Information security analyst jobs in Camas, WA - 356 jobs
All
Information Security Analyst
Information Security Manager
Information Systems Security Officer
Security Engineer
Senior Security Engineer
Security Architect
Cyber Security Analyst
Information Security Officer
Securities Analyst
Cyber Security Specialist
Information Security Engineer
Information Technology Analyst
Intrusion Detection Analyst
Senior Information Assurance Analyst
Data Security Analyst
Hardware Security Engineer IV (Electrical): 25-07342
Akraya, Inc. 4.0
Information security analyst job in Seattle, WA
Primary Skills: Circuit Design (Expert), Embedded Security (Expert), Testing Equipment (Proficient), Cryptography (Knowledgeable), PCB Analysis (Intermediate) Contract Type: W2 Duration: 12 months with possible extension Pay Range: $105.00 - $120.00 per hour
#LP
Job Summary:
We are seeking a highly skilled Hardware Security Engineer IV with extensive experience in electrical engineering and hardware security for role which is fully onsite in Seattle, WA, US. This role involves collaboratively working on hardware security assessments for emerging devices, ensuring robust privacy and security protocols. The ideal candidate will bring a deep understanding of electrical engineering principles to spearhead our efforts in maintaining and enhancing the security of our devices and services.
Key Responsibilities:
Conduct thorough hardware security assessments and provide actionable insights.
Design, test, and analyze circuit designs and PCB layouts with an eye on security.
Develop and implement secure boot solutions and cryptography measures.
Collaborate with third-party manufacturers to update and secure device designs.
Utilize common electronics test equipment for testing, debugging, or hacking hardware.
Must-Have Skills:
5+ years of experience in hardware security, embedded systems security, or similar
Bachelor's degree in Electrical Engineering, Computer Engineering, Computer Science, or related technical field.
hands-on experience with common test equipment: Oscilloscopes, multimeters, microscopes, logic analyzers, soldering
Industry Experience:
Experience with manufacturing security processes, including secrets provisioning and secure production flows, is highly desirable.
Previous work in a team environment focusing on hardware security for telecom or consumer electronics industries.
ABOUT AKRAYA
Akraya is an award-winning IT staffing firm consistently recognized for our commitment to excellence and a thriving work environment. Most recently, we were recognized Inc's Best Workplaces 2024 and Silicon Valley's Best Places to Work by the San Francisco Business Journal (2024) and Glassdoor's Best Places to Work (2023 & 2022)!
Industry Leaders in IT Staffing
As staffing solutions providers for Fortune 100 companies, Akraya's industry recognitions solidify our leadership position in the IT staffing space. We don't just connect you with great jobs, we connect you with a workplace that inspires!
Join Akraya Today!
Let us lead you to your dream career and experience the Akraya difference. Browse our open positions and join our team!
$105-120 hourly 3d ago
Looking for a job?
Let Zippia find it for you.
Freelance IT Developers, Graphic Designers, Data Analyst
Advanceqt.com
Information security analyst job in Seattle, WA
Freelance Independent work in IT Developers, Graphic Designers, Data Analyst services online. Remote and or location work on a freelancer online platform. Need a smart phone and lap top or desk top computer to perform work. We provide a platform and you work for various clients independently on a freelance contract hire basis.
$88k-124k yearly est. 27d ago
Cyber Security Analyst
Thehivecareers.Co
Information security analyst job in Oregon
The Cyber SecurityAnalyst will be responsible for protecting all of the companys hardware, software, and networks from cybercriminals. The analyst's primary role will be to understand the company IT infrastructure in detail in order to detect, evaluate and respond to threats that could potentially breach the network. The Cyber SecurityAnalyst provides specific guidance and coaching to key security areas, e.g. key and encryption, secure software development. In this capacity, a cyber securityanalyst is part of the proactive work to help shape the tech delivery of the organization.The successful incumbent must possess excellent analytical, communication skills and be solution oriented.
RESPONSIBILITIES AND DUTIES
Responsible for understanding the global threat landscape and acting on threat intelligence.
Conduct cyber security incident response, following industry standards of containment, eradication, recovery and lessons learned.
Manage containment and eradication of threats and remediation of environment during or after an incident, including identifying potential business impact and communication with stakeholders
Manage informationsecurity-related breaches
Document event analysis and write reports of incident investigations.
Perform forensic analysis on threat indicators and intelligence insight and identify impact of vulnerabilities
Support the tech delivery in product and services teams with expert security knowledge relevant to a specific technology area or domain (e.g. Key & encryption, secure software development)
Develop the required processes and tools to support the tech delivery teams
Define and develop security guardrails relevant to the tech area/domain
The above responsibilities are indicative of the work required and should not be seen as an exhaustive list.
KNOWLEDGE AND SKILLS
Security solutions (proxy, email gateway, IDS/IPS, FW, SIEM, SOAR, EDR etc.)
Cloud, key and encryption management, SDLC concepts
IT and security architecture
Excellent English skills, both written and spoken.
QUALIFICATIONS AND EXPERIENCE
BSc. in Computer Science, Computer Engineering, Mathematics, InformationSecurity or any related field (or equivalent work experience).
Minimum of 3 years experience in the field
Penetration testing (OWASP, MITRE etc.) experience
Cyber Security certifications (e.g. Security+, GCIA, GCIH, GREM, CISSP, CEH, GCFA)
DESIRED ATTRIBUTES AND BEHAVIOURAL COMPETENCIES
Apply fundamental security concepts to cyber defense and understand business and risk to guide the cyber defense day to day operations.
Manage cases with enterprise SIEM or Incident Management systems
Support network investigations and network monitoring in a SOC environment.
Perform vulnerability assessment and penetration testing
SPECIAL CONDITIONS
N/A
FUNCTIONAL RELATIONSHIPS
External: N/A
Internal: Development team, Tech Lead, CTO
PERFORMANCE CRITERIA
Timely delivery of agreed daily, weekly and monthly KPIs
$86k-119k yearly est. 60d+ ago
Information Security Analyst
Aditistaffing
Information security analyst job in Bellevue, WA
Aditi Staffing is an MBE certified, IT Staffing firm in the US offering contract, contract-to-hire & direct hire career opportunities with Fortune Firms. Recently recognized as one of the fastest growing staffing firms and top diversity firm by the Staffing Industry Analysts, Aditi Staffing has been a partner of choice for candidates and clients.
Visit our website: http://www.aditistaffing.com/
Job Description
Role: InformationSecurityAnalyst
Location: InformationSecurityAnalyst
6-8 years of experience in informationsecurity / technology or related field. Advanced verbal and communication skills with diverse cross functioning groups.
Strong background and experience in policy development, program administration. In depth knowledge and experience in incident response activities and compliance. Ability to plan, organize and prioritize tasks to complete independently and within time frame established.
