Lightning Labs is seeking to hire a Security Engineer for the ongoing scaling of our growing engineering organization. This is a hands-on role that consists of devising and implementing policies and procedures around best practices in systems security. The ideal candidate has experience in securing web, Bitcoin, and other public-facing network services, penetration testing, and both automated and manual source code security reviews. Due to the domain in which we work, experience with Bitcoin and the Lightning Network is extremely desirable as is knowledge of the cryptographic aspects involved in this area.
As we are an international organization, experience and comfort working with highly distributed teams is a must. In addition, the ideal candidate should have a passion for our mission of bringing financial freedom to the world, as well as for Bitcoin as a whole. Although a part of the engineering organization, candidates in this position will work across functional team boundaries to ensure all aspects of the business are appropriately considered and covered by security best practices.
Responsibilities may include but are not limited to:
Designing and deploying active fuzzing, black+white box testing and penetration testing infrastructure for open source and production systems
Performing security audits and review of both internal production systems as well as open source software which interacts with Bitcoin+Lightning in a security critical manner
Provide mentorship and guidance to level up your teammates
Creating global security policy, standards, guidelines, and procedures to ensure ongoing maintenance of security
Overseeing security aspects of software release processes and infrastructure
Determining security team requirements for future growth
Developing and ensuring responsiveness of security incident management processes
Performing risk management assessments
Preferred experience:
At least 5 years prior experience in in systems security
An ability to work with a high impact, fast-moving startup team
Extensive knowledge of operating system and computer architecture internals
Strong understanding of cryptography, protocol design and adversarial analysis
Experience in reverse engineering and exploiting of cryptographic protocol (cryptocurrencies like Bitcoin) systems
Extensive expertise with professional software development experience in Go, Rust, C/C++, and/or Java
Experience in security incident response
Experience in security code review and vulnerability triaging
Prior experience running an open source facing bug bounty program
2+ years management experience or experience as a senior decision maker
Experience working with remote teams
Experience working with Kubernetes and AWS infrastructure
Working knowledge of fundamental Bitcoin and Lightning design principles
Candidates with additional experience are welcome to apply as we are open to adjusting the role accordingly
#J-18808-Ljbffr
A leading security training provider is seeking a Senior Security Engineer for their content engineering team. This role supports security professionals, builds hands-on content, and integrates security into DevOps. Ideal candidates have over 5 years of experience in application security and are passionate about improving security practices. The position is remote-first with competitive compensation and benefits.
#J-18808-Ljbffr
A technology company is seeking a skilled software engineer to join their Radar team, focusing on building systems for real-time identity event processing. The ideal candidate will have over 5 years of experience in software development, a background in large-scale systems, and strong collaboration skills. This position offers flexible remote work and comprehensive benefits, including healthcare coverage, equity grants, and generous paid time off. Join a growing team committed to delivering a seamless identity security platform.
#J-18808-Ljbffr
A leading data collaboration platform in San Francisco seeks a Senior Security Engineer to enhance threat detection and automation strategies. The role involves implementing detection logic, automating workflows, and developing scalable cloud solutions. Candidates should have a Bachelor's degree in a relevant field and strong skills in security automation and detection engineering. This position offers competitive compensation with a base range of $131,500 to $203,000.
#J-18808-Ljbffr
$131.5k-203k yearly 3d ago
Defense ML Engineer - AI for National Security, Remote
Phase2 Technology 3.9
Remote job
A leading technology firm in McLean, Virginia is seeking a Machine Learning Engineer to develop mission-critical AI solutions. You'll collaborate with data engineers and scientists to deploy models that enhance national security. The ideal candidate should have over 3 years of experience in artificial intelligence and a strong proficiency in Python and machine learning techniques. This role offers flexible work arrangements and comprehensive benefits.
#J-18808-Ljbffr
$89k-120k yearly est. 3d ago
Head of Growth Hacking
Remote 4.1
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
Not only do we encourage folks from all ethnic groups, genders, sexuality, age, abilities, disability status and any other under-represented group to apply, but we prioritize a sense of belonging. We have 4 ERGs (Women, Disability, Queer, Minorities in Tech) who meet regularly with the People team. During your interviews and beyond, we ask & encourage anybody who needs an accommodation to request one from their recruiter.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
At Remote, we embrace AI as a valuable tool while prioritizing human creativity and authenticity. We look forward to meeting candidates who balance innovation with genuine expertise and experience. To learn more about Remote's AI guidelines check see here.
Please note we accept applications on an ongoing basis.
$72k-111k yearly est. Auto-Apply 3d ago
Growth Hacker
Osaro 4.2
Remote job
Who We Are: At OSARO, we're on a mission to empower industries with cutting-edge automation solutions that redefine the possibilities of supply chain and fulfillment operations. By harnessing the power of AI and advanced robotic vision systems, we help businesses streamline operations and achieve unprecedented efficiency. Join us as we create a world where technology not only drives productivity but also enhances the human experience in the workplace.
About the Role:
Are you a dynamic, socially savvy individual who thrives on building relationships and creating lasting connections? Do you have a knack for turning online interactions into meaningful conversations that drive business? If so, we want you to be our Social Intelligence Strategist!
