Azure Security Engineer
Cyber Security Analyst Job In Covington, KY
Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands.
From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded.
The Opportunity
We are seeking a Senior Cloud Security Engineer to lead cloud security initiatives with the goal of maturing security controls and working closely with data engineering teams to enhance P&G security posture. This is a highly visible role that requires regular interaction with senior management, product managers, business leads, and service providers, in addition to technical partners.
We believe that data is a critical business asset that empowers strategic decision making, integrates into daily operational processes using ML/AI technologies and provides vital insights into product innovation, marketing, product supply, and R&D. In an era where data growth is outpacing the organization's ability to get value from it, the Data & Analytics (D&A) organization is at the heart of driving the required cultural change: enhance value of data in a responsible, secure way.
Position Responsibilities
Cloud Security: Serve as the cloud security SME for P&G's global D&A organization - including support of platform teams, data architects, data pipelines, data science, AI engineering, and operations teams. Advise engineering teams on technical options to implement security controls. Keep up to date on the latest PaaS and IaaS products/services, security features, and the implications of any changes to P&G's risk profile.
Security and Privacy by Design: Lead initiative to embed security and privacy controls throughout the product lifecycle while enabling the growth of platforms, data pipelines, and capabilities. Develop toolkit for product and engineering teams that includes security features, guidelines, processes, control assessments, and metrics.
Security Engineering and Automation: Implement automation and other technical solutions to streamline security and compliance processes. Review security technologies/tools and assess their potential for adoption
Threat and Vulnerability Management: Proactively review threat intelligence and collaborate with Infosec partners to track and mitigate key threats to P&G infrastructure and systems. Lead vulnerability management program, including process for responding to alerts, remediating issues, and improving security controls.
Training: Develop security training in collaboration with the enterprise security and cloud teams. Contribute to knowledgebase and other upskilling efforts.
The Ideal Candidate
Is passionate about cyber security and improving infrastructure for the future.
Can work independently and as a team to gather requirements and translate into solutions.
Is meticulous and analytical in nature, with strong problem-solving skills.
Has the ability to multitask and prioritize, work on multiple projects and manage time effectively.
Can produce and present technical information to both technical and non-technical personnel.
Can provide customer-facing support in a professional manner.
Job Qualifications
Required:
Bachelor's Degree in Information Systems, Information Technology (IT), Computer Science, Software Engineering, other STEM field
5+ years of hands-on Azure cloud security experience, with deep knowledge of PaaS and IaaS offerings and capabilities.
Experience with Databricks, Azure Networking, Synapse, Azure Analysis Services, Azure Data Factory, Storage accounts, and VMs highly preferred.
Strong PowerShell, Azure Log Analytics, and related scripting skills to support security analysis and automation efforts.
3+ years proven experience working with DevOps teams and CI/CD processes
Strong background in security and data privacy frameworks such as ISO/IEC 27001, NIST, GDPR, and CCPA
Ability to work cross functionally and influence stakeholders at all levels
Can work in Cincinnati, OH office 3 days per week
Preferred:
Certifications: CISSP, CCSP and/or AZ-500 certifications are a strong plus
Application development and scripting (SQL/Python) experience as part of large-scale programs
Pay Range: $105k-$150k
Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process.
Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE.
P&G participates in e-verify as required by law.
Qualified individuals will not be disadvantaged based on being unemployed.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Job Schedule
Full time
Job Number
R000108004
Job Segmentation
Experienced Professionals (Job Segmentation)
Starting Pay / Salary Range
$105,000.00 - $150,000.00 / year
Information Systems Security Officer (ISSO) II
Cyber Security Analyst Job In Dayton, OH
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Information Security
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
2 + years of related experience
US Citizenship Required:
Yes
Job Description:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2-5 years related experience
SAP experience required
Prior performance in roles such as System, Network Administrator, or ISSO
Education:
Bachelor's degree in a related area or equivalent experience (4 years)
Certifications:
IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.)
Security Clearance:
TS/SCI required
Must be able to Attain - TS/SCI with CI Polygraph
Other Requirements:
Must be able to regularly lift up to 50lbs
#AirforceSAPOpportunities
The likely salary range for this position is $82,110 - $111,090. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.We connect people with the most impactful client missions, creating an unparalleled work experience that allows them to see their impact every day. We create opportunities for our people to lead and learn simultaneously. From securing our nation's most sensitive systems, to enabling digital transformation and cloud adoption, our people are the ones who make change real.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Computer & Information Security Analyst 2
Cyber Security Analyst Job In Cincinnati, OH
Job Description
This position will primarily be responsible for monitoring and analyzing security alerts using our Security Information and Event Management (SIEM) platform, conducting regular vulnerability assessments and configuration compliance scans, managing email security measures, and providing technical support for various cybersecurity tools as needed.
Responsibilities
Monitor and analyze security alerts using the SIEM system and other specialized monitoring tools.
Triage and investigate potential cybersecurity incidents, prioritizing threats based on severity and potential impact on the system.
Conduct a thorough investigation of security violations and incidents, collaborating with other team members and/or escalating to manager as necessary.
Conduct regular vulnerability assessments and configuration compliance scans across internal and external networks.
Collaborate with cross-functional IT teams on vulnerability remediation efforts and address configuration baseline deviations, ensuring timely resolution and improved security posture.
Monitor and analyze email security systems, including user-reported phishing attempts. Perform appropriate investigation and remediation actions as necessary.
Identify and develop ways to improve the efficiency of security, network, and application log monitoring.
Provide technical and end-user support for cybersecurity tools as needed.
Qualifications
Bachelors degree in technology-related field and 2-4 years of job-related experience. An equivalent combination of education and experience requiring similar knowledge, skills, abilities, and performing duties as described may be substituted for the minimum requirements.
Experience conducting vulnerability scanning and assessments using tools like Nessus Professional and Qualys.
Familiarity with cybersecurity frameworks and standards, such as National Institute of Standards and Technology (NIST) SP 800-53, NIST SP 800-171, and NIST cybersecurity framework is preferred.
Experience with configuration baselines such as Center for Internet Security (CIS) Benchmarks and Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGS) is preferred.
Fundamental networking knowledge, such as TCP/IP and common protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.).
Fundamental understanding of firewalls, intrusion detection/prevention systems (IDS/IPS), data loss prevention (DLP), endpoint antivirus, and email security.
Ability to read and interpret various system and security logs, such as Windows Event Logs, firewall logs, antivirus logs, email security/filtering logs, and IDS/IPS logs is required.
Basic knowledge of SIEM systems such as LogRhythm, QRadar, Splunk, ELK stack, etc.
Must have good verbal and written communication skills.
Must be able to clearly document findings, incidents, and procedures.
Must be able to pass a National Agency Check with Inquiries (NACI/Tier 1) background check.
Data Security Architect
Cyber Security Analyst Job In Cincinnati, OH
Must Have Technical/Functional Skills
Data Security, DLP, Microsoft Purview, Cyber security
Experience Required
3+ Year of DLP operational experience is required, must have implemented DLP, understanding expressions, analysis, policy drivers, and rules work, etc.