While technical knowledge of information technology and security issues is highly desirable, technical expertise and resources will be available from units such as Security Operations to support the informationsecurity and privacy program.
Strong technical writing abilities. Very good understanding of security controls, control systems, and business drivers that impact security controls.
Knowledge of SEC, FFC, Sarbanes-Oxley (SOX) and or Gramm-Leach Bliley Act regulatory policies & guidelines.
Strong background in security authentication, security applications development methodologies, security architecture and operational procedures, organization, business continuity skills, disaster recovery skills, identity management skills and hands on experience implementing products / solutions e.g. NetIQ, Entrust, Netegrity, Oblix, PKI, and some director service, RSA, strong understanding of the development and maintenance of RBAC s (Role Based Access Controls).
Ability to work collaboratively with a broad range of constituencies essential. A demonstrated ability to work with diverse cross functional groups of people is required.
Good to Have:
Knowledge of the following technologies a plus: Intrusion Detection / Prevention Systems for networks and hosts Security Event Management Systems Vulnerability Assessment Systems
Secure transfer protocols such as SSH, SCP and Connect Direct Secure Plus Diagnostic tools such as packet capture/decode and WAN probes IP Networking Windows Systems administration and security tools
Experience with remote access, terminal servers, etc a plus Experience in the administration of UNIX Solaris, HP/UX, or Linux and Windows operating systems a plus
Experience in developing and administering an informationsecurity program desirable
Working knowledge of and experience in the policy and regulatory environment of informationsecurity, especially in higher education is desirable
Additional Information
Regards,
Arun Kumar R
arunkr(AT)aditistaffing.com
D: 425-457-7916
$85k-126k yearly est. 60d+ ago
Cyber Security Analyst
Zone It Solutions
Information security analyst job in Seattle, WA
Job Description
We is seeking a talented Cyber SecurityAnalyst. As a Cyber SecurityAnalyst, you will play a key role in ensuring the security and integrity of our organization's data and systems.
Requirements
Responsibilities:
Monitor, detect, and respond to cyber threats and security incidents,
Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems,
Develop and implement security measures and best practices to protect against cyber attacks,
Stay up-to-date with the latest cyber security trends and technologies,
Collaborate with cross-functional teams to identify security risks and implement appropriate solutions,
Provide training and guidance to employees on cyber security awareness and best practices.
Requirements:
Bachelor's degree in Computer Science, InformationSecurity, or a related field,
Proven experience in cyber security or a related role,
Strong knowledge of security protocols and tools,
Ability to analyze and interpret complex data and make informed decisions,
Excellent problem-solving and communication skills,
Relevant certifications (e.g. CISSP, CISM) are preferred but not required.
Benefits
About Us
Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************.
Also, follow our LinkedIn page for new job opportunities and more.
Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
$80k-111k yearly est. Easy Apply 19d ago
Information Security Analyst I
Beneficial State Bank 3.2
Information security analyst job in Portland, OR
TITLE: N/A JOB CODE: FLSA: Exempt SALARY GRADE: 7 CATEGORY: Full-time UNION REPRESENTATION: NA SCHEDULE: Hybrid SUPERVISORY ROLE Y/N: 11.2025 The InformationSecurityAnalyst I plays a critical role in safeguarding the organization's systems and information assets. This position supports the development and implementation of security strategies, tools, and guidelines to protect against unauthorized access, data breaches, and system disruptions.
Responsibilities include monitoring and responding to InformationSecurity-related alerts, supporting audit and risk assessment activities, evaluating internal controls, and recommending improvements to enhance security posture.
The analyst assists in migrating non-compliant environments to meet regulatory standards and ensures adherence to data protection laws and banking industry compliance requirements. This role is foundational to maintaining the confidentiality, integrity, and availability of sensitive financial data and supporting the organization's overall cybersecurity framework.
ESSENTIAL DUTIES
Identity and Access Management
Support access provisioning, modification, and termination processes to ensure timely and secure access control.
Conduct administrator activity and user access reviews across IT systems, including privileged access audits and firewall/cloud app usage monitoring.
Maintain asset and access inventories, perform recurring audits of critical systems, and reconcile against endpoint and network tools.
Security Monitoring and Incident Response
Monitor and respond to alerts from SIEM, IDS, firewalls, and endpoint protection systems.
Conduct vulnerability scans, track remediation efforts, and facilitate related meetings.
Maintain readiness for incident response activation, including participation in tabletop exercises.
System Administration and Tool Management
Administration of cloud computing environments, conditional access, and guest provisioning following established best practices.
Manage software controls, browser extensions, and patching processes.
Administer security camera system and ensure system uptime.
Administer Mobile Device Management system.
Threat Intelligence and Continuous Improvement
Stay informed on emerging threats in the banking sector and contribute to threat intelligence reporting.
Research and test new security tools, controls, and AI applications to enhance the Bank's security posture.
Correctly identify true and false positives in alerting systems and tune these systems for continuous improvement.
Security Awareness and Training
Support phishing simulations and training campaigns, track completion, and report metrics to management.
Documentation and Reporting
Log findings, remediation efforts, and audit results in a structured ticketing system.
Assist with vendor management program administration and reporting.
Data Protection and Compliance
Ensure compliance with GLBA, FFIEC, and other applicable regulations through log retention, configuration management oversight, and DLP monitoring.
Administer data classification tools and respond to violations involving PII or sensitive data.
Audit VPN usage and test controls across email, endpoint, and network security platforms.
Completes mandatory compliance training in accordance with established deadlines.
The position performs duties specific to the position and other functions as assigned.
ROLE COMPETENCIES/SKILLS
Attention to Detail
Collaboration & Communication
Diversity & Inclusion
Execution & Ownership
Time Management
Compliance
Innovation
Systems Thinking
Data Analysis & Management
InformationSecurity
Network Operations
Critical Thinking
Consulting
Analytical Thinking
ENVIRONMENT, PHYSICAL & MENTAL ACTIVITIES
The incumbent is in a non-confined office-type setting in which they are free to move about at will. It may include some minor annoyances such as noise, odors, drafts, etc. For Hybrid and Remote roles, work may also be performed away from BSB worksites depending on the position and requirements. For Hybrid/Remote work, employees are required to have an environment when working at home that has a dependable, high-speed internet connection and environment conducive to frequent phone or internet calls where private, confidential or other information is not visible, able to be overheard, or physically or electronically accessible to anyone else.
The incumbent in the course of performing this position spends time writing, typing, speaking, listening, lifting (up to 10 pounds), driving, carrying, seeing (such as close, color and peripheral vision, depth perception and adjusted focus), sitting, pulling, walking, standing, squatting, kneeling and reaching.
The incumbent for this position may operate any or all of the following: personal computer, cellular telephone, printer, fax, and other standard office equipment.
The incumbent in this position must be able to accommodate reading documents or instruments, detailed work, problem solving, customer contact, reasoning, math, language, presentations, verbal and written communication, analytical reasoning, stress, multiple concurrent tasks and constant interruptions.
The work environment characteristics, physical and mental demands described here are representative of those an employee encounters while performing the essential functions of this job.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
POSITION REQUIREMENTS
Minimum Qualifications
Bachelor's degree in Information Technology, Cybersecurity, or a related field, or equivalent combination of education and experience.
5 years of professional experience in IT support or related technical roles.
Foundational understanding of cybersecurity principles, including access control, endpoint protection, and network monitoring.
Familiarity with Microsoft 365, Active Directory, and basic system administration tasks.
Ability to conduct audits, manage tickets, and document findings accurately.
Strong analytical and troubleshooting skills.
Effective communication skills and ability to collaborate across departments.
Preferred Qualifications
Bachelor's degree in Information Technology, Cybersecurity, or a related field.
Experience with banking industry compliance standards (e.g., GLBA, FFIEC).
Hands-on experience with security tools such as SIEM, DLP, IDS/IPS, EDR, Email Filtering, and Firewalls.
Exposure to vulnerability management platforms and identity/access management processes.
Familiarity with Microsoft cloud services and Mobile Device Management.
Experience supporting or administering phishing simulations, security awareness programs, or similar efforts.
Knowledge of vendor management platforms and data classification tools.
Management reserves the right to change this position description at any time according to business needs. #LI_Hybrid
$111k-144k yearly est. 28d ago
Senior Information Assurance Analyst
Serviss
Information security analyst job in Washington
At SERVISS, we deliver cutting-edge cybersecurity and IT solutions to government and commercial clients, with a mission to secure systems, data, and critical infrastructure through innovation and expertise. As we expand our capabilities, we're seeking a highly skilled and talented Information Assurance Professional.
Position Summary
We are seeking a dynamic and versatile Information Assurance Professional to support a high-impact U.S. Government program. The ideal candidate brings a rare balance of hands-on technical acumen and governance expertise-able to move seamlessly between engineering, architecture, and GRC functions. This role is pivotal in ensuring that systems are not only compliant but also resilient, secure, and aligned with federal risk management frameworks.
Key Responsibilities
· Serve as a trusted IA advisor, bridging technical engineering efforts with cybersecurity policy, governance, and risk management.
· Collaborate with system architects and engineers to design secure solutions that meet compliance and mission requirements.
· Support the development, review, and maintenance of key authorization documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POA&Ms).
· Guide system owners and developers through the Risk Management Framework (RMF) process and associated controls (e.g., NIST 800-53, 800-171, CMMC, FedRAMP).
· Translate complex technical risks and mitigation strategies into actionable GRC documentation and executive communications.
· Conduct system security assessments, gap analyses, and continuous monitoring activities.
· Coordinate with cybersecurity operations, incident response, and engineering teams to align IA strategy with operational realities.
· Recommend and help implement security architecture improvements based on evolving threat and compliance landscapes.
· Track and report on IA posture, risk status, and compliance progress across multiple systems or program areas.
Required Qualifications
· 10+ years of experience in information assurance, cybersecurity engineering, or GRC.
· In-depth knowledge of federal compliance frameworks (e.g., NIST, FISMA, FedRAMP).
· Strong technical foundation with the ability to understand complex systems, architectures, and security configurations.
· Excellent verbal and written communication skills, including experience preparing formal security documentation and reports.
· Demonstrated ability to work cross-functionally with engineering, architecture, operations, and policy teams.
· Bachelor's degree in Cybersecurity, Computer Science, Engineering, or a related field; or Associate's degree with 2+ years of additional relevant experience.
Preferred Qualifications
· Prior experience supporting U.S. federal agencies or DoD environments.
· Professional certifications such as CISSP, CISM, CAP, CCSP, or Security+.
· Experience with security automation tools and continuous compliance approaches.
· Understanding of Zero Trust principles, DevSecOps environments, and modern system architecture.
Why Join SERVISS
Our goal as an employer is simple yet profound: to create an environment where you can be your best self, pursue your passions, and enjoy the freedom to thrive both personally and professionally. Your success is our success, and we're committed to supporting you every step of the way.
Freedom to Thrive.
· Be part of an exciting company with ground floor opportunities to include equity
· Highly competitive compensation and best in class benefits
· Opportunities for annual performance bonuses, growth incentives, and profit-sharing
· 100% of medical, vision, dental, and life insurance premiums covered by SERVISS
· 401(k) retirement plan with company match for the first 6%
Note: This position is contingent upon contract renewal and funding from the sponsoring federal agency, anticipated end of May 2025.
$106k-143k yearly est. Auto-Apply 60d+ ago
Senior Cloud Security Analyst
GW Cancer Center
Information security analyst job in Washington
GW Information Technology (GW IT) provides empowering tools and caring support for all members of The George Washington University (GW) community. We are focused on driving digital transformation and innovation to enable the academic and operational excellence of our students, faculty, staff, and researchers. At GW IT, we are committed to cultivating a team culture that values diversity, inclusion, respect and collaboration, and invests in each of our team members to grow in their technology and career skills. The Senior Cloud SecurityAnalyst is a mid-level position within GW IT's Application Security team that will collaborate on application security risk assessments, threat modeling, vulnerability assessments specific to GW IT's cloud environment. Primary Responsibilities: Experience evaluating security controls and the application of commonly used cyber risk standards and frameworks: e.g., NIST 800-171, NIST -800-53, CIS , OWASP . Familiarity with cloud computing environments (e.g., AWS , Azure) Experience in the secure design of cloud-based solutions to measurable performance and security standards Familiarity with cloud-managed security services such as Amazon Inspector, AWS WAF and Shield, and AWS Directory Service. Ability to translate security risks and misconfigurations into product security rules and controls to map against standards, policies and procedures. Familiarity with AWS and Azure core cloud infrastructure capabilities, features, and services. Review cloud logging reports for events that occur in the cloud environment. Performs other related duties as assigned. The omission of specific duties does not preclude the supervisor from assigning duties that are logically related to the position
Minimum Qualifications
Qualified candidates will hold a Bachelor's degree in an appropriate area of specialization plus 5 years of relevant professional experience, OR, a Master's degree or higher in a relevant area of study plus 3 years of relevant professional experience, OR a Bachelor's degree in an appropriate area of specialization plus 3 years of relevant professional experience PLUS a relevant IT Security certification. Degree must be conferred by the start date of the position. Degree requirements may be substituted with an equivalent combination of education, training and experience.