In this role, you'll pivot away from traditional cold outreach and focus on leveraging social media platforms like LinkedIn and X (formerly Twitter) to engage with decision-makers at our target accounts. You'll be given a curated list of 20-25 ideal customer profiles (ICPs) to concentrate on, ensuring your efforts are focused and impactful.In this role, you will:
Engage: Connect, follow, and interact with key decision-makers within your target accounts through social media.
Strategize: Develop innovative strategies to showcase OSARO's automation solutions, tailoring approaches that resonate with potential clients' unique needs.
Educate: Share insights and content that highlight the value of our solutions, driving interest and engagement within your network.
Analyze: Track and analyze engagement metrics to refine your outreach strategies, ensuring continuous improvement.
Collaborate: Work closely with our sales and marketing teams to synchronize efforts and share best practices.
Key Responsibilities:
Achieving a target of 3-5 meaningful interactions per week with decision-makers.
Generating weekly engagement reports to gauge activity metrics and adjust strategies accordingly.
Utilizing tools like LinkedIn Sales Navigator and other analytics platforms to monitor and engage with leads strategically.
What makes the ideal candidate:
Connections & Network: ~5000+ LinkedIn Connections
Experience: You have 3-5 years of experience in enterprise and social selling, with a proven ability to engage prospects through digital channels.
Knowledge: Familiarity with the MEDDICC qualification framework is a plus, as is experience with automation technologies.
Relationship Builder: Your skills in social dynamics allow you to establish and nurture meaningful relationships that lead to new business opportunities.
Data-Driven: You have an analytical mindset and enjoy using data to inform your strategies and improve performance.
Creative Problem Solver: You're an out-of-the-box thinker with the ability to develop engaging content that attracts the right audience.
Ideal candidate will be in the Bay Area of California
Perks of Joining OSARO:
A collaborative company culture that promotes innovation and teamwork.
Opportunity to work with cutting-edge technology and industry-leading experts.
Comprehensive onboarding and continuous professional development programs to ensure your success in the role.
Clear paths for career advancement within OSARO.
Competitive salary with performance bonuses and equity options.
Comprehensive health, dental, and vision insurance.
Flexible time-off policy - take the time you need to recharge.
Join Us:
At OSARO, we value diversity and the unique perspectives every team member brings to the table. If you are excited about the opportunity to help redefine how industries use automation and drive change through innovative sales strategies, we want to hear from you!
Apply Now!
Let's revolutionize the future of automation together. If you're ready to take the next step in your career and make a real impact, we'd love to see your application :)
OSARO is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
More About OSAROOSARO is a San Francisco-based startup company building machine learning software for industrial automation, to power robots in logistics and material handling centers. Our vision is to develop a solution that enables industrial robots to perform diverse tasks in a wide range of environments. We are excited and driven to see the results of our efforts operating in the fast-growing field of autonomous material handling. We implement state-of-the-art techniques but constantly strive to build the simplest possible solution. OSARO is technique agnostic and always focused on the goal. We regularly review academic literature for novel strategies while steering clear of the hype. We're focused on delighting our customers with systems that work like magic.
Our markets are global. That's why OSARO employs a diverse team of experts in various fields from more than 15 countries, attracting talent from both innovative companies and the research labs of top-ranked engineering universities. We are naturally curious, love healthy debate, and respect varying points of view. At OSARO, we strive to be champions for equality. We believe we can serve as a model for diversity in the tech industry by emphasizing policies of nondiscrimination and inclusion at every step.
We are an equal opportunity employer who offers Health, dental, vision, and commuter benefits Generous, flexible vacation time Excellent paid parental leave policy with the option for additional reduced and unpaid leave The chance to work with robots!
The above full-time position is available immediately.
$71k-110k yearly est. Auto-Apply 60d+ ago
CERTIFIED ETHICAL HACKER
Vikingcloud Inactive
Remote job
at VikingCloud
CERTIFIED ETHICAL HACKER About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platformâ„¢, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information security analysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
$69k-112k yearly est. Auto-Apply 4h ago
CERTIFIED ETHICAL HACKER
Viking-Cloud
Remote job
About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platformâ„¢, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information security analysts
Web application security
Social engineering
Database security
Reverse engineering
Network security
Threat modeling and risk assessment
Qualifications
Below are the qualifications expected of a certified ethical hacker:
Bachelor's degree in computer science, information technology security, or related field
Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
Experience with common network infrastructure and security tools
Familiarity with web applications, including HTTP and SQL injection attacks
Knowledge of security testing methodologies in accordance with the EC-Council
Ability to work in a fast-paced environment
PLEASE NOTE: We are always looking for strong candidates to reinforce the VikingCloud Cyber Threat Unit. While positions may not be currently open, please use this application to send us your resume so that we have it on file and can follow up as required by our customer demand. We will let you know when a position opens up that may fit your background.
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, political affiliation or opinion, medical condition, status as a veteran, and/or any other federal, state, or local protected class.
$69k-112k yearly est. Auto-Apply 4h ago
Head of Growth Hacking
Remote-Referral Board
Remote job
About Remote Remote is solving modern organizations' biggest challenge - navigating global employment compliantly with ease. We make it possible for businesses of all sizes to recruit, pay, and manage international teams. With our core values at heart and future focused work culture, our team works tirelessly on ambitious problems, asynchronously, around the world. You can find Remoters working from 6 different continents (Antarctica left to go!) and all of our positions are fully remote.
We encourage every member of the Remote team to bring their talents, experiences and culture to the table to help us build the best-in-class HR platform. If you are energetic, curious, motivated and ambitious, be part of our world. Apply now and define the future of work!The position
As Head of Growth Hacking you will own unconventional, high‑leverage growth, design and run guerrilla growth programs that create awareness, demand, and activation for the suite of Remote HR products. This role is for you if you enjoy hands-on, scrappy building and will use your deep network in startup ecosystems to drive revenue growth and find new commercial avenues.
What you bring
High agency
Ex‑founder or first‑growth hire who has shipped scrappy plays from idea to measurable impact and revenue.
Have public presence in founder communities or creator economy.
Have a network among founders, operators, and investors
Move fast with low dependency.
Comfortable running multiple experiments in parallel.
Actively defaults to using AI
Fluent in written and spoken English.
Key responsibilities
Identify and prioritise opportunities for building brand awareness, especially across founder and startup communities and events.
Develop and deliver both online and offline marketing campaigns to optimise growth and generate revenue.
Drive efficiency and productivity across marketing channels.
Launch scrappy, high‑signal experiments: such as community hijacks, product‑led virality and other non-traditional marketing campaigns.
Measure and analyze outcome of strategies to help shape future GTM strategy.
Nurture a close network of partners
Own market research and competitive analysis.
Practicals
You'll report to: President
Team: President
Location: SF / Bay Area
Start date: As soon as possible
Remote Compensation Philosophy
Remote's Total Rewards philosophy is to ensure fair, unbiased compensation and fair equity pay along with competitive benefits in all locations in which we operate. We do not agree to or encourage cheap-labor practices and therefore we ensure to pay above in-location rates. We hope to inspire other companies to support global talent-hiring and bring local wealth to developing countries.
At Remote we have international operations and a globally distributed workforce. We use geo ranges to consider geographic pay differentials as part of our global compensation strategy to remain competitive in various markets while we hiring globally.
Our salary ranges are determined by role, level and location, and our job titles may span more than one career level. The actual base pay for the successful candidate in this role is dependent upon many factors such as location, transferable or job-related skills, work experience, relevant training, business needs, and market demands. The base salary range may be subject to change.
At Remote, we foster internal mobility as a key element of our culture of employee growth and development, supported by a compensation philosophy that guarantees pay equity and fairness. Therefore, all compensation changes associated with an internal move will be reviewed by the Total Rewards & People Enablement team on a case by case basis.
Application process
(async) Profile review
Interview with the Recruiter
Interview with Hiring Manager
Interview with team members
(async) Offer
Benefits Our full benefits & perks are explained in our handbook at remote.com/r/benefits. As a global company, each country works differently, but some benefits/perks are for all Remoters:
work from anywhere
flexible paid time off
flexible working hours (we are async)
16 weeks paid parental leave
mental health support services
stock options
learning budget
home office budget & IT equipment
budget for local in-person social events or co-working spaces
How you'll plan your day (and life)
We work async at Remote which means you can plan your schedule around your life (and not around meetings). Read more at remote.com/async.
You will be empowered to take ownership and be proactive. When in doubt you will default to action instead of waiting. Your life-work balance is important and you will be encouraged to put yourself and your family first, and fit work around your needs.
If that sounds like something you want, apply now!
How to apply
Please fill out the form below and upload your CV with a PDF format.
We kindly ask you to submit your application and CV in English, as this is the standardised language we use here at Remote.
If you don't have an up to date CV but you are still interested in talking to us, please feel free to add a copy of your LinkedIn profile instead.
We will ask you to voluntarily tell us your pronouns at interview stage, and you will have the option to answer our anonymous demographic questionnaire when you apply below. As an equal employment opportunity employer it's important to us that our workforce reflects people of all backgrounds, identities, and experiences and this data will help us to stay accountable. We thank you for providing this data, if you chose to.
Please note we accept applications on an ongoing basis.
$69k-112k yearly est. Auto-Apply 3d ago
Growth Marketing Hacker
Alphapoint
Remote job
Growth Hacker / Marketer 100% Remote AlphaPoint is a financial technology company powering digital asset exchanges and brokerages worldwide. Through its secure, scalable, and customizable white label digital asset trading platform, AlphaPoint has enabled over 150 customers in 35 countries to launch and operate digital asset markets, as well as digitize assets. AlphaPoint and its award winning blockchain technology have helped startups and institutions discover and execute their blockchain strategies since 2013.Position Overview
AlphaPoint has set up an AI Lab to rapidly prototype and develop AI focused applications. We are seeking a highly creative, analytical, and performance-driven Growth Hacker to help promote and develop test marketing strategies of the MVP's and prototypes that the lab develops. You'll experiment across marketing channels, rapidly develop new tactics to acquire and retain users, and leverage data to guide your decisions. The ideal candidate thrives in a startup environment and has a proven track record of driving rapid user or revenue growth.Key Responsibilities
Develop and execute innovative, scalable growth strategies across multiple creative channels.