Roles & Responsibilities
We are looking for a Cloud Solution Architect (CSA), specializing in Data Security DLP Architect who is passionate about driving our customers' security & AI transformation on the Microsoft Platform. This person will be a trusted advisor for customers attempting to secure their entire data estates against internal and external data risk. Microsoft Purview's integrated Data Security services support customers holistically securing data by:
• Protecting Sensitive Data using data classification, sensitivity labelling and encryption policies.
• Managing Insider Risks using machine learning detection controls and indicators, adaptive protection to dynamically enforce controls and advanced privacy controls
• Preventing Data Loss using built in exfiltration policies for Microsoft 365 apps, services and endpoints.
• Customer Satisfaction - Drive positive Customer Satisfaction & become a trusted advisor.
• Customer/Partner Insights - Provide feedback & insights from customers/partners.
• Be the Voice of Customer to share insights and best practices, connect with Global Security teams at Microsoft, Engineering and Product teams to remove blockers and influence the solution roadmap.
• Support customers through the adoption lifecycle, through planning, adoption, deployment, and optimization.
• Support increasing drive of Microsoft security products utilization.
• Lead technical solutioning and nurturing across the customer journey.
• Experience in the implementation (end to end) of Data Security projects with Data Security Platforms, preferably experience with Microsoft Purview (Information Protection, Data Loss Prevention, Information Risk Management)
• Experience working with Microsoft 365 services and/or Azure data services such as SharePoint, Teams, Office 365, SQL, Azure Data Lake Services.
OR equivalent experience.
Generic Managerial Skills
• Strong interpersonal skills, with an emphasis on the ability to effectively influence others and develop productive working relationships
Salary Range: $110,000-$140,000 a year
Linux Cryptography and Security Engineer
Cyber Security Analyst Job In Cincinnati, OH
Job Description
This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. You will use your applied cryptography, Linux Security, and coding skills to enhance the Ubuntu distribution and work with organizations such as DISA and CIS to draft and implement security hardening benchmarks for Ubuntu.
As a member of the Security Hardening team you will work with and develop automation tooling to audit deployed systems for DISA-STIG and CIS benchmark compliance. You will interact with internal and external stakeholders to identify gaps in our frameworks, and develop new solutions to address these challenges. In this role you will have the opportunity to influence team and security culture, facilitate technical delivery, and help drive team direction and execution. You'll collaborate closely with Canonical's kernel team as well as the wider engineering organization to drive features impacting all Ubuntu users.
Day-to-day responsibilities
Collaborate with other engineers in the Security Hardening team to achieve and retain various Security certifications
Extend and enhance Linux cryptographic components (OpenSSL, Libgcrypt, GnuTLS, and others) with the features and functionality required for FIPS and CC certification
Collaborate with external security consultants to test and validate kernel and crypto module components
Work with external partners to develop security hardening benchmarks and audit + remediation automation for Ubuntu
Contribute to Ubuntu mainline and upstream projects to land solutions and benefit the community
Communication and collaboration within and outside Canonical to identify opportunities to improve our security posture, rapidly resolve issues, and deliver high-quality solutions on schedule
What we are looking for in you
Hands-on experience with low-level Linux cryptography APIs and debugging
Excellent software engineering fundamentals, including prior experience with C development, and the ability to demonstrate such
Hands-on experience with Linux system administration and shell scripting
Demonstrated knowledge of security and cryptography fundamentals + direct experience writing secure code and implementing best practices
Significant development experience working with open source libraries
Excellent verbal and written communications to enable efficient collaboration with internal and external partners in a remote-first environment
Additional skills that you might also bring
Prior experience working on FIPS/Common Criteria certified products and in-depth knowledge of the underlying standards
Prior experience working directly with DISA-STIG or CIS benchmarks, including related audit + remediation tooling (e.g. Compliance as Code)
Experience working directly with Linux Kernel
Prior experience with Python, OVAL (Open Vulnerability Assessment Language), and Ansible
History of contributions to open source projects
What we offer you
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
Distributed work environment with twice-yearly team sprints in person - we've been working remotely since 2004!
Personal learning and development budget of USD 2,000 per year
Annual compensation review
Recognition rewards
Annual holiday leave
Maternity and paternity leave
Employee Assistance Programme
Opportunity to travel to new locations to meet colleagues from your team and others
Priority Pass for travel and travel upgrades for long haul company events
About Canonical
Canonical is a pioneering tech firm that is at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do.
Canonical has been a remote-first company since its inception in 2004. Work at Canonical is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game. Canonical provides a unique window into the world of 21st-century digital business.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
#LI-Remote
Microsoft Senior Security Consultant
Cyber Security Analyst Job In Mason, OH
Description:
Interlink is looking for our next Microsoft Senior Security Consultant to join the team. We are a team of consultants who are passionate for information security and helping clients get value out of their technology investments. Reporting to the Security Practice Manager, you will be focused on implementing, managing, and maintaining Microsoft’s security solutions, including the Defender platforms, Azure Sentinel, Azure Information Protection, and more.
Job Description:
Provide consulting services to design and implement threat protection and response solutions based on the Microsoft Defender suite of products.
Provide consulting services to design and implement Azure Sentinel as a SIEM
Provide consulting services to design and implement data protection solutions based on Azure Information Protection
Provide consulting services to design and implement identity and access management solutions based on Azure Active Directory
Provide consulting services to integrate security solutions into an overall security and compliance posture to support Client business objectives and requirements
Interface with Clients in a presales capacity to find opportunities and scope projects
Provide third-level support to Clients
Provide strong customer service while working with Clients onsite or remote
Find opportunities to drive additional value to our clients while working with them
Requirements:
Skills/Requirements:
5+ years of prior consulting experience
5+ years of experience with Microsoft Defender (Endpoints, Office 365, Azure, Identity, etc…) or similar non-Microsoft products
5+ years of experience with Azure Sentinel or similar non-Microsoft products
5+ years of experience with Azure Active Directory or similar non-Microsoft products
5+ years of experience with Azure Information Protection or similar non-Microsoft products
Familiarity with zero trust security principles
Familiarity with common compliance frameworks including CMMC, NIST 800-171, FedRAMP, GDPR, and HIPAA
Experience with penetration testing and/or vulnerability management tools is a plus, but not required
Active industry certifications are helpful, though not required
Our Benefits
Medical, Dental, and Vision coverage
Flexible schedules, 3 weeks of vacation time annually, 7 paid company holidays, and paid birthday off
Voluntary supplemental insurances (life, disability, and accident)
401(k) with company contribution
Awarded the 2023 Best Places to Work Winner in Cincinnati by the Business Courier
About Us
Interlink is a nationally recognized IT consulting company, offering the flexibility of a small company while providing stability and benefits usually found at enterprise firms. We work with a "family first" attitude, so we look to hire motivated individuals who understand that accomplishing our goals in supporting our clients while having fun is important.
