsibility of the Offeror to pre-screen their candidates to ensure compliance. Resource will have a background check conducted by ODPS.
Qualifications
-1-2 Years SIEM (Q-Radar preferred)
-8 years customer service experience
-8 Years Troubleshooting experience
-8+ years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP.
-8 years' experience with Active Directory.
-4 Years experience with Web and Email Filtering and Security (Ironport)
-5+ Years experience with Imperva (DAM/WAF)
-1 years of Vulnerability scanning experience (Qualys)
-3 years A/V suite experience McAfee
-3 years IPS (IBM)
-Contributes to continuous process improvements to increase the efficiency of section.
-Excellent communication skills both written and oral.
-Strong communication/ leadership skills.
-Strong influence, collaboration and negotiation experience.
-Ability to collaborate with supporting resources across business and/or functional lines.
-Have excellent oral and written skills/possess strong meeting and work session facilitation skills.
-Have the ability to work independently and as part of a team, the ability to manage time and resources to meet assigned deadlines.
-Have strong understanding of prioritization stemming from the elicitation of system and/or user requirements.
-Have excellent organizational skills, proven analytical, planning, problem solving, and decision-making skills.
-Must be knowledgeable in the English language/speak clearly and understandably use the English language.
Desired Skills
-Q-Radar
-Ironport Web and Email Security
-Imperva
-Certifications in Microsoft
-Powershell 3.0 scripting background.
-Qualys
-McAfee Enterprise solutions
-IPS
-Splunk
-Other security related tools.
-ITIL Knowledge and ITSM Tools.
Additional Information
Additional Information :
- "All your information will be kept confidential according to EEO guidelines".
- All candidates who are authorized to work in US are encouraged to apply.
- Candidates must clear the Background check prior to commencing the assignment.
THIRD PARTY CANDIDATES:
Email your candidate/s resume to joseph dot shelton at idealforce.com along with the following details: Rate, Current location and Availability.
Disclaimer :
The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
$71k-100k yearly est. 60d+ ago
Information Security Specialist/Analyst III - Information Solutions (Remote)
MUSC (Med. Univ of South Carolina
Remote certified information systems security professional job
The InformationSecurity Specialist/Analyst III reports to the Manager, Security Operations. Under indirect supervision, the InformationSecurity Specialist/Analyst III provides a variety of operational, compliance, and consultative functions. This position designs, implements, manages, and monitors technical, administrative, and physical controls to protect the confidentiality, integrity, and availability of the organization's information assets. This role may be required to provide rotating 24x7 on-call support.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC005101 SYS - IS Tidelands Integration
Pay Rate Type
Salary
Pay Grade
Health-29
Scheduled Weekly Hours
40
Work Shift
We are seeking a highly skilled and experienced Senior InformationSecurity Analyst to join our team. This role is critical in safeguarding our complex healthcare IT environment and ensuring compliance with industry standards.
Key Responsibilities:
45% - Network Security Monitoring and Incident Response:
* Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure. Experience with Microsoft Defender for Endpoint EDR is also desired.
* Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and SecurityInformation Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches.
* Perform cyber security incident handling, tracking and reporting.
* Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts.
* Respond to relevant service requests received from end users (e.g. for investigation of security events).
* Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents.
20% - Security Technology management:
* Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities.
* Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements.
10% - Vulnerability Management:
* Conduct vulnerability assessments to identify security risks and report findings to system owners.
* Manage workflows to ensure that protected assets are properly assessed in a timely manner.
15% - Threat Analysis
* Continuously evaluate and update analytics to counter evolving Threat Actor tactics, techniques, and procedures (TTPs).
* Perform risk assessments and translate business requirements into effective security controls.
* Maintain comprehensive documentation and present findings to stakeholders in a clear and actionable manner.
10% - Security Awareness:
* Create and deliver security awareness training for technical and non-technical audiences.
Additional Job Description
Required Education/Skills/Work Experience:
* A Bachelor's degree in informationsecurity, information assurance, computer science, or a related field with 5 years of IT security experience; or 10 years of hands-on experience in informationsecurity or related IT experience required, at least 6 of which must be directly related IT security experience; or a Master's degree in informationsecurity, information assurance, computer science, or a related field, and 3 years of IT security experience required.
* Advanced knowledge of informationsecurity principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.).
* Strong analytical and problem-solving skills with the ability to make decisions under pressure.
* Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools.
* Familiarity with cloud security (Azure, AWS) and identity management solutions.
* Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices.
* Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language.
* Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks.
Highly Desired Certifications:
* CISSP, CISM, GIAC, or equivalent.
Physical Requirements
* Mobility & Posture
* Standing: Continuous
* Sitting: Continuous
* Walking: Continuous
* Climbing stairs: Infrequent
* Working indoors: Continuous
* Working outdoors (temperature extremes): Infrequent
* Working from elevated areas: Frequent
* Working in confined/cramped spaces: Frequent
* Kneeling: Infrequent
* Bending at the waist: Continuous
* Twisting at the waist: Frequent
* Squatting: Frequent
* Manual Dexterity & Strength
* Pinching operations: Frequent
* Gross motor use (fingers/hands): Continuous
* Firm grasping (fingers/hands): Continuous
* Fine manipulation (fingers/hands): Continuous
* Reaching overhead: Frequent
* Reaching in all directions: Continuous
* Repetitive motion (hands/wrists/elbows/shoulders): Continuous
* Full use of both legs: Continuous
* Balance & coordination (lower extremities): Frequent
* Lifting & Force Requirements
* Lift/carry 50 lbs. unassisted: Infrequent
* Lift/lower 50 lbs. from floor to 36": Infrequent
* Lift up to 25 lbs. overhead: Infrequent
* Exert up to 50 lbs. of force: Frequent
* Examples:
* Transfer 100 lb. non-ambulatory patient = 50 lbs. force
* Push 400 lb. patient in wheelchair on carpet = 20 lbs. force
* Push patient stretcher one-handed = 25 lbs. force
* Vision & Sensory
* Maintain corrected vision 20/40 (one or both eyes): Continuous
* Recognize objects (near/far): Continuous
* Color discrimination: Continuous
* Depth perception: Continuous
* Peripheral vision: Continuous
* Hearing acuity (with correction): Continuous
* Tactile sensory function: Continuous
* Gross motor with fine motor coordination: Continuous
* Selected Positions:
* Olfactory (smell) function: Continuous
* Respirator use qualification: Continuous
* Work Environment & Conditions
* Effective stress management: Continuous
* Rotating shifts: Frequent
* Overtime as required: Frequent
* Latex-safe environment: Continuous
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
$65k-92k yearly est. 14d ago
Senior Information Systems Security Engineer (ISSE) Philadelphia, PA
Watershed Security
Remote certified information systems security professional job
Watershed Security, is a Veteran Owned Small Business with over 20 years' Cybersecurity and Government Contracting experiencing. Watershed is looking for a Journeyman InformationSystemsSecurity Engineer (ISSE) to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidates will have experience coordinating and enacting required security changes, with in various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
REQUIRED QUALIFICATIONS
Bachelor's degree in Computer Science, IT, or equivalent technical degree.
Must have at least one of the following active certifications: CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP
Years of Experience: 7 years practical experience in a cybersecurity or A&A related field.
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to informationsystems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of informationsystems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Clearance Level: SECRET; US Citizen.
Ability to possibly provide onsite support in Philadelphia PA. Some/all remote work may be an option, however the norm will be onsite support. This will be dependent upon customer needs and classification level of work being performed.
Some travel may be required.
Experience with the Navy RMF Process Guide (RPG), and Navy A&A tools such as ACAS, eMASS and eMASSter.
Proficient with Microsoft Office Suite (Word, Excel, Teams, Project). Self Starter; detail oriented; able to brief senior level staff.
DESIRED QUALIFICATIONS
Experience supporting 5 or more Navy Packages (achieving and/or maintaining ATO)
Experience with the NAVSEA RMF Business Rules
Contingent upon award
PAY RANGE
Final salary is influenced by factors such as location, contract labor categories, experience, skills, education, and certifications. Watershed offers competitive compensation, medical and dental benefits, educational reimbursement, 401K plans with matching, 15 days of PTO to start and 11 paid holidays per year. The proposed salary range for this position is: $70,000.00 - $90,000.00 USD.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
$70k-90k yearly Auto-Apply 60d+ ago
Information Security Expert
Cyberthink 4.2
Certified information systems security professional job in Columbus, OH
Title: InformationSecurity SME/Developer with .NET development Duration : 5 Months contract (High possibility of Extension) Interview Type: Both iLinc Web Cam and In Person Interview Skills Required Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
.NET development experience Required 5 Years
Thanks
Naimesh Solanki
Sr. Technical Recruiter
Phone: ************ x 6578
Qualifications
Experience working in Microsoft Identity Integration Server (MIIS) 2003 Required 2 Years
Experience with Identity Lifecycle Manager (ILM) 2007 Required 2 Years
Experience with Forefront Identity Manager (FIM) 2010 including design and implementation Required 2 Years
Experience and strong development skills in the MS Metadirectory Services Namespace in C# Required 2 Years
Additional Information
All your information will be kept confidential according to EEO guidelines.
$62k-80k yearly est. 1d ago
Information Security Controls Analyst
United Community Bank 4.5
Remote certified information systems security professional job
United Community is seeking an experienced InformationSecurity Controls Analyst to serve as a subject matter expert in evaluating and strengthening our cybersecurity and technology controls. This role plays a critical part in assessing risk exposure, recommending control improvements, and ensuring alignment with regulatory standards and business risk tolerance. You'll collaborate with enterprise risk, compliance, and legal teams to provide visibility into our risk posture and drive meaningful change across the organization.
What You'll Do
Review and document the adequacy of security and technology controls across business and IT environments.
Evaluate control posture through interviews, documentation reviews, and workflow analysis.
Recommend and support implementation of risk reduction strategies via policies, procedures, and technical controls.
Partner with risk management and security leadership to align controls with organizational risk tolerance.
Identify control strengths and weaknesses related to privacy, security, resiliency, and compliance.
Document and advocate for control improvements that balance risk with operational efficiency.
Support control development across testing, QA, and production environments.
Present control effectiveness reports to senior risk leadership.
Stay current on regulatory requirements, internal policies, and industry best practices.
Requirements For Success
Experience:
3+ years in cybersecurity or IT practitioner roles.
2+ years in IT risk or controls analysis.
Practical experience with risk management and IT control frameworks.
Education: Bachelor's degree preferred in Information Assurance, Computer Science, Engineering, or a related technical field.
Required Skills:
Strong understanding of risk frameworks (CRI, COSO, RMF, COBIT, NIST).
Familiarity with regulatory standards (PCI, FFIEC, SOX, HIPAA, GDPR, CCPA, GLBA).
Experience with CIS CSC, ISO 2700, or NIST CSF.
Excellent written and verbal communication across all organizational levels.
Strong organizational skills and ability to meet SLAs.
Sound judgment and decision-making in complex scenarios.
High integrity, trustworthiness, and adaptability.
Preferred Skills:
Certifications such as CISSP, CISA, CRISC, or CISM.
Technical experience with enterprise networks, applications, and directory services.
Familiarity with enterprise GRC platforms.
Conditions of Employment
Must be able to pass a criminal background & credit check
This is a full-time, non-remote position
FLSA Status:
Exempt
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Pay Range USD $49,972.00 - USD $76,958.00 /Yr.
$50k-77k yearly Auto-Apply 21d ago
Learn more about certified information systems security professional jobs