Design and run rapid A/B tests to optimize conversion funnels, landing pages, and onboarding processes
Use analytics tools to track KPIs, interpret performance data, and report actionable insights
Collaborate within AI Labs product, engineering, and design teams to drive user engagement and retention
Identify and execute new growth opportunities through traditional and non-traditional means.
Identify and research new channels to distribute products (reddit, discord, youtube, etc…)
Requirements
2-4+ years of experience in growth marketing, digital marketing, or a similar role
Proven track record of designing and executing successful growth campaigns
Leverage AI Tools in research in order to streamline and enhance every aspect of the AI marketing process. (research, content creation, execution, and analysis..)
Startup mindset: creative, resourceful, agile, data-obsessed, and outcome-driven
Preferred skills
Experience in Consumer and Enterprise Marketing
Diverse skillset across marketing strategies: Digital, Social, OOH, and other non-traditional methods
Prior involvement in viral or community-led growth strategies
What We Offer
Competitive compensation
Equity or stock options (if applicable)
A culture of autonomy, experimentation, and learning
Opportunity to make a real impact on company trajectory
$59k-94k yearly est. Auto-Apply 60d+ ago
Growth Hacker (Telecommute OK)
Vt Enterprise 3.8
Remote job
We are an independent software vendor for SlashDB. SlashDB is an automated REST API for databases. It works great as a gateway to databases for internal purposes like data science or use it for building new or extending legacy systems to web and mobile applications.
SlashDB clients reap between $35K-$75K a year in savings per developer.
Learn more about SlashDB at ******************
Job Description
This is a marketing job like no other. You will leverage our own engineering skills to implement your ideas so together we beat other marketers at this game.
Objectives are not uncommon from other high tech businesses, but we will win by combining your growth hacking with our tech hacking skills:
Devise and execute tactics to promote SlashDB offerings in Amazon Web Services Marketplace, Microsoft Azure and for on-premise installation.
Develop and execute lead generation programs
Fill calendar with demo and webinar appointments
Develop, launch, and optimize drip email communication and campaigns establish and strengthen engagement throughout the customer lifecycle
Reach out to industry bloggers, reporters, conferences and meetup organizers
Reach out to software consultancies with partnership opportunity
Manage website and blog content creation; write content if so inclined
Represent the company at trade shows and conferences
Add your best idea here: _______________________
Qualifications
You don't need to be told what to do, but you are responsive to CEO's ideas and take in any critique in stride. You are resourceful in finding cost effective marketing options.
Key skills:
1-3 years of overall work experience in a growth, email marketing or product marketing role
Know how to measure effectiveness while avoiding over-analyzing
Know how not get ripped off on display advertising
Know how to avoid pitfalls with affiliate marketing
You are a super-connector
Bonus skills:
Dabbled in software development or participated in such projects
Additional Information
In you application please state your desired compensation and time availability (number of hours per week). This will most likely be a contract-to-hire situation.
$73k-100k yearly est. 60d+ ago
AI Security Researcher
Wiz
Remote job
Come join the company that is reinventing cloud security and empowering businesses to thrive in the cloud. As the fastest-growing startup ever, Wiz is on a mission to help organizations secure cloud environments that will accelerate their businesses. Trusted by security teams all over the world, we have a proven track record of success and a culture that values world-class talent.
Our Wizards from over 20 countries work together to protect the infrastructure of our hundreds of customers, including over 50% of the Fortune 100, who trust us to scan and secure over 230 billion files daily. We're the leading player in a massive and growing market, but it's still early enough for you to make a significant impact. At Wiz, you'll have the freedom to think creatively, dream big, and use your full range of skills to contribute to our record growth. Come join our team and help us create secure cloud environments that allow the best companies to move faster.
SUMMARY
We're looking for a talented AI Security Researcher to join our team and play a critical role in Wiz's foundational, risk-driven approach to cloud security. This role requires deep technical research into complex cloud- and AI-native environments to identify the most significant, unaddressed risks.
WHAT YOU'LL DO
Conduct deep technical research to discover and report novel risks and attack vectors specific to modern cloud and AI-native architectures and systems.
Discover and articulate the highest unaddressed risk areas, working with Product and Engineering teams to translate research into product capabilities.
Define necessary foundational product capabilities by delivering both compelling proofs of risk (demonstrating impact) and technical POCs (showing how to solve it).
Work closely with Product and Engineering teams to ensure comprehensive risk coverage and support the investigation of new and complex product scope.
WHAT YOU'LL BRING
5+ years of hands-on experience in security or security research, specifically relevant to modern cloud environments (AWS, GCP, Azure, Kubernetes, etc.).
Strong hands-on skills with scripting languages (e.g., Python, Go) for automation and research, as well as query languages (e.g., KQL, SQL) for efficient data analysis of security telemetry.
Proven ability to work independently, prioritize effectively, and drive complex, multi-quarter research projects from initial concept through to clear, delivered impact.
Excellent written and verbal communication skills, with a track record of successfully collaborating with cross-functional teams (e.g Product, Engineering, Marketing) to achieve shared goals.
ADVANTAGE
Specialized knowledge or research experience in AI security, focusing on risks to AI as deployed in the enterprise.
Experience in public-facing work, such as presenting at recognized industry conferences, authoring technical blog posts, or publishing research.
Experience conducting data-driven research and working with large-scale security telemetry to derive statistically significant or high-impact findings.
Benefits
Wiz offers a competitive package of benefits and programs to support you and your family. Below provides a description of our current benefits for employees in the US. Specific benefits may vary by location.
Health & Welfare Benefits
Medical, dental and vision insurance
Home Office Setup reimbursement
Flexible Spending Accounts
Monthly Connectivity reimbursement
Employee Assistance Program (EAP)
Financial Benefits
Short- and Long-term Disability Insurance
Life & Accident Insurance
401(k) Retirement Savings Plan (with employer match)
Time Off
Flexible paid time off + 11 paid holidays
Paid leave programs, including parental, pregnancy health, medical and bereavement leave
Compensation
Starting compensation will be determined based on various factors, including but not limited to, the candidate's job-related experience, skills and geographic location. Your Talent Partner can share more about the specific salary range during the hiring process.
This role is eligible to participate in Wiz's equity plan and may also include incentive compensation.
The annual base salary range for this full-time position is listed below.
US Base Pay Range$160,000-$220,000 USD
Applicants must have the legal right to work in the country where the position is based, without the need for visa sponsorship. This role does not offer visa sponsorship.
Wiz is an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health decisions, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, genetic information, political views or activity, or other applicable legally protected characteristics.
By submitting your application, you acknowledge that Wiz will process your personal data in accordance with Wiz's Privacy Policy.
$160k-220k yearly Auto-Apply 8d ago
Security Researcher
Prelude 3.8
Remote job
About Origin by Prelude
Origin is building the category leader in Runtime Memory Protection - an endpoint product that detects and blocks in-memory execution, memory zero-day exploitation, and ransomware execution entirely from user mode.
We are a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution to detect in-memory attacks on endpoints, which is written in Rust and runs exclusively in user mode. It leverages advances in modern edge computing architecture, hardware-level telemetry, and a graph-based understanding of the Windows operating system to catch adversaries the moment that they compromise an endpoint. Rather than endlessly attempting to predict what an adversary
might
do, trapping adversaries at this universal and unavoidable chokepoint that lies at the center of their operations allows us to focus all of our efforts on what they must do, regardless of their sophistication or how much creativity (or AI) they apply to their tactics.
Our goal is simple: to detect out-of-context execution in a way that remains entirely outside the adversary's control. Out-of-context execution occurs when an attacker coerces an application to run code paths that were not intended by the original application. This includes in-memory execution techniques such as local and remote injection, exploitation that results in the execution of dynamic code, and fileless malware
Role
Origin is seeking a Security Researcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Origin's endpoint protection platform.
As a subject matter expert, you will specialize in one or more areas crucial to Origin's research, such as operating system internals, reverse engineering, malware development, offensive security, program analysis, performance profiling or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units.
Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward.
Responsibilities
Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics, specifically targeting code execution
Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability
Translate and implement research findings into actionable improvements for Origin's endpoint protection platform
Produce high-quality, public-facing security research content, including blog posts and conference talks
Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research
Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed
Support other Researchers on the team with their research and actively engage in team-driven initiatives
Skills and Experience
Deep knowledge of Windows operating system internals and static/dynamic reverse engineering
Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg
5+ years of experience in one or more of the following areas:
Offensive security, specifically red team operations or purple teaming
Detection engineering, specifically, writing robust, production-scale queries in any major EDR
Systems programming, ideally using Rust or C/C++
Program analysis and performance profiling
Strong understanding of how modern EDRs/XDRs work internally
Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers
Aptitude for working in a fast-paced, adaptive startup environment
Nice to Haves
Prior experience in enterprise software development using Rust
Prior vulnerability research and exploit development experience
Working at Origin
Origin is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
$93k-129k yearly est. Auto-Apply 60d+ ago
Cyber Information Assurance Analyst SME
Chickasaw Nation Industries 4.9
Remote job
The Cyber Information Assurance Analyst SME provides IT support services for the Marine Corps Logistics Base by independently conducting complex security analyses of classified and unclassified systems for compliance with security requirements. Performs Command Cyber Readiness Inspections, vulnerability evaluations, and utilizing various security technologies and tools to assess the security posture of intricate computer systems and networks. Responsibilities include conducting vulnerability and risk analyses, participation in penetration studies, and defining security requirements for a range of computing systems. Recommends solutions to enhance security, gathers technical information to align with organizational goals, and offers technical analysis and advice to client executive management on system improvements, focusing on areas like information systems architecture, networking, and communication protocols. This position is on-site in the Albany, GA area.
Chickasaw Nation Industries, Inc. serves as a holding company with multiple subsidiaries engaged in several lines of business (Technology, Infrastructure & Engineering, Health, Manufacturing, Public Safety, Consulting, and Transportation) for the federal government and commercial enterprises. A portion of our profits is used to support Chickasaw citizens. We are proud to support the economic development and long-term viability of the Chickasaw Nation and its people. CNI offers premium benefits eligible on the first day of hire to full time employees; (Medical - Dental - Vision), Company Life Insurance, Short-Term and Long-Term Disability Insurance, 401(K) Immediate Vesting, Professional Development Assistance, Legal Aid Assistance Program, Family Planning / Fertility Assistance, Personal Time Off, and Observance of Federal Holidays.
As a federal contractor, CNI is a drug-free workplace and adheres to the Federal Controlled Substance Act.
ESSENTIAL REQUIREMENTS
Secret Clearance is required and must be maintained for employment. Must be eligible for an IT-II upon assignment.
Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification.
IAM III and IAT II level certification is required.
Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
Seven (7) years IT experience
Five (5) years IA experience
Two (2) years of experience with DOD Vulnerability Management System
Command Cyber Readiness Inspection certification in at least one of the following areas:
Retina scan analysis o Operating Systems (Windows, Unix)
Boundary defense (network policy, router, firewall)
Internal defense (L2 switch, L3 switch)
DNS (policy, BIND/Windows)
HBSS (remote console, AV, ABM, PA, HIPS, ePO)
Traditional security (Common, Basic, NCV, SCV)
Wireless communications (BES, handhelds)
Strong analytical and problem solving skills for resolving security issues
Strong skills implementing and configuring networks and network components
Knowledge and understanding of DOD security regulations, DISA Security Technical Implementation Guides
Understanding of SCAP
Knowledge of and proficiency with: VULNERATOR; USCYBERCOM CTO Compliance Program; Wireless vulnerability assessment; Web Services (IIS, Apache, Proxy); Database (SQL Server, Oracle); Email Services (Exchange); Vulnerability Scans (NESSUS, SCCM); Knowledge of Phishing exercises; USB Detect; Physical Security.
Nice to have: DISA FSO certified CCRI Team Lead and have a certification in penetration testing, such as: Licensed Penetration Tester (LPT); Certified Expert Penetration Tester (CEPT); Certified Ethical Hacker (CEH); Global Information Assurance Certification Penetration Tester (GPEN); Familiarity with AUTOCHECKLIST Tool.
KEY DUTIES AND RESPONSIBILITIES
Essential Duties and responsibilities include the following. Other duties may be assigned.
Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements.
Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations.
Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks.
Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies.
Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers.
Recommends solutions to meet security requirements.
Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture.
Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves.
Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC. Competent to work at the highest level of all phases of information systems auditing.
EDUCATION AND EXPERIENCE
Seven (7) years of experience, or an equivalent combination of education/experience.
PHYSICAL DEMANDS
Work is primarily performed in an office environment. Regularly required to sit. Regularly required use hands to finger, handle, or feel, reach with hands and arms to handle objects and operate tools, computer, and/or controls. Required to speak and hear. Occasionally required to stand, walk and stoop, kneel, crouch, or crawl. Must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, depth perception, and ability to adjust focus. Exposed to general office noise with computers printers and light traffic.
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this job.
EOE including Disability/Vet
CNI offers a comprehensive benefits package that includes:
Medical
Dental
Vision
401(k)
Family Planning/Fertility Assistance
STD/LTD/Basic Life/AD&D
Legal-Aid Program
Employee Assistance Program (EAP)
Paid Time Off (PTO) - (11) Federal Holidays
Training and Development Opportunities
Your application submission will be considered for all potential employment opportunities with Chickasaw Nation Industries (CNI).
$48k-74k yearly est. Auto-Apply 11d ago
Information Systems Security Officer (ISSO) - Mid Level (TS required, eligible for SCI)
Redtrace Technologies Inc.
Remote job
Job Description
SECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY
This position requires onsite work. However, due to COVID-19, remote work on a rotational schedule is temporarily available.
REQUIRES US CITIZENSHIP***
Program Description:
The program provides support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a federal customer. The contract's support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
Position Description:
We are seeking a Junior Level ISSO to carry out the following duties and responsibilities:
Services to support IS Security performed by the Information System Security Officer (ISSO) at a minimum, shall consist of to the following activities:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
Provide liaison support between the system owner and other IS security personnel
Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis
Conduct required IS vulnerability scans according to risk assessment parameters.
Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs)
Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO)
Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an agency IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
Provide baseline security controls to the system owner, contingent upon the IS's security categorization, type of information processed and entity type
Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems' impact levels and ISs' authorization boundary
Ensure that new entities are created in the GRC application with the security categorization of agency ISs
Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS
Perform an independent review of the System Security Plan (SSP) and make approval decisions
Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the agency Authorizing Official
Schedule security control assessments in coordination with the system owner.
Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision
Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number
Advise the agency Authorizing Official of IS vulnerabilities and residual risks.
Ensure that all POA&M actions are completed and tested
Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official
Ensure the removal and retirement of agency ISs being decommissioned, in coordination with the SO, ISSO, and ISSR
Qualifications:
Required:
Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility
Must be a U.S Citizen
5+ years serving as an Information Systems Security Officer (ISSO) at a cleared facility
Minimum of 5 years of work experience in a computer science or Cybersecurity related field
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications
Hold at least one of the following certifications:
Certified Information Systems Security Professional (CISSP)
Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 Information Assurance Management (IAM) Level I proficiency
Desired:
A bachelor's and/or advanced degree in computer science, business management, or IT-related discipline
Employee Benefits:
Competitive salary for well qualified applicants
401(k) plan
Annual performance bonus
Certification and advanced degree attainment bonuses
Student Loan / Tuition reimbursement
Health Care Insurance (medical, dental, vision)
Up to four weeks of paid vacation
11 Federal Holidays, and 3 Floating Holidays
Team bonding events
RedTrace Technologies is an EOE employer.
Powered by JazzHR
7XfJyOFTho
$70k-94k yearly est. 3d ago
Information System Security Officer
Zermount
Remote job
MILITARY FRIENDLY & PREFERRED - HOH SPONSOR
The Information Systems Security Officer (ISSO) is responsible for supporting the full lifecycle of security assessment and authorization (A&A) activities for information systems. The ISSO ensures that assigned systems comply with federal cybersecurity standards and maintain their Authority to Operate (ATO) through continuous monitoring and documentation.
The ISSO will be responsible for developing and providing risk assessments, Security Control Assessments (SCA), A&A documentation and various reports, based on NIST guidelines and client's policies, procedures and request. The ISSO will be responsible for providing security recommendations on any system changes or new technologies, analysis on vulnerability scans, conducting continuous monitoring activities, and provide mitigation recommendations for any risks or threats.
RESPONSIBILITIES:
Lead and conduct Pre-Security Assessment and Authorization (A&A) activities, including stakeholder identification, change request submissions, appointment memorandums, and IT Security Kickoff meetings.
Supports the ISBO in day-to-day IT security activities.
Assists the ISBO with reviews of the security posture of the system and report any findings to the ISBO, CISO, and the AO.
Conduct Information System Categorization by identifying information types, completing FIPS-199 assessments, and facilitating Business Impact Analyses (BIA), Privacy Threshold Analyses (PTA), and Privacy Impact Assessments (PIA).
Develop and maintain system security documentation, including:
System Administration Plan (SAM)
Configuration Management Plan (CMP)
IT Contingency Plan (ITCP)
Information Security Continuous Monitoring (ISCM) Plan
Incident Response Plan (IRP)
Security Assessment Report (SAR)
System Security Plan (SSP)
Coordinate initial and annual ITCP testing in collaboration with the OCIO Business Continuity and Disaster Recovery (BCDR) Office.
Develop and manage inter-agency agreements and documentation such as MOUs, MOAs, ISAs, IT Security Waivers, and Risk Acceptance Memorandums.
Document and maintain Security Control Implementation details, ensuring updates are made according to required frequency.
Coordinate vulnerability and compliance scans, Security Control Assessments (SCA), and track remediation efforts with the IT Security Test Team.
Manage and update Plan of Action and Milestones (POA&M) entries, submitting remediated findings for closure.
Prepare and present SAR to Authorizing Officials to obtain or renew ATO.
Perform Information Security Continuous Monitoring (ISCM) activities to ensure ongoing compliance and security posture of systems.
Develop and update project schedule, including A&A / SCA task and milestones, task dependencies, and personnel resources.
Conduct A&A activities and tasks and obtain ATO in line with NIST and client guidance and directives.
Determining the baseline IT Security requirements for IT Systems, identifying system boundaries, determining information categories, assisting with FIPS-199.
Ensure that IT Systems are operated, used, maintained, and disposed of in accordance with internal security policies and practices.
Enforce security policies and safeguards on all personnel having access to the IT System for which the ISSO has responsibility.
Ensure users and system support personnel have the required authorization and need-to-know; have been indoctrinated; and are familiar with internal security practices before access to the IT System.
Implement security controls based on IT System FIPS categorization.
Document security control implementation in the system's Security Plan using the client's GRC tool.
Document system's risk assessment per client directives and requirements.
Review and monitoring system security and audit logs.
Develop and maintain Plan of Actions and Milestones (POA&Ms) for IT systems.
Update A&A documentation and artifacts on a regular basis (e.g. annually, after approved change).
QUALIFICATIONS:
A minimum of five (5) years of demonstrated experience in the Information Security or IT field.
Demonstrates a proficiency with developing, maintaining and managing SA&A packages.
Experience with developing and managing POA&M's.
Strong problem solving and analysis skills, self-motivated, and able to work and communicate in a team environment.
Strong understanding of federal cybersecurity frameworks (e.g., NIST RMF, FIPS-199, FISMA).
Experience in developing and maintaining security documentation and plans.
Possess experience conducting CPT's.
Experience conducting audit log reviews.
Technical experience with conducting vulnerability management, compliance scanning, and providing mitigation techniques.
Excellent communication and coordination skills with technical and non-technical stakeholders.
Ability to manage multiple systems and projects simultaneously in a dynamic environment.
Excellent communication (written and verbal) skills.
CERTIFICATION:
A minimum of at least one (1) certification that meet DOD 8570 IAT Level II (e.g., Security+, GSEC, CASP) requirements or any equivalent or more advanced.
