Information security analyst jobs in Hawaii - 87 jobs
Senior Security Engineer - Public Sector, Honolulu Onsite
Google Inc. 4.8
Information security analyst job in Urban Honolulu, HI
A leading technology company is seeking a Senior Security Engineer for the Google Public Sector team in Honolulu, Hawaii. This role requires strong expertise in security assessments and engineering, along with 5 years of relevant experience. The engineer will implement security monitoring and incident response plans while collaborating closely with various teams. A Bachelor's degree and active Security Clearance are mandatory, as well as the ability to conduct client-facing work five days a week. Competitive salary up to $244,000 plus benefits.
#J-18808-Ljbffr
$244k yearly 5d ago
Looking for a job?
Let Zippia find it for you.
Information Systems Programming Professional II
Hsfcu Online
Information security analyst job in Urban Honolulu, HI
Posted Tuesday, September 2, 2025 at 4:00 PM
Hawaii State FCU is looking for hardworking individuals who want a great work-life balance, and a great work environment.
-Voted Hawaii's Best Places to Work 2024
-Voted Hawaii's Best - Best Financial Credit Union 2024 (Star Advertiser)
Are you ready to join a dynamic team that values collaboration, growth, and making a positive impact in our community? Look no further than Hawaii State Federal Credit Union (HSFCU)! We're more than just a financial institution; we're a family that believes in being “Always Right By You.”
Overview
Hawaii State Federal Credit Union is committed to enriching lives by building strong relationships within the community. As an employee, you will be part of a team that values trust, encouragement, and the holistic experience of working together.
Hawaii State Federal Credit Union (HSFCU) offers a dynamic and supportive work environment where employees can thrive both personally and professionally.
Position Summary
Responsible for the development, testing, and maintenance of programs within the credit union's in-house supported systems such as Data Warehouse, Document Management, Data Analytics and Robotics Process Automation. Responsibilities include assisting the IT Solutions Department Manager and Data Administrator with simple to moderately complex data dictionary and database maintenance functions as well as simple to moderately complex requirements gathering for the development of extracts, reports, scripts, ingestion processes and dashboards. This is a key position to ensure that the credit union has accurate and consistent data in their repositories and in their extracts and reports. This position will also be responsible for scoping, implementing and maintaining individual-level technical solutions with minimal guidance, as well as to manage simple to moderately complex corporate and departmental projects and assist with vendor management.
Qualifications/Experience
At least 3 years of experience in administrating, supporting, and maintaining enterprise platforms.
At least 1 year of enterprise IT project management experience.
Intermediate knowledge of Microsoft SQL, Oracle, or other database software.
Intermediate knowledge of SDLC processes and best practices for managing software releases.
Strong oral and written communication skills.
Intermediate proficiency in using Microsoft Office suite products (Word, Excel, PowerPoint, Outlook). Able to perform intermediate tasks such as creating complex documents, using advanced spreadsheet functions, and designing professional presentations.
Ability to apply intermediate logical or scientific thinking to define problems, collect data, establish facts, and draw conclusions.
Ability to interpret intermediate technical instructions and deal with multiple variables.
Ability to compute intermediate mathematical functions such as discount, interest, profit and loss, commission markup and selling price, ratio and proportion, and percentage.
Ability to work under pressure and meet deadlines.
High degree of adaptability.
Solid organizational abilities and attention to detail.
Salary Range
Competitive Compensation: HSFCU offers competitive pay, merit increases, and incentives.
Health Coverage: Comprehensive medical and dental coverage, with 100% paid single coverage for full-time employees.
Paid Time Off: Enjoy 13 paid annual holidays and up to 29 PTO days.
Retirement Savings: Contribute to a 401(k) plan with up to 10% employer contributions.
Transportation Subsidy: On-site parking at a small cost, up to $100 parking subsidy, or 100% bus pass reimbursement.
Health & Wellness: Access to wellness fairs, flu shot clinics, and on-site fitness centers.
Additional Benefits: Flexible spending plans, credit union discounts, life, accident, and disability insurance.
Growth Opportunities: HSFCU invests in employee development through in-person and online training programs, workshops, career development assistance, and tuition assistance. Employees are encouraged to further their education and unlock new opportunities.
Work Environment: HSFCU's modern headquarters prioritize a balance between wellness and productivity, offering a variety of amenities. The culture is inclusive, with a focus on teamwork and community, often described as an 'ohana' or family atmosphere.
Employee Testimonials: Employees appreciate the supportive environment where everyone's voice is heard and valued. The credit union has been recognized as one of Hawaii's best places to work for over 12 years.
#J-18808-Ljbffr
$89k-117k yearly est. 3d ago
Cyber Security Engineer - Senior
Steelgate LLC
Information security analyst job in Urban Honolulu, HI
# Cyber Security Engineer - Senior# Cyber Security Engineer - SeniorLocationFt. Shafter, Hawaii### DescriptionThe Cyber Security Engineer - Senior is responsible for supporting the Risk Management Framework Body of Evidence (BoE) creation, design, development, and implementation of all activities related to the 9th Mission Support Command's (9th MSC) information technology enterprise systems. The senior engineer ensures protection of information systems from unauthorized access and to protect the data within systems. The senior engineer will support the 9th MSC's Cyber Security/CND program through active implementation of DoD, Cyber Security and Theater Cyber Security Program directives and policies. The senior engineer is responsible for implementation of a patch management and vulnerability mitigation program to ensure compliance with current Information Assurance Vulnerability Alert (IAVA) directives. The senior engineer should be familiar with a diverse range of cybersecurity areas and knowledgeable in InformationSecurity technology and processes. The senior engineer is a critical part of the team, in that this member ensures the design and implementation of the Information Technology are in alignment to real-world cybersecurity operations. This position guarantees techniques and technology used throughout the environment are in alignment with current and future cyber capabilities.Roles and Responsibilities:· Managing, maintaining, and securinginformation systems· System security measures· Requirements analysis· Performing gap analyses· Supporting system architecture design and development· Developing system, data flow, network, security, and operational diagrams· Writing, preparing, evaluating and supporting documentation development· Provide relevant expertise on Army PM-DCO cybersecurity efforts in support of the ArmyRequired Skills:· Current and Valid DOD 8140 IAM Level III Certification with required CISSP, CISM, GSLC, or CCISO certification number on resume· 10+ Years of Experience in Cybersecurity Management Roles required to meet IAM Level III· Education: BA/BS 12+ years or MA/MS 10+ years· Secret Clearance, Top Secret Eligible· Experience as a Certificate Authority (manage security credentials, private/public keys, etc.), IASO, IANO, IANM, etc.· Completed RMF/eMASS training courses· Extensive working knowledge with NIST, RMF Assessment and Authorization (A&A), eMASS, and Enterprise Systems Accreditation requirements/processes/controls/artifacts.· Extensive working knowledge of IAVA compliance (Retina), STIG enforcement and auditing (DISA Gold Disk), and other IA tools (ACAS, Log Collector, ESS, etc.)· Extensive participation/experience in a successful Cybersecurity Operational Readiness Assessment (CORA)· Able to work on-site at Fort Shafter Flats, Hawaii· Lead Cybersecurity Policy, Plans, and Execution with minimal guidance Preferred Skills:· Customer service mindset with excellent oral and written communication skills· Demonstrable experience with security software and devices· Ability to multitask and rapidly shuffle priorities· Extensive knowledge of USCYBERCOM and U.S. Army Cyber Command policy, plans, and directives· Familiar with Networking fundamentals (VLANs, firewalls, routing)· Understanding of technology used for virtualized environments, container platforms, and cloud capabilities, ie: Kubernetes, OpenStack, and VMware ESXiBenefits: • 401(k) • 401(k) matching • Dental insurance • Health insurance • Paid time off • Vision insurance Schedule: • 8 hour shift • Monday to Friday • On call STEELGATE LLC is a Service-Disabled, Veteran-Owned Small Business (SDVOSB) that prides itself in hiring top-level Subject Matter Experts (SME's) proven to exceed deliverable expectations. STEELGATE LLC is focused on solving the hard problems facing our government and commercial clients. Our success lies in blending together relevant domain/functional knowledge with deep expertise in Information Technology, Cybersecurity, Defensive Cyber Operations, cloud-based DevSecOps, Data Analytics & AI, Acquisition and Acquisition Management, and more. STEELGATE LLC has a positive, inclusive workplace environment where all team members and partners work towards mutual success. We have established a reliable reach-back program whereas all SMEs are available to support, advise and directly complete mission deliverables when necessary. STEELGATE LLC has a worldwide reputation as a valued and trustworthy partner. Our can-do attitude and willingness to support any mission requirement sets us apart from other small business organizations. Find out more about STEELGATE LLC @ *********************** are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other characteristic protected by law.
#J-18808-Ljbffr
$73k-95k yearly est. 1d ago
Cyber Security Analyst 3
Amentum
Information security analyst job in Waimea, HI
Amentum is seeking a Cyber SecurityAnalyst 3 for a position on Kauai, HI. Supporting the Cyber/IT Department. The Cyber SecurityAnalyst 3 is responsible for the creation, consultation, and ongoing assessment and authorization (A&A) documentation in compliance with DoD Cybersecurity policies and guidelines including DoDI 8500.01, NIST 800-53 and the Risk Management Framework (RMF) accreditation process for all PMRF Range Operations and Range Systems Information Systems (IS) and Platform Information Technology (PIT). Additionally, Cyber SecurityAnalyst will evaluate information assurance compliance and coordinate program security documentation for various PMRF systems.
Responsibilities
Specific assignments and responsibilities include but are not limited to the following areas:
Oversee the execution of the DoDI 8510.01 Risk Management Framework (RMF) for PMRF Information Systems and assist in implementing the DoD Assessment and Authorization (A&A) procedure.
Perform all ISSO duties and responsibilities in DODI 8500.01, DODI 8510.01, and U.S. Navy Policy.
Assist with handling of security events/incidents, as they are escalated, including triage, remediation, documentation, and escalation to management and government customers, as well as after-action reviews.
Oversee the working group meetings including, but not limited to Cyber Security Working Group Meetings and other contractual required meetings.
Accurately perform security tasks required by the 32 CFR Part 117 National Industrial Security Operating Manual (NISPOM), National Institute for Standards and Technology (NIST) Special Publication 800-37, DoD 8500.1 DoD Information Assurance Certification and Accreditation Process, DOD Instruction 8510.01 Risk Management Framework for DoD Systems
Provide periodic self-assessments to Government System Managers (GSM) and regular feedback on routine and non-routine data-calls.
Provide employee mentorship, team building and training on cyber security concepts, standards, guidance, and policies.
Other duties and responsibilities as assigned.
Additional Responsibilities
Lifting, Pushing/Pulling 1-10 lbs
Work positions requirements: walking, standing, crawling, kneeling, cramped, sitting and work requiring repeated stooping or frequent climbing.
Customer contact, extended workday, confined work area, and office laboratory
Minimum Qualifications
Bachelor's degree in computer science or related discipline w/ 8 years of cybersecurity experience, or AS w/10 years' experience
Five years of RMF experience; equivalent years of experience may be substituted in lieu of education.
Certifications
DoD 8570/8140: IAM I
Security Clearance
Must be able to obtain and maintain a Secret US Government Clearance. Note: US Citizenship is required to obtain and maintain a Secret Clearance. Applicants selected either must currently possess a Secret clearance or will be subject to a US Government Security Investigation and must meet eligibility requirements to obtain clearance prior to commencement of employment and maintain a security clearance for access to classified information or Closed/Restricted Areas throughout duration of employment.
EXEMPT POSITIONS
Compensation & Benefits
HIRING SALARY RANGE: $118K - $128K (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant internal equity, and alignment with market data.)
This position includes a competitive benefits package. For more detailed information on our Benefits and what it is like to work for Amentum: Please visit our careers site: ***********************
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.
$118k-128k yearly Auto-Apply 60d+ ago
Cyber Intrusion Analyst
AMS Technologies 4.3
Information security analyst job in Hawaii
AMS Technologies is a leader in providing technological solutions tailored to meet the ever-changing needs of our customers. We pride ourselves on delivering scalable, customer-focused, and cost-effective solutions that drive success in complex environments.
Summary
As a Cybersecurity Analyst at AMS Technologies, you will play a crucial role in safeguarding our clients' information systems. This position is vital for ensuring the security and integrity of our technological solutions, allowing us to maintain our commitment to excellence and customer satisfaction.
PRIMARY RESPONSIBILITIES:
Detect, analyze, and respond to computer network incidents by identifying anomalous activities that may pose threats to the enterprise.
Monitor security tools and applications for suspicious activity, investigate alerts, and recommend appropriate mitigation strategies.
Analyze subtle (“low and slow”) events to uncover unauthorized actions using problem-solving and self-learning techniques.
Conduct near real-time event triage and analysis, leading to network traffic validations or incident reporting to Mission Partners.
Follow established policies and utilize DoD-approved network monitoring and traffic analysis tools to identify suspicious or malicious traffic around the clock.
Review and analyze logs promptly to detect intrusions and formally notify Mission Partners of findings through incident reports.
Develop, apply, and fine-tune countermeasures to prevent or reduce cyber event impacts.
Perform detailed network traffic analysis using raw packet data, net flow, IDS/IPS, and custom sensor outputs to protect communication networks.
Maintain a thorough understanding of attack signatures, tactics, techniques, and procedures used by advanced threats.
Document all events and analyses clearly in a ticketing system, requiring strong technical writing skills.
Communicate effectively with customers and team members, with regular face-to-face interactions and ongoing coordination.
BASIC QUALIFICATIONS:
Active DoD Top Secret clearance required.
Bachelor's Degree plus 4+ years of relevant experience; relevant cyber courses, certifications, or DISA customer experience may substitute for the degree.
Current DoD 8570 IAT Level II Certification (e.g., Security+ CE) or higher at start.
Current DoD 8570 CSSP Analyst Certification (e.g., CEH, CySA+), or ability to obtain within 180 days of start.
Experience performing Computer Network Defense (CND) duties, including Protect, Defend, Respond, and Sustain.
Experience working with DoD and government leadership at multiple levels.
Strong knowledge of computing systems and networking, including protocols and security elements like IDS/IPS and firewalls.
Experience analyzing packet captures.
PREFERRED QUALIFICATIONS:
Proficiency in command-line scripting (PERL, Python, Shell) for automating analysis tasks.
Understanding of hacker tactics, techniques, and procedures (TTP).
Familiarity with security frameworks such as MITRE ATT&CK and Cyber Kill Chain.
Experience monitoring intrusion detection systems and defense tools (e.g., Splunk, Elastic) and analyzing associated alerts.
Knowledge of advanced threat actor tactics and software exploits.
Ability to analyze packed and obfuscated code.
If you are passionate about cybersecurity and eager to make a difference in a dynamic environment, we invite you to apply today and join our team at AMS Technologies!
Talent @ AMS
AMS Technologies
Please contact us with any questions:
Email:
******************************
$80k-99k yearly est. Easy Apply 60d+ ago
CAC/PKI Local Registration Authority (LRA) Information Security Specialist - Intermediate
Qbe 4.3
Information security analyst job in Hawaii
Full-time Description
As a CAC/PKI Local Registration Authority (LRA) InformationSecurity Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.
Requirements
Highlights of Responsibilities:
Provide 24/7 On-Call and Emergency Response.
Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR.
Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites.
Provide support for annual and semi-annual DoD Compliance Audits.
Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS.
Develop and maintain On-the-Job Training packages.
Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability.
Verify Subscriber's identity.
Pre-register users with PKI.
Validate NPE certificate requirements and forward revocation requests.
Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon.
Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered.
Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS.
Complete General Officer / Senior Executive Service requests within 12 hours of receipt.
Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours.
Complete request for key recoveries within 48 hours.
Complete new ASCL and NSS SIPRNET token request within 72 hours.
Submit a monthly RA Activity Report.
Submit a monthly Token Report of all tokens on hand to include returned and bad tokens.
Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time.
Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office.
Qualifications
Minimum Requirements:
Secret Security Clearance with a completed Tier 5 (T5) background investigation
Bachelor's degree
3+ years of experience
Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services.
Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties.
Have never been denied or had a security clearance revoked.
Have never been convicted of a felony offense.
Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials.
Preferred Qualifications:
DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification
ITIL v4 Foundations certification
Physical Requirements:
Sitting for long periods
Standing for long periods
Ambulate throughout an office
Ambulate between several buildings
Stoop, kneel, crouch, or crawl as required
Travel by land or air transportation 10% or less
QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
$80k-102k yearly est. 60d+ ago
Information System Security Officer
SOSi
Information security analyst job in Hawaii
Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide.
Job Description
Join the Cyber Team in Paradise 🌴
SOSi
is looking for a seasoned
Information Systems Security Officer (ISSO)
ready to lead the charge in securing mission-critical IT operations at
Joint Base Pearl Harbor Hickam, Honolulu
. As part of a dynamic team supporting over 5,000 users across the Pacific theater, you'll be at the forefront of solving complex technical challenges that drive real-time Command and Control (C2) strategies.
This isn't just a job - it's a mission. You'll own the full
Risk Management Framework (RMF)
lifecycle, from identifying vulnerabilities to engineering resilient security controls. If you're fluent in DoD protocols, thrive in high-stakes environments, and can deliver executive-level insights with clarity and precision, this is your opportunity to make a strategic impact where it matters most.
Essential Job Duties:
Assist the ISSM (Information System Security Manager) in formulating and upholding an organized information system security program and policies that are applicable to their assigned area of responsibility.
Establish and maintain secure computer systems and networks for classified processing, and take responsibility for the administration, maintenance, and security auditing of such systems.
Develop and supervise the implementation of guidelines and policies for operational information systems security.
Manage assigned eMASS (Enterprise Mission Assurance Support Service) packages containing all security authorizations for information systems under their supervision.
Coordinate inspections, tests, and reviews of information system security.
As a key member of the team, you will be responsible for contributing your expertise and skills to help ensure the team's success in responding to security incidents and protecting organizational assets.
Practical understanding of the Assured Compliance Assessment Solution (ACAS) to support the execution of the information system patch and vulnerability management program.
Thorough understanding of Security Technical Implementation Guidelines (STIG) and ensure they are reviewed, maintained, and updated on a quarterly basis.
Ensure compliance with Configuration Management policies and procedures for authorizing the use of hardware and software on an information system.
Engage with external stakeholders to facilitate the coordination of interconnection requests and ensure that such requests are processed and approved in an efficient manner.
Maintain current knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Manage, maintain, and execute the informationsecurity continuous monitoring plan.
Keep records of all security-related vulnerabilities POA&Ms and ensure that serious or unresolved violations are reported to the AO/DAO.
Evaluate any changes to the system, its environment, and operational requirements that could impact security authorization.
Qualifications
Minimum Requirements:
An Active in-scope SECRET clearance.
Bachelor's degree in a related field plus 4 years of related experience.
DoD 8570 IAT-II compliant (Security+ CE, CCNA, CND, CySA+, GICSP, GSEC, or SSCP).
Knowledge of NSA's Commercial Solution for Classified (CSfC) solution and Cross Domain Solutions (CDS).
Thorough understanding of NIST Publication 800-53r5, Risk Management Framework, Executive Order 14028, and OMB Mandate M-22-09.
Prior experience with eMASS.
Strong communication skills and ability to coordinate tasks across functional groups.
Preferred Qualifications:
An Active in-scope TOP SECRET clearance with SCI Eligibility.
Recent experience in the assessment and authorization of systems.
Practical knowledge of JIRA and Confluence.
Experience with compliance tools such as Tenable Nessus and SCAP.
Experience in program policy and process creation and oversight.
Additional Information
Work Environment:
Working conditions are normal for an office environment.
Fast paced, deadline-oriented environment.
May require periods of non-traditional working hours including consecutive nights or weekends.
Target Salary Range: $110,556 to $136,257.
Working at SOSi:
All interested individuals will receive consideration and will not be discriminated against for any reason.
$110.6k-136.3k yearly 3d ago
Information Assurance Analyst
Cymertek
Information security analyst job in Urban Honolulu, HI
Information Assurance AnalystLOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a detail-oriented and proactive Information Assurance Analyst to join our team and safeguard critical information systems. In this role, you will play a key part in identifying, assessing, and mitigating security risks to ensure compliance with organizational policies and industry standards. Collaborating with technical teams, you will implement best practices, monitor systems for vulnerabilities, and provide solutions to enhance security. If you are passionate about protecting sensitive data and thrive in a dynamic, fast-paced environment, we encourage you to apply!
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, SecurityAnalyst, InformationSecurity Specialist, Risk Management Analyst, Compliance Analyst, IT SecurityAnalyst, Security Operations Analyst, Network SecurityAnalyst, Vulnerability Analyst, Data Protection Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Information Assurance, Computer Science, Information Technology, Systems Engineering, Network Security, Information Systems, Data Science, Risk Management, Software Engineering, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Identify and mitigate security risks
Conduct system vulnerability assessments
Monitor compliance with security policies
Implement security best practices
Document security incidents and resolutions
Collaborate with IT and security teams
REQUIRED SKILLS
Knowledge of security frameworks
Risk assessment and analysis
Incident response techniques
Proficiency in security tools
Understanding of access control
Strong analytical thinking
DESIRED SKILLS
Familiarity with SIEM platforms
Experience with penetration testing
Knowledge of cloud security
Understanding of compliance standards (e.g., NIST, ISO)
Familiarity with encryption protocols
Proficiency in security automation tools
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
$64k-81k yearly est. Easy Apply 60d+ ago
Sr. Cyber Security Analyst - Top Secret Clearance (SCI Eligible)
JFL Consulting
Information security analyst job in Pearl City, HI
Full-time Description
With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients. Our cybersecurity operators are experts at assessing and defending mission-critical data and the networks that facilitate their operation. We are focused on delivering advanced products and industry best practices that meet each customer's unique requirements. Visit *********************
Job Description
JFL Consulting, LLC is seeking a Senior Cyber Security Operator to support critical cybersecurity operations within highly secure environments. This role offers the opportunity to work on advanced network defense strategies, with a unique focus on passive vulnerability analysis: a specialized and low-impact method of identifying risks without active scanning. You'll play a key role in detecting anomalies, analyzing complex systems, and strengthening network security for high-value missions. This position is ideal for professionals who enjoy deep technical work, problem-solving, and contributing to meaningful national security efforts within a collaborative, mission-driven team.
Job Title: Senior Cyber Security Operator
Place of Performance: Pearl Harbor HI, 96701
Mandatory Requirements: Top Secret Clearance (SCI Eligible)
Experience Level: Senior-Level (8+ years in cybersecurity, 3+ years in passive vulnerability analysis)
Responsibilities:
Ensure the safe and proper functional operation of the toolkit and its components.
Collect and document measures of performance per approved CONOPS.
Analyze and document behaviors, characteristics, and attributes of a network's baseline activity within steady-state operations.
Analyze and investigate potential anomalies or outliers from established baseline.
Analyze and identify misconfigurations, faults, and vulnerabilities within the network's architecture, subcomponents, and utilized communication protocols.
Determine root source of anomalies and extent of vulnerable findings for validation with system users and administrators.
Document and report anomalies to appropriate channels for further investigation and notification.
Document vulnerable findings and provide recommendations through appropriate channels that increase both security and operational capacity of the respective network.
Recommend improvements to current operations for potential incorporation into the overall program.
Collaborate with cross-functional teams to support incident response, system hardening, and policy development as needed.
Additional duties as assigned
5-10% Conus Travel
Requirements
Education:
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field preferred. Equivalent work experience may be considered in lieu of a degree.
A master's degree is a plus.
Certifications:
Must hold an IAT Level II certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., Security+ CE, CySA+, CCNA Security, GSEC).
Must hold a CSSP Analyst certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., CEH, CySA+, GCIA, GCIH).
Preferred: Advanced certifications such as CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), or similar.
Experience:
Minimum 8 years in cybersecurity operations or analysis
Minimum 3 years of experience with passive vulnerability detection techniques
Experience supporting DoD or Intelligence Community networks
Technical Skills:
Practical experience with firewalls, network TAPs, IDS/IPS, endpoint protection, and other network defense technologies
Adept in evaluating network protocols utilizing network analyzers, such as Wireshark, Tshark, and tcpdump
Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations.
Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity
Proficient in triaging Suricata alerts, tuning rules, and creating custom detections.
Knowledge:
In-depth understanding of network vulnerabilities and misconfigurations
Strong knowledge of cybersecurity principles, adversary techniques, and detection/response strategies
Experience working within the framework of a CONOPS or similar operational document
Awareness of DoD cybersecurity frameworks (e.g., RMF, CMMC, NIST 800-53) and their application in secure system design and monitoring.
Knowledge of common enterprise network architectures and defense mechanisms
Experienced in analyzing TCP/IP, DNS, HTTP/S, SSL/TLS, SMB, and RDP protocols to identify vulnerabilities, misconfigurations, and indicators of malicious activity.
Soft Skills:
Strong analytical and investigative mindset
Excellent documentation and reporting skills
Effective communicator with ability to explain technical issues to both technical and non-technical audiences
Comfortable working independently and as part of a cross-functional team
Competitive Benefits Package Includes:
100% employer-paid medical, dental, and vision for employees and dependents
401(k) with 3% company contribution and immediate vesting
Generous PTO policy (15 vacation, 5 sick, 2 personal days)
Reimbursement for job-related certifications, generous training budget and company provided access to training platforms.
JFL Consulting, LLC is an Equal Opportunity Employer.
We do not discriminate against any applicant for employment on any legally recognized basis including, but not limited to: race, religion or creed, color, national origin, sex, age, disability, marital status, sexual orientation, genetic information, veteran status, status with regard to public assistance or any other protected class under federal, state or local statute. It is also the policy of JFL Consulting, LLC to provide reasonable accommodations for qualified individuals with disabilities.
$73k-93k yearly est. 34d ago
Information Systems Security Officer (ISSO)
Valiant Integrated Services
Information security analyst job in Schofield Barracks, HI
Valiant Integrated Services is seeking an experienced, highly skilled Information System SecurityAnalyst to act as Information Systems Security Officer (ISSO) to join our professional team protecting mission training services for a Mission Training Complex (MTC) on Schofield Barracks, HI.
Duties and Responsibilities
Develop and maintain an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
Provide support to the System Owner and the ISSM for maintaining the appropriate operational IA posture for a system, program, or enclave.
Provide support to the customer on all matters involving the security of their information systems.
Assist with the management of all security aspects of the information system and as assigned performs day-to-day security operations of the system.
Assist in the development of the system security policy and ensures compliance with that policy on a routine basis.
Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization.
Provide configuration management for security-relevant information system software, hardware, and firmware, controlling changes to the system and assessing the security impact of those changes.
Identify and mitigate security business and system risks.
Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M.
Maintain a repository for all organizational or system-level cybersecurity-related documentation such as DIACAP/RMF processes within eMASS or other automated process.
Maintain Defense Information Technology Portfolio Registry (DITPR) for client systems and software.
Ensure implementation of Information System (IS) security measures and procedures, including reporting incidents to the Command Information System Security Manger (ISSM) and appropriate reporting chains as well as coordinating system-level responses to unauthorized disclosures in accordance with DoDM 5200.01 Vol 3 for classified information or DoDM 5200.01 Vol 4 for CUI, respectively.
Implement and enforce all DoD IS and Platform Information Technology (PIT) system cybersecurity policies and procedures, as defined by cybersecurity-related documentation.
Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems.
In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered.
Establish a process for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO.
Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals.
Ensures proper Configuration Management procedures are followed. Prior to implementation and contingent upon necessary approval with the ISSM.
Initiates requests for temporary and permanent exception, deviations, or waivers to IA requirements such as Plan of Action and Milestones (POA&Ms).
Ensures IA and IA-enabled software, hardware and firmware comply with appropriate security configuration guides.
Provide status updates of assigned duties to the appropriate agency heads as defined in their respective Service Level Agreement (SLA).
Respond to all applicable data calls, CTO's, FRAGO's, IAVA's ,etc within the requested timeframe.
Attend all Cybersecurity Workforce Meetings when requested.
Required Education and Experiences
A bachelor's degree plus 3 years of recent specialized experience OR an associate's degree plus 7 years of recent specialized experience OR a major certification plus 7 years of recent specialized experience OR 11 years of recent specialized experience.
Required to have active U.S. Top Secret/SCI security clearance with the ability to pass a CI/Polygraph exam.
Baseline DoDI 8570 IA Certifications are required -
a current CompTIA Security+ or greater certification.
A higher level certification, such as GSLC, CAP, CASP, CISM, CISSP, is also appropriate.
Desired Skills and Qualifications
A working knowledge of RMF and the security authorization processes and procedures.
Knowledge of NIST Special Publications and their counterparts, especially SP800-37, SP800-53, ICD 503, and CNSS 1253. Ability to communicate clearly and present information to the customer in a format they can understand.
Experience in several of the following areas: knowledge of current security tools, hardware and software security implementation; different communication protocols; and encryption techniques/tools.
Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
Must be able to prioritize tasks, deliver solutions on time and be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints.
Have strong analysis, oral and written communication, and change management skills with ability to plan, organize, prioritize, track, manage, and learn new skills.
It is preferred that a candidate have at least one year of experience under the DoD Information Assurance Certification and Accreditation Process (DIACAP) and/or Risk Management Framework (RMF) accreditation process and has a familiarity with Enterprise Mission Assurance Support Service (eMASS).
Technical familiarity with Windows 7 Enterprise/Windows 10 Professional, Windows Server 2012, and Red Hat Linux.
Experience with providing IA or IT support to a US Army client desirable, but not required.
Proficiency with using the Internet and with Microsoft Office products including e-mail, Word, Excel, Access and Project is required.
Completion of required certifications required within six (6) months of hire date.
*****************************************
$74k-95k yearly est. Auto-Apply 60d+ ago
Information System Security Officer (ISSO)
Raft Company Website
Information security analyst job in Urban Honolulu, HI
Job Description
This is a U.S. based position. All of the programs we support require U.S. citizenship to be eligible for employment. All work must be conducted within the continental U.S.
Who we are:
Raft (********************* is a customer-obsessed non-traditional small business with a purposeful focus on Distributed Data Systems, Platforms at Scale, and Complex Application Development, with headquarters in McLean, VA. Our range of clients includes innovative federal and public agencies leveraging design thinking, cutting-edge tech stack, and cloud-native ecosystem. We build digital solutions that impact the lives of millions of Americans.
About the role:
As an Information System Security Officer (ISSO), you will expertly manage the security aspects of our cutting-edge platforms and systems designed for our esteemed clients. The ISSO will play an instrumental role in generating and maintaining the necessary artifacts to achieve and sustain Authority to Operate (ATO) while working in close collaboration with our development team. This collaboration ensures the seamless integration of security controls early in the development lifecycle. You will audit and monitor all of the platforms & tooling across the customer environment. This role requires a deep understanding of cybersecurity principles, federal compliance requirements, and a passion for safeguarding national security infrastructure.
What we are looking for:
• Minimum of 4 years' experience in ISSM/O roles
• Proven experience in obtaining and maintaining ATO for classified government cloud systems, adhering to DoD policies such as Risk Management Framework (RMF), NIST 800-53 Rev 4 and 5, NIST 800-37, NIST 800-60 and more
• Skilled in crafting eMASS packages and implementing DISA STIGs
• Proficient in conducting risk assessments, audits, and compliance monitoring within DoD environments
• Demonstrated proficiency in managing and creating Body of Evidence (BOE) artifacts, including POA&Ms, SSPs, RARs, Vulnerability Assessments, Security Assessment Plans, etc.
• Understanding of and experience with SIEM tools such as Splunk, Grafana, or ELK
• Proficient in conducting continuous monitoring activities such as auditing, configuration reviews, policy & procedure reviews, etc.
• Demonstrated experience managing compliance activities for both on-prem & cloud-based (AWS) systems & networks
• Track record of leading programs/projects in attaining ATO
• Experience conducting internal self-assessments and audits with external assessors
• In-depth understanding of Network Rules, Platforms, and Application development
• Familiarity with cloud-native, scalable services
• Experience with common cybersecurity tools and technologies such as vulnerability & compliance scanners, anti-malware, code analyzers, IDS/IPS, DLP, SBOM, etc.
• Experience building and maintaining Standard Operating Procedures
• Obtain Security+ or other DoD 8570 IAT Level II or higher certification within 6 months of employment with Raft
Highly preferred:
• Bachelor's degree in Cybersecurity, Information Assurance, Information Technology, or a related field.
• CISSP, CISM, CISA, CGRC, or other DoD 8570 IAM Level 2 or higher certifications
• Experience in a K8s DevSecOps environment, preferably with Platform One
• Experience with FIPS (Federal Information Processing Standards)
• Experience with writing/reviewing RMF control policies
• Experience with Executive leadership (PMO office)
• Knowledge of Cloud platforms and migrations
• Previous experience as a Solution Architect
• Engineering background
• Experience in a software factory setting
Clearance Requirements:
Active Secret with the ability to obtain and maintain a Top Secret security clearance
Work Type:
The selected candidate will be onsite in Honolulu, HI, Hanscom AFB, MA, Tampa, FL or in the National Capitol region
May require up to 35% travel to both CONUS and OCONUS locations (Must possess a valid, active US passport with at least six months validity beyond intended period of employment to facilitate international travel and meet security requirements for government contracts.)
Salary Range:
$180,000 - $220,000
The determination of compensation is predicated upon a candidate's comprehensive experience, demonstrated skill, and proven abilities
What we will offer you:
Highly competitive salary
Fully covered healthcare, dental, and vision coverage
401(k) and company match
Take as you need PTO + 11 paid holidays
Education & training benefits
Generous Referral Bonuses
And More!
Our Vision Statement:
We bridge the gap between humans and data through radical transparency and our obsession with the mission.
Our Customer Obsession:
We will approach every deliverable like it's a product. We will adopt a customer-obsessed mentality. As we grow, and our footprint becomes larger, teams and employees will treat each other not only as teammates but customers. We must live the customer-obsessed mindset, always. This will help us scale and it will translate to the interactions that our Rafters have with their clients and other product teams that they integrate with. Our culture will enable our success and set us apart from other companies.
How do we get there?
Public-sector modernization is critical for us to live in a better world. We, at Raft, want to innovate and solve complex problems. And, if we are successful, our generation and the ones that follow us will live in a delightful, efficient, and accessible world where out-of-box thinking, and collaboration is a norm.
Raft's core philosophy is Ubuntu: I Am, Because We are. We support our
"nadi"
by elevating the other Rafters. We work as a hyper collaborative team where each team member brings a unique perspective, adding value that did not exist before. People make Raft special. We celebrate each other and our cognitive and cultural diversity. We are devoted to our practice of innovation and collaboration.
We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
$74k-95k yearly est. 31d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Urban Honolulu, HI
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, InformationSecurity and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, InformationSecurity, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Senior Security Engineer, Google Public Sector
Google Inc. 4.8
Information security analyst job in Urban Honolulu, HI
Apply
Must be a US Citizen to meet customer and compliance requirements, including potential access to classified information. This position requires onsite client-facing work 5 days a week in Honolulu, Hawaii.
Bachelor's degree in Computer Science, IT, or related field or equivalent practical experience.
5 years of experience with security assessments, security design reviews, or threat modeling.
5 years of experience with security engineering, computer and network security, and security protocols.
Experience delivering comprehensive security solutioning through design, coding, configuration, and deployment.
Must possess an active Top Secret/SCI Security Clearance.
Must currently have or be able to obtain advanced DoD 8140 DCWF certification.
Preferred qualifications
Certifications in CISSP, CISM, GCIH, GCIA, or OSCP.
Experience in a regulated industry (e.g., finance, healthcare, government).
Experience securing cloud environments (Cloud Computing Platform, Google Cloud Platform).
Understanding of cloud security principles and best practices.
About the job
Security is at the core of Google's design and development process: it is built into the DNA of our products. The same is true of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't come at the expense of customer service - you will be our bodyguard (and our long lost pal).
The GPS Cyber Defense and Security Operations Group leads our Security Operations (SECOPs) function for a range of GPS platforms and services. Combining Mandiant's deep security experience with Google technologies, our team sets the standard in Security Engineering, Assessment, and Operations across Government Cloud programs.
Google Public Sector brings the magic of Google to the mission of government and education with solutions purpose-built for enterprises. We focus on helping United States public sector institutions accelerate their digital transformations, and we continue to make significant investments and grow our team to meet the complex needs of local, state and federal government and educational institutions.
The US base salary range for this full-time position is $166,000-$244,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
Implement security monitoring strategies, incident response plans, and security awareness programs.
Oversee the deployment and operation of securityinformation and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS) and other security tools.
Leverage cyber threat intelligence to conduct ongoing network hunt activities and identify active and dormant threats within the environment.
Develop and implement custom-built AI-driven security detections and workflows.
Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See also Google's EEO Policy, Know your rights: workplace discrimination is illegal, Belonging at Google, and How we hire.
Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting.
To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes.
#J-18808-Ljbffr
$123k-155k yearly est. 5d ago
Cyber Security Analyst 3
Amentum
Information security analyst job in Waimea, HI
Amentum is seeking a **Cyber SecurityAnalyst 3** for a position on **Kauai, HI** . Supporting the Cyber/IT Department. The Cyber SecurityAnalyst 3 is responsible for the creation, consultation, and ongoing assessment and authorization (A&A) documentation in compliance with DoD Cybersecurity policies and guidelines including DoDI 8500.01, NIST 800-53 and the Risk Management Framework (RMF) accreditation process for all PMRF Range Operations and Range Systems Information Systems (IS) and Platform Information Technology (PIT). Additionally, Cyber SecurityAnalyst will evaluate information assurance compliance and coordinate program security documentation for various PMRF systems.
**Responsibilities**
Specific assignments and responsibilities include but are not limited to the following areas:
+ Oversee the execution of the DoDI 8510.01 Risk Management Framework (RMF) for PMRF Information Systems and assist in implementing the DoD Assessment and Authorization (A&A) procedure.
+ Perform all ISSO duties and responsibilities in DODI 8500.01, DODI 8510.01, and U.S. Navy Policy.
+ Assist with handling of security events/incidents, as they are escalated, including triage, remediation, documentation, and escalation to management and government customers, as well as after-action reviews.
+ Oversee the working group meetings including, but not limited to Cyber Security Working Group Meetings and other contractual required meetings.
+ Accurately perform security tasks required by the 32 CFR Part 117 National Industrial Security Operating Manual (NISPOM), National Institute for Standards and Technology (NIST) Special Publication 800-37, DoD 8500.1 DoD Information Assurance Certification and Accreditation Process, DOD Instruction 8510.01 Risk Management Framework for DoD Systems
+ Provide periodic self-assessments to Government System Managers (GSM) and regular feedback on routine and non-routine data-calls.
+ Provide employee mentorship, team building and training on cyber security concepts, standards, guidance, and policies.
+ Other duties and responsibilities as assigned.
**Additional Responsibilities**
+ Lifting, Pushing/Pulling 1-10 lbs
+ Work positions requirements: walking, standing, crawling, kneeling, cramped, sitting and work requiring repeated stooping or frequent climbing.
+ Customer contact, extended workday, confined work area, and office laboratory
**Minimum Qualifications**
+ Bachelor's degree in computer science or related discipline w/ 8 years of cybersecurity experience, or AS w/10 years' experience
+ Five years of RMF experience; equivalent years of experience may be substituted in lieu of education.
**Certifications**
+ DoD 8570/8140: IAM I
**Security Clearance**
Must be able to obtain and maintain a Secret US Government Clearance. Note: US Citizenship is required to obtain and maintain a Secret Clearance. Applicants selected either must currently possess a Secret clearance or will be subject to a US Government Security Investigation and must meet eligibility requirements to obtain clearance prior to commencement of employment and maintain a security clearance for access to classified information or Closed/Restricted Areas throughout duration of employment.
**EXEMPT POSITIONS**
Compensation & Benefits
HIRING SALARY RANGE: $118K - $128K (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant internal equity, and alignment with market data.)
This position includes a competitive benefits package. For more detailed information on our Benefits and what it is like to work for Amentum: Please visit our careers site: ********************** .
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters (********************************* SkbztPuAwwxfs) .
$118k-128k yearly 60d+ ago
CAC/PKI Local Registration Authority (LRA) Information Security Specialist - Senior
Qbe 4.3
Information security analyst job in Hawaii
As a CAC/PKI Local Registration Authority (LRA) InformationSecurity Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a member of the CAC/PKI Registration Authority (LRA) operations team, you will provide token issuance, sustainment, maintenance, and revocation to the Army customer.
Requirements
Highlights of Responsibilities:
Provide 24/7 On-Call and Emergency Response
Respond to emergency calls and arrive at the designated work site within two (2) hours after receiving the emergency call from the COR
Provide leadership, supervision, and mentorship to the RA/LRA team, ensuring all responsibilities are executed in compliance with DoD PKI CPS and RPS requirements
Provide RA support to the LRA personnel in creation of NIPRNET and SIPRNET PKI tokens
Provide RA interface with the Trusted Agent (TA) for token request and distribution
Maintain an asset inventory list of all PKI daily operations equipment by location at all RA/LRA sites
Provide support for annual and semi-annual DoD Compliance Audits
Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS
Develop and maintain On-the-Job Training packages
Support test events of the global management PKI system software and token versions to assess backwards compatibility and interoperability
Verify Subscriber's identity
Pre-register users with PKI
Validate NPE certificate requirements and forward revocation requests
Support issuance and renewal of SIPRNET tokens and/or NIPRNET Alternate Smart Card Logon
Support production of and delivery of an Issuance Report detailing number of tokens issued, revoked, renewed, and any issues encountered
Conduct duties as assigned through NSS/PKI RPS and DoD/PKI RA/LRA CPS
Complete General Officer / Senior Executive Service requests within 12 hours of receipt
Complete request for PIN reset, unlock code, revocation and re-issuance of a failed token CRI within 24 hours
Complete request for key recoveries within 48 hours
Complete new ASCL and NSS SIPRNET token request within 72 hours
Submit a monthly RA Activity Report
Submit a monthly Token Report of all tokens on hand to include returned and bad tokens
Provide the weekly RA Backlog Report of any activities that fall outside the response timelines identified in the sections titled Response Time
Prepare a monthly NSA Failed Token Report for HQDA to submit to NSA Program Manager Office
Minimum Requirements:
Secret Security Clearance with a completed Tier 5 (T5) background investigation
Bachelor's degree
5+ years of experience
Advanced operational expertise in Smart Tokens, PKI, Certificate Revocation, CAC Pin Reset, PKE, biometrics, logical and physical access, tactical PKI, and directory services
Have never been previously relieved of trusted role duties for reasons of negligence or nonperformance of duties
Have never been denied or had a security clearance revoked
Have never been convicted of a felony offense
Must complete RA/LRA training provided by DISA prior to receiving RA or LRA credentials.
Preferred Qualifications:
DoD Cyber Workforce Framework (DCWF 631) Information Systems Security Developer Intermediate qualified (BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science or CSC or GCLD or CASP+ or CCSP or Cloud+ or GSEC) or equivalent certification
ITIL v4 Foundations certification
Physical Requirements:
Sitting for long periods
Standing for long periods
Ambulate throughout an office
Ambulate between several buildings
Stoop, kneel, crouch, or crawl as required
Travel by land or air transportation 10% or less
QBE is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender, gender-identity and/or expression, age, disability, Veteran status, genetic information, pregnancy (including childbirth, lactation, or other related medical conditions), marital-status, neurodivergence, ethnicity, ancestry, caste, military/uniformed service-member status, or any other characteristic protected by applicable federal, state, local, or international law.
$80k-102k yearly est. 60d+ ago
Information System Security Officer
SOSi
Information security analyst job in Hawaii
Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide.
Job Description
Join the Cyber Team in Paradise
SOSi is looking for a seasoned Information Systems Security Officer (ISSO) ready to lead the charge in securing mission-critical IT operations at Joint Base Pearl Harbor Hickam, Honolulu. As part of a dynamic team supporting over 5,000 users across the Pacific theater, you'll be at the forefront of solving complex technical challenges that drive real-time Command and Control (C2) strategies.
This isn't just a job - it's a mission. You'll own the full Risk Management Framework (RMF) lifecycle, from identifying vulnerabilities to engineering resilient security controls. If you're fluent in DoD protocols, thrive in high-stakes environments, and can deliver executive-level insights with clarity and precision, this is your opportunity to make a strategic impact where it matters most.
Essential Job Duties:
Assist the ISSM (Information System Security Manager) in formulating and upholding an organized information system security program and policies that are applicable to their assigned area of responsibility.
Establish and maintain secure computer systems and networks for classified processing, and take responsibility for the administration, maintenance, and security auditing of such systems.
Develop and supervise the implementation of guidelines and policies for operational information systems security.
Manage assigned eMASS (Enterprise Mission Assurance Support Service) packages containing all security authorizations for information systems under their supervision.
Coordinate inspections, tests, and reviews of information system security.
As a key member of the team, you will be responsible for contributing your expertise and skills to help ensure the team's success in responding to security incidents and protecting organizational assets.
Practical understanding of the Assured Compliance Assessment Solution (ACAS) to support the execution of the information system patch and vulnerability management program.
Thorough understanding of Security Technical Implementation Guidelines (STIG) and ensure they are reviewed, maintained, and updated on a quarterly basis.
Ensure compliance with Configuration Management policies and procedures for authorizing the use of hardware and software on an information system.
Engage with external stakeholders to facilitate the coordination of interconnection requests and ensure that such requests are processed and approved in an efficient manner.
Maintain current knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Manage, maintain, and execute the informationsecurity continuous monitoring plan.
Keep records of all security-related vulnerabilities POA&Ms and ensure that serious or unresolved violations are reported to the AO/DAO.
Evaluate any changes to the system, its environment, and operational requirements that could impact security authorization.
Qualifications
Minimum Requirements:
An Active in-scope SECRET clearance.
Bachelor's degree in a related field plus 4 years of related experience.
DoD 8570 IAT-II compliant (Security+ CE, CCNA, CND, CySA+, GICSP, GSEC, or SSCP).
Knowledge of NSA's Commercial Solution for Classified (CSfC) solution and Cross Domain Solutions (CDS).
Thorough understanding of NIST Publication 800-53r5, Risk Management Framework, Executive Order 14028, and OMB Mandate M-22-09.
Prior experience with eMASS.
Strong communication skills and ability to coordinate tasks across functional groups.
Preferred Qualifications:
An Active in-scope TOP SECRET clearance with SCI Eligibility.
Recent experience in the assessment and authorization of systems.
Practical knowledge of JIRA and Confluence.
Experience with compliance tools such as Tenable Nessus and SCAP.
Experience in program policy and process creation and oversight.
Additional Information
Work Environment:
Working conditions are normal for an office environment.
Fast paced, deadline-oriented environment.
May require periods of non-traditional working hours including consecutive nights or weekends.
Target Salary Range: $110,556 to $136,257.
Working at SOSi:
All interested individuals will receive consideration and will not be discriminated against for any reason.
$110.6k-136.3k yearly 12d ago
Information System Security Officer (ISSO)
Raft Company Website
Information security analyst job in Urban Honolulu, HI
This is a U.S. based position. All of the programs we support require U.S. citizenship to be eligible for employment. All work must be conducted within the continental U.S.
Who we are:
Raft (********************* is a customer-obsessed non-traditional small business with a purposeful focus on Distributed Data Systems, Platforms at Scale, and Complex Application Development, with headquarters in McLean, VA. Our range of clients includes innovative federal and public agencies leveraging design thinking, cutting-edge tech stack, and cloud-native ecosystem. We build digital solutions that impact the lives of millions of Americans.
About the role:
As an Information System Security Officer (ISSO), you will expertly manage the security aspects of our cutting-edge platforms and systems designed for our esteemed clients. The ISSO will play an instrumental role in generating and maintaining the necessary artifacts to achieve and sustain Authority to Operate (ATO) while working in close collaboration with our development team. This collaboration ensures the seamless integration of security controls early in the development lifecycle. You will audit and monitor all of the platforms & tooling across the customer environment. This role requires a deep understanding of cybersecurity principles, federal compliance requirements, and a passion for safeguarding national security infrastructure.
What we are looking for:
• Minimum of 4 years' experience in ISSM/O roles
• Proven experience in obtaining and maintaining ATO for classified government cloud systems, adhering to DoD policies such as Risk Management Framework (RMF), NIST 800-53 Rev 4 and 5, NIST 800-37, NIST 800-60 and more
• Skilled in crafting eMASS packages and implementing DISA STIGs
• Proficient in conducting risk assessments, audits, and compliance monitoring within DoD environments
• Demonstrated proficiency in managing and creating Body of Evidence (BOE) artifacts, including POA&Ms, SSPs, RARs, Vulnerability Assessments, Security Assessment Plans, etc.
• Understanding of and experience with SIEM tools such as Splunk, Grafana, or ELK
• Proficient in conducting continuous monitoring activities such as auditing, configuration reviews, policy & procedure reviews, etc.
• Demonstrated experience managing compliance activities for both on-prem & cloud-based (AWS) systems & networks
• Track record of leading programs/projects in attaining ATO
• Experience conducting internal self-assessments and audits with external assessors
• In-depth understanding of Network Rules, Platforms, and Application development
• Familiarity with cloud-native, scalable services
• Experience with common cybersecurity tools and technologies such as vulnerability & compliance scanners, anti-malware, code analyzers, IDS/IPS, DLP, SBOM, etc.
• Experience building and maintaining Standard Operating Procedures
• Obtain Security+ or other DoD 8570 IAT Level II or higher certification within 6 months of employment with Raft
Highly preferred:
• Bachelor's degree in Cybersecurity, Information Assurance, Information Technology, or a related field.
• CISSP, CISM, CISA, CGRC, or other DoD 8570 IAM Level 2 or higher certifications
• Experience in a K8s DevSecOps environment, preferably with Platform One
• Experience with FIPS (Federal Information Processing Standards)
• Experience with writing/reviewing RMF control policies
• Experience with Executive leadership (PMO office)
• Knowledge of Cloud platforms and migrations
• Previous experience as a Solution Architect
• Engineering background
• Experience in a software factory setting
Clearance Requirements:
Active Secret with the ability to obtain and maintain a Top Secret security clearance
Work Type:
The selected candidate will be onsite in Honolulu, HI, Hanscom AFB, MA, Tampa, FL or in the National Capitol region
May require up to 35% travel to both CONUS and OCONUS locations (Must possess a valid, active US passport with at least six months validity beyond intended period of employment to facilitate international travel and meet security requirements for government contracts.)
Salary Range:
$180,000 - $220,000
The determination of compensation is predicated upon a candidate's comprehensive experience, demonstrated skill, and proven abilities
What we will offer you:
Highly competitive salary
Fully covered healthcare, dental, and vision coverage
401(k) and company match
Take as you need PTO + 11 paid holidays
Education & training benefits
Generous Referral Bonuses
And More!
Our Vision Statement:
We bridge the gap between humans and data through radical transparency and our obsession with the mission.
Our Customer Obsession:
We will approach every deliverable like it's a product. We will adopt a customer-obsessed mentality. As we grow, and our footprint becomes larger, teams and employees will treat each other not only as teammates but customers. We must live the customer-obsessed mindset, always. This will help us scale and it will translate to the interactions that our Rafters have with their clients and other product teams that they integrate with. Our culture will enable our success and set us apart from other companies.
How do we get there?
Public-sector modernization is critical for us to live in a better world. We, at Raft, want to innovate and solve complex problems. And, if we are successful, our generation and the ones that follow us will live in a delightful, efficient, and accessible world where out-of-box thinking, and collaboration is a norm.
Raft's core philosophy is Ubuntu: I Am, Because We are. We support our
“nadi”
by elevating the other Rafters. We work as a hyper collaborative team where each team member brings a unique perspective, adding value that did not exist before. People make Raft special. We celebrate each other and our cognitive and cultural diversity. We are devoted to our practice of innovation and collaboration.
We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
$74k-95k yearly est. Auto-Apply 2d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Urban Honolulu, HI
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including InformationSecurity, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, InformationSecurity, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Network Security Analyst
Cymertek
Information security analyst job in Urban Honolulu, HI
Network SecurityAnalystLOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network SecurityAnalyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, InformationSecurityAnalyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure SecurityAnalyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
$70k-89k yearly est. Easy Apply 60d+ ago
System Security Engineer
Cymertek
Information security analyst job in Urban Honolulu, HI
System Security EngineerLOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a highly motivated and detail-oriented System Security Engineer to design, implement, and maintain security measures that protect our critical systems and data. In this role, you will work closely with cross-functional teams to identify vulnerabilities, develop robust security solutions, and ensure compliance with industry standards and regulations. The ideal candidate has a strong understanding of system architecture, a proactive approach to mitigating risks, and a passion for staying ahead of evolving cyber threats. If you are a problem-solver who thrives in a dynamic environment, we encourage you to apply and help us safeguard our organization's infrastructure.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Engineer, InformationSecurity Engineer, Network Security Engineer, IT Security Engineer, Cloud Security Engineer, Infrastructure Security Engineer, Endpoint Security Engineer, Security Operations Engineer, Security Systems Analyst, Data Security Engineer, Application Security Engineer, Identity and Access Management Engineer, Threat Detection Engineer, Vulnerability Management Engineer, Risk Assessment Engineer, Compliance Security Engineer, Incident Response Engineer, Secure Systems Architect, Security Automation Engineer, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Computer Science, Information Technology, Information Systems, Computer Engineering, Network Engineering, Software Engineering, Systems Engineering, Electrical Engineering, Data Science, Telecommunications, Information Assurance, Security Management, Digital Forensics, Cryptography, Cyber Operations, Applied Mathematics, Artificial Intelligence, Risk Management, Secure Systems Design, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Design and implement secure system architectures
Monitor and respond to system security incidents
Develop and enforce system security policies
Conduct risk assessments and mitigate vulnerabilities
Ensure compliance with security standards and frameworks
Collaborate with teams to integrate security into system development
REQUIRED SKILLS
Proficiency in configuring firewalls and intrusion detection systems
Strong knowledge of operating system security (e.g., Linux, Windows)
Experience with endpoint protection tools
Familiarity with network protocols and security
Ability to perform vulnerability assessments and penetration tests
Expertise in implementing encryption and secure authentication methods
DESIRED SKILLS
Knowledge of cloud security practices (e.g., AWS, Azure)
Familiarity with automation tools for security (e.g., Ansible, Terraform)
Experience with security incident response and forensics
Understanding of DevSecOps principles
Strong communication and technical documentation skills
Ability to train and mentor team members on security best practices
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
$70k-91k yearly est. Easy Apply 60d+ ago
Learn more about information security analyst jobs