Preferred Qualifications
4 years of relevant experience with cloud security requirements Experience working within a distributed team via collaborative tools Certifications: 1+ security certification (e.g., CISSP ) Familiarity with Linux and Windows in cloud environments Experience in secure design of cloud-based solutions to measurable performance and security standards Ability to perform forensic file system analyses to identify indicators of compromise system timeline Experience evaluating log data and cloud-hosted virtual machines to detect security incidents and initiate appropriate steps as a first responder Experience assessing cloud-based security controls using security tools and threat modeling
Work Schedule
Monday - Friday, 8am - 5pm (occasional evenings and weekends)
$96k-132k yearly est. 60d+ ago
Senior Cyber Intrusion Detection Analyst
Vets Hired
Information security analyst job in Washington
A Senior Cyber Intrusion Detection Analyst is needed to provide advanced incident response and monitoring support. This is a hybrid position based in Washington, D.C., covering 5th shift work (7am7pm Saturday & Sunday, Friday 11pm7am, and Tuesday 7am3pm).
Responsibilities
Respond to cyber incidents, including SOC incident response calls and emails.
Serve as Subject Matter Expert (SME) in investigations escalated from SOC Tier I & II analysts.
Investigate phishing attempts and other potential cyber threats.
Collaborate with SOC federal staff and Incident Handlers to triage, contain, and remediate incidents.
Participate in Splunk engineer working groups to improve alerting rules and reduce false positives.
Work closely with Threat Hunt and Security Intelligence teams to strengthen SOC capabilities.
Follow established incident response procedures, while identifying process improvement opportunities.
Manage incidents involving enterprise systems and sensitive data, including PII breaches.
Detect, collect, analyze, and report cybersecurity incidents.
Investigate and remediate malware infections.
Analyze a variety of logs and alerts (firewall, IDS, malware, HIPS, PCAP, proxy, Windows/Active Directory, etc.) to identify anomalous activity and document findings.
Conduct advanced log and malicious code reviews to support containment and recovery.
Assist with cybersecurity workforce development by reviewing tickets and annotations.
Required Qualifications
Bachelors degree with 8+ years of cybersecurity experience (or equivalent).
At least 6 years of intrusion detection examination experience.
Experience with a wide range of security technologies and logging data, including WANs, IPS/IDS/HIPS, web logs, raw data logs, and event reviews.
Strong knowledge of Splunk SIEM with 3+ years of advanced analytics experience (queries, Grep skills, firewall ACL review, Snort IDS events, PCAPs, and web server logs).
Strong written and verbal communication skills.
One or more advanced certifications, such as:
CERT Certified Computer Security Incident Handler
CEH (Certified Ethical Hacker)
CISSP
GCIH (Certified Incident Handler)
GISF (InformationSecurity Fundamentals)
Clearance
Must be able to obtain and maintain a Public Trust clearance.
Working Place: Washington, D.C., District of Columbia, United States Company : 2025 Sept 11 Virtual Career Fair - GovCIO
$91k-124k yearly est. 60d+ ago
Manager - Information Security Engineering
St. Public Branding
Information security analyst job in Seattle, WA
Salary range is $104k to $206k with a midpoint of $155k. New hires typically receive between minimum and midpoint, however, we may go slightly higher based on experience, internal equity and market.
Sound Transit also offers a competitive benefits package with a wide range of offerings, including:
Health Benefits: We offer two choices of medical plans, a dental plan, and a vision plan all at no cost for employee coverage; comprehensive benefits for employees and eligible dependents, including a spouse or domestic partner.
Long-Term Disability and Life Insurance.
Employee Assistance Program.
Retirement Plans: 401a - 10% of employee contribution with a 12% match by Sound Transit; 457b - up to IRS maximum (employee only contribution).
Paid Time Off: Employees accrue 25 days of paid time off annually with increases at four, eight and twelve years of service. Employees at the director level and up accrue additional days. We also observe 12 paid holidays and provide up to 2 paid floating holidays and up to 2 paid volunteer days per year.
Parental Leave: 12 weeks of parental leave for new parents.
Pet Insurance discount.
ORCA Card: All full-time employees will receive an ORCA card at no cost.
Tuition Reimbursement: Sound Transit will pay up to $5,000 annually for approved tuition expenses.
Inclusive Reproductive Health Support Services.
Compensation Practices: We offer competitive salaries based on market rates and internal equity. In addition to compensation and benefits, you'll find that we provide work-life balance, opportunities for professional development and recognition from your colleagues.
GENERAL PURPOSE:
Under general direction, the InformationSecurity Engineering Manager oversees and operates several essential InformationSecurity functions including Security Engineering and informationsecurity tool management. The InformationSecurity Engineering Manager's role is to lead and support service owners, system owners, and relevant stakeholders in ensuring their respective (or proposed) systems are compliant with the Agency's informationsecurity standards. In addition, the InformationSecurity Engineering Manager supports the operations of several other functions of the Agency's InformationSecurity Management System (ISMS).
ESSENTIAL FUNCTIONS:
The following duties are a representative summary of the primary duties and responsibilities. Incumbent(s) may not be required to perform all duties listed and may be required to perform additional, position-specific duties.
Acts as Service Owner for related InformationSecurity Engineering services of the InformationSecurity business unit.
Support InformationSecurity Architecture and Security Operations services
Manages personal for the InformationSecurity Engineering components of the InformationSecurity Division.
Provides guidance to the technical professionals that comprise the Security Engineering functions of the InformationSecurity Division
Participates in the overall implementation of the agency's informationsecurity program, under the direction of the Chief InformationSecurity Officer (or delegate), where appropriate.
Participates in the creation of informationsecurity governance documents (policies, standards, baselines, guidelines, and procedures) under the direction of the Chief InformationSecurity Officer (or delegate), where appropriate.
Identifies and assesses technology-related risks to informationsecurity associated with prospective technology solutions; and recommends appropriate mitigating controls.
Influences the design of any prospective technology solution for adherence to documented agency standards, policies, and regulatory responsibilities.
Evaluates, implements, and supports security-focused tools and services required to support informationsecurity controls.
Collaborates with other IT engineering and administration disciplines to ensure security best practices are incorporated into design, implementation and sustainment of systems and services within the agency.
Consults with internal customers on risk assessment, threat modeling and mitigation of vulnerabilities
Conducts security assessments, evaluates controls, and provide feedback to management and system owners on the design and effectiveness of control processes.
Conducts regular security reviews of both software and processes. Reviews and creates threat models and recommends security enhancements consistent with informationsecurity strategy and evolving threats
Participates in ongoing informationsecurity education, awareness, and outreach activities.
Participate with informationsecurity incident investigation and response efforts, leading as needed.
Participate with computer and network forensic investigations in support of incident response activities.
Prepares regular reports on relevant metrics for different stakeholders.
Coaches, manages, mentors, and develops staff.
Focuses on keeping professional skills current.
Keeps up to date on latest informationsecurity threats and countermeasures.
