Information Security Analyst I
Information security analyst job in Hillsboro, OH
Oversee and validate the effectiveness of security controls and configuration baselines implemented by first line teams. Regularly review security documentation and operational practices to ensure alignment with regulatory requirements, industry standards, and organizational policies. Recommend improvements to control frameworks and support the development and maintenance of security policies, standards, and procedures.
Review and validate reports and metrics provided by first line teams to assess the effectiveness of security solutions and controls. Analyze trends and findings to identify systemic risks or gaps and collaborate with operational teams to ensure timely remediation and continuous improvement. Prepare independent summaries and recommendations for management based on oversight activities.
Maintain up-to-date detailed knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors. Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. Assist in the deployment, integration, and initial configuration of all new security solutions and any enhancements to existing security solutions in accordance with standard best operating procedures and the enterprise's security documents.
Assist in investigations of security incidents and problematic activities to help identify root causes and recommend corrective actions. Contribute to the development and delivery of information security awareness training programs for all organizational levels, including new hire orientation and ongoing awareness campaigns. Perform additional responsibilities as assigned to support the overall security objectives of the organization.
Participate in the planning and design of enterprise security architecture, under the direction of the Information Security Manager. Assist in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the CISO. Contribute to the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the CISO.
Minimum Qualifications:
Second year college student focusing on Information Technology or Information Security
Two to four years related experience or equivalent combination of education and experience
Security related certifications such as: Security +, CISA, CISSP, CRISC, CISM, GRCP, CCSP, CGEIT are strongly desired
Eligibility requirements may differ for each benefit or program.
National Cooperative Bank, N.A. is an Equal Employment Opportunity Employer (EOE/AA)
Information Security Analyst (On-Site Position)
Information security analyst job in Miamisburg, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
* Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
* Competitive Compensation: Enjoy annual merit increases and bonuses.
* Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
* Secure Your Future: 401K plan and profit-sharing opportunities.
* Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
* Give Back: Participate in our "Constructing Hope" program to contribute to meaningful community outreach projects.
* Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
* Bachelor's degree in Cybersecurity, Information Technology, or a related field.
* 3+ years of hands-on experience in cybersecurity or a related discipline.
* Working knowledge of security frameworks (e.g., NIST, ISO 27001).
* Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
* Strong analytical and investigative mindset.
* Clear, confident communication and collaboration skills.
* Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
* Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
* Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
* Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
* Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
* Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
* Drive cybersecurity awareness through engaging education initiatives.
* Oversee new hire onboarding for required cyber training.
* Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
* Continuously monitor systems for suspicious activity or breaches.
* Respond swiftly to security incidents and ensure thorough documentation.
* Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
* Lead regular system assessments and vulnerability scans.
* Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
* Oversee the deployment and management of critical security tools.
* Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
* Evaluate and enhance our security technology stack.
Collaboration & Communication
* Build trusted partnerships across IT and the broader organization to strengthen security culture.
* Support business continuity and disaster recovery planning with department leads.
* Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
* Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
* Deep expertise in endpoint protection, network monitoring, and DLP tools.
* Calm, strategic approach to crisis management.
Qualifications
Working Environment:
* Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
* Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
* Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
* Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
* Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
* Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
Auto-ApplyEntry Level Cyber Security Analyst
Information security analyst job in Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Information Systems Security Officer (ISSO) III
Information security analyst job in Dayton, OH
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description:
The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.
This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Conduct continuous monitoring activities for authorization boundaries under your preview.
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts.
Experience:
5+ years related experience.
2+ years SAP experience required.
Prior performance in roles such as System, Network Administrator or ISSO.
Education:
Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire
Clearance Required to Start:
TS/SCI required
Must be able to Attain - TS/SCI with CI Polygraph
#AirforceSAPOpportunities
The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyInfrastructure Security Analyst
Information security analyst job in Dayton, OH
Versiti is a fusion of donors, scientific curiosity, and precision medicine that recognize the gifts of blood and life are precious. We are home to the world-renowned Blood Research Institute, we enable life saving gifts from our donors, and provide the science behind the medicine through our diagnostic laboratories. Versiti brings together outstanding minds with unparalleled experience in transfusion medicine, transplantation, stem cells and cellular therapies, oncology and genomics, diagnostic lab services, and medical and scientific expertise. This combination of skill and knowledge results in improved patient outcomes, higher quality services and reduced cost of care for hospitals, blood centers, hospital systems, research and educational institutions, and other health care providers. At Versiti, we are passionate about improving the lives of patients and helping our healthcare partners thrive.
