Information Security (INFOSEC) Specialist - Pentagon (Active Top Secret with SCI Eligibility)
Information security analyst job in Washington, MA
RiverTech is seeking a skilled Information Security (INFOSEC) Specialist to support the Joint Staff Security Office (JSSO) at the Pentagon in providing comprehensive security services. The ideal candidate will be responsible for ensuring that classified information, SCI, and controlled unclassified information (CUI), under the control of the JS, is protected in accordance with authoritative policies. To join our team of outstanding professionals, apply today!
Responsibilities
+ Ensures classified information, SCI, and controlled unclassified information (CUI), under the control of the Joint Staff is protected in accordance DoDM 5200.01, DoDD 5205.21, and DoDI 5200.48.
+ Develops INFOSEC standard operating procedures (SOPs) and policies for the Joint Staff Security Office (JSSO).
+ Conducts security incident inquiries addressing security incidents involving non-compliance with security procedures for classified information, from initiation to completion.
+ Maintains a tracking system of all security incidents and conducts an analysis of the information compiled to identify areas of concern to address trending security issues.
+ Maintains repository of all Joint Staff security classification guides (SCGs) and reviews SCGs as prescribed by the Information Security Oversight Office (ISOO).
+ Manages the Joint Staff and combatant commands original classification authorities (OCAs) lists.
+ Conducts security classification reviews for Joint Staff products containing classified national security information and provides recommendations to align with policies.
+ Develops, implements, and conducts specialized training programs for security personnel, including annual and refresher training, while tracking completion status.
+ Collaborates with other security disciplines such as Physical Security, Personnel Security, Insider Threat Hub and Foreign Disclosure Office during security incidents, classification reviews and to ensure security measures and training align with organizational goals.
+ Manages and Implements the Joint Staff courier program.
Qualifications
+ Minimum of six (6) years of direct relevant experience.
+ Top Secret Clearance with SCI eligibility.
+ Must possess a working knowledge of the U.S. Government Security Programs and skills in planning, developing, implementing, and evaluating security programs to meet mission requirements for which they support.
+ Excellent written and oral communication and problem-solving skills and the ability to review, analyze, and resolve complex issues.
Desired Qualifications:
+ Working in Department of Defense (DoD).
+ Working in a Sensitive Compartmented Information Facility (SCIF) and on classified networks (SIPRnet and Joint Worldwide Intelligence Communications System (JWICS).
+ Familiarity with Enterprise Task Management Software Solutions (ETMS2) tasking system, Correspondence and Task Management System (CATMS) or other DoD Task Management Tools (TMT) or applications.
+ Sharepoint Management.
+ Utilizing Microsoft Office products (Word, Excel, Powerpoint).
Job ID
2025-20040
Work Type
On-Site
Pay Range
$110,000 - $120,000
Benefits
Regular - The company offers a comprehensive benefits program, including medical, dental, vision, life insurance, 401(k) and a range of other voluntary benefits. Paid Time Off (PTO) is offered to regular full-time and part-time employees.
Company Description
Work Where it Matters
RiverTech, an Akima company, is not just another federal professional solutions contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal projects as we support our shareholder communities in Alaska.
At RiverTech, the work you do every day makes a difference in the lives of our 15,000 Iñupiat shareholders, a group of Alaska natives from one of the most remote and harshest environments in the United States.
For our shareholders, RiverTech provides support and employment opportunities and contributes to the survival of a culture that has thrived above the Arctic Circle for more than 10,000 years.
For our government customers, RiverTech provides innovative solutions to complex engineering and operational challenges and delivers wide-ranging services for mission support, systems engineering, and IT.
As a RiverTech employee, you will be surrounded by a challenging, yet supportive work environment that is committed to innovation and diversity, two of our most important values. You will also have access to our comprehensive benefits and competitive pay in addition to growth opportunities and excellent retirement options.
We are an equal opportunity employer and comply with all applicable federal, state, and local fair employment practices laws. All applicants will receive consideration for employment, without regard to race, color, religion, creed, national origin, gender or gender-identity, age, marital status, sexual orientation, veteran status, disability, pregnancy or parental status, or any other basis prohibited by law. If you are an individual with a disability, or have known limitations related to pregnancy, childbirth, or related medical conditions, and would like to request a reasonable accommodation for any part of the employment process, please contact us at ******************** or ************ (information about job applications status is not available at this contact information).
Information Security Solutions Analyst
Information security analyst job in Enfield, CT
Join a team focused on the success of our customers, the success of our communities, and the success of each other. Farm Credit East (FCE) is the leading provider of loans and farm advisory services to farm, forest product, fishing, and other agricultural business owners across the northeast with $13.5 billion in total loan volume and $29 million in annual financial services revenue from 18,000 customers across our 8-state territory. We are One Team Working Together with a focus on our five pillars: Outstanding Customer and Employee Experience, Quality Growth, Operational Excellence, Commitment to our Communities, and Protecting Customer Information.
As part of our commitment to protecting customer information and enabling operational excellence, the Security Solutions Analyst plays a key role in supporting the secure design, implementation, and documentation of systems and cybersecurity initiatives.
This role serves as a technical liaison between the Information Security team and internal and external stakeholders, including Farm Credit Financial Partners, Inc. (FPI). The analyst represents Information Security in the Architecture Review Board (ARB), evaluates strategic projects for security alignment, and ensures that security requirements are embedded in technical decisions and implementation plans.
The analyst applies Security by Design principles, ensuring that systems and solutions are architected with security as a foundational principle. This includes adherence to internal standards, regulatory requirements, and industry best practices throughout the lifecycle of technology initiatives.
The value drivers for this role are as follows:
Secure Enablement of Initiatives
Data Protection and Governance Support
Alignment with Standards and Risk Appetite
Operational Resilience and Incident Readiness
Cross-Team Collaboration and Technical Alignment
Come join a collaborative, customer-focused team at Farm Credit East!
Duties and Responsibilities
Security Architecture, Standards & Project Evaluations
Represent Information Security in the Architecture Review Board (ARB) for all projects requiring architectural review.
Evaluate strategic and technical initiatives for alignment with security architecture, regulatory requirements and risk posture.
Conduct threat modeling to assess cybersecurity risk related to new projects and technologies.
Apply security by design principles to ensure security is embedded throughout project lifecycles.
Ensure solutions adhere to internal security standards, NIST CSF principles, and applicable regulatory frameworks.
Ensure security standards are defined, are accurate, up-to-date, and aligned with FCE's risk appetite and industry best practices.
Conduct security evaluations of internal and third-party systems, including encryption, patching, APIs, data residency, incident response, and third-party risk indicators.
Review configurations and security controls for AI-enabled systems, including generative, agentic, and embedded AI. Evaluate risks related to model behavior, data usage, integration points, and alignment with internal standards and responsible AI security practices.
Provide security oversight throughout the full lifecycle of systems, from design to deployment to decommissioning.
System Configuration Oversight & Technology Service Provider Collaboration
Provide guidance and maintain oversight for the configuration and security settings of all FCE systems.
Partner with FPI and/or other outside vendors to ensure system configurations, access policies, and integration points meet FCE's security requirements.
Participate in joint planning and review sessions to support shared initiatives and maintain architectural alignment.
Maintain visibility into FPI-managed implementations and ensure security expectations are clearly communicated, documented, and tracked.
Participate in change management process to assess the security impact of system changes, upgrades and new deployments.
Initiative Coordination, Implementation Support & Incident Readiness
Serve as a bridge between business and security to ensure cybersecurity initiatives are implemented effectively, securely and in alignment with organizational goals.
Facilitate secure implementation of systems in alignment with architectural principles and engineering best practices.
Monitor initiative progress and ensure readiness for integration with managed services.
Ensure systems are configurated to support incident detection, logging, and response capabilities.
Assist in tuning and optimizing security tools in collaboration with FPI or other external parties, such as data loss prevention (DLP), endpoint protection, and threat detection platform to improve visibility and reduce false positives.
Lead the implementation of data classification and labeling, including applying classification rules, tagging sensitive data, and testing configurations to ensure accuracy and effectiveness.
Contribute to incident readiness by validating that systems and integrations support timely response and containment of security events.
Documentation, Reporting & Governance
Develop and maintain technical documentation (e.g., workflows, configuration guides, implementation checklists).
Maintain dashboards and reporting tools to track progress and security posture.
Support audits, readiness assessments, and leadership reporting.
Contribute to the development and maintenance of architecture standards and security metrics.
Security by Design Enablement
Facilitate effective communication of security risks and best practices for both technical and non-technical audiences.
Champion Security by Design philosophy for embedding cybersecurity design thinking into organizational processes and enabling technologies.
Contribute to internal education efforts by developing technical guides, reference material, and awareness content to promote security best practices.
Promote a culture of security through collaboration, training, and knowledge sharing across departments.
Translate technical tasks into business impact for non-technical stakeholders to support decision-making
Support awareness and adoption of data classification and labeling frameworks, ensuring users understand how to handle sensitive information appropriately.
Job Qualifications and Requirements:
Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field required. Master's degree or equivalent experience preferred.
Minimum of 3-5 years of experience in cybersecurity, information security, or security engineering roles.
Hands-on experience with security architecture or engineering support, including secure system design, configuration, and implementation.
Experience working with data protection technologies, such as data loss prevention (DLP), data classification and labeling, trainable classifiers, and endpoint protection.
Experience collaborating with managed service providers or external technology partners to implement and maintain secure systems.
Exposure to governance frameworks such as NIST CSF, CIS Controls, or ISO 27001, with an understanding of how to align security standards with organizational risk appetite.
Participation in architecture review boards (ARBs) or similar governance bodies is a strong plus.
Experience supporting change management processes, including security impact assessments for system changes and deployments.
Strong background in technical documentation, process mapping, and reporting to support visibility and compliance.
Security-related certifications such as CISSP, CCSP or equivalent are preferred. Certifications in architecture or engineering support (e.g., ITIL, TOGAF, cloud security) are a plus.
We offer hybrid work options after two weeks of employment with Farm Credit East. Hybrid work options are determined based on job role and balancing the needs of the customers, the team, and individual work performance. This will be reviewed based on manager discretion.
Compensation and Benefits:
Salary Range: $80,000 to $120,000 commensurate with experience
Short-Term Incentive to reward business results
Retirement Contributions :
401k match up to 6% of salary; or for those unable to take full advantage of the 401(k) match, verified student loan payments may qualify for an employer match in your 401(k) up to 6% of salary
Defined Contribution retirement plan funded at 2-9% of salary depending on years of service
Time Off:
15-25 days of vacation leave per year, depending on years of service
12 days of holiday leave per year
7.5 days of sick leave in your first year, followed by 12 days of sick leave per year thereafter; unlimited rollover of unused sick leave year to year
Paid Parental Leave: Up to 80 hours of paid leave for birthing, non-birthing, and adoptive parents
Family Care Leave: Additional leave options available under FMLA and company policy
Health and Insurance:
Comprehensive medical, dental, and vision plans, including preventive care and wellness programs to support your overall health and well-being
Health Savings Account
Life insurance at 2x base pay
Accidental Death and Dismemberment insurance at 2x base pay
Long-term disability insurance at 2/3 base pay
Additional Benefits:
Tuition reimbursement
Continuing education and training
Employee Assistance Program offering a wide variety of tools and resources
Benefits Eligibility:
Eligibility Begins: First of the month following your hire date
Eligible Employees: Full-time employees working 30+ hours per week; Part-Time employees working 20+ hours per week.
Farm Credit East is an Equal Opportunity Employer. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identity or expression, age, marital status, parental status, political affiliation, disability status, protected veteran status, genetic information or any other status protected by federal, state or local law. It is our goal to make employment decisions that further the principle of equal employment opportunity by utilizing objective standards based upon an individual's qualifications for a specific job opening. In compliance with the Americans with Disabilities Act (“ADA”), if you have a disability and would like a reasonable accommodation in order to apply for a position with Farm Credit East, please call ************** or e-mail ************************************
Senior Analyst, Security Compliance (SOX IT)
Information security analyst job in Albany, NY
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Product Security Engineer, Instagram
Information security analyst job in Albany, NY
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
NYS DOT HBITS-07-14507 Expert Security Analyst
Information security analyst job in Albany, NY
Outcomes. Delivered.
Voyatek delivers outcome-driven technology solutions to public sector agencies and higher education institutions nationwide.
For example, our technology:
· Facilitates access to nutritious food for children of mothers participating in the WIC program
· Supports first responders in reducing opioid overdoses within their communities
· Empowers colleges and universities to identify and thwart financial aid fraud
· Equips teachers with valuable insights to identify students requiring additional support
· Enhances efficiency for state tax agencies, leading to 99% faster return processing and quicker refunds for taxpayers
With a focus on Tax & Revenue, Health & Human Services, and Justice & Public Safety, Voyatek combines the scale to support large complex projects with the agility and accessibility of a boutique solutions provider. Together, Voyatek and its customers work to improve population wellbeing, create safer communities, and foster a thriving economy.
We're more than a technology company -- we're an outcomes company.
We encourage our employees to think differently, ask tough questions, and relentlessly pursue what's best for our customers and the residents they serve.
We believe that the value of technology is defined by its human impact. If you agree, you've come to the right place.
Voyatek is seeking applicants to occupy the position of Expert Security Analyst within our team.
Key Responsibilities:
Under the direction of a Senior Information Security Analyst, ITS 4 [SG 25], or Information Security Officer, MITS 1, within the Security Services Team the position will be a member of an ITS Dedicated Security Services Team that provides security services to the NYS Department of Transportation. The incumbent will provide in-depth information security, privacy, and artificial intelligence consulting and services aligned with business needs of the client agency, DOT, to ensure confidentiality, integrity, and availability of information and systems.
The incumbent will work with other ITS teams and upper-level agency management to resolve technically complex and politically sensitive issues under pressure.
The position requires availability during off-shift hours to ensure appropriate response to security incidents or other critical activities that may impact sensitive information, critical systems, NYS agencies, or ITS. Duties include, but are not limited to:
• Implement information security and compliance programs for Information Technology (IT) systems and Operational Technology (OT) systems.
• Conducting written risk assessments (security, privacy, Artificial Intelligence) for existing systems/solutions, new systems/solutions, and services in use or to be used by the business.
• Assist with management and resolution of security risks and/or threats to business information and operational systems.
• Serve as information security analyst and evaluate systems and contracts for alignment with Business and State information security policies and standards as well as other laws, regulations, and industry best practices, as applicable.
• Assist with risk register management and vulnerability management
• Monitor and remain aware of information security industry trends, tools, and techniques.
• Perform additional duties as required.
Qualifications:
· 84+ months: Candidate is able to provide guidance to large teams and/or has extensive industry experience and is considered at the top of his/her field.
Preferred Qualifications:
· 84 months experience evaluating information security, privacy, and compliance for Information Technology systems and/or Operational Technology systems.
· 84 months experience conducting written risk and compliance assessments for security, privacy, and/or Artificial Intelligence using industry standards and frameworks such as NIST, CIS Critical Controls, ISO 27001, etc.
· 60 months experience triaging and determining mitigation plans (with and without Vendor) to resolve security risks and/or threats to business information systems and operational technology systems
· 60 months experience evaluating business systems (Commercial Off the Shelf and Custom Developed) for alignment with Information Technology and/or Operational Technology security policies, standards, laws, regulations, and industry best practices.
· 60 months experience in evaluating security controls for cloud environments.
· 60 months experience working with cross functional teams to mitigate or remediate system and application vulnerabilities
· 48 months experience in risk management (including third-party), vulnerability management, and security program management
· 48 months experience in threat assessment and/or Incident Response management for information security and/or operational technology systems.
· Bachelor's Degree (or higher) in one or more of the following: Information Security, Information Assurance, Cybersecurity, Computer Science, Information Science, Information System Management, Digital Forensics, Compliance and Risk Management
· One or more of the following certifications: GICSP, GSEC, CISSP, CCSP, CCSK, CompTIA Cloud+, GCSA, CompTIA Network+, CompTIA Security+, CompTIA CySA+, CIPT, CIPP, CIPM, CISSP, CRISC, ISSAP, ISSEP, CGRC, CSSLP, SSCP, or other applicable information and/or cybersecurity, privacy, artificial intelligence, or risk management certifications
The wage range for this role reflects the wide array of factors considered in compensation decisions. These factors include, but are not limited to, skill sets, experience, training, licensure and certifications, and geographic location. Compensation decisions are based on the unique facts and circumstances of each case. A reasonable estimate of the hourly range is $64.00 - $68.00.
At Voyatek, we believe in supporting our employees with a comprehensive benefits package designed to enhance their well-being and professional growth. Please note that eligibility for certain benefits may vary based on your role and employment status.
· Flexible Work Schedules
· Health, Dental, and Vision Insurance
· Medical, Limited, & Dependent Flexible Spending Accounts (FSA)
· Health Savings Account (HSA) with Employer Contributions
· Company-Paid and Voluntary Life Insurance
· Long and Short-Term Disability Insurance
· Accident, Critical Illness, & Hospital Indemnity Insurance
· 401(k) Retirement Plan with Company Match and Immediate Vesting
· Wellhub Fitness and Wellness Platform
· Pet Insurance
· Training Opportunities
· Employee Referral Bonus Program
We are committed to fostering a workplace that supports both your personal and professional aspirations.
As part of our commitment to maintaining a compliant workplace, all final candidates will undergo and must successfully pass a pre-employment (post offer) background check. The background check may include, but is not limited to, verification of employment history, education, criminal records, and other relevant checks. Background check results will be evaluated in accordance with applicable law. For certain positions, additional client-specific background screenings may be required at the time of hire or in the future, in accordance with client requirements.
If you think you are a good fit for us, we encourage you to apply. Check out our career website for all open positions!
Voyatek provides equal employment opportunities to all employees and applicants for employment. Voyatek will make employment decisions without regard to race, color, creed, ancestry, national origin, citizenship, sex or gender (including pregnancy, childbirth, and pregnancy-related conditions), gender identity or expression (including transgender status), sexual orientation, marital status or domestic violence victim status, religion, age, disability, genetic information, service in the military, or any other characteristic protected by applicable federal, state, or local laws and ordinances. Employment decisions include all terms and conditions of employment, including recruitment and hiring, job assignment/ placement, promotion, upgrading, demotion, termination, layoff, recall, transfer, leave of absence, rates of pay or other compensation, internship, and training.
Security Analyst
Information security analyst job in Albany, NY
This is a 30 month opportunity on the Hourly-Based IT Services (HBITS) Contract at the State of New York. (Possibility of extension).
Required Experience:
84 months experience evaluating information security, privacy, and compliance for Information Technology systems and/or Operational Technology systems.
84 months experience conducting written risk and compliance assessments for security, privacy, and/or Artificial Intelligence using industry standards and frameworks such as NIST, CIS Critical Controls, ISO 27001, etc.
60 months experience triaging and determining mitigation plans (with and without Vendor) to resolve security risks and/or threats to business information systems and operational technology systems
60 months experience evaluating business systems (Commercial Off the Shelf and Custom Developed) for alignment with Information Technology and/or Operational Technology security policies, standards, laws, regulations, and industry best practices.
60 months experience in evaluating security controls for cloud environments
60 months experience working with cross functional teams to mitigate or remediate system and application vulnerabilities
48 months experience in risk management (including third-party), vulnerability management, and security program management
48 months experience in threat assessment and/or Incident Response management for information security and/or operational technology systems.
Bachelor's Degree (or higher) in one or more of the following: Information Security, Information Assurance, Cybersecurity, Computer Science, Information Science, Information System Management, Digital Forensics, Compliance and Risk Management
One or more of the following certifications: GICSP, GSEC, CISSP, CCSP, CCSK, CompTIA Cloud+, GCSA, CompTIA Network+, CompTIA Security+, CompTIA CySA+, CIPT, CIPP, CIPM, CISSP, CRISC, ISSAP, ISSEP, CGRC, CSSLP, SSCP, or other applicable information and/or cybersecurity, privacy, artificial intelligence, or risk management certifications
Sr Staff Cyber Security Architect
Information security analyst job in Niskayuna, NY
GE Vernova Research is building a USG Classified Program at our Niskayuna, NY site. Information systems have an important role in this and we are looking for an individual with experience as an Information Systems Security Manager (ISSM) or Information Systems Security Officer (ISSO) to fill our ISSM role and help us build and administer our IS program
Job Description
Roles and Responsibilities
The Information Systems Security Manager will be responsible for leading GE Vernova Research's Classified Information Systems program ensuring it meets or exceeds all requirements. The ideal candidate will be a detail oriented, self-starter with a strong IT background and previous experience supporting classified programs. This role offers a great opportunity to have a significant impact providing leadership in an important, growing area of the company.
In this role, you will:
* Develop, maintain, and oversee the Information Systems (IS) security program and ensure policies and procedures are documented, up-to-date, and being followed.
* Lead and ensure implementation of strong processes in the IS program (i.e. configuration management, change management, vulnerability management, incident management, investigation, reporting, ...).
* Stay current with the latest threats, vulnerabilities and best practices, make changes to the program as required, and regularly test security controls to ensure IS security.
* In partnership with the FSO, manage IS program relationship with USG representatives and coordinate IS security inspections, tests & reviews.
* Develop and implement an effective IS security education, training, and awareness program.
* Leverage your skills and abilities to lead and/or assist with GE Vernova Research non-classified IT governance
Position Requirements
* Bachelor's Degree in Computer Science or in "STEM" Majors (Science, Technology, Engineering and Math)
* A minimum of 7 years' professional experience, with a minimum of 5 years' professional experience in IT security or governance (Risk management, Compliance, Audits, Software Governance, etc.) and 2 years as an ISSM or ISSO
* Strong process focus, detail oriented
* Strong written and verbal communication skills
* Strong interpersonal skills and demonstrated ability to work as part of a high performing team
* Must be willing to work out of an office located in Niskayuna, NY
* Strong analytical and problem-solving skills
* Due to the nature of the duties of this position, this role requires the individual to have US Government Security Clearance; prerequisite for a security clearance is U.S. citizenship.
Desired Characteristics
* U.S. Government classified program ISSM or ISSO experience
* Information security certifications (CISSP, CISM, CISA, etc.)
* Knowledge of risk management frameworks (ISO, NIST, etc.)
* Prior experience in IT operations and support
* Self-starter, identifies opportunities for improvement and implements positive change
* Project management experience
This role requires access to U.S. export-controlled information. If applicable, final offers will be contingent on ability to obtain authorization for access to U.S. export-controlled information from the U.S. Government.
Additional Information
GE Vernova offers a great work environment, professional development, challenging careers, and competitive compensation. GE Vernova is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.
GE Vernova will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable).
Relocation Assistance Provided: No
For candidates applying to a U.S. based position, the pay range for this position is between $119,200.00 and $198,600.00. The Company pays a geographic differential of 110%, 120% or 130% of salary in certain areas. The specific pay offered may be influenced by a variety of factors, including the candidate's experience, education, and skill set.
Bonus eligibility: discretionary annual bonus.
This posting is expected to remain open for at least seven days after it was posted on December 18, 2025.
Available benefits include medical, dental, vision, and prescription drug coverage; access to Health Coach from GE Vernova, a 24/7 nurse-based resource; and access to the Employee Assistance Program, providing 24/7 confidential assessment, counseling and referral services. Retirement benefits include the GE Vernova Retirement Savings Plan, a tax-advantaged 401(k) savings opportunity with company matching contributions and company retirement contributions, as well as access to Fidelity resources and financial planning consultants. Other benefits include tuition assistance, adoption assistance, paid parental leave, disability benefits, life insurance, 12 paid holidays, and permissive time off.
GE Vernova Inc. or its affiliates (collectively or individually, "GE Vernova") sponsor certain employee benefit plans or programs GE Vernova reserves the right to terminate, amend, suspend, replace, or modify its benefit plans and programs at any time and for any reason, in its sole discretion. No individual has a vested right to any benefit under a GE Vernova welfare benefit plan or program. This document does not create a contract of employment with any individual.
Information Systems Security Officer (ISSO)
Information security analyst job in Albany, NY
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyMid Career Systems Engineer - Nuclear Weapons Security
Information security analyst job in Pittsfield, MA
Basic Qualifications
Requires a Bachelor's degree in Systems Engineering, or a related Science, Engineering, Technology or Mathematics field. Also requires 2+ years of job-related experience, or a Master's degree and 6 months of job-related experience.. Agile experience preferred.
CLEARANCE REQUIREMENTS: Department of Defense Secret security clearance is obtainable within a reasonable amount of time after hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
Responsibilities for this Position
ROLE AND POSITION OBJECTIVES:
As a Systems Engineer for the Nuclear Weapons Security program, you'll be a member of a cross functional team responsible for designing advanced security and information systems, as well as helping to maintain deployed systems.
We encourage you to apply if you have any of these preferred skills or experiences:
IBM DOORS
MATLAB
Simulink
Requirements Decomposition
Test Procedure Development
Windows Powershell
Cisco Networking
Operating System Administration (Linux, Windows)
Virtualization
Cybersecurity Tool implementation and administration
Database Administration (Mongo preferred)
What sets you apart:
Clear understanding of systems engineering concepts, principles, theories, and technical standards
Clear understanding of requirements management and system modeling tools
Creative thinker with ability to grasp and apply new information quickly and handle increasing responsibilities with growing complexity
Team player who thrives in collaborative environments and revels in team success
Commitment to ongoing professional development for yourself and others
Our Commitment to You:
An exciting career path with opportunities for continuous learning and development.
Research oriented work, alongside award winning teams developing practical solutions for our nation's security
Flexible schedules with every other Friday off work, if desired (9/80 schedule)
Competitive benefits, including 401k matching, flex time off, paid parental leave, healthcare benefits, health & wellness programs, employee resource and social groups, and more
See more at gdmissionsystems.com/careers/why-work-for-us/benefits
Workplace Options:
This position is Hybrid/Flex, but will require periods of 100% on site.
While on-site, you will be a part of the Pittsfield, MA facility.
#CJ2
#LI-Hybrid
Salary Note This estimate represents the typical salary range for this position based on experience and other factors (geographic location, etc.). Actual pay may vary. This job posting will remain open until the position is filled. Combined Salary Range USD $97,754.00 - USD $108,445.00 /Yr. Company Overview
General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 12,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high-performance team!
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyHBITS-07-14507 Security Analyst-Expert
Information security analyst job in Albany, NY
Job Description Project/Program: Under the direction of a Senior Information Security Analyst, ITS 4 [SG 25], or Information Security Officer, MITS 1, within the Security Services Team the position will be a member of an ITS Dedicated Security Services Team that provides security services to the NYS Department of Transportation. The incumbent will provide in-depth information security, privacy, and artificial intelligence consulting and services aligned with business needs of the client agency, DOT, to ensure confidentiality, integrity, and availability of information and systems.
The incumbent will work with other ITS teams and upper-level agency management to resolve technically complex and politically sensitive issues under pressure.
The position requires availability during off-shift hours to ensure appropriate response to security incidents or other critical activities that may impact sensitive information, critical systems, NYS agencies, or ITS.
Day-to-Day:
Duties include, but are not limited to:
- Implement information security and compliance programs for Information Technology (IT) systems and Operational Technology (OT) systems.
- Conducting written risk assessments (security, privacy, Artificial Intelligence) for existing systems/solutions, new systems/solutions, and services in use or to be used by the business.
- Assist with management and resolution of security risks and/or threats to business information and operational systems.
- Serve as information security analyst and evaluate systems and contracts for alignment with Business and State information security policies and standards as well as other laws, regulations, and industry best practices, as applicable.
- Assist with risk register management and vulnerability management
- Monitor and remain aware of information security industry trends, tools, and techniques.
- Perform additional duties as required.
Mandatory Requirements:
Security Analyst - Plans and carries out security measures to protect an organization's computer networks and systems.
Expert - 84+ months: Candidate is able to provide guidance to large teams and/or has extensive industry experience and is considered at the top of his/her field
Requested Requirements:
- 84 months experience evaluating information security, privacy, and compliance for Information Technology systems and/or Operational Technology systems.
- 84 months experience conducting written risk and compliance assessments for security, privacy, and/or Artificial Intelligence using industry standards and frameworks such as NIST, CIS Critical Controls, ISO 27001, etc.
- 60 months experience triaging and determining mitigation plans (with and without Vendor) to resolve security risks and/or threats to business information systems and operational technology systems.
- 60 months experience evaluating business systems (Commercial Off the Shelf and Custom Developed) for alignment with Information Technology and/or Operational Technology security policies, standards, laws, regulations, and industry best practices.
- 60 months experience in evaluating security controls for cloud environments
- 60 months experience working with cross functional teams to mitigate or remediate system and application vulnerabilities.
- 48 months experience in risk management (including third-party), vulnerability management, and security program management
- 48 months experience in threat assessment and/or Incident Response management for information security and/or operational technology systems.
- Bachelor's Degree (or higher) in one or more of the following: Information Security, Information Assurance, Cybersecurity, Computer Science, Information Science, Information System Management, Digital Forensics, Compliance and Risk Management
- One or more of the following certifications: GICSP, GSEC, CISSP, CCSP, CCSK, CompTIA Cloud+, GCSA, CompTIA Network+, CompTIA Security+, CompTIA CySA+, CIPT, CIPP, CIPM, CISSP, CRISC, ISSAP, ISSEP, CGRC, CSSLP, SSCP, or other applicable information and/or cybersecurity, privacy, artificial intelligence, or risk management certifications
NIST Security Architect
Information security analyst job in Albany, NY
Provide proven expertise and knowledge in Governance, Risk and Compliance (GRC), internal and external audit and assessment support and Information Security assurance initiatives. A firm knowledge of security compliance controls i.e NIST 800-53r4, HIPAA, HITECH, ISO27001 and other security standard frameworks is an absolute requirement.
Gather and analyze metrics, key risk indicators and maintain scorecards defined within the area of information security to ensure the information security program is meeting governance expectations and maturity. This candidate must be familiar with general security risk management principals, healthcare and government-designed security control standards and best practices for security and privacy.
Candidate should be familiar with documented security plans, procedures, supporting evidence and risk rating standards based on NIST and other risk management frameworks.
Assist with evaluation and testing as well as work with the applicable teams to track, address, and remediate audit and assessment findings to closure. Candidate must be familiar with threats and vulnerabilities, latest trends and risks and be able to understand the technical remediation action steps or plans and communicate them effectively to teams within the organization.
Manage policy exceptions with requestors and coordinate the annual exception review process. Requires working directly with various teams to document exceptions, identify compensating controls, and remediation action plans accordingly. Provide process improvement suggestions for more effective management and review of exceptions.
Support and help mature the overall security management program. Should be familiar with general governance, risk and compliance (GRC) programs with specific knowledge of government practices, and security risk and policy management. Provide support for ongoing BAA, third party risk reviews, including initial inherent risk, ongoing residual risk, and attestation campaigns.
Support and help maintain risk appetite frameworks focused on security and business continuity risks. Additionally, support and maintain other general regulatory risk assurance program functions.
Support and address regular IT general controls (ITGC) activity reviews and be able to rate and score maturity and compliance to standard control objectives.
A knowledge of security architectures including SDLC, cloud or multi-tenant infrastructure and environments and network/boundary architectures. Should be familiar with SIEM, DLP, and other reporting and protection capabilities.
Qualifications
This position requires:
BS or BA degree in a related field or equivalent work experience.
Minimum 5 years in information security, Risk Management, IT compliance, or security/IT risk related field.
Strong oral and written communication, as well as good interpersonal skills.
Knowledge and experience in standard security and regulatory frameworks including HIPAA, HITECH, NIST 800-53, other NIST standards, ISO 27001/31000, FFIEC and PCI.
Possess the ability to solve a wide range of complex problems, requiring ingenuity and innovation.
Preferred/Nice-to-haves:
Experience using GRC platforms or rating scorecards to show compliance levels and maturity.
Experience with SharePoint administration, including workflow and process design.
Current Certified Information Systems Security Professional CISSP certification (or similar security profession certificate).
Current Certified Information Systems Auditor CISA certification (or similar).
Additional Information
PlanIT Group, LLC is an Equal Opportunity/Affirmative Action (M/F/D/V) Employer.
All your information will be kept confidential according to EEO guidelines.
Engineer, Information Security and Risk
Information security analyst job in Albany, NY
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
SAP S/4HANA Defense & Security Architect
Information security analyst job in Albany, NY
Introduction A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe. You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat.
Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in groundbreaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.
Your role and responsibilities
The SAP S/4HANA Defense & Security Architect assists the program solution architect with designing, developing, and implementing the Ministry of Defense for Ukraine's Defense and Security implementation. This role requires a mastery of specific business processes and requirements within the defense and security sectors, ensuring that our solution meets the priorities and needs of the Ukrainians. This individual assists in managing the integration of SAP S/4HANA with other components and systems, as well as oversee the test, deployment and sustainment of these solutions.
Requires strong organization and communication skills and knowledge of integration with SAP functional areas. Possesses and applies a comprehensive knowledge across key tasks and high impact assignments
Required education
High School Diploma/GED
Preferred education
Bachelor's Degree
Required technical and professional expertise
* SAP functional SME with more than 15+ years delivering end to end complex SAP projects; experience in one or more SAP S/4HANA Line of Business
* Comprehensive knowledge of SAP S/4HANA D&S with one or more successful SAP S/4HANA D&S implementations
* Minimum Education: Bachelor's degree in a recognized technical, engineering, scientific, managerial, business, or other discipline related to area of expertise. An additional 4 years of relevant experience may be substituted for the bachelor's degree.
* Must be able to obtain and maintain a NATO security clearance
Preferred technical and professional experience
* Proven stellar communication skills and strong teamwork experience with a multi-lingual team.
* Experience leading teams and coordinating with other program leaders and stakeholders located in other time zones (6+ hours difference)
* SAP Certified Application Associate
ABOUT BUSINESS UNIT
IBM Consulting is IBM's consulting and global professional services business, with market leading capabilities in business and technology transformation. With deep expertise in many industries, we offer strategy, experience, technology, and operations services to many of the most innovative and valuable companies in the world. Our people are focused on accelerating our clients' businesses through the power of collaboration. We believe in the power of technology responsibly used to help people, partners and the planet.
YOUR LIFE @ IBM
In a world where technology never stands still, we understand that, dedication to our clients success, innovation that matters, and trust and personal responsibility in all our relationships, lives in what we do as IBMers as we strive to be the catalyst that makes the world work better.
Being an IBMer means you'll be able to learn and develop yourself and your career, you'll be encouraged to be courageous and experiment everyday, all whilst having continuous trust and support in an environment where everyone can thrive whatever their personal or professional background.
Our IBMers are growth minded, always staying curious, open to feedback and learning new information and skills to constantly transform themselves and our company. They are trusted to provide on-going feedback to help other IBMers grow, as well as collaborate with colleagues keeping in mind a team focused approach to include different perspectives to drive exceptional outcomes for our customers. The courage our IBMers have to make critical decisions everyday is essential to IBM becoming the catalyst for progress, always embracing challenges with resources they have to hand, a can-do attitude and always striving for an outcome focused approach within everything that they do.
Are you ready to be an IBMer?
ABOUT IBM
IBM's greatest invention is the IBMer. We believe that through the application of intelligence, reason and science, we can improve business, society and the human condition, bringing the power of an open hybrid cloud and AI strategy to life for our clients and partners around the world.
Restlessly reinventing since 1911, we are not only one of the largest corporate organizations in the world, we're also one of the biggest technology and consulting employers, with many of the Fortune 500 companies relying on the IBM Cloud to run their business.
At IBM, we pride ourselves on being an early adopter of artificial intelligence, quantum computing and blockchain. Now it's time for you to join us on our journey to being a responsible technology innovator and a force for good in the world.
IBM is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, neurodivergence, age, or other characteristics protected by the applicable law. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
OTHER RELEVANT JOB DETAILS
IBM will not be providing visa sponsorship for this position now or in the future. Therefore, in order to be considered for this position, you must have the ability to work without a need for current or future visa sponsorship.
The compensation range and benefits for this position are based on a full-time schedule for a full calendar year. The salary will vary depending on your job-related skills, experience and location. Pay increment and frequency of pay will be in accordance with employment classification and applicable laws. For part time roles, your compensation and benefits will be adjusted to reflect your hours. Benefits may be pro-rated for those who start working during the calendar year.
Mid-Level Application Security Engineer (35710716)
Information security analyst job in Springfield, MA
Job Description
We are seeking an experienced Application Security Engineer to join our Software Security team and take charge of ensuring the security and integrity of our software applications. The ideal candidate will have advanced knowledge of secure software development, extensive experience with identifying vulnerabilities, and the ability to implement robust security solutions. This role will require collaboration with development teams, security architects, and other stakeholders to integrate security best practices into all stages of the software development lifecycle.
The Impact
Your key responsibilities will consist of the following to ensure applications are resilient against emerging threats, reducing potential financial and reputational damage from security incidents.
Conduct in-depth security assessments, including vulnerability scanning, and code reviews.
Leverage automated tools and manual testing techniques to identify, risk assess and prioritize and propose mitigation strategies for identified threats and application-level vulnerabilities (e.g., OWASP Top 10, etc.) ensuring our applications meet security standards and reducing exposure to data breaches.
Collaborate with security architects to design secure application architectures that align with industry best practices.
Ensure secure coding practices are followed, and security controls are incorporated into software designs.
Conduct detailed threat modeling to identify attack vectors and potential weaknesses.
Collaborate with our SDLC Council to develop and maintain secure coding standards, empowering developers to integrate security into the development process.
Partner with DevOps teams to implement security within CI/CD (continuous integration & delivery) pipelines for automated and seamless deployment of secure code.
Assist in incident response activities related to application security breaches, providing rapid identification and mitigation guidance.
Ensure compliance with security regulations, frameworks, and industry standards such as OWASP.
Leverage reporting tools to demonstrate the overall risk through metrics (KPIs, KRIs, OKRs) of vulnerabilities and code defects to cyber assets for various team leaders and executive leadership for risk prioritization and enablement of risk-based decision-making.
Stay up to date with the latest security threats, vulnerabilities, and industry trends to inform and improve security strategies.
Strong problem-solving abilities and analytical thinking.
Excellent communication skills to explain security issues to both technical and non-technical stakeholders.
A team player with the ability to work in a collaborative, fast-paced environment.
The Minimum Qualifications
Bachelor's or master's degree in computer science, Information Security, or a related field.
Minimum of 5+ years of experience in application security, penetration testing, or secure software development.
The Ideal Qualifications
Relevant security certifications such as CEH, OSCP, or GWAPT) from an industry recognized certifier (e.g., SANS/GIAC, CompTIA, ISACA, ISC2, etc.) Strong knowledge of secure software development methodologies, including threat modeling, code reviews, and static/dynamic analysis.
Experience in integrating security into DevOps (DevSecOps) and CI/CD environments.
Strong technical knowledge of web application security, cloud security (AWS, Azure, GCP), mobile security, infrastructure as code (IaC), container security, and API security.
Familiarity with SAST, DAST, and IAST tools.
Deep understanding of common vulnerabilities (e.g., OWASP Top 10) and their mitigations.
Advanced understanding and experience with writing source code (e.g., JavaScript, Java, C/C++/C#, Python, etc.) and familiarity with software security frameworks (e.g., Maven, Node, Gradle, etc.).
Experience with identifying security vulnerabilities/defects in dockers, containers, and Kubernetes.
Experience with cloud deployment and automation tools (Terraform, GitHub Actions, Jenkins, AWS Cloud Formation Templates, Secrets Managers).
Knowledge of compliance and regulatory frameworks (SOC 2, etc.).
Education:
Bachelor's or master's degree in computer science.
Skills and Experience:
Required Skills:
MITIGATION
CLOUD SECURITY
METRICS
SCANNING
GCP
Additional Skills:
SOC
INFORMATION SECURITY
API
DYNAMIC ANALYSIS
C
JAVA
MAVEN
AMAZON WEB SERVICES
PROBLEM-SOLVING
GITHUB
DEPLOYMENT
REPORTING TOOLS
INCIDENT RESPONSE
C/C++
CONTINUOUS INTEGRATION/DELIVERY
TERRAFORM
CODING
DEV OPS
EXCELLENT COMMUNICATION SKILLS
JAVASCRIPT
SOFTWARE SECURITY
COMPTIA
PYTHON
STRUCTURED SOFTWARE
GIAC
SDLC
JENKINS
CODING STANDARDS
TEAM PLAYER
GRADLE
KUBERNETES
Application Security Engineer
Information security analyst job in Springfield, MA
Must have: Application security, Relevant security certifications , Devops, OWASP
Duties: The Opportunity
We are seeking an experienced Application Security Engineer to join our Software Security team and take charge of ensuring the security and integrity of our software applications.
The ideal candidate will have advanced knowledge of secure software development, extensive experience with identifying vulnerabilities, and the ability to implement robust security solutions.
This role will require collaboration with development teams, security architects, and other stakeholders to integrate security best practices into all stages of the software development lifecycle.
Description:
Your key responsibilities will consist of the following to ensure applications are resilient against emerging threats, reducing potential financial and reputational damage from security incidents.
Conduct in-depth security assessments, including vulnerability scanning, and code reviews.
Leverage automated tools and manual testing techniques to identify, risk assess and prioritize and propose mitigation strategies for identified threats and application-level vulnerabilities (e.g., OWASP Top 10, etc.) ensuring our applications meet security standards and reducing exposure to data breaches.
Collaborate with security architects to design secure application architectures that align with industry best practices.
Ensure secure coding practices are followed, and security controls are incorporated into software designs.
Conduct detailed threat modeling to identify attack vectors and potential weaknesses.
Collaborate with our SDLC Council to develop and maintain secure coding standards, empowering developers to integrate security into the development process.
Partner with DevOps teams to implement security within CI/CD (continuous integration & delivery) pipelines for automated and seamless deployment of secure code.
Assist in incident response activities related to application security breaches, providing rapid identification and mitigation guidance.
Ensure compliance with security regulations, frameworks, and industry standards such as OWASP.
Leverage reporting tools to demonstrate the overall risk through metrics (KPIs, KRIs, OKRs) of vulnerabilities and code defects to MassMutual's cyber assets for various team leaders and executive leadership for risk prioritization and enablement of risk-based decision-making.
Stay up to date with the latest security threats, vulnerabilities, and industry trends to inform and improve security strategies.
Strong problem-solving abilities and analytical thinking.
Excellent communication skills to explain security issues to both technical and non-technical stakeholders.
A team player with the ability to work in a collaborative, fast-paced environment.
Office location worker is associated with: Springfield, MA, Boston, MA, or NY, NY.
Skills:
Bachelor's or master's degree in computer science, Information Security, or a related field.
Minimum of 5+ years of experience in application security, penetration testing, or secure software development.
The Ideal Qualifications
Relevant security certifications such as CEH, OSCP, or GWAPT) from an industry recognized certifier (e.g., SANS/GIAC, CompTIA, ISACA, ISC2, etc.) Strong knowledge of secure software development methodologies, including threat modeling, code reviews, and static/dynamic analysis.
Experience in integrating security into DevOps (DevSecOps) and CI/CD environments.
Strong technical knowledge of web application security, cloud security (AWS, Azure, GCP), mobile security, infrastructure as code (IaC), container security, and API security.
Familiarity with SAST, DAST, and IAST tools.
Deep understanding of common vulnerabilities (e.g., OWASP Top 10) and their mitigations.
Advanced understanding and experience with writing source code (e.g., JavaScript, Java, C/C++/C#, Python, etc.) and familiarity with software security frameworks (e.g., Maven, Node, Gradle, etc.).
Experience with identifying security vulnerabilities/defects in dockers, containers, and Kubernetes.
Experience with cloud deployment and automation tools (Terraform, GitHub Actions, Jenkins, AWS Cloud Formation Templates, Secrets Managers).
Knowledge of compliance and regulatory frameworks (SOC 2, etc.).
Security Engineer II
Information security analyst job in Albany, NY
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Detection & Response Security Engineer, Threat Intelligence
Information security analyst job in Albany, NY
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Sr Staff Cyber Security Architect
Information security analyst job in Niskayuna, NY
SummaryGE Vernova Research is building a USG Classified Program at our Niskayuna, NY site. Information systems have an important role in this and we are looking for an individual with experience as an Information Systems Security Manager (ISSM) or Information Systems Security Officer (ISSO) to fill our ISSM role and help us build and administer our IS program Job Description
Roles and Responsibilities
The Information Systems Security Manager will be responsible for leading GE Vernova Research's Classified Information Systems program ensuring it meets or exceeds all requirements. The ideal candidate will be a detail oriented, self-starter with a strong IT background and previous experience supporting classified programs. This role offers a great opportunity to have a significant impact providing leadership in an important, growing area of the company.
In this role, you will:
Develop, maintain, and oversee the Information Systems (IS) security program and ensure policies and procedures are documented, up-to-date, and being followed.
Lead and ensure implementation of strong processes in the IS program (i.e. configuration management, change management, vulnerability management, incident management, investigation, reporting, ...).
Stay current with the latest threats, vulnerabilities and best practices, make changes to the program as required, and regularly test security controls to ensure IS security.
In partnership with the FSO, manage IS program relationship with USG representatives and coordinate IS security inspections, tests & reviews.
Develop and implement an effective IS security education, training, and awareness program.
Leverage your skills and abilities to lead and/or assist with GE Vernova Research non-classified IT governance
Position Requirements
• Bachelor's Degree in Computer Science or in “STEM” Majors (Science, Technology, Engineering and Math)
• A minimum of 7 years' professional experience, with a minimum of 5 years' professional experience in IT security or governance (Risk management, Compliance, Audits, Software Governance, etc.) and 2 years as an ISSM or ISSO
• Strong process focus, detail oriented
• Strong written and verbal communication skills
• Strong interpersonal skills and demonstrated ability to work as part of a high performing team
• Must be willing to work out of an office located in Niskayuna, NY
• Strong analytical and problem-solving skills
• Due to the nature of the duties of this position, this role requires the individual to have US Government Security Clearance; prerequisite for a security clearance is U.S. citizenship.
Desired Characteristics
• U.S. Government classified program ISSM or ISSO experience
• Information security certifications (CISSP, CISM, CISA, etc.)
• Knowledge of risk management frameworks (ISO, NIST, etc.)
• Prior experience in IT operations and support
• Self-starter, identifies opportunities for improvement and implements positive change
• Project management experience
This role requires access to U.S. export-controlled information. If applicable, final offers will be contingent on ability to obtain authorization for access to U.S. export-controlled information from the U.S. Government.
Additional Information
GE Vernova offers a great work environment, professional development, challenging careers, and competitive compensation. GE Vernova is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.
GE Vernova will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable).
Relocation Assistance Provided: No
For candidates applying to a U.S. based position, the pay range for this position is between $119,200.00 and $198,600.00. The Company pays a geographic differential of 110%, 120% or 130% of salary in certain areas. The specific pay offered may be influenced by a variety of factors, including the candidate's experience, education, and skill set.Bonus eligibility: discretionary annual bonus.This posting is expected to remain open for at least seven days after it was posted on December 18, 2025.Available benefits include medical, dental, vision, and prescription drug coverage; access to Health Coach from GE Vernova, a 24/7 nurse-based resource; and access to the Employee Assistance Program, providing 24/7 confidential assessment, counseling and referral services. Retirement benefits include the GE Vernova Retirement Savings Plan, a tax-advantaged 401(k) savings opportunity with company matching contributions and company retirement contributions, as well as access to Fidelity resources and financial planning consultants. Other benefits include tuition assistance, adoption assistance, paid parental leave, disability benefits, life insurance, 12 paid holidays, and permissive time off.GE Vernova Inc. or its affiliates (collectively or individually, “GE Vernova”) sponsor certain employee benefit plans or programs GE Vernova reserves the right to terminate, amend, suspend, replace, or modify its benefit plans and programs at any time and for any reason, in its sole discretion. No individual has a vested right to any benefit under a GE Vernova welfare benefit plan or program. This document does not create a contract of employment with any individual.
Auto-ApplyInformation Systems Security Officer (ISSO)
Information security analyst job in Albany, NY
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Easy ApplyEngineer, Information Security and Risk
Information security analyst job in Albany, NY
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************