Cloud Security Engineer
Information security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cloud Security Engineer
Information security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Information Security Specialist - Cyber Resilience
Information security analyst job in Mount Laurel, NJ
Hours:
40
Pay Details:
$87,000 - $151,000 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
The role involves designing and implementing cyber resilience strategies, leading initiatives to improve organizational preparedness, conducting risk assessments, and collaborating with various teams to align resilience goals with business objectives. Responsibilities also include developing incident response plans, managing continuity strategies, providing expert guidance during incidents, and delivering training programs to foster a culture of resilience.
Depth & Scope:
Participates on complex, comprehensive or large projects and initiatives
Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
7+ years of relevant experience
Expert knowledge of IT security and risk disciplines and practices
Preferred Qualification :
Design, develop, and implement comprehensive cyber resilience strategies.
Lead cross-functional initiatives to enhance organizational preparedness against cyber threats and incidents.
Conduct risk assessments and business impact analyses to identify vulnerabilities.
Collaborate with IT, security teams, and business units to align resilience goals with organizational objectives.
Develop and manage incident response plans, continuity strategies, and recovery protocols.
Provide expert guidance during cybersecurity incidents, ensuring rapid response and recovery.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyInformation Security Analyst
Information security analyst job in Philadelphia, PA
About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations.
Responsibilities:
Configure and maintain firewalls, VPNs, and IDS/IPS systems.
Perform network security monitoring and incident response.
Conduct penetration testing and simulate attacks to identify weaknesses.
Harden routers, switches, and network devices.
Optimize performance without compromising security.
Requirements:
3+ years experience in network engineering/security.
Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls.
Experience with network protocols (TCP/IP, DNS, SSL, VPN).
CCNA Security, CCNP Security, or equivalent certifications.
Required Skills:
Information Security Security
Analyst III - Information Security
Information security analyst job in Conshohocken, PA
Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today!
Job Details
Job Description for IAM Hygiene Analyst III role
This role is responsible for supporting the Execution and Improvement of IAM operations across the enterprise, specifically within the IAM Hygiene space. This role will assist with continuously detecting, remediating, and preventing identity-related risks by maintaining accurate, minimal, and secure identity data, access configurations, and authentication mechanisms, as well as assisting with other IAM Governance related functions where needed. The Analyst II will be responsible to generate possible hygiene actions (hypotheses), using approved Cencora tooling, to proactively identify and escalate potential identity-related control gaps, data integrity issues, process deficiencies, and other hygiene concerns; collaborate with stakeholders to validate gaps, evaluate root causes and drive timely remediation.
This role is key to creating and maintaining a mature IAM Hygiene function to ensure access is controlled, organized, and following the concept of “least privilege”. The ideal candidate will have hands-on experience remediating identity and access related risks.
This role works closely with more senior IAM analysts, engineers, and business stakeholders to ensure secure and efficient access to systems and data. The Analyst II also supports the development of IAM procedures, participates in user support and troubleshooting, and contributes to continuous improvement efforts. They are expected to demonstrate learning agility, attention to detail, and a strong commitment to operational excellence and user experience.
Primary Duties and Responsibilities:
Identify and take appropriate actions around unused or stale accounts.
Identify and take appropriate actions around unused or stale accounts.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Monitor and analyze identity-related activities to identify and remediate risky accounts, authorizations, and configurations, ensuring compliance with policies.
Assist in the development and maintenance of comprehensive processes for identity threat detection and response, including the creation of runbooks and workflows.
Collaborate with cross-functional teams to evaluate and align on identity analytics tools and data structures to enhance IAM capabilities.
Develop and track key performance indicators (KPIs) and key risk indicators (KRIs) for IAM hygiene, providing insights and recommendations to improve identity management practices.
Support the establishment of a culture of continuous improvement by leveraging incident learnings to refine IAM processes and protocols.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Qualifications:
4+ years of experience IAM or related field
1+ years in an IAM Hygiene or IAM Governance role
Bachelors degree or equivalent experience
Skills and Knowledge:
Behavioral:
Strong understanding of IAM concepts, practices, and technologies including Least Privilege, Privileged Access Management (PAM), Identity Lifecycle management and access controls
Familiarity with SailPoint
Familiarity with Axonius (preferred)
Familiarity with NIST framework
Strong analytical and problem-solving skills, with the ability to interpret data and make informed decisions.
Ability to operate independently and within a team structure
Effective communication and collaboration skills
Strong time management, with ability to multi-task and shift from task to task effectively in a fast-paced environment.
Technical Skills:
IAM Lifecycle and Access provisioning
Authentication Support (MFA and SSO)
IAM Policy and Standards (NIST, ISO 27001, HITRUST)
IT Risk and Compliance Awareness
Root Cause Analysis and Incident Support
Reporting and Documentation
Threat Monitoring and Alert Response
Tools Knowledge:
IAM Platforms (e.g., SailPoint, Saviynt, Okta, Ping Identity)
Directory Services (Active Directory, Azure AD)
ITSM Tools (e.g., ServiceNow)
Security Tools (SIEM, EDR, SOAR)
Programming/Scripting (e.g., Python, PowerShell, SQL)
Microsoft Office Suite
What Cencora offers
We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members' ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit **************************************
Full time Equal Employment Opportunity
Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law.
The company's continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory.
Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call ************ or email ****************. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned
Affiliated CompaniesAffiliated Companies: AmerisourceBergen Services Corporation
Auto-ApplyCyber Security Analyst
Information security analyst job in Wilmington, DE
Stefanini Group is hiring!
Exciting opportunity awaits, let us help you get started!
Click Apply now or you may call: **************/ email: Deepak Tyagi (**************************) for faster processing!
Job Description:
The Cyber Monitoring Analyst will be part of the Cyber Operations team that is responsible for monitoring and investigating alerts to identify potential incidents. The individual will be required to work closely with other members of the Cyber Operations team to ensure the successful delivery of the alert monitoring, triage, and escalation. Specifically, the Cyber
Monitoring Associate will have the following key responsibilities:
Perform real-time analysis and correlation of logs/alerts.
Follow detailed operational procedures to appropriately analyze, escalate, and assist in remediation of security events.
Utilize multiple security technologies to investigate and analyses alerts.
Deliver timely and detailed documentation related to any incident including the findings, review, and follow-up activities
Participate in the creation, modification and maintenance of all Cyber Monitoring policies and procedures
Keep abreast of cyber security trends and the emerging threat landscape in general
What the ideal candidate looks like:
1-4 years of experience in IT, IT Security, Security, Technical helpdesk, Security Operations are preferred
Understanding various Cloud technologies such as Azure, AWS, GCP is highly desirable
Also desirable is if they have performed investigation of high severity threats, in on-Prem technologies or in cloud
Strong oral and written communication skills including the ability to interact directly with individuals that do not have an IT background.
Intermediate knowledge of endpoint and network security concepts and tools preferred.
Knowledge of ServiceNow.
Crowdstrike, highly desired.
Experience with event monitoring and security reporting
Ability to exercise sound technical, interpersonal, and organizational judgment while evaluating and solving complex problems.
*Listed salary ranges may vary based on experience, qualifications, and local market. Also, some positions may include bonuses or other incentives*
About Stefanini Group
The Stefanini Group is a global provider of offshore, onshore and near shore outsourcing, IT digital consulting, systems integration, application and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like Americas, Europe, Africa and Asia, and more than 400 clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting, company with global presence. We are CMM Level 5 company.
#LI-DT1
#LI-HYBRID
Easy ApplySecurity Analyst
Information security analyst job in Philadelphia, PA
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Job Details:
Title: Security Specialist
Location: Philadelphia, PA
Duration: 3 month (may extend)
Division: Intellectual Property and Science
Required Skills:
• Active Secret clearance (Public Trust) required.
• Provide security technical advisory and directions to technical and research teams
• Maintain operational security posture for the program to ensure government information security requirements and information systems security policies, standards, and procedures are established and followed.
• Assist with the management of security aspects of the information system and performs day-to-day security operations of the system.
• Evaluate security solutions to ensure they meet security requirements for processing classified information.
• Prepare Standard Operating Procedures that meet the security requirements for the business' clients
• Perform vulnerability/risk assessment analysis to support certification and accreditation.
• Provides configuration management (CM) for information system security software, hardware, and firmware.
• Manage changes to system and assesses the security impact of those changes.
• Experience and familiarity with securing Windows Environments, MS SQL Servers, Web Servers, Encryption, and Access Control.
• Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, etc.
• Experience and/or familiarity with Certification and Accreditation (C&A).
• Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis
• Experience and/or familiarity with NIST Guidelines, FIPS 140-2, FIPS 190 , FedRAMP, Federal Information Security Management Act (FISMA) and other tools using industry best practices.
Additional Information
To know more on this position or to schedule an interview please contact;
Monil Narayan
************
Information System Security Officer (ISSO) III
Information security analyst job in Philadelphia, PA
Full-time Description
Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity, we remain committed to upholding honesty, trust, respect, and ethical standards in all our endeavors. We are a certified SBA 8(a) small, disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offer our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense, make working here more than a job; it's the Digital family.
Digital Consultants seeks an Information System Security Officer (ISSO) III who provides cybersecurity support and oversight for Navy systems in accordance with DoD Risk Management Framework (RMF) and Navy Cybersecurity policies. The ISSO assists the ISSM in ensuring system compliance, maintains RMF package documentation, and supports vulnerability management and cybersecurity reporting in support of NSWCPD Code 104.
Duties to include:
Support the Information System Security Manager (ISSM) in all aspects of system cybersecurity compliance and accreditation.
Develop, review, and maintain RMF accreditation packages, including System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), POA&Ms, and Continuous Monitoring strategies.
Ensure implementation and validation of security controls in accordance with NIST SP 800-53, DoD 8510.01 (RMF), and Navy SCA business rules.
Monitor systems for vulnerabilities, review STIG and SRG scan results, and track remediation in eMASS/VRAM.
Conduct and document security incident response actions and report to the ISSM.
Provide cybersecurity status reporting, technical risk analysis, and compliance metrics to leadership.
Coordinate with system administrators, engineers, and Navy program offices to ensure security requirements are integrated into system lifecycle management.
Requirements
Clearance: Top Secret, US Citizen only
Education: Bachelor's Degree in Computer Science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Certifications: DoD 8570/8140 IAM Level II (CAP, CASP+ce, CISM, CISSP, GSLC, CCISO, HCISPP) OR IAT Level II baseline certification (CCNA-Security, CySA+, GICSP, GSEC, Security+ce, CND, SSCP)
Experience: Minimum 7 years of cybersecurity or A&A experience, with at least 5 years as an ISSO or equivalent security role. Experience must include:
Developing and maintaining RMF lifecycle documentation.
Assessing and validating implementation of security controls.
Conducting risk and vulnerability reviews, documenting results, and supporting system accreditation.
Expert knowledge of DoD RMF, NIST SP 800-53, and Navy cybersecurity compliance processes.
Proficiency in eMASS, ACAS, VRAM, and DISA STIG compliance tools.
Ability to coordinate across engineering, operations, and program management teams to resolve cybersecurity issues.
Ability to work on-site at NSWCPD Philadelphia and travel CONUS as required.
The candidate must, with or without reasonable accommodation, be able to sit, stand, use computers and monitors, and perform duties in an office environment for extended periods. The candidate must be able to lift up to 40 lbs. on occasion (e.g., moving a case of paper or similar task) that may occur occasionally.
Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, veteran status or any other protected characteristic.
We provide reasonable accommodation to individuals who require assistance at any stage of the employment process. If you need assistance navigating Digital Consultants' job openings or applying for a position, please email ************************** or call ************. Please provide your contact information so we can assist you.
Salary Description $130,000 - 170,000
Information Security Specialist - Cyber Resilience
Information security analyst job in Mount Laurel, NJ
Mount Laurel, New Jersey, United States of America **Hours:** 40 **Pay Details:** $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
**Line of Business:**
Technology Solutions
**Job Description:**
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
The role involves designing and implementing cyber resilience strategies, leading initiatives to improve organizational preparedness, conducting risk assessments, and collaborating with various teams to align resilience goals with business objectives. Responsibilities also include developing incident response plans, managing continuity strategies, providing expert guidance during incidents, and delivering training programs to foster a culture of resilience.
**Depth & Scope:**
+ Participates on complex, comprehensive or large projects and initiatives
+ Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
+ Has advanced knowledge of organization, technology controls / security/ risk issues
**Education & Experience:**
+ Bachelor's degree preferred
+ Information security certification / accreditation an asset
+ 7+ years of relevant experience
+ Expert knowledge of IT security and risk disciplines and practices
**Preferred Qualification :**
+ Design, develop, and implement comprehensive cyber resilience strategies.
+ Lead cross-functional initiatives to enhance organizational preparedness against cyber threats and incidents.
+ Conduct risk assessments and business impact analyses to identify vulnerabilities.
+ Collaborate with IT, security teams, and business units to align resilience goals with organizational objectives.
+ Develop and manage incident response plans, continuity strategies, and recovery protocols.
+ Provide expert guidance during cybersecurity incidents, ensuring rapid response and recovery.
**Physical Requirements:**
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
+ Domestic Travel - Occasional
+ International Travel - Never
+ Performing sedentary work - Continuous
+ Performing multiple tasks - Continuous
+ Operating standard office equipment - Continuous
+ Responding quickly to sounds - Occasional
+ Sitting - Continuous
+ Standing - Occasional
+ Walking - Occasional
+ Moving safely in confined spaces - Occasional
+ Lifting/Carrying (under 25 lbs.) - Occasional
+ Lifting/Carrying (over 25 lbs.) - Never
+ Squatting - Occasional
+ Bending - Occasional
+ Kneeling - Never
+ Crawling - Never
+ Climbing - Never
+ Reaching overhead - Never
+ Reaching forward - Occasional
+ Pushing - Never
+ Pulling - Never
+ Twisting - Never
+ Concentrating for long periods of time - Continuous
+ Applying common sense to deal with problems involving standardized situations - Continuous
+ Reading, writing and comprehending instructions - Continuous
+ Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
**Who We Are:**
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
**Our Total Rewards Package**
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more (***************************************
**Additional Information:**
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
**Colleague Development**
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
**Interview Process**
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
**Accommodation**
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at *************** . Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Federal law prohibits job discrimination based on race, color, sex, sexual orientation, gender identity, national origin, religion, age, equal pay, disability and genetic information.
Epic Security & Providers - Analyst
Information security analyst job in Wilmington, DE
Job Details
Applicants must be currently authorized to work in the United States. ChristianaCare will not sponsor applicants for this position for an employment visa now or in the future.
Why ChristianaCare
Do you want to work at one of the Top 100 Hospitals in the nation? We are guided by our values of Love and Excellence and are passionate about delivering health, not just health care. Come join us at ChristianaCare!
ChristianaCare, with Hospitals in Wilmington and Newark, DE, as well as Elkton, MD, is one of the largest health care providers in the Mid-Atlantic Region. Named one of “America's Best Hospitals” by U.S. News & World Report, we have an excess of 1,100 beds between our hospitals and are committed to providing the best patient care in the region. We are proud to that Christiana Hospital, Wilmington Hospital, our Ambulatory Services, and HomeHealth have all received ANCC Magnet Recognition .
ChristianaCare Offers
Medical, Dental, Vision, Life Insurance, etc.
Two retirement planning offerings, including 403(b) with company contributions.
Generous paid time off with annual roll-over and opportunities to cash out.
12-week paid parental leave
Tuition assistance
Incredible Work/Life benefits including annual membership to care.com, access to backup care services for dependents through Care@Work, retirement planning services, financial coaching, fitness and wellness reimbursement, and great discounts through several vendors for hotels, rental cars, theme parks, shows, sporting events, movie tickets and much more!
Why Epic
The electronic health record (EHR) is foundational to the care we provide because it centralizes patient information, enabling informed decision-making and seamless care coordination. The EHR supports our ability to deliver high-quality, equitable, accessible care.
ChristianaCare is excited to transition from Cerner to Epic as the EHR across our sites of care!
This role is a HYBRID position requiring frequent on-site work. Must be within a commutable distance.
Epic certification preferred; if not certified, must become Epic certified within 3 weeks of completing the mandatory Epic training sessions.
Education and Experience Requirements:
Bachelor's degree in Information Technology, Computer Science, Healthcare Administration, or a related field is preferred.
2 - 3 years of experience working with Epic systems or similar EHR platforms preferably in security analysis or a related field.
High School diploma with 5 years of related experience may be considered in lieu of bachelor's degree.
Epic Security Coordinator Certification preferred.
Relevant certifications in healthcare security management are highly desirabl
Principal Duties and Responsibilities:
Provisions application security levels and roles.
Establishes ownership of each particular security class.
Coordinates security template and role updates and establishes a security change control process.
Coordinates security‐related activity across physical ﴾buildings, grounds﴿, infrastructure ﴾network, servers, operating system﴿ and application ﴾Epic or non‐Epic﴿ teams.
Works with application and compliance teams to design system‐level access.
Creates user records and maps them to templates built by application coordinators/analysts.
Creates appropriate shared security classifications which do not have specific application ownership.
Creates and maintains procedures to activate, deactivate, and update user records.
Understands the Epic software security structures, including user profiles, roles, and security classes
Serving as the main point of contact for technical issues and general questions related to assigned applications
Working in collaboration with Epic to implement new projects ﴾such as a new module﴿
Managing upgrades of assigned applications with Epic by setting timelines, maintaining continuous communication, and addressing issues
Analyzing and communicating the impact of issues
Triaging requests and determining the priority of issues
Resolving end‐user application issues using Epic documentation and ensuring business needs are met
Escalating end‐user problems to the appropriate level ﴾such as team lead﴿ when necessary
Validating solutions are complete and appropriately implemented
Building relationships with end users and providing consistent support through day‐to‐day communication
Communicating problem status and solutions to end users
#LI-CD1
Annual Compensation Range $79,497.60 - $127,212.80This pay rate/range represents ChristianaCare's good faith and reasonable estimate of compensation at the time of posting. The actual salary within this range offered to a successful candidate will depend on individual factors including without limitation skills, relevant experience, and qualifications as they relate to specific job requirements.
Christiana Care Health System is an equal opportunity employer, firmly committed to prohibiting discrimination, whose staff is reflective of its community, and considers qualified applicants for open positions without regard to race, color, sex, religion, national origin, sexual orientation, genetic information, gender identity or expression, age, veteran status, disability, pregnancy, citizenship status, or any other characteristic protected under applicable federal, state, or local law.
Post End Date
Jan 10, 2026
EEO Posting Statement
ChristianaCare offers a competitive suite of employee benefits to maximize the wellness of you and your family, including health insurance, paid time off, retirement, an employee assistance program. To learn more about our benefits for eligible positions visit *********************************************************
Auto-ApplyPlatform Engineer - Security
Information security analyst job in Camden, NJ
Since 1869 we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Michael Angelo's, Pace, Pacific Foods, Prego, Rao's Homemade, Swanson, and V8. In our Snacks division, we have brands like Cape Cod, Goldfish, Kettle Brand, Lance, Late July, Pepperidge Farm, Snack Factory, and Snyder's of Hanover. Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us. Why Campbell's… Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners). Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting. Campbell's offers unlimited sick time along with paid time off and holiday pay. If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store. Giving back to the communities where our employees work and live is very important to Campbell's. Our "Campbell's Cares" program matches employee donations and/or volunteer activity up to $1,500 annually. Campbell's has a variety of Employee Resource Groups (ERGs) to support employees.
Who we are looking for…
The Campbell's Company is looking for an senior-level Engineer - Information Security to join our critical and highly visible Information Security team. This position will primarily be responsible for managing the lifecycle and effectiveness of key security tools and processes. You will work closely with the Architecture and Risk Management teams to ensure that security controls are in place and appropriately managing risk throughout the Information Technology, Operational Technology, and Cloud environments.
What you will do…
Essential responsibilities will include but not be limited to:
* Design, deploy, and integrate security tools and processes
* Design, deploy, integrate Privilege Access Management (PAM) services for Linux and Windows environments
* Experience in developing, testing, and deploying ZeroTrust security strategies focused on identity, device, and network contexts
* Cloud (Azure / AWS) security engineering
* Develop and implement automation strategies tied to both administrative maintenance of the environment, as well as contribute to the overall detection engineering efficiency
* Active Directory security hardening
Job Complexity
* Manage multiple, concurrent project and task assignments, placing proper priorities on tasks and attention to detail to follow through all assignments to completion
* Create and manage the lifecycle of documentation to support the architecture and operations of security systems
* Continuously improve operational playbooks and knowledge transfer material to enable operational support teams to handle increasingly complex tasks to enable Engineering time is focused on the most valuable work
* Serve as an incident escalation point
* Provide thought leadership and communications expertise in the development of policies, standards, procedures, and other communication for the department
* Provide thought leadership on key performance indicators for measuring success objectively
* Integrate existing and new tools and supporting resources into our security intelligence platform, with the goal of deriving actionable data
* Keep current with the latest news and events surrounding cyber threats and security
* Evaluate new technologies and processes that enhance security capabilities
What you bring to the table… (Must Have)
* Bachelor's degree in a computer science or information technology discipline
* 5+ years of relevant work experience, including:
* 2 years of experience as an Information Security Analyst with experience within at least two of the following disciplines: networking, system hardening, identity and access management, or privileged access management
* 1 year of experience in system or firewall administration
* Deep understanding of Linux identity engineering and administration
* 2 years of experience working with privileged access management platforms across Windows, Linux, network device, and containerized platforms
* Significant experience working with automation scripting leveraging at least 3 of the following: python, PowerShell, API based integrations, and no/low-code workflow automation platforms.
* Strong knowledge of L4-L7 protocols such as SSL, HTTP, DNS, SMTP, and IPsec
* Deep understanding of TCP/IP, computer networking, routing, and switching, and encryption technologies and standards
* Knowledge of identity and access management principles (SSO, MFA, ModernAuth)
It would be great if you have… (Nice to Have)
* CISSP certification is a plus
* Cloud security experience is a plus
* Conceptual understanding of the Cyber Kill Chain and MITRE ATT&CK framework
* Experience with Manufacturing environments is a plus
* Experience with leveraging LLM's or statistical analysis to drive operational insights
* Strong capacity to understand vectors and the risks associated with them
* Experience with deploying and managing distributed architecture layer 7 firewalls
* Experience with IDS/IPS, penetration and vulnerability testing
* Strong security policy knowledge and experience
* Strong ability to clearly communicate and document complex concepts
* Data protection tools and processes - Data Loss Prevention [DLP], Rights Management Services [RMS], Cloud Access Security Broker [CASB]
More about the job…
* This position reports to the Senior Manager for Security Architecture and Engineering
Compensation and Benefits: The target base salary range for this full-time, salaried position is between
$131,400-$188,900
Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package.
The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
Auto-ApplySenior Manager, Information Security Office Consultant
Information security analyst job in Philadelphia, PA
Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Security Architect Engineer
Information security analyst job in Malvern, PA
At Customers Bank, we believe in working hard, working smart, working together to deliver memorable customer experiences and having fun. Our vision, mission, and values guide us along our path to achieve excellence. Passion, attitude, creativity, integrity, alignment, and execution are cornerstones of our behaviors. They define who we are as an organization and as individuals. Everyone is encouraged to have personal development plans. By doing so, our team members are on their way to achieve their highest potential and be successful in their personal and professional lives.
This role is ONSITE in our Malvern, PA office Monday through Thursday with Friday remote.
Must be eligible to work in the U.S. without requiring sponsorship now or in the future.
Who is Customers Bank?
Founded in 2009, Customers Bank is a super-community bank with over $22 billion in assets. We believe in dedicated personal service for the businesses, professionals, individuals, and families we work with.
We get you further, faster.
Focused on you: We provide every customer with a single point of contact. A dedicated team member who's committed to meeting your needs today and tomorrow.
On the leading edge: We're innovating with the latest tools and technology so we can react to market conditions quicker and help you get ahead.
Proven reliability: We always ground our innovation in our deep experience and strong financial foundation, so we're a partner you can trust.
What you'll do:
* Cloud Security Architecture: Design, implement, and maintain secure architectures for cloud platforms (Azure, AWS, or others), ensuring alignment with security policies and regulatory requirements.
* Security Tools Configuration: Configure, maintain, and optimize security tools including CNAPP, CASB, SIEM, endpoint detection, vulnerability scanners, and cloud-native security controls.
* Defender & CASB Oversight: Manage and tune Microsoft Defender and Defender for Cloud Apps (CASB) to detect, prevent, and remediate threats across cloud environments, SaaS platforms, and endpoints.
* Security Baseline Compliance: Review and ensure that environments and resources consistently follow security baselines and frameworks such as CIS, NIST, and FFIEC.
* Secure Design & Guidance: Partner with infrastructure, DevOps, and application teams to provide security requirements and guidance for cloud projects and deployments.
* Documentation & Reporting: Maintain architecture diagrams, configuration documentation, and compliance reporting to support audits and regulatory exams.
* Incident Response Support: Provide expertise in responding to cloud-related security incidents and collaborate on remediation efforts.
* Continuous Improvement: Evaluate emerging cloud security tools and best practices to enhance protection and operational efficiency.
* API platform monitoring: Assist architecture team implement API monitoring platform. This includes API inventory and related data monitoring
* Perform monitoring: Provide metrics (KPIs and KRIs) supporting appropriate security monitoring and underlying processes.
What do you need?
* Must-Haves
* 5+ years' experience in security engineering, architecture, or operations, with at least 2 years in cloud security.
* Strong knowledge of cloud platforms (Azure, AWS, or GCP), including native security tools and services.
* Experience reviewing and managing network security configurations.
* Hands-on experience with configuring and maintaining security tools (SIEM, EDR, vulnerability management, IAM, cloud security posture management).
* Solid understanding of networking protocols, routing, and hybrid cloud connectivity.
* Bachelor's degree in Information Security, Computer Science, or related field, or equivalent work experience.
Key Skills
* Strong troubleshooting and analytical skills.
* Ability to balance security needs with business requirements.
* Excellent communication skills, with the ability to translate technical findings into clear, actionable recommendations.
* Proficiency in Microsoft Office applications for reporting and documentation.
* Nice-to-Haves
* Cloud security certifications such as AZ-500 (Azure Security Engineer), AWS Security Specialty, CCSP, or CISSP.
* Experience with Splunk, CrowdStrike, Tenable, Active Directory, and cloud-native logging/monitoring tools.
* Knowledge of DevSecOps practices and integrating security into CI/CD pipelines.
* Banking or financial services industry experience.
Customers Bank is an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
We also provide "reasonable accommodations", upon request, to qualified individuals with disabilities, in accordance with the Americans with Disabilities Act and applicable state and local laws.
Diversity Statement:
At Customers Bank, we believe in working smart, working together, and having fun while delivering innovative solutions and memorable experiences for our customers. We are committed to the continual advancement of a culture which reflects the value we place on diversity, equity, and inclusion. We honor the diverse experiences, perspectives, and identities of our team members, and we recognize that it is their passion, creativity, and integrity that drives our success. Step into your future with us! Let's take on tomorrow.
Auto-ApplyCyber Security
Information security analyst job in Philadelphia, PA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Security Analyst
Information security analyst job in Moorestown, NJ
Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs
Position : Security Analyst (SIEM)
Location: Moorestown, NJ
Duration: Full Time
Job Description :
Overall experience of 8+ years in the field of information security with 2+years of experience in handling Security Analytics/SIEM tools such as Arcsight, Loglogic, Splunk etc.
Working knowledge of
SQL and Oracle databases, Windows operating systems and Cisco and Juniper network solutions
Windows and UNIX administration experience
Perl or Python scripting knowledge
Familiar with Regular Expressions. Can create regular expressions to search for evidence of malicious activity
Able to interpret log files from various network devices to include firewall, proxy, endpoints and web servers
Ability to work independently and within a team environment
Demonstrated ability to stay current with information security best practices, existing and emerging technology
Good oral communications and written communication skills
Certifications such as CEH, ECSA, CISSP, GISP etc. are preferred
Thanks & Regards
Rahul Kumar
Additional Information
Contact
"Rahul Kumar
" for more details at
************ Ext :157
Information Systems Security Officer (ISSO)
Information security analyst job in Philadelphia, PA
ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:
* Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades.
* Maintain responsibility for managing cybersecurity risk from an organizational perspective.
* Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.
* Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.
* Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).
* Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
* Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.
* Provide subject matter expertise for cyber security and trusted system technology.
* Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.
* Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes.
* Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.
* Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:
* Bachelor's Degree.
* A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.
* eMASS experience.
* Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.
* Strong desktop publishing skills using Microsoft Word and Excel.
* Experience with industry writing styles such as grammar, sentence form, and structure.
* Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:
* CISSP, CASP, or a similar certificate is preferred.
* Master's Degree in Cybersecurity or related field.
* Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.
* Demonstrated ability to work well independently and as a part of a team.
* Excellent work ethic and a high commitment to quality.
Our Commitment:
Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.
Health, Dental, and Vision
Life Insurance
401k
Flexible Spending Account (Health, Dependent Care, and Commuter)
Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!
Explore additional job opportunities with CGS on our Job Board:
*************************************
For more information about CGS please visit: ************************** or contact:
Email: [email protected]
#CJ
$92,213.33 - $125,146.66 a year
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
SOC Cloud Security Analyst
Information security analyst job in Wilmington, DE
Job DescriptionAt ALLERE, we take pride in creating the perfect match for our candidates. We work diligently to build strong relationships with top companies nationwide, ensuring we always have exciting opportunities available for the right individuals. If you're passionate about emerging technologies and eager to contribute to a forward-thinking organization, we'd love to connect with you!Job Title: SOC Cloud Security AnalystLocation: Hybrid - Wilmington, DEOverviewIn this role, you will assist in the execution, monitoring, and documentation of SOC 1 controls across our cloud environments, ensuring compliance with regulatory requirements, client expectations, and industry security standards. The ideal candidate will have hands-on experience with cloud platforms, security frameworks, audit methodologies, and continuous control monitoring. Key Responsibilities
SOC 1 Compliance & Controls
Support the readiness, testing, and ongoing maintenance of SOC 1 Type I and Type II control activities.
Ensure cloud-based systems adhere to internal control requirements, including change management, logical access, incident response, and system operations.
Assist with preparing evidence, documentation, and reporting for internal and external auditors.
Cloud Security Monitoring & Analysis
Monitor cloud infrastructure security across platforms such as AWS, Azure, or Google Cloud.
Analyze security alerts, investigate potential threats, and escalate incidents as needed.
Validate that cloud controls are operating effectively and consistently.
Documentation & Reporting
Maintain accurate and up-to-date control documentation, policies, and procedures.
Assist in preparing SOC 1 audit deliverables and ensuring timely submission.
Develop dashboards and metrics to communicate control health and compliance performance.
Qualifications
2-6 years of experience in cloud security
Intermediate knowledge of at least one major Cloud technology such as Azure, AWS, GCP
Understanding of IaaS security concepts and technologies with intermediate knowledge in at least one major CSP is preferred
Also desirable is if they have performed investigation of high severity threats in cloud
ALLERE is a proud woman-owned business (WBENC certified) and an active supporter of numerous philanthropic, volunteer, and fundraising initiatives. We provide direct hire, contract-to-hire, and statement-of-work placements, along with access to employer-sponsored healthcare benefits and a 401(k)-retirement plan.ALLERE is committed to equal employment opportunity for all employees and applicants. We prohibit discrimination or harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetic information, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected under federal, state, or local laws.
IT Application Analyst
Information security analyst job in Philadelphia, PA
Join our IT Business Applications team as a functional and technical Subject Matter Expert (SME) for Business Application Solutions. This role includes supporting and optimizing IFS ERP, Salesforce, Agile PLM, and other non-ERP applications, as well as their associated Reporting and Analytics tools. You will play a key role in driving operational excellence and contributing to the enhancement of our business systems.
Primary Duties & Responsibilities
Service Delivery and Operations
Provide timely support and service in accordance with department standards. Frequently communicate to users as to current status of problems/issues. Update documentation following resolution of problems.
Communicate with external vendors as necessary to coordinate resolution of open support issues.
Adheres to department standards/Procedures/Policies and complies with legal and regulatory requirements
System Requirements Analysis
Develops a thorough knowledge of manufacturing system requirements and business processes
Participates and provides assistance in the planning, designing, development, and deployment of new applications and enhancements to existing applications
Utilize input from other leaders and key users to improve existing technology, capabilities and software. Keeps abreast of new technology
Participates in the design and implementation of business process change
Project Management
Develop and manage project plans to effectively implement information technology solutions, indicating significant milestones
Determine resource needs to complete project
Meet project schedules/milestones. Complete project deliverables according to department standards
Effectively communicate project expectations with team members and project stakeholders. Proactively identify, communicate and resolve project issues
Education & Experience
B.S. Information Science or related field
Minimum of 2 years of experience supporting ERP, CRM, or business analytics tools (manufacturing environment preferred).
Experience implementing or supporting Data warehousing and Business Intelligence/Analytics solutions preferred
Skills
Knowledge of manufacturing processes and financial reporting especially in an Aerospace and project environment preferred.
Knowledge of key BI and analytics concepts and technologies.
Knowledgeable in relational database technology, application programming, including the ability to write and analyze programs using SQL, scripting languages, and Power Queries.
Demonstrated experience in the support and/or implementation of business application software packages.
Excellent customer service skills including telephone techniques, listening skills, sense of urgency and enthusiasm.
Excellent verbal and written communication skills; ability to communicate effectively with end-users and management.
Demonstrated problem-solving and work prioritization skills.
Balances business and technical issues in decision making.
Able to identify and assess alternatives, make decisions and communicate the process and logic
Must be both team-oriented and self-motivated.
Experience with operating systems, relational databases, reporting tools including MS Windows, Oracle, Crystal or other reporting/Business Analytics tools is essential
Working Conditions
Job operates in a professional office environment
Routinely uses standard office equipment such as computers, phones, photocopiers, filing cabinets and fax machines
Work in a cubicle area - must be able to work in environment where employees are on the phone / speaking causing potential distractions throughout the day.
Work in a private office
Noise level - Usually moderate
Physical Requirements
Standing. Particularly for sustained periods of time. 50 - 75% of the time.
Walking. Moving about on foot to accomplish tasks, particularly for long distances or moving from one work site to another.
Walk. Occasionally move about inside the office to access file cabinets, office machinery, etc.
Talking. Expressing or exchanging ideas by means of the spoken word. Those activities in which they must convey detailed or important spoken instructions to other employees accurately, loudly, or quickly.
Hearing. Perceiving the nature of sounds at normal speaking levels with or without correction. Ability to receive detailed information through oral communication, and to make the discriminations in sound.
Reaching. Extending hand(s) and arm(s) in any direction.
Use hands/fingers to type/handle. Operating a computer and other office productivity machinery, such as a calculator, copy machine, and computer printer.
Grasping. Applying pressure to an object with the fingers and palm.
Stooping. Bending body downward and forward by bending spine at the waist. This factor is important if it occurs to a considerable degree and requires full motion of the lower extremities and back muscles.
Kneeling. Bending legs at knee to come to a rest on knee or knees.
Crouching. Bending the body downward and forward by bending leg and spine.
Lifting. Raising objects from a lower to a higher position or moving objects horizontally from position-to-position. This factor is important if it occurs to a considerable degree and requires substantial use of upper extremities and back muscles.
Sedentary Work. Sedentary work involves sitting most of the time. Jobs are sedentary if walking and standing are required only occasionally and all other sedentary criteria are met.
Visual acuity. Specific vision abilities required by this job include close vision and ability to adjust focus.
Safety Requirements
All employees are required to follow the site EHS procedures and Coherent Corp. Corporate EHS standards.
Quality and Environmental Responsibilities
Depending on location, this position may be responsible for the execution and maintenance of the ISO 9000, 9001, 14001 and/or other applicable standards that may apply to the relevant roles and responsibilities within the Quality Management System and Environmental Management System.
Culture Commitment
Ensure adherence to company's values (ICARE) in all aspects of your position at Coherent Corp.:
Integrity - Create an Environment of Trust
Collaboration - Innovate Through the Sharing of Ideas
Accountability - Own the Process and the Outcome
Respect - Recognize the Value in Everyone
Enthusiasm - Find a Sense of Purpose in Work
Coherent Corp. is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
To conform to U.S. Government export regulations (ITAR), applicant must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8. U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the U.S. Department of State."
Auto-ApplyInformation System Security Officer (ISSO III) - US Navy
Information security analyst job in Philadelphia, PA
Requirements
Education:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or other STEM discipline.
Experience:
Minimum 6 years of experience coordinating and enacting security changes within an organization.
Experience with vulnerability and threat analysis, compliance enforcement, and incident response.
Familiarity with DoD and Navy cybersecurity practices and reporting requirements.
Skills & Knowledge:
Proficiency in identifying, analyzing, and mitigating cybersecurity threats.
Strong understanding of Risk Management Framework (RMF), system accreditation processes, and DoD cybersecurity directives.
Excellent communication and reporting skills with the ability to provide clear, actionable recommendations.
Certifications:
Must hold a baseline certification as outlined in the Cybersecurity Workforce (CSWF) requirements (e.g., Security+ CE, CISSP, CISM, or equivalent).
Security Clearance Requirements
Active Secret clearance
Salary Description 85,000 - 150,000
Information System Security Officer (Contingent)
Information security analyst job in Philadelphia, PA
Information System Security Officer (ISSO) Rothe Development, Inc. (RDI) is seeking a skilled Information System Security Officer (ISSO) to support the cybersecurity posture of Navy information systems. The ISSO will play a critical role in ensuring systems are secure, compliant, and resilient against cyber threats in accordance with DoD and Navy cybersecurity policies. Contingent upon contract award to Rothe, this position will be based on-site in Philadelphia, Pennsylvania, and requires an active Secret security clearance. Key Responsibilities:
Implement and manage security controls for Navy information systems in compliance with DoD directives and RMF (Risk Management Framework).
Conduct system security risk assessments and vulnerability analyses.
Develop and maintain system security plans (SSPs), POA&Ms, and other required documentation.
Monitor system security status and support continuous monitoring activities.
Coordinate with system owners, administrators, and other stakeholders to ensure security requirements are met.
Support incident response efforts and investigations as needed.
Ensure compliance with NIST, DoD, and Navy cybersecurity standards and policies.
Qualifications:
U.S. Citizenship and active Secret clearance required.
Bachelor's degree in Cybersecurity, Information Technology, or related field (or equivalent experience).
Minimum of 3-5 years of experience in information system security, preferably within DoD environments.
Strong knowledge of RMF, NIST SP 800-53, and DoD cybersecurity policies.
Experience with eMASS, ACAS, and other DoD cybersecurity tools is preferred.
Security+ CE or equivalent DoD 8570 IAT Level II certification required.
Work Environment:
This is an on-site position located in Philadelphia, PA. Remote work is not available. Rothe is an EEO/AA/Disability/Vets Employer and complies with E-Verify Rothe shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities, and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sexual orientation, gender identity, national origin, disability or veteran status. To apply complete online submission at **************************