At Interlink, we also believe that working in an innovative, fun, and collaborative environment is key to success.
As the winner of The Best Places to Work Award three years in a row, we know what it takes to care for our employees and clients.
Get to know more about us and our company culture.
Our Culture Promise
At Interlink, we believe in creating a positive and collaborative work environment where everyone can thrive, grow, and make an impact. We value diversity, equity, innovation, and excellence in everything we do. Interlink is more than just a company; we are a community. You'll enter a supportive, collaborative work environment where everyone has your back. We celebrate your wins, encourage you during challenges (both personal and work), and foster connections beyond the office walls. We are looking for people who share our vision and passion for making a difference. If you are ready to join a team of talented and driven professionals who love what they do, you are in the right place.
Interlink Cloud Advisors is an equal-opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran, or disability status.
#Linkedin-Remote
Cyber Security Analyst Dayton, OH
Cyber Security Analyst Job In Dayton, OH
****Cyber Security Analyst**** We are actively seeking applicants that have experience in one or more of the areas listed below to be part of an enterprise Cybersecurity organization. If you have interest in being part of a team providing leading edge cybersecurity services to a large part of the DoD community, then please reach out to us.
****Specific Job Description:****
* Analyze suspicious or malicious network traffic to identify unauthorized or anomalous activity
* Conduct cybersecurity monitoring and analyzes threats and suspicious/malicious network traffic
* Identify, documents, and reports unauthorized activity/attacks
* Incorporate data from deployed sensors into malicious/suspicious traffic analysis capability and ensure the sensors remain fully operational
* Develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks
* Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats
****Required Security Clearance:****
* Candidate MUST be able to obtain and maintain a TOP SECRET security clearance
* Strongly preferred if you already have an active Secret or Top Secret clearance
****Minimum Requirements:****
* Current DoD 8570 Certification.
* Candidate MUST have IAT Level II Security+ certification or higher and Certified Ethical Hacker (CEH) within 6 months.
* Strong interpersonal and communication skills
* Ability to work in a team and as individual contributor
* Ability to manage multiple projects and tasks in a rapidly evolving environment
****Preferred Qualifications:****
* Scripting skills including python and/or bash
**Work Location:**
* Dayton, OH, reliably commute or planning to relocate before starting work
**Job Type**: Full-time, 8 hour shifts
**Benefits**:
* 401(k)
* Dental insurance
* Health insurance
* Life insurance
* Paid time off
* Paid holidays
* Vision insurance
**What to Expect Next:**
After submitting your application, our recruiting team members will review your resume to ensure you meet the qualifications. This may include a brief telephone interview or email communication with a recruiter to verify resume specifics and salary requirements. Management will be conducting interviews with the most qualifies candidates.
We perform a background and drug test prior to the start of every new hires' employment. Broadway Ventures is an equal opportunity employer and VEVRAA Federal Contractor.All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Education
Select... Select... Select... If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows:
A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability.
A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.
An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.
An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.
Cyber Security Analyst - Entry Level
Cyber Security Analyst Job In Cincinnati, OH
Entry Level Cyber Security Analyst
Cincinnati, OH
READ BEFORE YOU APPLY!
Opportunity: Per Scholas is helping to source entry-level candidates for Cyber Security Analyst positions with our employer partners in the Cincinnati region and will offer free training to candidates in need of additional upskilling in order to qualify.
Requirements:
To be successful, candidates need to possess basic literacy, math, critical thinking, and self-teaching skills, do well in fast-paced environments, and be able to learn new technologies quickly.
What we are looking for:
Must have at least a High School diploma or GED
Must be authorized to work in the US
Previous tech work experience or education preferred
Must be able to commit a Monday - Friday, 9:00am - 4:00pm
Must live in the Atlanta area
We are not currently offering visa sponsorship or transfers, but we will accept applications from individuals with work authorization.
Information Security Specialist - Standards Coordinator
Cyber Security Analyst Job In Cincinnati, OH
Description We are in search of an Information Security Specialist - Standards Coordinator to join our team based in Cincinnati, Ohio. This role lies within the tech industry and will involve tasks related to the maintenance and improvement of our information security standards. The role offers a long-term contract employment opportunity.
Responsibilities:
- Manage and maintain information security standards and guidelines
- Implement and coordinate security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information
- Perform regular audits to ensure security practices are compliant
- Utilize skills in Checkpoint, Cisco ASA, Cisco Technologies, Cloud Technologies, and Firewall Technologies for effective security management
- Use AB Testing, Auditing, AWS Technologies, and Configuration Management to ensure the robustness of security systems
- Lead Cyber Security initiatives and strategies to enhance the security framework
- Monitor and evaluate the efficiency of security operations and make necessary adjustments
- Collaborate with different teams to ensure the implementation of security measures across all departments
- Stay updated with the latest trends in information security and incorporate them into our security strategies Requirements - Proficient in Checkpoint, Cisco ASA, and Cisco Technologies.
- Demonstrated expertise in Cloud Technologies and Firewall Technologies.
- Proficiency in AB Testing and Auditing.
- Strong knowledge of AWS Technologies and Configuration Management.
- Proven experience in Cyber Security.
- Bachelor's degree in Computer Science, Information Systems, or related field.
- Minimum of 3 years of experience in information security or related field.
- Strong problem-solving skills and ability to work under pressure.
- Excellent written and verbal communication skills.
- Ability to work both independently and in a team-oriented environment.
- Relevant certifications in information security are preferred.
- Willingness to stay updated with the latest advancements in technology and security threats.
- Ability to handle confidential and sensitive information with discretion.
- Strong analytical and organizational skills. Technology Doesn't Change the World, People Do.
Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles.
Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more.
All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information.
© 2024 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
Cyber Engineer I-III
Cyber Security Analyst Job In Alexandria, KY
* Alexandria, VA, USA * Commensurate with Education and Experience * Full Time * *Excellent Benefits Package* Email Me This Job ****Cyber Engineer I-III**** The Human Resources Research Organization (HumRRO) is a non-profit leader in applied research, evaluation, and analytics in the arenas of employment, student, and military testing, and professional credentialing and licensing. We work with federal and state government agencies, private sector organizations, and professional associations.
**About the Organization**
As a non-profit, HumRRO is dedicated to work that contributes to science and society. Our employees enjoy a highly collaborative and supportive environment that fosters innovation, ethical practice, and outstanding customer service. Our core operational staff includes Behavioral Science and Educational Research professionals. We are committed to supporting a diverse workforce and to practicing equity and inclusion for all staff.
**About the Job**
About the Role: We are seeking a hands-on Junior to Mid-Level Cyber Engineer to join our dynamic team. This role is crucial in maintaining and enhancing our organization's cybersecurity posture. The ideal candidate will be involved in various aspects of our security operations, from conducting vulnerability assessments to analyzing security logs and artifacts. Your role will consist of performing NIST800-171 and 53(RMF) support for Federal and DoD and DOD Contractor IT systems by conducting risk assessments and developing RMF package components and test plans, assisting in documentation on cyber security technologies, best practices, policies and procedures. Other tasks include maintenance and technical reviews of IA security processes assuring requirements for continuous compliance activities, annual control assessments, monitoring POA&Ms, MFRs, and IA artifacts, creating and updating security documentation, and developing mitigations for maintaining compliance.