CLEARANCE:
Client Suitability and Public Trust
LOCATION and HOURS:
Location: Primary location is at Zermount HQ (Arlington, VA) and the Client Site (Washington, D.C.). Remote work is authorized.
Onsite work at the primary location., may be occasionally required.
Hours of Operation (Business Hours): 8:00 am ET - 5:30 pm ET
$78k-105k yearly est. 60d+ ago
Information Systems Security Officer (ISSO)
Contact Government Services, LLC
Remote job
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
$78k-105k yearly est. Auto-Apply 39d ago
Information System Security Officer II - Mid-Level
The One 23 Group
Remote job
At The One 23 Group, our mission is to set the benchmark for excellence in government services. We empower our clients in the Department of Defense, intelligence community, and federal civilian sectors to excel with our advanced capabilities. Our dedication lies in fostering a people-first culture, underpinned by steadfast ethical principles. Embracing innovative technologies and process improvements, we are steadfast in our journey toward a future that is both bright and transformative.
Our expertise spans consulting and analytics, digital workplace solutions, and cyber compliance. With our global footprint, we place a strong emphasis on nurturing our people and culture, which forms the core of our successful strategies in leadership and financial management. We pride ourselves on our extensive experience and effective approach, ensuring that we lead with both innovation and integrity.
Responsibilities
Contractor to provide cyber security management, oversight, and customer support for maintaining the continuity of DHS Management Information System compliance in accordance with DHS, National Institute of Standards and Technology (NIST), and other applicable Federal standards. This Position is 100% Remote.
Applies specialized knowledge of sensitive system Cybersecurity requirements and Privacy Act requirements.
Applies specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with NIST's Risk Management Framework and the Federal Risk and Authorization Management Program (FedRAMP).
Applies specialized knowledge and experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, Federal Information Processing Standards (FIPS, and NIST guidelines.
Applies knowledge of DHS Information Security Policy Directives and Handbooks is preferred.
Applies knowledge and experience with standard IA concepts, practices, and procedures. Working independently to solve problems quickly and completely.
Applies specialized experience with three (3) of the four (4) following criteria is required:
Vulnerability scanning execution, assessment, and analysis.
Operating system and network knowledge (i.e., Local Area Networks [LAN] and Wide Area Networks [WAN]).
Information security and assurance principles (e.g., Defense-in-depth) and associated supporting technologies.
Application security, database security, and network security.
Possess ability to assess and weigh current and evolving security threats in an operational environment.
Possess good oral and written communication skills.
Team player who can collaborate with multiple stakeholders to arrive at the best solution.
Qualifications
Master's degree and 4 years of Cybersecurity & Federal Information Security Modernization Act (FISMA) experience, or a Bachelor's Degree and 5 years of Cybersecurity & FISMA experience or a total of 7 years of Cybersecurity & Federal Information Security Modernization Act (FISMA) experience
Must be a US citizen with ability to obtain/maintain a Top Secret clearance
Possesses
one (1) of the following professional security certifications
or
can be obtained within six (6) months of hire:
Certified Information System Security Professional (CISSP)
CompTIA Advanced Security Practitioner (CASP)
Certified Information Systems Auditor (CISA)
Certified Ethical Hacker (CEH)
Systems Security Certified Practitioner (SSCP)
Certified Information Security Manager (CISM)
GIAC Information Security Professional (GISP)
GIAC Security Leadership (GSLC)
We can recommend jobs specifically for you! Click here to get started.
$78k-105k yearly est. Auto-Apply 60d+ ago
Senior Information Systems Security Officer (ISSO) Norfolk, VA
Watershed Security
Remote job
Watershed Security, is a Veteran Owned Small Business with over 20 years' Cybersecurity and Government Contracting experiencing. Watershed is looking for a Senior Information Systems Security Officer (ISSO) to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidates will have experience coordinating and enacting required security changes, with in various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
REQUIRED QUALIFICATIONS
Bachelor's degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Must have at least one of the following active certifications: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP,
Years of Experience: 6 years practical experience in a cybersecurity or A&A related field.
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of information systems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Clearance Level: SECRET; US Citizen.
Ability to possibly provide onsite support in Philadelphia, PA or Norfolk, VA. Some/all remote work may be an option, however the norm will be onsite support. This will be dependent upon customer needs and classification level of work being performed.
Some travel may be required.
Experience with the Navy RMF Process Guide (RPG), and Navy A&A tools such as ACAS, eMASS and eMASSter.
Proficient with Microsoft Office Suite (Word, Excel, Teams, Project). Self Starter; detail oriented; able to brief senior level staff.
DESIRED QUALIFICATIONS
Experience supporting 10 or more Navy Packages (achieving and/or maintaining ATO)
Experience with the NAVSEA RMF Business Rules
Contingent upon award
PAY RANGE
Final salary is influenced by factors such as location, contract labor categories, experience, skills, education, and certifications. Watershed offers competitive compensation, medical and dental benefits, educational reimbursement, 401K plans with matching, 15 days of PTO to start and 11 paid holidays per year. The proposed salary range for this position is: $70,000.00 - $100,000.00 USD.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans