Information security analyst jobs in Falls, PA - 200 jobs
All
Information Security Analyst
Information Systems Security Officer
Information Technology Analyst
Information Security Manager
Senior Security Specialist
Security Architect
Information Security Officer
Cyber Security Analyst
Security System Engineer
Cloud Security Architect
Cognizant 4.6
Information security analyst job in Bridgewater, NJ
Practice - CIS - Cloud, Infrastructure, and Security Services
About Cloud Infrastructure & Security Services: Cognizant's Cloud, Infrastructure, and Security Services Practice (CIS), is all about embracing digital transformation by driving core modernization holistically across layers. We help customers transform infrastructure and workplace to meet the rapidly evolving needs of the digital era. Our holistic approach delivers key results for our customers by achieving cloud driven modernization and workplace and operational transformation to run the business in a secure environment.
*Please note, this role is not able to offer visa transfer or sponsorship now or in the future*
Job Summary
This role is responsible for managing and optimizing our cloud security tooling and ensuring robust cloud security operations across IaaS, PaaS, and SaaS environments. The role will involve triaging and managing cloud security issues alongside providing expert consultancy to the business on cloud security risks and driving remediation efforts. Additionally, this role involves developing automation scripts, generating actionable security reports, and enabling data-driven insights through analytics and BI tools.
In this role, you will:
Security Tooling:
Perform BAU operations for cloud security tooling across IaaS, PaaS, and SaaS platforms.
Drive and maintain full coverage of CNAPP and SSPM solutions across all cloud platforms, workloads, and SaaS applications.
Manage IAM operations related to cloud security tooling, including role-based access control, group management, and JML (Joiner-Mover-Leaver) processes.
Ensure integration and continuous improvement of security tooling to meet evolving business and compliance requirements.
Understanding of Kubernetes, Helm and YAML to support deployment of security capabilities across Kubernetes Clusters.
Security Monitoring:
Design and implement security monitoring processes to detect, analyze, and respond to potential threats.
Monitor cloud security tooling for misconfigurations, vulnerabilities, and compliance gaps collaborating with business partners to ensure timely notification and remediation within agreed SLAs.
Provide expert level consultancy to business stakeholders on cloud security risks, clearly articulating technical issues and their business impact. Where remediation is not feasible, identify and guide implementation of compensating controls.
Evaluate and clearly articulate the operational impact of configuration changes to cloud resources, ensuring informed decision-making on business continuity.
Excellent written communication in documenting cloud security risk statements used to capture, manage and drive risk remediation of cloud security issues.
Collaborate with engineering and application teams to remediate issues and continuously improve the organization's cloud security posture.
Security Reporting & Development:
Develop and maintain scripts to extract security data from APIs and transform it into consumable formats.
Generate regular and ad-hoc security reports for management, highlighting key risks, trends, and remediation progress.
Leverage BI tools (e.g., Power BI) to create dashboards and visualizations that provide actionable insights into cloud security posture.
Explore opportunities for automation and analytics to enhance operational efficiency and risk visibility.
What you need to have to be considered
5+ years of experience in cloud security engineering
Strong hands-on experience with major cloud platforms (AWS, Azure, GCP), cloud security tools and cloud-native security controls
Deep understanding of cloud security concepts, compliance frameworks, and best practices
Excellent problem-solving and analytical skills
Certifications such as CISSP, CCSP and/or cloud service provider security certifications such as AWS-SCS, AZ-500 and GCP PCSE.
Knowledge and experience working with cloud security tooling such as CSPM, CWP, CNAPP.
#LI-EF1
#CB
#Ind123
Applications will be accepted until 12 Jan 2026.
Salary and Other Compensation:
The annual salary for this position is between $[136,500 -160,000] depending on experience and other qualifications of the successful candidate.
This position is also eligible for Cognizant's discretionary annual incentive program, based on performance and subject to the terms of Cognizant's applicable plans.
Benefits: Cognizant offers the following benefits for this position, subject to applicable eligibility requirements:
· Medical/Dental/Vision/Life Insurance
· Paid holidays plus Paid Time Off
· 401(k) plan and contributions
· Long-term/Short-term Disability
· Paid Parental Leave
· Employee Stock Purchase Plan
$96k-125k yearly est. 19h ago
Looking for a job?
Let Zippia find it for you.
Chief Information Security Officer
Arma International 4.4
Information security analyst job in Princeton, NJ
Department InformationSecurity Office Category Information Technology Job Type Full-Time
The Chief InformationSecurity Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University informationsecurity policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to informationsecurity in a world-class institution of teaching, learning and research.
The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of informationsecurity risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements.
The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University InformationSecurity Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance.
Responsibilities
Strategic Planning and Policy Development
Provides guidance and counsel on informationsecurity to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders.
Works with campus leadership to develop a strategy for informationsecurity that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations.
Recommends strategies and practices to ensure informationsecurity and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies.
Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office.
Advises University leaders on emerging informationsecurity risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities.
Tracks industry and higher-ed informationsecurity best practices to keep abreast of current techniques, systems and applications.
Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives.
As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture.
Management
Leads the overall management and success of a robust, current and expanding informationsecurity office.
Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan.
Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security.
Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and informationsecurity features; provides security requirements for software/services RFPs.
Training and Outreach
Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around informationsecurity.
Qualifications
Essential Qualifications:
At least 10 years of current experience directly related to the responsibilities of the role
Demonstrated domain expertise
A strategic grasp of informationsecurity at both institutional and operational levels
The capacity to articulate a vision for informationsecurity that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields
Communication and collaboration skills to build support for security-related initiatives and objectives
Experience in higher education or a research environment is preferred
Broad knowledge of computer security issues, requirements, and trends
Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation
Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse
Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment
Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents
The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university
The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable
Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment
Integrity and high standards of personal and professional conduct
Education :
Bachelor's degree required, preferably in computer science or information technology
Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials
Preferred Qualifications:
Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials
Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden.
Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law.
The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly.
If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above.
The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information.
Standard Weekly Hours
36.25
Eligible for Overtime
No
Benefits Eligible
Yes
Probationary Period
180 days
Essential Services Personnel (see policy for detail)
No
Physical Capacity Exam Required
No
Valid Drivers License Required
No
Experience Level
Director
Salary Range
$265,000 to $325,000
PI279427080
#J-18808-Ljbffr
$265k-325k yearly 2d ago
Information Technology Financial Analyst
Motion Recruitment 4.5
Information security analyst job in Philadelphia, PA
Our client is looking for an IT Financial Analyst to join their team on a contract, remotely.
Pay: $45-52/hour
Primary Duties and Responsibilities:
Manage the financial relationship between the organization and key strategic IT vendors, including SOW review and tracking, monitoring vendor adherence to financial contract terms, and reconciliation of vendor accounts.
Monitor and report on key Program Accounting initiatives, including project financial reviews.
Maintain and monitor IT Financial processes that are part of the project life cycle, including assisting with training for project managers.
Serve as an educational resource to internal and external partners, as well as business leaders, to aid in the understanding of financial results and measurement systems/metrics.
Provide financial consulting and analytical support, including budgeting and forecasting, to leadership of assigned shared service organizations.
Serve as a mentor for junior IT Financial Analysts.
Work closely with shared service leaders to understand business needs and requirements and ensure alignment of forecasts and budgets.
Prepare monthly accrual and expense re-class entries.
Audit task charge codes in Clarity to ensure proper Accounting standards are followed.
Maintain forecast of operating expense and capital expenditure.
Support the development, maintenance, and continuous improvement of the annual budgeting and ongoing forecast processes.
Assist the capital planning process for assigned organizations, including conducting research and analysis, validating business cases, creating financial models, and making recommendations.
Analyze and interpret financial data and formulate conclusions and recommendations to supported organizations to address concerns or areas of opportunity.
Report monthly actual results against budget and forecast; investigate and explain causes of variance.
Analyze trends and cost drivers and highlight risks and opportunities.
Provide financial analysis to help IT leadership understand financial results and support business decisions.
Provide analysis for monthly management reviews.
Ensure knowledge, understanding, and compliance with company policies and procedures.
Provide feedback to management concerning possible problems or areas of improvement.
Make recommendations to implement improved processes.
Perform other duties as assigned by management.
Experience and Educational Requirements:
Bachelor's Degree or equivalent in relevant work experience. Degree in Finance or Accounting preferred.
8+ years of FP&A experience in a large corporate environment.
Experience working in an IT environment a plus.
Experience creating budgets and forecasts, reporting, financial modeling, and financial analysis.
Experience developing and leading FP&A processes.
Advanced knowledge of accounting principles required.
High level of proficiency in Microsoft Excel and PowerPoint required.
Experience with financial systems required; SAP a plus.
Ability to work with senior management in a cross-functional environment.
Ability to work independently with minimal direction and oversight.
Must be creative and forward-thinking with high ethical standards.
Must possess sound technical skills, analytical ability, good judgment, and a strong operational focus.
Strong presentation skills.
Ability to maintain the highest level of confidentiality.
Ability to work within and meet established deadlines.
Excellent interpersonal, written, and oral communication skills.
Ability to work in a team fostered environment.
Ability to adapt to a flexible schedule.
Minimum Skills, Knowledge, and Abilities:
Demonstrated knowledge of database applications in the business environment.
Strong analytical and problem-solving skills to interpret and evaluate business problems and apply applications knowledge to identify appropriate solutions.
Demonstrated knowledge of project management concepts.
Strong leadership skills.
Good interpersonal skills.
Strong decision making skills.
Strong customer service skills.
Ability to communicate effectively both orally and in writing, including the ability to relate effectively with both technically and non-technically oriented individuals.
Ability to prioritize workload and consistently meet deadlines.
Strong organizational, administrative, and follow-up skills.
$45-52 hourly 1d ago
IT Analyst
Cypress HCM 3.8
Information security analyst job in Bridgewater, NJ
This is an exciting opportunity to join a growing global company in the medical equipment industry! This role is responsible for managing the company's response to IT-related requests that have been submitted by our customers. The IT Analyst will utilize a combination of their project management skills, knowledge of company products and services, and input from multiple subject experts to respond to customer's needs.
Responsibilities
Draft, review and execute responses to IT inquiries submitted by current and prospective customers regarding company products and services, ensuring compliance to company policies and procedures.
Complete security assessments, both technical and organizational, for all lines of business (Clinical Labs, Immunohematology, Point of Care, and Molecular).
Primarily support North America, but complete global requests when necessary.
Understand the customer's requested solution and how to position company products, messaging and services.
Work cross functionally to ensure internal alignment, delivering responses that clearly articulate the company's product and service differentiators to attract and retain customers.
Task and assign proposal content as needed for subject matter experts' sections, following up with section owners to ensure timely and accurate content delivery.
Meet established SLAs, such as two-week turnarounds for standard requests.
Manage database of FAQ/Responses by line of business and instrument.
Create best in class content to act as a competitive differentiator.
Participate in projects and initiatives as required.
Qualifications
Experience in IT analytics or relevant.
Any experience or knowledge with security ideal.
Project management and organizational skills.
Customer centric approach in resolving customer needs and inquiries.
Pay Rate: $28-$30/hour
$28-30 hourly 2d ago
3014 - Specialist, Information System Security III (SISS3)
AlakaʻI Services and Poe'Hana Group, Inc.
Information security analyst job in Philadelphia, PA
Provide senior-level cybersecurity and information system security support for Navy systems by leading RMF activities, security authorization packages, continuous monitoring, and cybersecurity compliance in support of mission operations.
Key Responsibilities
Lead and support RMF Steps 1-6 for assigned Navy information systems
Develop and maintain SSPs, SAPs, SARs, POA&Ms, and security artifacts
Coordinate system authorization activities with Authorizing Officials (AOs)
Conduct risk assessments and vulnerability analysis
Support continuous monitoring, audits, and inspections
Advise leadership on cybersecurity risk and mitigation strategies
Qualifications (Citizenship, Education, Experience, Skills)
Citizenship: U.S. Citizenship required
Education: Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience)
Experience: Minimum 8 years cybersecurity / ISS experience; 5+ years RMF support
Skills: RMF; NIST 800-53; risk analysis; technical writing; coordination with government stakeholders
Required Systems, Tools, and Framework Experience
Frameworks: DoD RMF, NIST SP 800-53, 800-37, 800-30
Systems: eMASS, ACAS, HBSS, STIG Viewer
Tools: Nessus, SCAP, vulnerability scanning tools
Security Handling: CUI, controlled system documentation
We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.
$80k-114k yearly est. 2d ago
Information Security Analyst
Vurke
Information security analyst job in Philadelphia, PA
About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations.
Responsibilities:
Configure and maintain firewalls, VPNs, and IDS/IPS systems.
Perform network security monitoring and incident response.
Conduct penetration testing and simulate attacks to identify weaknesses.
Harden routers, switches, and network devices.
Optimize performance without compromising security.
Requirements:
3+ years experience in network engineering/security.
Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls.
Experience with network protocols (TCP/IP, DNS, SSL, VPN).
CCNA Security, CCNP Security, or equivalent certifications.
Required Skills:
InformationSecuritySecurity
$80k-114k yearly est. 60d+ ago
Information Security Specialist
Ask It Consulting
Information security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The InformationSecurity Specialist (ISS)
is responsible for developing and documenting informationsecurity policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement informationsecurity & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document informationsecurity policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
$84k-119k yearly est. 3d ago
Cyber Security
Forhyre
Information security analyst job in Philadelphia, PA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Informationsecurity program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of InformationSecurity technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
$73k-100k yearly est. 15d ago
Specialist, Information System Security III (SISS3)
Armada Ltd. 3.9
Information security analyst job in Philadelphia, PA
Job Description
Type: Full Time
Overtime Exempt: Exempt
Reports To: ARMADA HQ
Travel Required: Yes
Security Clearance Required: Active Secret Security Clearance
************CONTINGENT UPON AWARD***************
Duties & Responsibilities:
Specialist, Information System Security III (SISS3) will conduct risk and vulnerability assessments of planned and installed systems to identify vulnerabilities, risks and protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on package content and assessment results and documenting for the Security Controls Assessor's (SCA) and higher level review.
Execute Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Specialist, Information System Security III (SISS3) will conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate and represent the current risk posture of the system.
Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, SecurityInformation and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS).
Specialist, Information System Security III (SISS3) will assess impacts from observed risks and report via the Cybersecurity Program chain of command.
Executing Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Perform the evaluation of system administrator, security engineer, and/or system owner proposed corrections to ensure compliance and best-fit solution.
Specialist, Information System Security III (SISS3) will present and submit data to management, develop reports, and produce procedural documentation in a comprehensive and cohesive manner.
Perform risk management and security engineering for Research, Development, Testing, and Evaluation (RDT&E) RMF Afloat systems include Information Assurance Vulnerability Management (IAVM) support, remediation, patching, scanning and associated boundary maintenance.
Specialist, Information System Security III (SISS3) will document residual risks in a plan of actions and milestones formatted in compliance with the current package system, currently eMASS.
Specialist, Information System Security III (SISS3) will maintain current vulnerability scan data and residual risk plan of actions and milestones in Vulnerability Remediation Asset Manager (VRAM).
Manage, attend, and support configuration control board practices.
Create and verify the accuracy of POA&Ms/RARs as identified by vulnerability actual test results.
Specialist, Information System Security III (SISS3) shall write technical documentation such as user manuals, reports, documentation, policies, presentations, Plan of Action and Milestones (POA&Ms), risk assessments, proposals, outlines, and summaries in support of both ashore and afloat systems across multiple platforms. Support developing of technical documents across multiple platforms including configuration management, milestone, issue tracking, web site content management and RMF documentation.
Specialist, Information System Security III (SISS3) may be required to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). The estimated number of trips is 14 per year (estimated 25%-30% travel).
Other duties as assigned.
Knowledge, Skills, and Abilities (KSAs):
Ability to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe).
Proficient in Microsoft Windows Operating System Administration, including Windows 11, Windows 10, Windows 7, and Windows XP (at a minimum).
Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance.
Possess excellent organizational and file management skills and the ability to plan and execute administrative work with little supervision.
Possess excellent oral and written communication skills.
Required Certifications:
Minimum of one (1) IAT Level II listed certificate required:
CompTIA Security+ (CE)
CompTIA CySA+
GIAC Security Essentials (GSEC)
ISC² SSCP (Systems Security Certified Practitioner)
Minimum/General Experience:
Five (5) years of experience in the following:
Cybersecurity, Engineering, Test and Evaluation (T&E) or Authorization and Assessment (A&A) (formerly C&A) related field.
Information Assurance tools such as Defense Information Systems Agency (DISA) Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS).
Command line interface, PowerShell, and performing automated tasking through use of code.
Minimum Education:
College degree in any technical discipline from an accredited college or university.
Disclaimer:
The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ******************
Special Notes: Relocation is not available for these jobs
ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
$84k-127k yearly est. 20d ago
Information Security Analyst II (E5122)
Institute of Electrical and Electronics Engineers
Information security analyst job in Piscataway, NJ
The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of informationsecurity practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, InformationSecurity and manages 0 direct reports.
Key Responsibilities
Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial informationsecurity products and services to determine which of these should be adopted by or tested by the organization.
Assists with the installation, maintenance and support of informationsecurity tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
Assists in the formulation and enforcement of security policies and procedures.
Education
Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req
Work Experience
2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req
Licenses and Certifications
Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref
Skills and Requirements
Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response)
Knowledge or familiarity on conducting and mitigating security/risk assessments
Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.)
Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
Knowledge and experience Windows Active Directory.
Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests).
Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH).
Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool
Ability to work alone and build relationships across the organization.
Anticipates problems and identifies long-term implications of decisions and actions.
Familiarity with server operating systems, such as; Windows, Linux & Solaris
Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:
As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================
Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
$84k-119k yearly est. Auto-Apply 17d ago
Information Security Analyst II (E5122)
Ieee 4.9
Information security analyst job in Piscataway, NJ
InformationSecurityAnalyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of informationsecurity practices, measures, and technologies consistent with industry best practices.
This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place.
The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption.
The role reports to the Manager, InformationSecurity and manages 0 direct reports.
Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial informationsecurity products and services to determine which of these should be adopted by or tested by the organization.
Assists with the installation, maintenance and support of informationsecurity tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
Assists in the formulation and enforcement of security policies and procedures.
Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering.
In lieu of a degree equivalent experience will be considered.
ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.
g.
Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment.
ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus.
PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.
) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
Knowledge and experience Windows Active Directory.
Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.
e.
Self Service Access requests).
Good understanding of a programming language (e.
g.
Java, C, Perl), HTML/XML and Unix “shells” scripting (e.
g.
CSH, KSH, SH).
Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.
o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization.
Anticipates problems and identifies long-term implications of decisions and actions.
Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements.
This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================Disclaimer: This is proprietary to IEEE.
It outlines the general nature and key features performed by various positions that share the same job classification.
It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job.
Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
Min: $91,000.
00 Max: $114,000.
00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Jan 5, 2026, 5:38:52 PM
$91k-114k yearly Auto-Apply 11h ago
Information System Security Officer (ISSO III) - US Navy
Tln Worldwide Enterprises, Inc.
Information security analyst job in Philadelphia, PA
Requirements
Education:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or other STEM discipline.
Experience:
Minimum 6 years of experience coordinating and enacting security changes within an organization.
Experience with vulnerability and threat analysis, compliance enforcement, and incident response.
Familiarity with DoD and Navy cybersecurity practices and reporting requirements.
Skills & Knowledge:
Proficiency in identifying, analyzing, and mitigating cybersecurity threats.
Strong understanding of Risk Management Framework (RMF), system accreditation processes, and DoD cybersecurity directives.
Excellent communication and reporting skills with the ability to provide clear, actionable recommendations.
Certifications:
Must hold a baseline certification as outlined in the Cybersecurity Workforce (CSWF) requirements (e.g., Security+ CE, CISSP, CISM, or equivalent).
Security Clearance Requirements
Active Secret clearance
Salary Description 85,000 - 150,000
$69k-94k yearly est. 60d+ ago
Information Systems Security Officer (ISSO)
Contact Government Services, LLC
Information security analyst job in Philadelphia, PA
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$69k-94k yearly est. Easy Apply 25d ago
INFORMATION SYSTEM SECURITY OFFICER (ISSO) III (Req 25 066)
Amelex 4.0
Information security analyst job in Philadelphia, PA
Responsibilities: Assists the Information System Security Managers (ISSM) in executing their duties and responsibilities. Ensures compliance with all cybersecurity policies. Ensures relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals. Coordinates cybersecurity processes and activities for assigned systems. Maintains and reports Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs. Provides oversight of Security Plans for assigned systems throughout their lifecycle. Manages and maintains Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and where possible, remediated. Assists with the identification of security control baselines and applicable overlays. Coordinates the validation of security controls with Navy Qualified Validators (NQV). Performs Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews. Adjudicates findings from Package Submitting Officer (PSO). Registers and maintains systems in Enterprise Mission Assurance Support Service (eMASS). Plans and coordinates security control testing during Risk Assessments and Annual Security Reviews. Reports changes in system security posture to the ISSM. Ensures the execution of Continuous Monitoring related requirements as defined in the System Level Continuous Monitoring (SLCM) Strategy. Reviews all data produced by Continuous Monitoring activities, updates the eMASS record as necessary, and escalates to leadership for action, if required. Correlates findings from non-RMF vulnerability assessments, penetration testing, Command Cyber Operational Readiness Inspection (CCORI), etc.) to RMF controls for tracking, ensuring a holistic risk assessment. Participates in change control and configuration management processes. Maintains vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Education: Bachelor s degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited institution as recognized by the U.S. Department of Education
Experience: Six (6) years of DoD experience coordinating and enacting required security changes, within various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
Minimum Certification Requirement: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP is required.
Other: An Active Secret Security Clearance is required.
Benefits Information: We offer a generous benefits package including a 401k with employer match. Full time employees are also eligible for family medical, dental and vision benefits; as well as ancillary benefits including life and accidental death and dismemberment insurance; short- and long-term disability; flexible spending accounts; long-term care insurance; and accident, hospital, and critical illness insurance. Full-time employees are also eligible for 2 weeks vacation leave accrual per year (this accrual increase as tenure with company increases), 7 days sick leave, and 11 paid holidays, with additional leave time available for bereavement, jury duty, and military training days throughout the year.
$69k-93k yearly est. 60d+ ago
Information Security Manager
Atlas Systems 3.9
Information security analyst job in East Brunswick, NJ
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
**************************************
Position Summary:
We are seeking an experienced InformationSecurity Manager to lead the organization's cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain informationsecurity strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field
7-10+ years of progressive experience in informationsecurity with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified InformationSecurity Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
$110k-140k yearly est. 60d+ ago
Information System Security Officer III
Data Intelligence 4.5
Information security analyst job in Philadelphia, PA
Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization.