The position is onsite at a HumRRO office in Alexandria, VA (Hybrid work setting and other offices in Minneapolis, MN; Louisville, KY, San Diego, CA; or Monterey, CA may be considered).
U.S. citizenship is required for this position based on government contract requirements.
**Key Responsibilities:**
* Assist in performing penetration testing and vulnerability assessments using tools such as OWASP ZAP, Burp Suite, and Kali Linux
* Conduct analysis of user access and behavior using analytics and security monitoring tools
* Review and analyze scan results from tools like SonarQube/Fortify to identify security issues and propose remediation actions
* Collaborate with development teams to address and remediate security findings
* Review and investigate issues found in error and audit logs
* Conduct monthly security reviews, capture and document necessary compliance evidence
* Assist in maintaining HumRRO's NIST 800-171, ISO 27001:2022 and CMMC control evidence catalogs
* Maintain SaaS compliance data and provide monthly reports on NIST 800-171, ISO 27001:2002 and CMMC compliance status
* Assist in developing and maintaining compliance-related policies, processes and procedures
* Assist in third-party NIST 800-171, ISO 27001:2002 and CMMC compliance audits
* Stay current with the latest security threats, vulnerabilities, and industry best practices
* Assist in maintaining compliance with relevant security standards and regulations such as NIST-800-171, NIST-800-53 (RMF for DoD), and CMMC
**Required Qualifications:**
* Bachelor's degree in Computer Science, Information Security, or related field (or equivalent work experience)
* DOD clearance T/3 (public trust) eligible and US citizenship.
* 1-3 years of experience in cybersecurity or related IT roles
* Knowledge of secure coding practices and web application security
* Familiarity with common security tools and technologies
* Strong analytical and problem-solving skills
* Knowledge of NIST frameworks and other security standards
* Excellent communication and collaboration abilities
* Willingness to learn and adapt to new technologies and methodologies
**Desired Qualifications:**
* Security+ or other relevant security certifications CCSP, CISSP, Security+ certification,
* Experience with cloud DevSecOps (AWS, Azure, or GCP)
* Familiarity with DevSecOps practices, DISA standards, enterprise level work with security policies, network administration and support within AWS GovCloud.
* In depth operational knowledge of IA controls and secure configurations with proficiency using ACAS, HBSS, and IAVM reporting.
* Analyzing system configuration per DISA STIG using STIGviewer and SCAP to mitigate security vulnerabilities.
* Exceptional skills responding to IAVAs as necessary to address systems vulnerabilities and remediating findings in FISMA and DIACAP audit reports.
* Review proposed new systems, networks, and software designs and concepts for potential security risks, recommend mitigations or countermeasures and resolve integration issues.
* Proficient with eMASS package development.
* Detailed knowledge of Federal and DoD directives including RMF and DIACAP and ensuring these security policies, standards, and procedures are enforced.
* Strong knowledge of RMF/NIST and Assessment Authorization processes.
**What We Offer:**
* Opportunity to work on challenging projects and make a significant impact on our organization's security
* Collaborative environment with experienced security professionals and software engineers
* Continuous learning and professional development opportunities
* Competitive salary and benefits package
If you are passionate about cybersecurity and ready to take your career to the next level, we encourage you to apply. Join us in our mission to build and maintain a secure application landscape!
All qualified applications will receive consideration without regard to race, color, religion, sex, national origin, age, marital status, sexual orientation, gender identity, veteran status, medical condition, or disability. EEO/AA Employer/Vet/Disabled.
Named one of "50 Great Places to Work" by Washingtonian magazine, 2019, and one of the "Top Workplaces" by The Washington Post for 2020 and 2021.
You must select a location. You must select an education status answer. You must select a seeking status answer.
Cyber Security Engineer
Cyber Security Analyst Job In Dayton, OH
CYBER SECURITY ENGINEER (HITS-R): Bowhead seeks a Cyber Security Engineer to support the High Performance Computing Modernization Program (HPCMP) Integrated Technical Services -Restricted (HITS-R) contract located in Dayton, OH. Bowhead will provide the High Performance Computing Modernization Program (HPCMP) with technical and professional support elements required for the operation of the HPCMP Office (HPCMPO) in all phases of planning and execution of its mission, including: technical and administrative support in all areas of program activity, program management support, meeting facilities and office environment, to include a complete telecommunications and computer systems capability and full logistical services.
The Cybersecurity Engineer will provide systems engineering expertise in the design, integration, operation, and maintenance of cybersecurity infrastructure and capabilities. They will define and employ documented procedures for sustainable, continued operations of enterprise Computer Network Defense capabilities, including centralized vulnerability/patch management processes for all systems. These highly skilled individuals will work in various capacities alongside Computer Network Defense (CND) Incident Responders and Warning Intelligence Analysts. The Cybersecurity Engineers will maintain the establishment of infrastructure services supporting cybersecurity environments such as directory services in support of authentication, networking monitoring services, domain name services, virtual hosting infrastructure, etc. They will support the functionality of an environment designed to foster cybersecurity research, development, and operations.
**Responsibilities**
- Develop interface specifications for use within the enclave environments.
- Ensure that enclave systems and network designs support the incorporation of DoD-directed vulnerability solutions, e.g. IAVA requirements.
- Apply and maintain cybersecurity for systems;
- Utilize defense-in-depth strategies and methods to harden systems and networks (e.g. blocking/filtering, IDS/IPS, A/V, logical separation of management traffic, content detonation and automated analysis, and DISA SRG/STIG compliance)
- Responsible for interfacing with both cybersecurity operations and project personnel in order to formulate engineering requirements, and seek concurrence in satisfying stated objectives
- Maintain a schedule for upcoming software and hardware upgrades and follow procedures for regularly scheduled maintenance and, in the instances necessary, ad hoc or emergency maintenance
- Ensure secure backup of systems and data through formally documented backup plan, accurate and up-to-date listing of systems to be backed up, proper storing and labeling of completed backups
- Possess the necessary technical skills to lead the overall design, engineering, integration, operation and maintenance of a defense-in-depth strategy for cybersecurity infrastructure
**Qualifications**
- Must possess BS/A degree in Computer Science or related field.
- Must have a CompTIA Security+ CE certificate (IAT Level II) and a Certified Ethical Hacker (CND-IS) certificate prior to starting.
- A minimum of five (5) years of Linux and Networking experience, three (3) years' experience with IDS, IPS and Host Based Security Solutions is required.
- Possess the necessary technical skills to lead the overall design, engineering, integration, operation and maintenance of a defense-in-depth strategy for cybersecurity infrastructure.