Position Summary
The Infrastructure Security Analyst will play a critical role in ensuring the security and integrity of our IT systems and networks. This position involves a balanced focus on IT Systems and Network Support and Cybersecurity with a concentration on Vulnerability Management. The ideal candidate will possess both technical expertise and strong analytical skills to identify, mitigate, and manage vulnerabilities while supporting the overall IT infrastructure. The candidate will thrive in a dynamic, team-oriented environment, where knowledge sharing, and continuous learning are encouraged. As an integral part of our collaborative team, the Infrastructure Security Analyst will work closely with various IT departments, including network operations, system administration, and application development. This role includes direct collaboration with the Senior Cybersecurity Engineer to ensure thorough analysis, identification, and mitigation of infrastructure vulnerabilities. Together, the team will address evolving cyber threats, communicate complex security concepts to stakeholders across all levels, and promote an organization-wide security culture while supporting Versiti's business and operational goals. This position values teamwork, encouraging information sharing and joint problem-solving to fortify the organization's defenses. This role is essential in building a resilient IT infrastructure that can adapt to evolving threats while supporting the organization's business objectives.
Total Rewards Package
Benefits
Versiti provides a comprehensive benefits package based on your job classification. Full-time regular employees are eligible for Medical, Dental, and Vision Plans, Paid Time Off (PTO) and Holidays, Short- and Long-term disability, life insurance, 7% match dollar for dollar 401(k), voluntary programs, discount programs, others.
Responsibilities
Provide technical support for IT infrastructure, including servers, networks, and cloud services.
Monitor system performance, troubleshoot issues, and perform regular maintenance on IT systems and document system configurations, changes, and procedures for future reference and compliance audits.
Collaborate with IT teams to implement and maintain secure network configurations and ensure compliance with organizational policies while assisting in the deployment and configuration of hardware and software as needed.
Respond to and resolve service requests and incidents in a timely manner.
Conduct regular vulnerability assessments and penetration testing to identify security weaknesses within IT systems and networks and collaborate with IT teams to develop and implement mitigation strategies for identified vulnerabilities.
Analyze vulnerability scan reports and prioritize remediation efforts based on risk assessment and monitor security alerts and incidents, responding to security breaches or threats as necessary.
Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and trends. Utilize threat intelligence feeds and monitoring tools to proactively identify and mitigate potential security threats. Provide recommendations for security improvements and help implement new security controls.
Performs other duties as required or assigned which are reasonably within the scope of the duties in this job classification
Understands and performs in accordance with all applicable regulatory and compliance requirements
Complies with all standard operating policies and procedures
Qualifications
Education
Bachelor's Degree Computer Science, Information Technology, Cybersecurity, or a related field preferred
Experience
4-6 years Demonstrated experience installing, managing and troubleshooting Linux and/or Microsoft Server environments. required
4-6 years Experience with Enterprise Data Center Server and Network environments. required
4-6 years Experience in conducting vulnerability assessments and penetration testing. required
Demonstrated experience with VMware Server and storage management. preferred
Knowledge, Skills and Abilities
Understanding of patch management processes and tools required
Knowledge of common security frameworks (e.g., NIST, ISO 27001, CIS Controls) required
Strong analytical and problem-solving skills. required
Excellent communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders. required
Strong attention to detail and ability to work independently as well as part of a team. required
Experience with ticketing systems and IT service management processes. required
Familiarity with scripting languages (e.g., PowerShell, Python). preferred
Licenses and Certifications
Certified Ethical Hacker (CEH) desired
CISSP Certified Information Systems Security Professional desired
Microsoft Certified Systems Engineer (MCSE) preferred
Microsoft Certified Systems Administrator (MCSA) preferred
CompTIA Network+ Certification preferred
CompTIA Security+ Certification preferred
Tools and Technology
Proficiency in network protocols, firewalls, VPNs, and security appliances. required
Knowledge of operating systems (Windows, Linux) and cloud environments (AWS, Azure). required
Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). preferred
Experience with container technologies (e.g., Docker, Kubernetes) preferred
Familiarity with threat intelligence and incident response processes. preferred
#LI-EH1
#LI-Hybrid
Not ready to apply? Connect with us for general consideration.
Auto-ApplyInformation System Security Officer (ISSO)
Information security analyst job in Dayton, OH
ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Why Work with us?â¯
âApplied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.â¯Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.â¯â¯
Responsibilities:
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
Report all security-related incidents to the ISSM
Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
Serve as member of the CCB, if designated by the ISSM;
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Responsibilities:
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or related
field
5-8 years demonstrated performance in related technology
Top Secret w/ SCI eligibility
Other duties as assigned
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Cyber Security Specialist
Information security analyst job in Kettering, OH
Kettering, OH/Remote
IPTA's Technology Solutions Team is passionate about providing our customers with technical solutions that satisfy their business needs. Through collaborative interactions with customers, team members, subject matter experts (SMEs), technical leaders, and partners we design practical solutions that solve real problems for major government and business organizations. As a member of our Technology Solutions group, you will work with a team of technologists focused on delivering innovative business solutions using emerging technologies through proven successful methods.
Our Team:
We are looking for talented people who are enthusiastic about applying technology to deliver innovative outcomes with "fierce determination, fearless integrity, and passionate service." Our belief is that our people are the key to success. By encouraging and enabling continued learning, our team members grow to achieve their personal career goals. We are looking for:
Smart people with a passion for technology
Ability to solve challenging business problems
Self-directed professionals
Hunger to continually learn and grow
Responsibilities:
Identifies and resolves highly complex issues to prevent cyber attacks on information systems and to keep computer information systems secure from interruption of service, intellectual property theft, network viruses, data mining, financial theft, and theft of sensitive customer data, allowing business to continue as normal.
Designs, installs, and manages security mechanisms that protect networks and information systems against hackers, breaches, viruses, and spyware.
Responds to incidents, investigates violations, and recommends enhancements to plug potential security gaps. Analyzes data to spot trends, and creates tools to support research efforts.
Mitigates threats by gathering information and developing plans, and monitors networks for security breaches.
Develops best practices and security standards, and trains users on security protocols.
Creates and tests disaster recovery procedures to keep IT running in the event of a security breach.
Researches data, learns about new technologies, and gathers information on the latest risks.
Utilizes specialized expertise, up-to-date knowledge, and proficiency in analysis, forensics, and reverse engineering to monitor and diagnose malware events and vulnerability issues resulting in web threats that facilitate cyber crime, including malware, phishing, viruses, denial-of-service attacks, information warfare, and hacking.
Makes recommendations for solutions, including hardware and software programs that can help mitigate risk.
Designs firewalls, monitors use of data files, and regulates access to safeguard information and protect the network.
Keeps up-to-date on current virus reports, and protects networks from these viruses.
Trains users, promotes security awareness, develops policies and procedures, and provides updates and reports to management and executive staff.
Requirements:
Bachelor's degree in a related field
Eight (8) years of prior experience in a similar role
DoD 8570 Level II/II certification required
Active Security Clearance Required
IPTA is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment opportunity to all qualified employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, religion, sex, sexual orientation, national origin, age, physical disability, mental disability, medical condition, status as a veteran or disabled veteran or any other characteristic protected by law. We base all employment decisions, including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, returns from lay-off, terminations, and social and recreational programs on the principles of equal employment opportunity. Our employees have diverse backgrounds, skills, and ideas that collectively contribute to a rich working environment and greater opportunity for innovation.
Information Security Analyst 2
Information security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Information Security Analyst 2**
**Job Duties**
+ Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
+ Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
+ Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
+ Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
**Minimum Qualifications**
+ 2-4 years related experience
+ Associate's degree (Information Technology, Cyber Security, Computer Science)
+ Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
**Preferred Qualifications**
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
IT Analyst II
Information security analyst job in Sidney, OH
Description Auria is a leading global supplier of highly engineered systems for automotive flooring, acoustical, thermal, aerodynamic and other fiber-based solutions for gas and electric vehicles. With U.S.-based operational headquarters in Southfield, Michigan, Auria operates 16 manufacturing, 9 technical and 5 JV locations across 10 countries and employs approximately 3,900 people worldwide.We are currently searching for IT Analyst II to join our team at our Sidney Plant in Sidney, Ohio.
What you will do:
Technical Support
Provide onsite and remote technical support for manufacturing IT systems, including hardware, software, and network components.
Troubleshoot and resolve issues related to production systems, devices, and applications in a timely manner.
System Maintenance and Upgrades
Perform regular system maintenance to ensure optimal performance and reliability of IT infrastructure.
Support hardware and software upgrades, patches, and updates to meet manufacturing requirements.
Monitor system performance and proactively address potential issues.
Collaboration with Manufacturing Teams
Work closely with production teams to understand IT requirements and ensure alignment with operational goals.
Collaborate with engineering and operations teams to implement and integrate new technologies.
Provide training and guidance to manufacturing staff on IT tools and systems.
Network and Security
Ensure the security and stability of the IT infrastructure, including networks, endpoints, and shop floor systems.
Monitor and maintain network connections between production systems and enterprise IT.
Implement and enforce IT policies, standards, and best practices in the manufacturing environment.
Incident Management and Documentation
Log and manage IT incidents and service requests using ticketing systems.
Document solutions, system configurations, and troubleshooting procedures.
Generate reports on IT support activities and system performance for management review.
Compliance and Safety
Ensure IT systems comply with industry regulations and company policies.
Support initiatives to enhance safety through the use of technology in the manufacturing environment.
Other Duties as Assigned
What you will gain as a part of the Auria Team:
An opportunity to enroll in full medical, dental and vision plan. As well as voluntary benefits.
Fertility Benefits available for those enrolled in our medical plan for financial support of treatment options
Parental Leave and Adoption and Surrogacy Benefits for salaried employees
Tuition Reimbursement available for eligible employees to continue education
Auria matches 50% of your contributions up to 8%, for a maximum Auria match of 4%
Salary Continuation & Long-Term Disability (LTD)
What you will bring:
Associate's or bachelor's degree in Information Technology, Computer Science, or a related field preferred
Relevant certifications (e.g., CompTIA, Microsoft, Cisco) are a plus.
3+ years of IT support experience, preferably in a manufacturing or industrial environment
Familiarity with manufacturing technologies, such as MES, PLCs, or SCADA systems are a plus
Familiarity with ERP solutions such as QAD or PLEX
Travel Requirements: Ability to travel up to 10% of the time to North American Plants Knowledge, Skills, and Ability:
Knowledge of networks, servers, databases, computing, and other technical components that make up an organization's IT systems.
Ability to troubleshoot complex problems, identify root causes, and implement effective solutions.
Adaptability in a fast-paced manufacturing environment.
Proactive approach to system maintenance and improvement.
When applying to Auria positions, you will be taken to our career site (careers.auriasolutions.com) to apply directly with us even through external job boards. Auria utilizes an in-depth interview process and will extend offers to successful candidates only at the completion of our process. Auria reminds all candidates that we will never ask for sensitive financial information throughout our process. We remind all candidates to take caution with any position that they are applying or when engaging with recruiters.
Auto-ApplyManager, Information Security
Information security analyst job in Beavercreek, OH
The Manager, Information Security is responsible for implementing and executing WPCU's Information Security program and strategies under the leadership of the VP, Information Security. This role will collaborate with all lines of business through projects, risk assessments, controls, and control effectiveness reviews. The manager will oversee tools utilized by the Information Security team to provide feedback on vendors and applications. Position will be responsible for collaboration with various business units during a data incident to ensure incidents are properly documented and evidence is captured. This role will be expected to provide thought leadership to ensure the efficiency and effectiveness of the Information Security team.
The major activities for this position include:
1) Information Security Operations (40%)
a) Develop and oversee control effectiveness reviews to ensure all activities align in scope and frequency with information security policies and approved information security frameworks.
b) Develop and oversee information security's involvement with vendor due diligence processes.
c) Develop and oversee Identity Access Governance processes to ensure alignment with the principle of least privilege access.
d) Develop and oversee information security related risk assessments. Develop and oversee processes to rate criticality of applications and controls to ensure risk assessments are aligned.
e) Ensure all assessments are completed in a timely manner including developing appropriate cross training plans to schedule impacts.
f) Develop and oversee reporting related to all assessments to ensure risk levels are appropriately assigned and management responses are captured.
g) Ensure identified gaps from information security assessments are appropriately tracked. Coordinate with various business units to collect timely updates.
2) Personnel Management & Procedures (20%)
a) Mentor assigned partners by administering individual development plans, making recommendations for promotions, or implementing coaching plans. This includes performing regular 1-on-1s with partners and completing annual reviews.
b) Ensure departmental procedures are effective, up-to-date, and follow company standards.
3) Project Management (20%)
a) Participate in project planning events to provide estimated work effort for projects including pro-active escalation of resources constraints to the VP of Information Security.
b) Assist in fostering an enterprise-wide security first culture by participating in project requirement gathering session. Inform project owners of applicable controls, audit findings, or control effectiveness gaps that are appropriate for the project.
c) Attend on-going project meetings to advise and ensure information security controls are addressed.
4) Incident Management (10%)
a) Role will be responsible for ensuring data incidents are tracked, properly documented, and evidence has been collected.
b) Provide regular status updates to the VP of Information Security on open data incidents.
5) Audit and Regulatory Exam Support (10%)
a) Assist the Vice President of Information Security with internal and external audits to ensure document collections are completed in a timely manner and properly vetted.
b) Serve as subject matter expert during internal and external audits related to activities completed by Information Security.
c) Ensure assigned business units are operating efficiently and reliably, are in compliance with applicable laws, regulations, and rules, have appropriate operating controls to mitigate risk, and are performing at a high level.
Required Skills
This leader in information security must be skilled at developing and leading strategic Information Security programs across the enterprise in a complex, multi-system and multi-vendor environment. Strong, practical knowledge of Information Security concepts and technical architecture are essential. Expert knowledge of risk and information security frameworks are essential.
1) A bachelor's degree is required, preferably in Information Technology, Information Security, or a related field. A master's degree in a related discipline is preferred.
2) At least 7+ years of experience in Information Technology or Information Security is required, with at least 3+ years of experience in a leadership role. Demonstrated experience with developing mapping controls to business processes, building control effectiveness reviews, or building risk ratings to allow business units to identify priorities is preferred.
3) A Certified Information System Security Professional (CISSP), Certified Information Security manager (CISM), or similar certification is required.
4) Demonstrate experience in evaluating vendor due diligence and vendor risk assessment processes.
5) Demonstrate experience in Identity Access Management including how to perform user access and rights reviews to align with least privilege access.
6) Demonstrate experience with developing and implementing a risk assessment process that is collaborative with business units and documents risk in accordance with board approved risk appetite.
7) Demonstrate strong leadership skills including the ability to work collaboratively and manage a remote workforce.
8) Demonstrate ability to drive and manage initiatives that increase operational efficiency, enhances quality, and improves/maintains service levels.
Information Systems Security Engineer (ISSE)
Information security analyst job in Dayton, OH
Subsidiary: KIRA Information Solutions
Job Title: Information System Security Engineer (ISSE)
Job Location: Hybrid-Position working with Wright-Patterson Air Force Base, Dayton, OH Labor Category: Exempt
Clearance Requirement: Secret Clearance, if required
In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer
Travel Requirement: Minimal, as needed
Salary: $120,000- $180,000
Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide.
THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law.
Scope of Work:
This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision.
Essential duties :
The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE [RD2] [KG3] assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows.
The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Required qualifications:
Bachelor's degree in engineering, science, mathematics, or a related field.
Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises.
Five years' experience in information technology management.
Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II).
U.S. citizenship.
Preferred qualifications:
Bachelor's degree in Computer Science or Information Management.
Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices.
Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.).
Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth).
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability.
To perform this job successfully, an individual must be able to perform all the essential duties of the position satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions. May be required to obtain and maintain a security clearance, including successfully completing a thorough background investigation.
If you need reasonable accommodations for any part of the employment process, please contact us and let us know the nature of your request. Requests for accommodation will be considered on a case-by-case basis.
Program Details:
This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. ETIMS is the Air Force System of Record for Technical Order (TO) management and is the Air Force's Enterprise Defense Business System (DBS) for managing TOs. TOs are military orders containing the authoritative procedures and instructions for operating and maintaining all U.S. Department of the Air Force equipment and systems.
ETIMS supports ~178,000 users at ~385 sites worldwide. It also supports ~60,000 eTOs, 54,000 ETIMS eTools, 14,000 paper TOs, and more than 13,000 TO libraries across the Air Force Enterprise. Agencies that rely on ETIMS for Air Force-related TOs and Computer Program Identification Numbers (CPINs) include the Army, Navy, Marines, Coast Guard, Foreign Military Sales (FMS), the National Aeronautics and Space Administration (NASA), The White House, and numerous Military Industrial Complex partners. ETIMS provides access to the official TO cataloging, managing, storing, distributing, and viewing capabilities needed by the operators and maintainers to support all Air Force weapon systems and equipment items.
ETIMS is a cloud-based enterprise system hosting Java and Windows applications accessing Oracle database in the AWS environment. The ETIMS migration to the Amazon Web Services (AWS) Air Force Cloud 1 environment and leveraging Agile Principles allows for processes to mature across the user community and enables streamlining and process improvement realized by the rapid delivery of follow-on capabilities. ETIMS has been modernized over the years to provide a fully capable Air Force enterprise TO Management system.
The Government Program Office is located at Wright Patterson Air Force Base in Dayton, Ohio. The development and support team are geographically dispersed and teleworking our daily working protocol.
Auto-ApplyInformation System Security Officer
Information security analyst job in Dayton, OH
Secure Your Future with the University of Dayton Research Institute! The University of Dayton's Research Institute (UDRI) is seeking a highly motivated and experienced Information System Security Officer to join our dynamic Sensor & Software Systems division in Warner Robins, GA. This is an exceptional opportunity to be part of a renowned research institution committed to excellence, innovation, and community engagement.
The Information System Security Officer (ISSO) position is supporting the Air Force Rapid Sustainment Office (RSO). The RSO increases mission readiness by rapidly identifying, applying and scaling technology essential to the operation and sustainment of the U.S. Air Force. Success comes from our teamwork and mutual respect for each other's talents and unique perspectives.
This role supports the government cyber lead and provides cybersecurity support for advanced software-intensive technologies to include agile manufacturing, conditioned-based maintenance, augmented reality/virtual reality, cloud-based infrastructure and services, and robotics.
Responsibilities:
• Serve as cybersecurity technical advisor, consultant, and primary point of contact to the Program Manager, Information System Owner, and other stakeholders for the Information systems
• Assessing systems for vulnerabilities and providing corrective recommendations.
• Supporting government Cyber lead in performing RMF activities leading to system RMF acceptance IAW DoDI 8510.01, NIST 800-series special publications, USAF policy and instructions, and guidance as applicable on RSO IT systems in networked, standalone, and cloud configurations.
• Support, coordinate, and continuously monitor system security posture and ensure adverse events are formally handled and reported
• Developing, reviewing, and updating necessary documentation associated with achieving RMF accreditation of each system.
• Applying currently accepted methods for documenting the RMF status of each RSO system within the DoD environment.
• Security Technical Implementation Guides (STIGs) for all systems
• Managing projects in compliance with DoD and AF RMF policies including but not limited to the following:
o DoDI 8500.01 - Cybersecurity Risk Management Framework for DoD Information Technology.
o DoD 8570.01 M - Information Assurance Training, Certification, and Workforce Management.
o CNSSI 1253 - Security Categorization and Control Selection for National Security Systems.
o NIST 800-series Special Publications (SP).
o Computer Security, including SP 800-53 - Security Controls and Assessment Procedures for Federal Information Systems and Organizations and Air Force Instruction Series 17.
Cyberspace:
Accomplishing system categorization, security control selection, security control implementation, security control assessment, and security control monitoring, including, but not limited to, accomplishing the RMF steps as outlined in DoDI 8510.01 on a system-by-system basis
• Providing system performance reporting.
• Support System Administrator for multiple cloud projects and implementations.
• Supporting Interim Authority to Test (IATT)/ Authority to Operate (ATO) planning and execution.
Minimum Qualifications:
• Associates Degree in Cybersecurity, Computer Science, or related field
• 3+ years relevant cybersecurity experience
• Experience with the NIST RMF process
• Security Technical Implementation Guides (STIGs) application experience
• The applicant must meet DoD 8570.01-M IAT Level II or higher certification requirements on hire date (Security+ CE)
• Familiarity with the DOD Information Assurance Vulnerability Management program
• Effective verbal and written communication skills
• Ability to obtain a Secret level security clearance
• Due to the requirements of our research contracts with the U.S. federal government, candidates for this position must be a U.S. citizen
Preferred Qualifications:
While not everyone may possess all of the preferred qualifications, the ideal candidate will bring many of the following:
• 5+ years' DoD cybersecurity experience
• IAT Level III or IAM Level I Certification
• Bachelor's Degree in Cybersecurity, Computer Science, or related field
• Additive Manufacturing experience
• Systems Administration experience
• Experience with Secure Development Operations Systems, as either a user, developer, or system administrator
• Experience with submission of system security package to DoD for ATO, IATO, etc
• Active Secret level security clearance.
• Familiarity with Enterprise Mission Assurance Support Service (eMASS).
• Experience with approved government cloud services such as Microsoft Azure, Amazon Web Services, Google Cloud.
• Relevant cloud infrastructure and security certifications (i.e. Office365, SharePoint, Amazon AWS)
• Cloud Application experience
• Experience managing various project activities ensuring accurate task completion
Special Instructions to Applicants:
To apply please submit a cover letter addressing each minimum qualification and any applicable preferred qualifications that you meet.
Closing Statement:
Informed by its Catholic and Marianist mission, the University is committed to the principles of diversity, equity, and inclusion. Informed by this commitment, we seek to increase diversity, achieve equitable outcomes, and model inclusion across our campus community. As an Affirmative Action and Equal Opportunity Employer, we will not discriminate against minorities, women, protected veterans, individuals with disabilities, or on the basis of age, race, color, national origin, religion, sex, sexual orientation or gender identity.
IT Security Audit Analyst
Information security analyst job in Mason, OH
Global Channel Management is a technology company that specializes in various types of recruiting and staff augmentation. Our account managers and recruiters have over a decade of experience in various verticals. GCM understands the challenges companies face when it comes to the skills and experience needed to fill the void of the day to day function. Organizations need to reduce training and labor costs but at same requiring the best "talent " for the job.
Qualifications
SKILLS REQUIREMENTS:Sound written and oral
communication skills required Demonstrates strong leadership and project
management skills within a team environment Must be able to adjust to
multiple demands, shifting priorities, and rapid change Must be results
and goal oriented, possess sound judgment and ability to apply critical
thought processes when developing solutions
EDUCATION & EXPERIENCE REQUIREMENTS:SAP/GRC
experience strongly preferred Bachelor's degree in Management
Information Systems, Computer Science or similar degree CISA
preferred1-3+ years large public accounting firm or general industry IT
audit experience preferred Must be experienced in performing audits
within a multi-platform, networked environment Specific Skills Needed:
Seeking an individual with the ability to learn quickly, attention to
details, strong communication skills (written and verbal) and reliable.
Specific skills: audit background, developed Policy and Procedures,
project management skills, information security background (optional),
HITRUST knowledge (optional)
Additional Information
$23/hr
6 MONTHS
Information Security Analyst (On-Site Position)
Information security analyst job in Miamisburg, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE **
At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
Competitive Compensation: Enjoy annual merit increases and bonuses.
Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
Secure Your Future: 401K plan and profit-sharing opportunities.
Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects.
Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
Bachelor's degree in Cybersecurity, Information Technology, or a related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (e.g., NIST, ISO 27001).
Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
Strong analytical and investigative mindset.
Clear, confident communication and collaboration skills.
Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Qualifications Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
Auto-ApplyInformation Security Compliance Analyst
Information security analyst job in Dayton, OH
":"As an Information Security Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cyber security assessments, help raise security awareness of associates, provide guidance on industry standard cyber security requirements, and track on-going activities that help meet our security and compliance goals.
If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Information Security Compliance Analyst","date":"2025-12-04","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Information Security Analyst 2
Information security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
Information Security Analyst 2
Job Duties
* Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
* Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
* Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
* Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
Minimum Qualifications
* 2-4 years related experience
* Associate's degree (Information Technology, Cyber Security, Computer Science)
* Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
Preferred Qualifications
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
Work Authorization:
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
Compensation and Benefits:
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Nearest Major Market: Lima
Nearest Secondary Market: Findlay
Job Segment: Information Security, Data Entry, Help Desk, Information Technology, Computer Science, Technology, Administrative
Information Systems Security Engineer (ISSE)
Information security analyst job in Dayton, OH
Subsidiary: KIRA Information Solutions
Job Title: Information System Security Engineer (ISSE)
Job Location: Hybrid-Position working with Wright-Patterson Air Force Base, Dayton, OH Labor Category: Exempt
Clearance Requirement: Secret Clearance, if required
In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer
Travel Requirement: Minimal, as needed
Salary: $120,000- $180,000
Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide.
THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law.
Scope of Work:
This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision.
Essential duties:
The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE [RD2] [KG3] assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows.
The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Required qualifications:
Bachelor's degree in engineering, science, mathematics, or a related field.
Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises.
Five years' experience in information technology management.
Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II).
U.S. citizenship.
Preferred qualifications:
Bachelor's degree in Computer Science or Information Management.
Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices.
Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.).
Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth).
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability.
To perform this job successfully, an individual must be able to perform all the essential duties of the position satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions. May be required to obtain and maintain a security clearance, including successfully completing a thorough background investigation.
If you need reasonable accommodations for any part of the employment process, please contact us and let us know the nature of your request. Requests for accommodation will be considered on a case-by-case basis.
Program Details:
This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. ETIMS is the Air Force System of Record for Technical Order (TO) management and is the Air Force's Enterprise Defense Business System (DBS) for managing TOs. TOs are military orders containing the authoritative procedures and instructions for operating and maintaining all U.S. Department of the Air Force equipment and systems.
ETIMS supports ~178,000 users at ~385 sites worldwide. It also supports ~60,000 eTOs, 54,000 ETIMS eTools, 14,000 paper TOs, and more than 13,000 TO libraries across the Air Force Enterprise. Agencies that rely on ETIMS for Air Force-related TOs and Computer Program Identification Numbers (CPINs) include the Army, Navy, Marines, Coast Guard, Foreign Military Sales (FMS), the National Aeronautics and Space Administration (NASA), The White House, and numerous Military Industrial Complex partners. ETIMS provides access to the official TO cataloging, managing, storing, distributing, and viewing capabilities needed by the operators and maintainers to support all Air Force weapon systems and equipment items.
ETIMS is a cloud-based enterprise system hosting Java and Windows applications accessing Oracle database in the AWS environment. The ETIMS migration to the Amazon Web Services (AWS) Air Force Cloud 1 environment and leveraging Agile Principles allows for processes to mature across the user community and enables streamlining and process improvement realized by the rapid delivery of follow-on capabilities. ETIMS has been modernized over the years to provide a fully capable Air Force enterprise TO Management system.
The Government Program Office is located at Wright Patterson Air Force Base in Dayton, Ohio. The development and support team are geographically dispersed and teleworking our daily working protocol.
Auto-ApplyInformation System Security Engineer (ISSE)
Information security analyst job in Dayton, OH
ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
**Why Work with us?**
Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.
**Responsibilities:**
+ Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.
+ Automate threat assessment and reporting activities.
+ Analyze and report system and organizational security posture trends to the ISSM/ISSO.
+ Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
+ Plan and recommend modifications or adjustments based on exercise results.
+ Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM
+ Audit support responsibilities
+ Analyze and report organizational security posture trends to the ISSM/ISSO
+ Analyze and report system security posture trends to the ISSM/ISSO
+ Apply security policies to meet security objectives of the system to the ISSM/ISSO
+ Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO
+ Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO
+ Assess the effectiveness of security controls and reports findings to the ISSM
+ Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements
+ Ensure all systems security operations and maintenance activities are properly documented and updated as necessary
+ Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM
+ Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation
+ Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM
+ Plan and recommend modifications or adjustments based on exercise results or system environment
+ Properly document all systems security implementation, operations and maintenance activities and updates necessary
+ Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities
+ Verify and update security documentation reflecting the application/system security design features
+ Verify minimum security requirements are in place for all applications
+ Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data
+ Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements
+ Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents
+ Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective
+ Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks
+ Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident
+ Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package
+ Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks.
+ Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system.
+ Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum
+ Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum
+ Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures
+ Monitors and investigates security breaches
+ Educates employees or clients about security procedures and programs
+ Other duties as assigned
**Requirements:**
+ Must be a US citizen
+ Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
+ Security+ Certification
+ 5+ years related experience in SCI/SAP environments.
+ Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.
+ 8-12 years demonstrated performance in related technology.
Minimum Security Clearance Required
+ Top Secret w/ SCI eligibility
Additional or Preferred Qualifications
+ 5+ years leadership experience in relevant area of business.
+ Technical certifications in Azure
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
Security Analyst - Indefinite US Work Authorization Required
Information security analyst job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Job Posting External**
**Primary Responsibilities:**
+ Lead the design and implementation of SIEM correlation rules and alert logic to detect advanced threats and suspicious behaviors.
+ Build and optimize SOAR playbooks to automate multi-step incident response actions.
+ Continuously tune alert thresholds and logic to reduce false positives and improve detection accuracy.
+ Integrate threat intelligence feeds into SIEM and SOAR platforms to enhance alert context and prioritization.
+ Investigate and respond to alerts, coordinating with IT, MDR, and security teams to validate and remediate incidents.
+ Maintain documentation for alert logic, playbook workflows, and incident handling procedures.
+ Mentor junior analysts on alert development, tuning, and automation best practices.
+ Participate in an on-call rotation to support timely response to critical alerts and incidents.
**Minimum Qualifications:**
+ High school diploma or equivalent is required.
+ Familiarity with SIEM platforms and basic alert logic.
+ Experience with scripting languages such as PowerShell or Python.
+ Understanding of cybersecurity fundamentals, including threat types and detection techniques.
+ 1+ years of experience in cybersecurity or a related field.
+ Strong analytical and problem-solving skills.
+ Willingness to participate in an on-call rotation.
**Preferred Qualifications:**
+ Bachelor's degree in cybersecurity, computer science, information technology, or a related field.
+ Exposure to SOAR platforms and basic playbook development.
+ Experience working with third-party MDR or managed security service providers.
+ Certification such as Security+, GSEC, or CEH.
+ Familiarity with threat intelligence sources and enrichment techniques.
+ Understanding of compliance frameworks such as NIST CSF or ISO 27001.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Information System Security Engineer (ISSE)
Information security analyst job in Dayton, OH
ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
Why Work with us?â¯
âApplied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.â¯Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.â¯â¯
Responsibilities:
Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.
Automate threat assessment and reporting activities.
Analyze and report system and organizational security posture trends to the ISSM/ISSO.
Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.
Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
Plan and recommend modifications or adjustments based on exercise results.
Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM
Audit support responsibilities
Analyze and report organizational security posture trends to the ISSM/ISSO
Analyze and report system security posture trends to the ISSM/ISSO
Apply security policies to meet security objectives of the system to the ISSM/ISSO
Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO
Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO
Assess the effectiveness of security controls and reports findings to the ISSM
Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements
Ensure all systems security operations and maintenance activities are properly documented and updated as necessary
Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM
Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed
Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation
Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM
Plan and recommend modifications or adjustments based on exercise results or system environment
Properly document all systems security implementation, operations and maintenance activities and updates necessary
Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities
Verify and update security documentation reflecting the application/system security design features
Verify minimum security requirements are in place for all applications
Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data
Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements
Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents
Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective
Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks
Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident
Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package
Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks.
Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system.
Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum
Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum
Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures
Monitors and investigates security breaches
Educates employees or clients about security procedures and programs
Other duties as assigned
Requirements:
Must be a US citizen
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Security+ Certification
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.
8-12 years demonstrated performance in related technology.
Minimum Security Clearance Required
Top Secret w/ SCI eligibility
Additional or Preferred Qualifications
5+ years leadership experience in relevant area of business.
Technical certifications in Azure
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.