Champions and models Sound Transit's core values and demonstrates values-based behaviors in everyday interactions across the agency.
Contributes to a culture of diversity, equity and inclusion in alignment with Sound Transit's Equity & Inclusion Policy.
It is the responsibility of all employees to follow the Agency safety rules, regulations, and procedures pertaining to their assigned duties and responsibilities, which could include systems, operations, and/or other employees.
It is the responsibility of all employees to integrate sustainability into everyday business practices.
Other duties as assigned.
MINIMUM QUALIFICATIONS:
Education and Experience: Bachelor's degree in Computer Science, Information Technology, Business Administration, Engineering, or closely related field. Five years of information technology experience with a focus on security engineering and operations, OR an equivalent combination of education and experience. Three years of leadership, budgetary, planning and workforce management experience.
Required Licenses or Certifications:
Certified Information Systems Security Professional (CISSP), orobtain within 12 months of hire.
Preferred Licenses or Certifications:
One or more of the following certifications is strongly preferred:
Certified InformationSecurity Manager (CISM)
Information Technology Infrastructure Library (ITIL)
Certified Ethical Hacker (CEH)
Certified Cyber Forensics Professional (CCFP)
GIAC Certified Incident Handler (GCIH)
Required Knowledge and Skills:
Strong command of ITIL core processes and principles.
Strong command and experience with informationsecurity architecture and engineering principles
General knowledge of the NIST 800 series standards, PCI DSS standard, and the ISO 27001/2 frameworks.
Demonstrated work experience in a few of the following areas: InformationSecurity, Security Architecture, Security Engineering, Security Operations and implementing best practices, tools and technology.
Strong understanding of information technology and security controls.
Strong understanding of and experience with security-related technologies, systems, and tools.
Proven competency in the use of MS Office applications (Microsoft Project, Word, Excel, PowerPoint, and SharePoint)
Strong team leadership and communicational (verbal/written) skills.
Ability to work in highly collaborative environments.
Strong workload prioritization and self-organization skills
Strong project management skills.
Preferred Knowledge and Skills:
Understanding of Cloud Computing environments (Microsoft Azure preferred).
Physical Demands / Work Environment:
Work is performed in a hybrid office environment.
This position is responsible for communicating with stakeholders, and using specialized security tools; may be subject to bending, hearing, sitting, standing, talking, seeing, and carrying and lifting 25 lbs or less.
The Agency promotes a safe and healthy work environment and provides appropriate safety and equipment training for all personnel as required.
Sound Transit is an equal employment opportunity employer. No person is unlawfully excluded from employment action based on race, color, religion, national origin, sex (including gender identity, sexual orientation and pregnancy), age, genetic information, disability, veteran status or other protected class.
$104k-206k yearly 27d ago
Information Systems Security Officer
Demand Drive Solutions 3.1
Information security analyst job in Washington
Job Title: Information Systems Security Officer (ISSO)
Salary: - $110,000 $120,000 / yr
Roles and Responsibilities:
Services to support IS Security performed by the Senior Cloud Information System Security Officer (ISSO), at a minimum, shall consist of the following activities:
Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
Provide liaison support between the system owner and other IS security personnel
Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
Ensure that system security documentation is developed, maintained, reviewed, and updated continuously
Conduct required IS vulnerability scans according to risk assessment parameters.
Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs)
Coordinate system owner concurrence for correction or mitigation actions
Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO)
Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
Ensure that changes to an agency IS, its environment, and operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
Provide baseline security controls to the system owner, contingent upon the ISs security categorization, type of information processed, and entity type
Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems impact levels and ISs authorization boundary
Ensure that new entities are created in the GRC application with the security categorization of agency ISs
Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreements (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS
Perform an independent review of the System Security Plan (SSP) and make approval decisions
Request and negotiate the level of testing required for an IS with the Enterprise InformationSecurity Section and the agency Authorizing Official
Schedule security control assessments in coordination with the system owner.
Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision
Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number
Advise the agency's authorized official on IS vulnerabilities and residual risks.
Ensure that all POA&M actions are completed and tested
Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official
Ensure the removal and retirement of agency ISs being decommissioned in coordination with the SO, ISSM, ISSE, and ISSR
What are the 3-4 non-negotiable requirements of this position?
Active U.S. Government (DoD-Issued) Top Secret Security Clearance with SCI and a CI-Polygraph eligibility.
At least 5 years serving as an Information Systems Security Officer (ISSO) at a cleared facility DoD Instruction 8570.1
Information Assurance Management (IAM) Level III Certification
What are the nice-to-have skills?
A bachelors and/or advanced degree in computer science, business management, or IT-related discipline
$110k-120k yearly 60d+ ago
PERS - Information Security Analysis
Perfecta
Information security analyst job in Tigard, OR
Founded in 2017 Perfecta is a division and a wholly owned subsidiary of City National Security a well known and reputed company providing IT Consulting , Staffing and Security services throughout the United States. Perfecta brings a rich experience of over 12 years in providing fully scaled IT Consulting and Staffing & Recruiting services. Perfecta brings a successful track record of delivering value based quality professional solutions at economical price to its customers across the U.S. Perfecta has successfully executed various IT and Staffing projects with its government and commercial clients and has consistently provided quality services to its customers.
Job Description
Part I. General Information
Under this Statement of Work (SOW), the Contractor shall analyze, recommend, create working documentation, guidelines, policies, standards, instructional procedures, and conduct assessments to support the implementation of the following:
• PERS InformationSecurity Awareness and Training Program
• PERS InformationSecurity Program
• Reorganization and alignment of PERS InformationSecurity policies, standards, and procedures
Part II. Work
The Contractor shall comply with OPERS contractual deliverable review and approval processes by working with OPERS Quality Assurance in utilizing the Quality Checkpoint process attached to this SOW as Attachment 1. Quality Checkpoint is a Quality Assurance process to verify that major deliverables in the project have been reviewed and approved by their respective stakeholders.
PERS InformationSecurity Awareness and Training Program
Contractor shall assist OPERS' CISO in the creation, documentation, and implementation of a structured InformationSecurity Awareness and Training Program. Contractor shall work with OPERS to plan, document and implement solutions to fit the needs of OPERS. Tasks to support OPERS' InformationSecurity Awareness and Training Program include, but not limited to:
1. Define activities to be performed to enable and implement the Security Awareness and Training Program
2. Research and document materials needed to implement the program
3. Research and document delivery methods and related activities to implement the program
4. Research, obtain stakeholder buy-in, and document a regularly occurring schedule of activities.
5. Develop content for PERS specific, role based training for data/system owners/custodians.
6. Develop content, produce materials for PERS specific training for staff.
7. Deliver Security, Awareness and Training materials, presentations, etc. to targeted audiences
Reorganization of PERS InformationSecurity policy structure
In the first phase of policy, standard, procedure creation, emphasis was placed on creating required policy documentation to address HPE findings. In this second phase, the emphasis is to consolidate and reorganize the policy structure, resulting in fewer policies, and more specific requirements, based on security domains:
1. Identify and convert redundant policies to standards as appropriate
2. Align policy structure to NIST CSF domains
3. Address gaps by creating policies, standards, and procedures as identified and needed.
Implementation of PERS InformationSecurity Program
Initialize and implement operation of InformationSecurity program:
1. Conduct Third Party and Software Development InformationSecurity assessments
2. Initialize policy exception requesting, approval, denial, and risk acceptance process.
Part III. Special Considerations
Contractor acknowledges and agrees that any and all information regarding OPERS installation, design, configuration, data migration will be kept confidential.
Part IV. Travel and Other Expenses
OPERS shall not reimburse Contractor for any expenses under this Contract. Work must be completed on-site, Tigard, OR
Additional Information
All your information will be kept confidential according to EEO guidelines.
$126k-188k yearly est. 60d+ ago
Information System Security Officer (ISSO)
Applylogic Consulting Group
Information security analyst job in Washington
ApplyLogic is a fast-paced Service-Disabled Veteran-Owned Small-Business, headquartered in Vienna, VA. Our people are our greatest asset, and our company culture is grounded on that belief. We offer challenging and interesting work in a friendly and supportive environment. Through prime and subcontracts, we deliver best-in-class expertise to solve complex technical problems.
We're looking for a talented Information System Security Officer (ISSO) to join our team. This position will support a complex government client and will serve as the principal security advisor to the Information System Owner (ISO) and Information System Security Manager (ISSM). The ISSO is responsible for overseeing and maintaining the security posture of assigned information systems, ensuring compliance with NIST 800-53 controls, EOUSA policies, and other applicable federal security requirements.
Work Location:
Onsite - Work can be performed from either location:
Columbia, SC
Washington, DC
Clearance:
Must be US citizen with the ability to obtain a government issued security clearance.
Primary Roles and Responsibilities:
Serve as the primary security advisor to the ISO and ISSM on all technical and non-technical information system security matters.
Ensure implementation, documentation, and ongoing maintenance of security controls in accordance with NIST SP 800-53 and EOUSA policies.
Prepare, review, update, and manage system authorization packages within Cyber Security Assessment and Management (CSAM).
Conduct continuous monitoring activities for agency systems, including internal systems and FedRAMP-authorized systems.
Perform and document system security procedures, control implementation statements, and system security documentation.
Conduct annual self-assessments of security controls and support authorization and assessment activities.
Develop, review, and track Plans of Action and Milestones (POA&Ms).
Review audit logs, vulnerability scans, and remediation activities in accordance with NIST requirements.
Conduct Security Impact Analyses (SIA), risk assessments, risk-based acceptance documentation, and STIG reviews when system changes occur.
Coordinate all security-related changes or modifications to system hardware, software, or firmware with Project Managers, Security Officers, and System Owners prior to implementation.
Support patch management, vulnerability management, auditing, and assessment activities as required.
Provide security assessment and authorization (A&A) support throughout the system lifecycle.
Required Knowledge and Experience:
Bachelor's degree in Computer Science, Information Technology, Business, or a related discipline
OR eight (8) years of relevant professional experience may be substituted in lieu of a degree.
Demonstrated experience working with NIST SP 800-53 and federal informationsecurity frameworks.
Experience preparing and maintaining system authorization packages (ATO) within CSAM or similar GRC tools.
Experience with continuous monitoring, vulnerability management, and POA&M tracking.
Strong understanding of federal risk management and compliance processes, including RMF.
Preferred Education, Experience, & Skills:
Experience supporting EOUSA or other federal law enforcement or justice systems.
Familiarity with FedRAMP requirements and cloud security controls.
Knowledge of DISA STIGs and security configuration baselines.
Relevant certifications (e.g., CISSP, CISM, Security+, CAP) are a plus.
The Perks of Being on Our Team
ApplyLogic offers competitive salaries with a robust Fortune-500 type benefits package. Some of the benefits you will receive when you join us are:
Employee Assistance Program
401K
Medical/Dental/Vision Insurance
Life/Short-Term Disability/Critical Illness/Accident Insurance
15 PTO Days
11 Federal Holidays
Up to $5K towards continuing education and/or professional development
$80k-110k yearly est. 1d ago
Information Security Manager
Triplenet Technologies
Information security analyst job in Seattle, WA
Guide security policy and participate in broader InformationSecurity governance efforts.
Develop and maintain the InformationSecurity Management System (ISMS) in collaboration with regional informationsecurity SMEs and technical consultants.
Oversee and manage the ISMS and recommend appropriate mitigating controls.
Oversees InformationSecurity Risk Management activities, including risk identification, assessment, and communication to relevant interest holders.
Provide valuable expertise and leadership directly to the governing Joint Board executive leadership, including sharing metrics to reflect the performance of the regional security program functions, executive risk score reports, and other guidance on a variety of informationsecurity topics.
Facilitate a committee of InformationSecurity SMEs across the Agencies to ensure both regional compliance and concurrence on informationsecurity-related matters, recommending solutions, and working from the regional perspective to achieve optimal solutions.
Collaborate with the Systems Integrator, other vendors, and partner Agencies to ensure security best practices, standards, policies, and regulatory requirements are incorporated into core payment system design, implementation, and sustainment, as well as support other future phase projects.
Conduct regular security reviews of both software and processes, advising on informationsecurity practices. Reviews and creates threat models and recommends security enhancements consistent with informationsecurity strategy and evolving threats.
Support external IT security audits and assessments that focus on operation.
Develop, update, implement, and conduct informationsecurity training programs to support the ISMS objectives.
Manage approvals for Identity and Access Management (IAM) and Access Control Administration.
Act as Incident Commander for Security Incident Response activities, whenever the InformationSecurity Incident Response Plan is invoked by the regional program; play an interest holder and oversight role if the plan is invoked by other partners or vendors.
Participate in informationsecurity incident investigation and response efforts; perform root-cause analysis when incidents occur and prepare incident reports.
Evaluate change requests to determine potential impacts to InformationSecurity, including IT systems, processes, policies, and provide appropriate input to the Change Management process.
Coach future Regional Operations Team (ROOT) informationsecurity personnel as the ISMS becomes complete and mature.
Keep up to date on latest informationsecurity trends, "best practices", threats, and countermeasures.
Required Skills and Qualifications:
Enterprise-level informationsecurity plans, policies, standards, guidelines, methods, and practices based on current industry standards, best practices, tools, and techniques.
InformationSecurity Management Systems, and applicable industry standards (ISO 27001/2).
Pertinent federal, state, and local laws, codes, and regulations; particularly those that affect informationsecurity for payment systems.
Environments subject to the Payment Card Industry Data Security Standard (PCI DSS), including compliance-related duties.
Knowledge and understanding of developing and administering information-security standards, practices, audits, risk management, and policy compliance.
InformationSecurity Audit principles and practices.
Knowledge of one or more governance frameworks such as COBIT 5, ISO, NIST, or COSO.
Strong understanding of IT Service Delivery (ITIL) core processes and methodologies.
Principles, methods, and techniques used in the facilitation of managing projects and leading teams.
Relevant experience and detailed technical knowledge in security engineering, system and network security, authentication and security protocols, cryptography.
In-depth knowledge of security software threats and vulnerability mitigation techniques.
Working knowledge of cloud platforms such as Azure/ AWS and relevant security controls.
Establishing and maintaining collaborative working relationships with other department staff, management, vendors, and other interest holders.
Documenting and explaining risks, recommendations, and incident data to technical interest holders.
Interpreting and administering informationsecurity policies, standards, and procedures sufficiently to administer, discuss, resolve, and explain them to staff and other constituencies.
Leading or supporting an InformationSecurity Management System.
Generating metrics and preparing reports to facilitate decision-making on security-related activities.
Utilizing personal computer software programs affecting assigned work and in compiling and preparing spreadsheets and reports.
Responding to inquiries with effective oral and written communication.
Researching, analyzing, and evaluating new security processes, products, and techniques.
Excellent time management skills including the ability to prepare, prioritize, and complete work plans.
Working effectively under pressure, meeting deadlines, and adjusting to changing priorities.
Writing of technical documentation and standards, including skill in English usage, spelling, grammar, and punctuation
Required Certifications or Licenses:
At least one of the following (in valid status):
Certified Information Systems Security Professional (CISSP).
Certified InformationSecurity Manager (CISM).
Certified InformationSecurity Auditor (CISA).
Other industry relevant certifications in the fields of informationsecurity, project management, auditing and/ or risk management, such as the Certification in Risk and Information Systems Control (CRISC)
Preferred Skills and Qualifications:
Knowledge of Governance, Risk, and Compliance (GRC) tools.
Principles of leadership, supervision, training, and performance evaluation.
Extensive knowledge of risk-based methodologies, and one or more of the following frameworks: ISO 27001/2:2017, 27005:2011, and 31000; PCI-DSS; or NIST 800-53.
Duration:11/07/2025 to 2/28/2026
Location: Downtown Seattle (Hybrid)
M-F: 8 AM to 5 PM
Hybrid: 3 days work onsite
Pay: $75 per hour
$75 hourly 60d+ ago
Sr Ent Information Security Manager
Direct Staffing
Information security analyst job in Bellevue, WA
Bellevue Telecommunications Services Exp 10-15 years Deg Bachelors Relo Bonus Job Description The InformationSecurity Manager, working with in Corporate InformationSecurity Team will be responsible for liaising with assigned business units on behalf of Corporate InformationSecurity (CIS). These responsibilities will include understanding business-driven projects that involve network and informationsecurity, applications, networking and web based technologies. They will be responsible for understanding the Business Unit's processes and priorities and working with them to manage business impact and threats, through a risk based methodology. Ensures through positive engagement that business goals are met in a secure and compliant manner, according to industry standard regulations
Qualifications
Ideal Candidate will have:
Candidate must have strong technical, influential and organizational skills.
Prefer six years' experience in informationsecurity related discipline, in addition to several years' relevant systems and/or network administration experience.
Expert relationship building and partnering skills, including persuasion, negotiation and consensus building.
Experience translating emerging IT and business trends into meaningful risk reduction opportunities.
Demonstrated ability to work effectively in a complex matrixed environment.
Outstanding verbal and written communication skills.
Ability to interpret business strategy and align to appropriate security enhancements to achieve business enablement.
Ability to translate security requirements into business risks and impacts.
Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA.
Strong understanding of encryption, obfuscation and/or tokenization technologies or compensating controls.
Appropriate industry certifications, such as CISSP, CISA or CCIE.
Preferred skill: Bachelor degree in Computer Science, InformationSecurity, Information Management, or other related discipline.
Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred.
Skills and Qualifications:
A broad, enterprise-wide view of the wireless (or similar) business and understanding of strategy, processes and capabilities, enabling technologies, and governance. Experience in telecommunications, internet service provider, or application service providers a plus.
The ability to apply InformationSecurity principles to business solutions.
Extensive experience planning and deploying both business and technology security initiatives.
Exceptional communication skills and the ability to convey results in a summarily and persuasive manner to business owners. This includes written and verbal communications as well as visualizations.
The ability to act as liaison conveying information needs of the business to technology teams and technology constraints to the business.
Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus.
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI.
Good understanding & experience applying CoBIT, ISO, ITIL, NIST frameworks.
Understanding of Local (Wired & Wireless), Wide area, and mobile networks.
A good understanding of Network Security, Firewalls, Intrusion Detection and Prevention, AVS, VLANS.
Strong background and experience in IP Networking and Routing Protocols.
Fluency in the use of all MS Office applications, including SharePoint services.
Qualifications
· Preferred: Any of the following
CISSP, CISA, CISM, C-RISC, CCNA, CCIE, Six Sigma Yellow/Green/Black Belt
Education
Minimum Required
High School Diploma/GED
Education/Vocational Training/Experience Preferred
Bachelor's degree in Computer Science, Information Technology or related field from an accredited 4-year college or university
10 years of system, network, and application design and architecture experience. Preferably in the wireless communications space
CISSP and or CISM Certification (required; experience may be substituted for Cert requirements (4 years minimum)
CISA Certification (preferred but not required; experience may be substituted for Cert requirements (4 years minimum)
Responsibilities
What you will do:
Make proactive assessments of threat information in and outside the public domain, understanding the threat as it relates to its customers, and implementing measures to combat the threat.
Understand the operations of the business and comprehend how these create value and risk for the organization.
Collaborate with team members, peers and the business unit management team to determine technical informationsecurity requirements, planned remediation, and advocate for the program to gain resources to implement appropriate protection technologies and processes.
Implement and monitor controls necessary to ensure operational processes are performed and are effective to protect the environment from all forms of malicious cyber activity.
Assist the Governance group in the development and refinement of technical security standards, key performance indicators and other necessary processes to maintain effective operational security, as it relates to the business.
Make risk-based decisions on a daily basis that has the potential to impact our ability to operate and communicate.
Ensure the information and network security controls for us are appropriate and operating as intended; includes solutions that are directly controlled as well as security solutions that are operated by other internal and external groups.
Provide status reports on a weekly, monthly and quarterly basis to business managers and other management activities that demonstrate the health of the program.
Interact with internal audit, third party auditors, and appropriate regulatory bodies.
Support the InformationSecurity policy lifecycle throughout, including all aspects of intake, creation, review, approval, implementation, publishing, communication and maintenance.
Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Direct Staffing Inc
$110k-159k yearly est. 1d ago
Information Systems Security Officer
Plexsys 4.1
Information security analyst job in Camas, WA
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security
posture for information systems and as such, works in close collaboration with the ISSM, CPSO, and FSO. The
ISSO must have detailed knowledge and expertise required to manage the security aspects of an information
system and is assigned the day-to-day responsibility for assigned systems. Responsibilities include
implementation of the requirements of Risk Management Framework, including the Joint Special Access
Program (SAP) Implementation Guide (JSIG), NIST 800-53, or other security requirements as assigned.
This position will report to the Corporate Information Assurance Manager and work in close collaboration with
the AFSO and FSO. The ISSO is responsible for developing and updating the security authorization package, managing and controlling changes to the system, and assessing the security impact of those changes.
Ensure systems are operated, maintained, and disposed of following security policies and procedures as outlined
in the security authorization package.
Report all security-related incidents to the ISSM.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Monitor system recovery processes to ensure security features and procedures are properly restored and
functioning correctly.
Ensure audit records are collected, reviewed, and documented.
Duties also include physical and environmental protection, personnel security, and incident handling.
DUTIES & RESPONSIBILITIES
Lead the information system security program for their assigned location to include implementation and
validation of automated informationalsecurity, ensuring security requirements as contracted are
satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current
DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring,
trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by
local employees
Conduct system audits in accordance with security accreditation package requirement
Lead the information system security program for their assigned location to include implementation and validation of automated informationalsecurity, ensuring security requirements as contracted are satisfied
Maintain and establish the accreditation of classified information systems
Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
Ensure all security procedures are being followed such as patching, AV updates, continuous monitoring, trainings, and self-inspections
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
Conduct system audits in accordance with security accreditation package requirements
Conduct vulnerability scans and analysis
Conduct maintenance on the networks, systems, and hardware
Perform software upgrades on networks, systems, and hardware
Perform security assignments in accordance with the Automated Information System requirements and local regulations
Understand and follow NISPOM/ODAA/RMF/JAFAN/ICD/NIST/JSIG classified system accreditation and certification requirements
Other duties as assigned
REQUIREMENTS
Bachelor's degree in related field or 4 years' experience in related field
DoD 8570 compliant, IAT Level II
Experience with Windows based administration of Information Systems
Ability to work within compliance standards; previous experience with RMF, HIPAA , PCI DSS, or
equivalent compliance standard preferred
Strong experience in networking, active directory, centralized logging solutions, vulnerability scanning
and anti-virus solutions
Experience with security audits for information systems
Strong communication and problem-solving skills
Ability to work in both a team environment as well as independently
Must be organized and detail oriented
Ability to obtain and maintain Top Secret clearance with the ability to obtain approval for SAP/SCI access
DESIRABLE
Have previous experience with DoD Security Regulations and Policies
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
Medical/Vision/Prescription/Dental Benefits
Life, AD&D and Long Term Disability Coverage
Paid Holidays, Military Leave, and Paid Time Off
401k Plan with eligibility from first day of employment
Education reimbursement for job-related courses for full-time employees
PriceClub/COSTCO/Sam's Club annual membership
$88k-116k yearly est. 60d+ ago
Information Security Manager - INTL - UK
Insight Global
Information security analyst job in Medford, OR
The InformationSecurity Manager is responsible for designing, implementing, and enhancing a comprehensive technology compliance and risk management program to bolster the organization's security posture. This role involves continuous assessment, reporting, and improvement of technology risks and compliance activities across global operations. You will serve as a pillar of the InformationSecurity Program by driving and managing program activities, ensuring success through collaboration with internal and external partners. In the future you will establish a team and reports, but on the forefront there will be a focus on managing third party and vendor risk with an emphasis on front end offensive security activities and conducting service provider security assessments.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
-5+ years of experience managing an enterprise risk register
-5+ years of experience managing InfoSec gathering and reporting metrics
-5+ years of experience spearheading offensive security activities
-5+ years of experience managing policy document and improvement
-5+ years of experience implementing data retention policies
-5+ years of experience managing third party risk management and cyber risk rating tools
-CISSP Certification -Automotive industry experience
$109k-157k yearly est. 60d+ ago
Google Cloud Security Architect
Slalom 4.6
Information security analyst job in Portland, OR
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies.
Join the Slalom Cloud Team -a team of trailblazers ensuring we achieve our strategic goals through innovation and investment in the future. You'll collaborate with local market teams, niche experts, and global partners to drive cloud solution sales and empower clients on their cloud transformation journey. As a key member of Slalom's Google Cloud Center of Excellence, you'll leverage our award-winning partnerships and multidisciplinary teams to deliver business value and technical excellence for high-impact security and infrastructure solutions.
What You'll Do
* Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor.
* Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles.
* Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance.
* Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools.
* Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data.
* Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap.
* Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients.
* Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients.
* Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities.
What You'll Bring
* Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor.
* Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments.
* Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud.
* Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture.
* Experience in security and risk advisory consulting, particularly related to cloud security transformations.
* Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs.
* Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices.
* Relevant certifications are strongly desired but not required, including (but not limited to):
* GCP Professional Security Engineer
* GCP Professional Cloud Architect
* CISSP
* Security+
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices.
Slalom is committed to fair and equitable compensation practices. For this role, we are targeting the following levels and salary ranges:
East Bay, San Francisco, Silicon Valley:
* Senior Consultant: $131,000-$196,500
San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC:
* Senior Consultant: $120,000-$180,000
All other locations:
* Senior Consultant: $110,000-$165,000
In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
$131k-196.5k yearly 11d ago
Security Engineer, Operating Systems
Anthropic
Information security analyst job in Seattle, WA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Create OS-level attestation and integrity monitoring systems
Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Serve as a subject matter expert for OS security questions and designs
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with secure boot technologies
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$300,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
$79k-113k yearly est. Auto-Apply 27d ago
Data Security Analyst 3
Washington State University 4.3
Information security analyst job in Pullman, WA
Required Qualifications A Bachelor's degree and three (3) years professional experience OR a combination of education and experience totaling seven (7) years from which comparable knowledge and abilities are acquired. Preferred Qualifications Experience developing operational informationsecurity procedures and technical training materials. Demonstrated experience with working within formal project management frameworks. Experience with the Splunk application, to include developing searches, reports, and other automated routines. Experience with security reviews of firewall, file system, and other forms of access control lists. Experience with digital forensics software and processes. Demonstrated ability to appropriately prioritize multiple tasks, projects, or assignments. Expert knowledge of Windows, Linux, and Apple operating systems.
$58k-77k yearly est. 60d+ ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Camas, WA?
The average information security analyst in Camas, WA earns between $71,000 and $149,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Camas, WA