- Intermediate to advanced level skills in Microsoft Office software suite - Word, Excel, Outlook, PowerPoint.
- Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
- Presentation and strong public speaking skills are required.
- Strong interpersonal skills and good judgment with the ability to work alone or as part of a team.
Physical Demands:
- Must be able to lift up to 25 pounds
- Must be able to stand and walk for prolonged amounts of time
- Must be able to twist, bend, and squat periodically
SECURITY CLEARANCE REQUIREMENTS: Must currently hold a security clearance at the Top Secret level, may be required to obtain a Top Secret/SCI clearance upon hire. US Citizenship is a requirement for Top Secret clearance at this location.
\#LI-KC1
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/AA/M/F/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. Please view Equal Employment Opportunity Posters provided by OFCCPhere (******************************************* .
All candidates must apply online at ****************** and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance (********************************************
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs.
**Join our Talent Community!**
Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events.
**ID** _2024-21725_
**Category** _Engineering_
**Location : Location** _US-OH-Dayton_
**Clearance Level Must Be Able to Obtain** _Top Secret_
**Minimum Clearance Required** _Top Secret_
**Travel Requirement** _N/A_
TS/SCI Cyber Reverse Engineer
Cyber Security Analyst Job In Dayton, OH
An employer in Dayton, OH is seeking a TS/SCI Cyber Reverse Engineer for a contract to hire opportunity. This individual will be responsible but not limited to the following: join a team of 5-6 in fast paced agile environment to not only develop software but to take the software and run it through reverse engineering tools to decompose an application to understand more information about it. This will be supporting a system that makes a difference to develop software and systems from vision to production. Will work directly with clients and sit on site 5 days a week at the base. Must have an active TS/SCI Security DoD clearance.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ******************** .
To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** .
Skills and Requirements
Active TSSCI Security DoD clearance
Bachelor's Degree (STEM preferred)
3+ years of experience with C+3+ years of experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro, Ghidra or Binary Ninja
Experience with programming, including Python, C, or Assembly
Experience with working in Windows or Linux environments Experience working with Debuggers (Immunity, GDB, Olly Dbg)
Experience with working in a virtualized environment null
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to ********************.
Cyber Security Engineer I
Cyber Security Analyst Job In Fairborn, OH
Job Details Dayton, OH - Fairborn, OH Full Time 4 Year Degree Negligible Information TechnologyDescription
Cyber Security Engineer I
Level: Experienced Department: Intelligence Services Job Type: Full-time
Job Summary
The Cyber Engineer I supports the research, development, and sustainment of old and new hardware systems and software capabilities for intelligence production.
Duties and Responsibilities
Plan, conduct, and accomplish assessments of systems and networks within the networking environment.
Identify systems/networks deviations from acceptable configurations, enclave policy, or local policy.
Conduct passive evaluations (compliance audits) and active evaluations (vulnerability assessments).
Establish strict program control processes to ensure mitigation of risks and support obtaining certification and accreditation of systems.
Provide process support, analysis support, coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits.
Assist in the implementation of the required Government policy (i.e., NISPOM, DCID 6/3), and make recommendations on process tailoring.
Support the formal Security Test and Evaluation required by each Government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.
Periodically conduct of a review of each system's audits and monitors corrective actions until all actions are closed.
Qualifications
Required Qualifications
Bachelors Degree cyber security, computer science, engineering, or information technology.
At least three years of experience working a cyber security role in the DoD space.
Must have an active TS/SCI clearance.
Proven experience in cyber security planning, assessment, and analysis
Proven experience performing and reviewing technical security assessments
Proficiency with Microsoft Office Suite, especially Excel and PowerPoint.
Experience implementing risk management processes, specifically related to cyber security
Working knowledge of the DoD Information Assurance Vulnerability Management Process.
Meets Department of Defense Cyber Security Workforce (CSWF) requirements for Information Assurance Management (IAM) Level I
Experience in planning, organizing, completing and presenting assessments of National Security/IA-related concepts, analyses, studies and procedures.
Thorough understanding of DoD Computer Network Defense policy and requirements, and have cursory familiarity with CND tools and processes (e.g. network scanners; vulnerability mitigation; remediation; risk management).
Working understanding of secure software development and assessment.
Must be U.S. Citizen.
AA/EOE M/F/Disabled/Vet
This company is an affirmative action/equal opportunity employer and makes employment decisions without regard to race, color, religion, sex, national origin, age, disability or protected veteran status. All qualified applicants will receive consideration for employment.
Cyber Security Engineer
Cyber Security Analyst Job In Dayton, OH
Applied Research Solutions is seeking a full-time Cyber Security Engineer, located at Wright-Patterson AFB, OH support the ISR Crosscutter program. **Why Work with us?** Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.
**Responsibilities Include:**
+ The Contractor shall provide expert weapons system cybersecurity guidance and recommendations to program engineers, program managers, acquisition security program executive officer, Milestone Decision Authority (MDA), and AO.
+ The Contractor shall have current and demonstrated background related to supply chain risk management to prevent an adversary subverting weapon systems and critical networks.
+ The Contractor shall translate and provide comprehensive NIST 800-53 requirements to ensure SSE and procurement solutions are incorporated into an integrated program protection scheme based upon known or anticipated risks. Knowledge of systems engineering principles, network architecture analysis, verification and validation of requirements, and understanding the risk management process and understanding of the operational context of weapon systems employment is critical.
+ The Contractor shall provide subject matter expertise to support the AFPEO's intent to execute RMF to support assessment & authorization of assigned systems including generating required artifacts such as Interim Authority to Test (IATT), Authority to Connect (ATC), and Authority to Operate (ATO) packages as well as associated reports and presentations.
+ The Contractor shall have verifiable experience with Authorization Officials (AOs), their associated action officers and their processes, preferably for platform systems.
+ The Contractor shall execute risk reduction based policies and procedures, and develop system specific comprehensive cybersecurity processes to include implementation of continuous monitoring.
+ The Contractor shall document system architectures, utilizing original equipment manufacturer documentation and system interface specifications, to support the cyber analysis, identification, selection, and tailoring of security and privacy controls necessary to protect the system.
+ The Contractor shall provide expert level evaluation of designs and proposed implementation solutions to defend weapon systems and critical networks against malicious and non-malicious exploitation throughout the full acquisition lifecycle of portfolio programs. The Contractor shall evaluate threat data and develop residual risk recommendations and mitigations to senior DoD and AF leadership based on identification and analysis of weapons vulnerabilities.
+ The Contractor shall review and analyze interoperability requirements and shall review, develop and evaluate resultant specifications and internal and external Interface Control Documents (ICDs).
+ The Contractor shall review and propose technical recommendations at both the strategic and operational levels regarding critical technologies requiring protection, Program Protection Plans (PPP), and anti-tamper (AT) plans, cyber findings, vulnerabilities, and risks.
+ The Contractor shall conduct technical evaluations on vendors' proposals to ensure that cybersecurity requirements are properly addressed.
+ The Contractor shall assist and advise various working groups, planning teams and IPTs by preparing and reviewing agendas, coordinating topics and speakers, and researching, tracking and closing action items.
+ The Contractor shall support multiple systems security working groups to develop a secure, resilient aircraft based on SSE principles.
+ The Contractor shall provide expert identification, documentation, and assessment of threats, cyber findings, vulnerabilities, attack scenarios, impacts if exploited, and likely timelines for exploitation.
+ The Contractor shall provide stakeholders with on-time deliverables, RMF artifacts, cyber impact assessments, and approaches to meet growing ISR & SOF requirements.
+ The Contractor shall deliver solutions which are ready for the AO approval under significantly reduced timelines required by special operations and quick reaction capability programs.
+ The Contractor shall ensure that contractual documentation, such as statements of work, CDRLs, and SRDs, incorporate cybersecurity requirements that support the development of the assessment and authorization process.
+ The Contractor shall be able to support up to 33% of contract time on travel to support remote site, site visits, site audits, design reviews and engineering implementation reviews of network architectures.
+ Other duties as assigned
**Qualifications/Technical Experience Required:**
+ Must be a US Citizen
+ Top Secret clearance required
+ The Contractor must have demonstrated expert level DoD acquisition processes experience related to acquisition platform and sensor cybersecurity engineering along with an expert understanding of Risk Management Framework (RMF), Cybersecurity strategies, developing cyber resilient systems of systems (SoS), systems engineering, network engineering, and technical interface design to ensure weapon systems meet cyber resilient and Systems Security Engineering (SSE) criteria.
+ Senior level cybersecurity positions will require IAT level 3 and/or level 2 certifications. be DoD 8570 certified and have a current T-5 special sensitive eligibility on the first day of the task order.
+ The DoD directive 8570 Information Assurance Technical Level 3 (IAT III) or Information Assurance Management Level 3 (IAM III) certification must be achieved within one year of the task order start date; and maintained throughout the period of performance.
**Senior** **:** Possesses the advanced knowledge, experience and recognized ability to be considered an expert in their technical/professional field, possess the ability to perform tasks and oversee the efforts of junior and journeyman personnel within the technical/professional discipline. Will demonstrate advanced knowledge of their technical/professional discipline as well as possess a comprehensive understanding and ability to apply associated standards, procedures and practices in their area of expertise. (Program Office, Enterprise and Staff Level Support interface)
Functionally Aligned Minimum Recommended Education and Experience:
+ Advanced Degree (Master of Arts (MA) / Master of Science (MS)) and 12 years of experience in the respective technical / professional discipline being performed, five years of which must be in the DoD
+ OR, BA/BS degree and 15 years of experience in the respective technical/professional discipline being performed, five of which must be in the DoD
+ OR, 20 years of directly related experience with proper certifications as described in the Functionally Aligned Job Descriptions, eight of which must be in the DOD.
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals based on disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
Cyber Engineer
Cyber Security Analyst Job In Beckett Ridge, OH
At Cryptic Vector, we are dedicated to mission success. We take the time to understand our customers' needs, delivering products that perform when our nation needs them most. We understand that properly supporting the most unique missions of the United States government requires the nation's best. Our focus is on creating a culture where the best and brightest want to grow, learn, and stay. If coming up with out-of-the-box solutions is your specialty, then you'll feel right at home at Cryptic Vector. We are solving the country's most unique problems in an environment where problem solvers and hard workers thrive. We've replaced corporate red tape with transparency and servant leadership. Honestly, it's hard not to love this culture!
We value the individual experiences that our team members add to our culture and capabilities. Please don't hesitate to apply even if you don't meet the exact qualifications! We are interested in varying levels of experience.
Cryptic Vector is looking for Cyber Engineers with experience or interest in offensive cyber engineering. Cyber Engineering at Cryptic Vector is a research and development position spanning a variety of disciplines.
The responsibilities of the Cyber Engineer position may include the following:
Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization
Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack
Design/develop secure, reliable, software-based communication solutions
Design/develop stealth solutions
Collaborate with engineering teams and product end users to translate customer/business/technical requirements into architectural designs and software solutions
Write unit tests, functional tests, and end-to-end tests
Provide constructive code reviews for colleagues
Programming languages:
Direct and recent experience coding in C and/or C++
Interest in new systems programming languages
Proficiency in modern scripting languages (like Python) is important but not central
An ideal candidate for these positions will have:
Experience developing user-mode applications for traditional platforms (Windows, Linux, mac OS, Android, iOS) or user/kernel-mode capabilities for non-traditional platforms (embedded/proprietary/custom firmware or operating systems)
A hacker mindset. Interest analyzing software/firmware for weaknesses.
Participation or interest in Capture the Flag (CTF)/hacking competitions
Interest in the architecture/internals of proprietary operating systems
Comfort working with assembly, machine code, hexadecimal, and binary. Familiarity with reverse engineering tools, such as IDA Pro and/or Ghidra.
Experience using, analyzing, and manipulating old/new network protocols. Interest in network/socket programming using TCP/UDP.
Working knowledge of basic cryptography functions and programming
Humble confidence, with a desire to work in a team setting (perhaps using an agile methodology)
Familiarity with software engineering methods/process. Familiarity with CI/CD pipelines and best practices.
Requirements
Preference for B.S. degree in Computer Science, Cyber Operations, Computer Engineering, Electrical Engineering, or related field
Ability to obtain/maintain a US security clearance
Willing to work in the greater Cincinnati area
Information System Security Officer III
Cyber Security Analyst Job In Wright-Patterson Air Force Base, OH
Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer III.
Job Descriptio n:
Summary: The ISSO III's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Review, prepare, and update AIS authorization packages
Notify customer when changes occur that might affect AIS authorization
Perform AIS self-inspections, provide security coordination and review of all system test plans
Identify AIS vulnerabilities and implement countermeasures
Represent the customer on various technical review and inspection teams
Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages
Coordinate, prepare, and track AIS inspections, reports, and responses
Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities
Prepare reports on the status of security safeguards applied to computer systems
Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices
Perform ISSO duties in support of in-house and external customers
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Review, track, and conduct AIS training
Provide leadership, mentoring, and quality assurance for Team Members
Requirement:
Five (5) to Seven (7) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
An exciting and rewarding career awaits you with Global Resource Solutions, Inc. (GRS). GRS is a management consulting company to government and business that offers great career opportunities and a comprehensive slate of employee benefits to our employees including medical, dental, vision, short/long term disability, life insurance and a retirement plan. GRS is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.
This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S. for more information please see the flyer: *******************************************************************************************
Information Security Analyst
Cyber Security Analyst Job In Dayton, OH
** Information Security Analyst-Hybrid** **Job Details** Dayton Office - Dayton, OH **Description** **McGohan Brabender** ** Information Security Analyst McGohan Brabender is renowned for recruiting top-tier talent within the employee benefits industry. As one of the nation's largest employee-owned (ESOP) benefit firms, we are true entrepreneurial disruptors in the field. Our team embodies agility, serving as advisors, financial strategists, and innovative problem solvers.
Our culture is infectious, grounded in our unwavering commitment to fostering a diverse and inclusive workplace where every individual is accorded the utmost dignity and respect. At the core of all our values, whether in life or business, lies our dedication to people. We wholeheartedly encourage everyone to bring their authentic selves to work every single day.
**About the Role:**
As an Information Security Analyst at McGohan Brabender, you will play an integral role in safeguarding our organization's data, systems, and networks from cyber threats. The ideal candidate will be a proactive and detail-oriented individual, focused on collaboration with other IT and non-IT resources to create the best solutions for the organization.
**Key Responsibilities:**
• Monitor network traffic, system logs, and security alerts for suspicious activity.
• Analyze security incidents to assess impact and identify root causes.
• Respond to security breaches, implement corrective actions, and mitigate threats.
• Coordinate with IT to resolve vulnerabilities and recover affected systems.
• Perform vulnerability assessments and risk analyses to identify security risks.
• Recommend measures to mitigate identified risks.
• Ensure security protocols align with industry regulations and best practices.
• Conduct regular security audits for compliance with regulatory requirements.
• Assist in designing, implementing, and managing security measures.
• Collaborate with IT teams to deploy updates, patches, and configurations.
• Provide security awareness training and develop best practice guidelines.
• Collaborate with various departments to align security strategies with organizational goals.
• Communicate security findings and recommendations to senior management.
• Stay current with cyber threats and participate in continuous learning.
**Qualifications:**
* Knowledge of common information security management frameworks.
* Experience implementing SOC2.
* Understanding & experience implementing security protocols in a Microsoft client and server systems.
* Security & configuration knowledge of O365, Azure, Exchange, Active Directory and related tools.
* Experience with computer network penetration testing and techniques required.
* Experience with proactive network, systems monitoring and threat management.
* Three or more years of related experience.
**Preferred Qualifications:**
* Previously worked in a HIPAA environment.
* Scripting language knowledge.
* Process Automation experience (automating security related functions, scans, reports, etc.)
* Linux knowledge.
* Security certifications: CISSP, CISA, Security+ or similar.
Information Systems Security Officer (ISSO)
Cyber Security Analyst Job In Wright-Patterson Air Force Base, OH
Wright-Patterson AFB, OH, USA | Salary | Full Time Information Systems Security Officer (ISSO) DEFTEC delivers mission-critical solutions through skillfully delivered services and innovative products. We are inspired by our clients' critical missions and driven to provide the most effective solutions to execute their missions, operational challenges, and requirements. Our dedicated, experienced, and talented employees work closely with our clients to ensure the delivery of exceptional services and products.
POSITION OVERVIEW
DEFTEC Corporation seeks an Information Systems Security Officer to support our Air Force Research Laboratory Integration & Operations (AFRL/RS) Directorate customer
JOB RESPONSIBILITIES:
+ Plan, implement, upgrade, and monitor security measures for the protection of computer networks and information
+ Assess system vulnerabilities for security risks and purpose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure
+ Respond to computer security breaches and viruses.
+ Administer, test, and implement computer databases, applying knowledge of database management systems
+ Coordinate changes to computer databases
+ Identify, investigate, and resolve database performance, capacity, and scalability issues.
+ Plan, coordinate, and implement security measures to safeguard computer databases.
QUALIFICATIONS:
Required Qualifications:
+ 5+ years of cybersecurity-related experience, including risk mitigation
+ 8570 compliant certification at IAT II or higher
+ Bachelor's degree or a master's degree and 4+ years of experience
+ Excellent verbal and written communication skills
+ Ability to obtain a Top Secret/SCI clearance
Preferred Qualifications:
+ Prior experience supporting AFRL/RS
DEFTEC offers a comprehensive whole life benefits package that includes medical, dental, vision, holiday, paid time off, life insurance, short/long term disability, and educational reimbursement. DEFTEC also matches 401k contributions dollar for dollar up to 3% of employee's income and an additional $0.50 for every dollar between 4-5% of employee's income. The DEFTEC team is comprised of professionals who make a difference every day in crucial missions related to national security. Our leadership knows that this happens by employing a diverse team who is well taken care of. Our employees are our top priority making DEFTEC an ideal place to work.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Please contact ************* if you require reasonable accommodations.
DEFTEC is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP and alcohol when criteria is met as outlined in our policies.
AAP/EEO Statement
DEFTEC Corp is an Equal Opportunity and Affirmative Action Employer and prohibits discrimination and harassment of any type on the basis of actual or perceived race, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding and medical conditions related to pregnancy, childbirth or breastfeeding), gender, gender identity, and gender expression, religious creed, disability (mental and physical) including HIV and AIDS, medical condition (cancer and genetic characteristics ), genetic information, age, marital status, civil union status, sexual orientation, military and veteran status, denial of family and medical care leave, arrest record and/or any other characteristic(s) protected by federal, state or local law.
This policy applies to all terms of employment including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, training, compensation, benefits, employee activities and general treatment during employment.
Other Duties
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
Cyber Security Engineer - Information System Security Officer
Cyber Security Analyst Job In Beavercreek, OH
Share If you are unable to complete this application due to a disability, contact this employer to ask for an accommodation or an alternative application process. **Cyber Security Engineer - Information System Security Officer** 27 days ago Requisition ID: 1132 **Location and Travel Details:** Dayton, OH - hybrid
The key responsibilities of the **Cyber Security Engineer -** **Information System Security Officer (ISSO)** include:
* Provide support for implementing and enforcing information systems security policies, standards, and methodologies
* Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information
* Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation
* Maintain records on systems, applications, hardware, etc. to include system upgrades
* Evaluate security solutions to ensure they meet security requirements for processing information
* Maintain operational security posture for information systems
* Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave
* Develop and maintain documentation for Certification & Accreditation in accordance with specified policies
* Develop and update system security plans and other IA documentation
* Provide CM for security-relevant information system software, hardware, and firmware
* Develop system security policy and ensure compliance
**Key skills for this position include:**
* Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; encryption techniques/tools
* Experience completing security evaluations of software systems or architectures to ensure they meet security requirements
* Experience preparing and maintaining SSPs and other security related documentation
* Experience proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies, preferably on a large software or IT program
* Demonstrated experience performing day-to-day security operations of large, complicated information and information processing systems
* Must be committed to developing and adhering to best practices
* Must be a solutions-oriented team player and must possess a high level of self-initiative
* Must have excellent interpersonal skills
* Must possess a Security+ certification
* Minimum education: Bachelor's degree in Computer Science, Cybersecurity, or comparable academic discipline
* Minimum experience requirements: five years of experience required
* Must have or be willing to obtain Secret Clearance (this requires US Citizenship)
* Acceptable candidates must successfully pass a drug test and background screen
**Desired Experience:**
* Knowledge of DoD security requirements
* Experience with Cloud
* Knowledge of DoD systems, data and processes
At Illumination Works, we know data, and we should, we've been doing it since we started in 2006! We specialize in everything data from big data to data science, software engineering, data management, AR/IoT, and cloud development. Illumination Works is a trusted technology partner in user-centered digital transformation-delivering impactful business results to clients. We partner with customers to solve their unique technology and data challenges, and stay on top of modern technologies and advancements leveraging our Innovation Lab.
We invest in our employees in all aspects of their life and we value family. We offer market competitive salary, a generous PTO package, and comprehensive medical, dental, vision and life insurance plans. We also offer 401K, short/long-term disability insurance, a fun and engaging culture, and training opportunities to keep you up to speed on the latest technologies.
Illumination Works is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity Employer, making decisions without regard to race, color, religion, sexual orientation, gender identity or national origin, age, veteran status, disability, or any other protected class. Acceptable candidates must successfully pass a drug test and background screen.
Systems Engineer - Cyber & Security
Cyber Security Analyst Job In Dayton, OH
ExistX was founded to bridge the technology transition 'valley of death'-the critical gap between groundbreaking research and real-world, user-friendly solutions. Our team excels in applied engineering, transforming cutting-edge advancements in cryptography, cyber-physical systems, and automated reasoning into practical tools for both government and commercial applications. We leverage a unique suite of capabilities-incubated through our sister R&D firm, Galois, and key research partnerships-to rapidly prototype and deliver impactful solutions. Because of this, at ExistX, you're never starting at zero. You're launching from a foundation of breakthrough innovation.
∃X.P(X): For every problem (X), a solution exists (P).
The solution exists. Let's build it together.
The Role
ExistX is seeking a dynamic, skilled Cyber Systems Engineer that has an interest and prior experience in cyber systems engineering and/or systems security to join our team in Dayton, Ohio. In this role, you will be a member of a multi-person team, serving as the focal point for an assigned project where you will lead the coordination and support activities that enable the government to go through the appropriate security accreditation processes. You are key to ensuring the customer achieves Authority to Operate (ATO), for both the unique cryptographic devices and the chassis that they are embedded in on the aircraft. You will work in a collaborative environment, interfacing with government personnel and contractor developer, integration, and test teams to bring secure encrypted communications to aircraft over multiple commercial satellite constellations. Work is performed at both the government and contractor facilities, as well as remote.
Responsibilities
Serves as a technical program coordinator supporting customer security accreditation activities
Serves as a technical liaison between government agencies and prime contractors in customer-facing recurring meetings, milestone reviews, and documentation with key stakeholders.
Applies technical expertise to review engineering designs for security deficiencies such as red/black separation and zeroization in critical scenarios.
Drafts processes for proper COMSEC and crypto key management for pilots and flight personnel.
Advises and contributes to the development of test plans for both physical and logical interfaces to ensure compliance with requirements set by the accreditation bodies.
Serves as the Customer focal point for managing projects through certification processes for cryptographic devices, as well as associated tactical systems with the DoD Risk Management Framework (RMF)
Supports hardware and software security assessments for embedded and cyber-physical systems
Collaborates with cross-functional teams to ensure project success and timely delivery
Necessary Qualifications
Bachelor's degree with 5-10 years of experience
Background in cyber security, engineering, technical program management, or related technical field
Active TS/SCI security clearance
Project or Program management experience with strong organizational skills and high attention to detail
Familiarity working with platform IT developer teams and supporting their ability to successfully satisfy SERD (IASRD) and CDRD (TSRD) requirements
Experience supporting government activities for certification and the Authority To Operate (ATO) processes, particularly for cryptographic systems
Strong communication skills and ability to collaborate with diverse stakeholders
Nice-to-Have Qualifications
Master's degree in a relevant field
Experience performing security assessments for embedded and cyber-physical systems
In-depth knowledge of cryptographic algorithms and protocols (e.g., SHA-2, AES-256, RSA)
Familiarity with CNSA 2.0 cryptographic standards
Familiarity with radio frequency RF and COMSEC equipment
Experience with Air Force platforms
Location
This role will be in Beavercreek / Dayton, OH and on the Wright-Patterson Air Force Base (WPAFB). This will be a hybrid work arrangement and may require occasional travel between Dayton, OH and the east coast. Relocation assistance is available.
Security and Citizenship Requirement
The employee must be a US Citizen with an active TS/SCI
Benefits of Note
We offer a robust benefits package to provide for your and your family's well-being, including:
401(k) retirement plan with 5% employer match and immediate vesting
Fully paid medical insurance plans for you and your family
Employer paid dental and vision plans for you and your family
5 weeks of PTO and 11 days of paid company holidays each year
Application Instructions
Only candidates applying directly to our posted job opening will be considered.
We are not accepting unsolicited resumes from recruiters or employment agencies at this time.
More About ExistX
Types of Tech-Enabled Services We Offer:
Bespoke Digital Solutions: We specialize in crafting bespoke digital solutions tailored specifically to the unique needs of each client, with a security conscious and cloud first approach.
Solution Integration: We excel in integrating new digital solutions into existing commercial off the shelf (COTS) tools/platforms, systems and operational environments.
Technology Transition Consulting: We provide subject matter expert reach back leveraging our extensive hands-on experience in transitioning research from the lab to the marketplace, ensuring that new solutions are not only developed to meet end-user needs but also deliver value swiftly and effectively.
Our domains of expertise:
Cryptography: At ExistX, our expertise in applied cryptography encompasses a wide range of secure communication and information protection technologies. We specialize in developing digital solutions with next generation cryptographic research breakthroughs offering novel approaches to data integrity and confidentiality across various systems, devices, platforms and networks.
Cyber-Physical Systems (CPS): Our skill in applied cyber-physical systems (CPS) lives between the user interface to the intersection of the software to the hardware. We are experts in cyber reliability, resiliency, and trust across systems, platforms, devices, and networks.
Automated Reasoning: Our focus within the realm of Artificial intelligence and Machine Learning (AI/ML) are technologies that increase AI/ML user adoption. We develop bespoke digital solutions and plug-ins for COTS that enable end users to adopt and sustain trustworthy, intelligent AI/ML powered systems that enhance decision-making and automate complex decision processes.
Equal Employment Opportunity
ExistX is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, ethnicity, national origin, ancestry, color, sex, gender identity or expression, sexual orientation, marital or parental status, pregnancy or childbirth, disability, age, religion, creed, genetic information, veteran status, or any other characteristic protected by applicable federal, state, or local law. We encourage and respect different viewpoints and experiences as being essential to the process of innovation. We strive to acquire, grow, and maintain a diverse and inclusive workplace that applies principles and standards equitably while supporting the needs and accommodations of the individual employee.
Consistent with the Americans with Disabilities Act (ADA) and federal and state laws, it is the policy of ExistX. to provide reasonable accommodation when requested by a qualified applicant or employee with a disability unless such accommodation would cause an undue hardship. If you require reasonable accommodation in completing the employment application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection -process, please contact ****************.