**This position is contingent upon award of contract**
Key Responsibilities:
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of information systems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Required Skills/Experience:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field.
A minimum of 6 years of relevant experience in cybersecurity or information systems security.
Prior experience supporting Navy programs.
Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M.
At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary.
Proficiency in cybersecurity frameworks, risk management processes, and security controls.
Strong analytical and problem-solving skills with attention to detail.
Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team.
Preferred Qualifications:
Experience with DoD security requirements and systems.
Familiarity with NIST, RMF, and other relevant cybersecurity standards.
Ability to work in a potentially remote environment with occasional on-site requirements.
Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment.
About Us:
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
$79k-108k yearly est. 60d+ ago
Information Security Systems Engineer-Ss
McLaughlin Research Corporation 4.0
Information security analyst job in Philadelphia, PA
McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division.
The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments.
Requirements
Key Responsibilities
Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems.
Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series.
Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP.
Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals.
Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements.
Required Qualifications
Education: BS in Computer Science or relevant field.
Experience: 3-10 years in informationsecurity engineering, with specific experience potentially needed for DoD or SAP environments.
Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP.
Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial.
Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance.
Equal Employment Opportunity Statement:
McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws.
EEO is the Law:
Applicants and employees are protected under Federal law from discrimination.
$74k-100k yearly est. 60d+ ago
3014 - Specialist, Information System Security III (SISS3)
Alakai Services and Poe'Hana Group, Inc.
Information security analyst job in Philadelphia, PA
Provide senior-level cybersecurity and information system security support for Navy systems by leading RMF activities, security authorization packages, continuous monitoring, and cybersecurity compliance in support of mission operations.
Key Responsibilities
Lead and support RMF Steps 16 for assigned Navy information systems
Develop and maintain SSPs, SAPs, SARs, POA&Ms, and security artifacts
Coordinate system authorization activities with Authorizing Officials (AOs)
Conduct risk assessments and vulnerability analysis
Support continuous monitoring, audits, and inspections
Advise leadership on cybersecurity risk and mitigation strategies
Qualifications (Citizenship, Education, Experience, Skills)
Citizenship: U.S. Citizenship required
Education: Bachelors degree in Cybersecurity, IT, or related field (or equivalent experience)
Experience: Minimum 8 years cybersecurity / ISS experience; 5+ years RMF support
Skills: RMF; NIST 800-53; risk analysis; technical writing; coordination with government stakeholders
Required Systems, Tools, and Framework Experience
Frameworks: DoD RMF, NIST SP 800-53, 800-37, 800-30
Systems: eMASS, ACAS, HBSS, STIG Viewer
Tools: Nessus, SCAP, vulnerability scanning tools
Security Handling: CUI, controlled system documentation
We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.
$80k-114k yearly est. 3d ago
Information Security Specialist
Ask It Consulting
Information security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The InformationSecurity Specialist (ISS) is responsible for developing and documenting informationsecurity policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement informationsecurity & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document informationsecurity policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
$84k-119k yearly est. 60d+ ago
Information Security Manager
Atlas Systems 3.9
Information security analyst job in East Brunswick, NJ
Job DescriptionSalary:
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
Please click on the link below to apply for this position:
**************************************
Position Summary:
We are seeking an experienced InformationSecurity Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain informationsecurity strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field
710+ years of progressive experience in informationsecurity with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified InformationSecurity Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
$110k-140k yearly est. 2d ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Falls, PA?
The average information security analyst in Falls, PA earns between $69,000 and $133,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Falls, PA
$96,000
What are the biggest employers of Information Security Analysts in Falls, PA?
The biggest employers of Information Security Analysts in Falls, PA are: