Cloud Security Engineer
Information security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cloud Security Engineer
Information security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Information Security Analyst
Information security analyst job in Philadelphia, PA
About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations.
Responsibilities:
Configure and maintain firewalls, VPNs, and IDS/IPS systems.
Perform network security monitoring and incident response.
Conduct penetration testing and simulate attacks to identify weaknesses.
Harden routers, switches, and network devices.
Optimize performance without compromising security.
Requirements:
3+ years experience in network engineering/security.
Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls.
Experience with network protocols (TCP/IP, DNS, SSL, VPN).
CCNA Security, CCNP Security, or equivalent certifications.
Required Skills:
Information Security Security
Analyst III - Information Security
Information security analyst job in Conshohocken, PA
Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today!
Job Details
Job Description for IAM Hygiene Analyst III role
This role is responsible for supporting the Execution and Improvement of IAM operations across the enterprise, specifically within the IAM Hygiene space. This role will assist with continuously detecting, remediating, and preventing identity-related risks by maintaining accurate, minimal, and secure identity data, access configurations, and authentication mechanisms, as well as assisting with other IAM Governance related functions where needed. The Analyst II will be responsible to generate possible hygiene actions (hypotheses), using approved Cencora tooling, to proactively identify and escalate potential identity-related control gaps, data integrity issues, process deficiencies, and other hygiene concerns; collaborate with stakeholders to validate gaps, evaluate root causes and drive timely remediation.
This role is key to creating and maintaining a mature IAM Hygiene function to ensure access is controlled, organized, and following the concept of āleast privilegeā. The ideal candidate will have hands-on experience remediating identity and access related risks.
This role works closely with more senior IAM analysts, engineers, and business stakeholders to ensure secure and efficient access to systems and data. The Analyst II also supports the development of IAM procedures, participates in user support and troubleshooting, and contributes to continuous improvement efforts. They are expected to demonstrate learning agility, attention to detail, and a strong commitment to operational excellence and user experience.
Primary Duties and Responsibilities:
Identify and take appropriate actions around unused or stale accounts.
Identify and take appropriate actions around unused or stale accounts.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Monitor and analyze identity-related activities to identify and remediate risky accounts, authorizations, and configurations, ensuring compliance with policies.
Assist in the development and maintenance of comprehensive processes for identity threat detection and response, including the creation of runbooks and workflows.
Collaborate with cross-functional teams to evaluate and align on identity analytics tools and data structures to enhance IAM capabilities.
Develop and track key performance indicators (KPIs) and key risk indicators (KRIs) for IAM hygiene, providing insights and recommendations to improve identity management practices.
Support the establishment of a culture of continuous improvement by leveraging incident learnings to refine IAM processes and protocols.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Qualifications:
4+ years of experience IAM or related field
1+ years in an IAM Hygiene or IAM Governance role
Bachelors degree or equivalent experience
Skills and Knowledge:
Behavioral:
Strong understanding of IAM concepts, practices, and technologies including Least Privilege, Privileged Access Management (PAM), Identity Lifecycle management and access controls
Familiarity with SailPoint
Familiarity with Axonius (preferred)
Familiarity with NIST framework
Strong analytical and problem-solving skills, with the ability to interpret data and make informed decisions.
Ability to operate independently and within a team structure
Effective communication and collaboration skills
Strong time management, with ability to multi-task and shift from task to task effectively in a fast-paced environment.
Technical Skills:
IAM Lifecycle and Access provisioning
Authentication Support (MFA and SSO)
IAM Policy and Standards (NIST, ISO 27001, HITRUST)
IT Risk and Compliance Awareness
Root Cause Analysis and Incident Support
Reporting and Documentation
Threat Monitoring and Alert Response
Tools Knowledge:
IAM Platforms (e.g., SailPoint, Saviynt, Okta, Ping Identity)
Directory Services (Active Directory, Azure AD)
ITSM Tools (e.g., ServiceNow)
Security Tools (SIEM, EDR, SOAR)
Programming/Scripting (e.g., Python, PowerShell, SQL)
Microsoft Office Suite
What Cencora offers
We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members' ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit **************************************
Full time Equal Employment Opportunity
Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law.
The company's continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory.
Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call ************ or email ****************. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned
Affiliated CompaniesAffiliated Companies: AmerisourceBergen Services Corporation
Auto-ApplyInformation System Security Officer (ISSO) III
Information security analyst job in Philadelphia, PA
Full-time Description
Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity, we remain committed to upholding honesty, trust, respect, and ethical standards in all our endeavors. We are a certified SBA 8(a) small, disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offer our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense, make working here more than a job; it's the Digital family.
Digital Consultants seeks an Information System Security Officer (ISSO) III who provides cybersecurity support and oversight for Navy systems in accordance with DoD Risk Management Framework (RMF) and Navy Cybersecurity policies. The ISSO assists the ISSM in ensuring system compliance, maintains RMF package documentation, and supports vulnerability management and cybersecurity reporting in support of NSWCPD Code 104.
Duties to include:
Support the Information System Security Manager (ISSM) in all aspects of system cybersecurity compliance and accreditation.
Develop, review, and maintain RMF accreditation packages, including System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), POA&Ms, and Continuous Monitoring strategies.
Ensure implementation and validation of security controls in accordance with NIST SP 800-53, DoD 8510.01 (RMF), and Navy SCA business rules.
Monitor systems for vulnerabilities, review STIG and SRG scan results, and track remediation in eMASS/VRAM.
Conduct and document security incident response actions and report to the ISSM.
Provide cybersecurity status reporting, technical risk analysis, and compliance metrics to leadership.
Coordinate with system administrators, engineers, and Navy program offices to ensure security requirements are integrated into system lifecycle management.
Requirements
Clearance: Top Secret, US Citizen only
Education: Bachelor's Degree in Computer Science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Certifications: DoD 8570/8140 IAM Level II (CAP, CASP+ce, CISM, CISSP, GSLC, CCISO, HCISPP) OR IAT Level II baseline certification (CCNA-Security, CySA+, GICSP, GSEC, Security+ce, CND, SSCP)
Experience: Minimum 7 years of cybersecurity or A&A experience, with at least 5 years as an ISSO or equivalent security role. Experience must include:
Developing and maintaining RMF lifecycle documentation.
Assessing and validating implementation of security controls.
Conducting risk and vulnerability reviews, documenting results, and supporting system accreditation.
Expert knowledge of DoD RMF, NIST SP 800-53, and Navy cybersecurity compliance processes.
Proficiency in eMASS, ACAS, VRAM, and DISA STIG compliance tools.
Ability to coordinate across engineering, operations, and program management teams to resolve cybersecurity issues.
Ability to work on-site at NSWCPD Philadelphia and travel CONUS as required.
The candidate must, with or without reasonable accommodation, be able to sit, stand, use computers and monitors, and perform duties in an office environment for extended periods. The candidate must be able to lift up to 40 lbs. on occasion (e.g., moving a case of paper or similar task) that may occur occasionally.
Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, veteran status or any other protected characteristic.
We provide reasonable accommodation to individuals who require assistance at any stage of the employment process. If you need assistance navigating Digital Consultants' job openings or applying for a position, please email ************************** or call ************. Please provide your contact information so we can assist you.
Salary Description $130,000 - 170,000
Senior Manager, Information Security Office Consultant
Information security analyst job in Philadelphia, PA
Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Information System Security Officer (ISSO III) - US Navy
Information security analyst job in Philadelphia, PA
The Information System Security Officer (ISSO) III will support the Navy in ensuring that information systems remain secure, compliant, and mission-ready. This role is responsible for implementing cybersecurity controls, monitoring security posture, supporting incident response, and ensuring compliance with Department of Navy, NAVSEA, and DoD cybersecurity requirements.
Responsibilities
Implement and manage information security controls across Navy IT systems.
Ensure compliance with cybersecurity regulations, directives, and published policies.
Conduct vulnerability and threat analyses, document findings, and recommend corrective actions.
Support cybersecurity incident response activities including isolation of affected assets, initial investigation, evidence collection, and status reporting.
Monitor systems for suspicious activity, unauthorized access, and security misconfigurations.
Prepare and maintain system security documentation to support accreditation and assessment processes.
Provide updates, reports, and security briefings to Navy leadership and program managers.
Collaborate with system administrators, engineers, and other cybersecurity personnel to maintain confidentiality, integrity, and availability of Navy information systems.
Requirements
Education:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or other STEM discipline.
Experience:
Minimum 6 years of experience coordinating and enacting security changes within an organization.
Experience with vulnerability and threat analysis, compliance enforcement, and incident response.
Familiarity with DoD and Navy cybersecurity practices and reporting requirements.
Skills & Knowledge:
Proficiency in identifying, analyzing, and mitigating cybersecurity threats.
Strong understanding of Risk Management Framework (RMF), system accreditation processes, and DoD cybersecurity directives.
Excellent communication and reporting skills with the ability to provide clear, actionable recommendations.
Certifications:
Must hold a baseline certification as outlined in the Cybersecurity Workforce (CSWF) requirements (e.g., Security+ CE, CISSP, CISM, or equivalent).
Security Clearance Requirements
Active Secret clearance
Salary Description 85,000 - 150,000
INFORMATION SYSTEM SECURITY OFFICER (ISSO) III (Req 25 066)
Information security analyst job in Philadelphia, PA
Responsibilities: Assists the Information System Security Managers (ISSM) in executing their duties and responsibilities. Ensures compliance with all cybersecurity policies. Ensures relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals. Coordinates cybersecurity processes and activities for assigned systems. Maintains and reports Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs. Provides oversight of Security Plans for assigned systems throughout their lifecycle. Manages and maintains Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and where possible, remediated. Assists with the identification of security control baselines and applicable overlays. Coordinates the validation of security controls with Navy Qualified Validators (NQV). Performs Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews. Adjudicates findings from Package Submitting Officer (PSO). Registers and maintains systems in Enterprise Mission Assurance Support Service (eMASS). Plans and coordinates security control testing during Risk Assessments and Annual Security Reviews. Reports changes in system security posture to the ISSM. Ensures the execution of Continuous Monitoring related requirements as defined in the System Level Continuous Monitoring (SLCM) Strategy. Reviews all data produced by Continuous Monitoring activities, updates the eMASS record as necessary, and escalates to leadership for action, if required. Correlates findings from non-RMF vulnerability assessments, penetration testing, Command Cyber Operational Readiness Inspection (CCORI), etc.) to RMF controls for tracking, ensuring a holistic risk assessment. Participates in change control and configuration management processes. Maintains vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Please go to Openings | Amelex to apply for this position.
Certificates/Security Clearances/Other
An Active Secret Security Clearance is required.
Minimum Certification Requirement: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP is required.
Education: Bachelor's degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited institution as recognized by the U.S. Department of Education
Experience: Six (6) years of DoD experience coordinating and enacting required security changes, within various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
Information System Security Officer (ISSO III) - US Navy
Information security analyst job in Philadelphia, PA
Requirements
Education:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or other STEM discipline.
Experience:
Minimum 6 years of experience coordinating and enacting security changes within an organization.
Experience with vulnerability and threat analysis, compliance enforcement, and incident response.
Familiarity with DoD and Navy cybersecurity practices and reporting requirements.
Skills & Knowledge:
Proficiency in identifying, analyzing, and mitigating cybersecurity threats.
Strong understanding of Risk Management Framework (RMF), system accreditation processes, and DoD cybersecurity directives.
Excellent communication and reporting skills with the ability to provide clear, actionable recommendations.
Certifications:
Must hold a baseline certification as outlined in the Cybersecurity Workforce (CSWF) requirements (e.g., Security+ CE, CISSP, CISM, or equivalent).
Security Clearance Requirements
Active Secret clearance
Salary Description 85,000 - 150,000
Information System Security Officer (Contingent)
Information security analyst job in Philadelphia, PA
Information System Security Officer (ISSO) Rothe Development, Inc. (RDI) is seeking a skilled Information System Security Officer (ISSO) to support the cybersecurity posture of Navy information systems. The ISSO will play a critical role in ensuring systems are secure, compliant, and resilient against cyber threats in accordance with DoD and Navy cybersecurity policies. Contingent upon contract award to Rothe, this position will be based on-site in Philadelphia, Pennsylvania, and requires an active Secret security clearance. Key Responsibilities:
Implement and manage security controls for Navy information systems in compliance with DoD directives and RMF (Risk Management Framework).
Conduct system security risk assessments and vulnerability analyses.
Develop and maintain system security plans (SSPs), POA&Ms, and other required documentation.
Monitor system security status and support continuous monitoring activities.
Coordinate with system owners, administrators, and other stakeholders to ensure security requirements are met.
Support incident response efforts and investigations as needed.
Ensure compliance with NIST, DoD, and Navy cybersecurity standards and policies.
Qualifications:
U.S. Citizenship and active Secret clearance required.
Bachelor's degree in Cybersecurity, Information Technology, or related field (or equivalent experience).
Minimum of 3-5 years of experience in information system security, preferably within DoD environments.
Strong knowledge of RMF, NIST SP 800-53, and DoD cybersecurity policies.
Experience with eMASS, ACAS, and other DoD cybersecurity tools is preferred.
Security+ CE or equivalent DoD 8570 IAT Level II certification required.
Work Environment:
This is an on-site position located in Philadelphia, PA. Remote work is not available. Rothe is an EEO/AA/Disability/Vets Employer and complies with E-Verify Rothe shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities, and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sexual orientation, gender identity, national origin, disability or veteran status. To apply complete online submission at **************************
Information Systems Security Officer (ISSO)
Information security analyst job in Philadelphia, PA
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyInformation System Security Officer (ISSO) III (Contingent)
Information security analyst job in Philadelphia, PA
The Information System Security Officer (ISSO) provides direct cybersecurity and information assurance support to Information System Security Managers (ISSMs), ensuring compliance with all DoD, DON, and NAVSEA cybersecurity policies.
This position is contingent upon contract award.
Please ensure resume has the following information:
Name
Updated Contact information
Dates of employment MM/YYYY to MM/YYYY
Key Responsibilities:
Maintain and report Assessment & Authorization (A&A) status for assigned systems.
Manage Plans of Action and Milestones (POA&Ms) and ensure vulnerability remediation.
Register and maintain systems in eMASS and VRAM; oversee continuous monitoring activities.
Coordinate security control validations with Navy Qualified Validators (NQV).
Review Risk Management Framework (RMF) Standard Operating Procedures and adjudicate findings.
Track, document, and escalate changes in security posture as needed.
Correlate results from non-RMF vulnerability assessments to RMF controls for comprehensive risk tracking.
Qualifications:
Bachelor's degree in Computer Science, Cybersecurity, or related discipline.
DoD 8570 compliant certification (e.g., CISSP, CISM, Security+ CE).
7+ years of experience in system security and RMF implementation.
Information System Security Officer (ISSO) III
Information security analyst job in Philadelphia, PA
Paragon Cyber Solutions is hiring a skilled Information System Security Officer (ISSO) III to support cybersecurity and compliance functions in direct support of the Naval Surface Warfare Center Philadelphia Division (NSWCPD). This position is contingent upon contract award.
The ISSO III will play a vital role in implementing and maintaining security controls, supporting incident response, and ensuring overall system compliance with Department of Defense (DoD) cybersecurity standards and frameworks. If you're looking for an opportunity to make an impact while supporting national security, we want to hear from you.
Requirements
Ensure security compliance across information systems by implementing DoD cybersecurity policies, standards, and guidelines.
Assist in applying Risk Management Framework (RMF) requirements for system security accreditation and authorization.
Coordinate and enforce required security changes and control implementations across systems and networks.
Conduct vulnerability scans, threat assessments, and cyber risk analysis on mission systems.
Support cyber incident response efforts including investigation, containment, documentation, and reporting.
Perform continuous monitoring of system security postures and coordinate with other cybersecurity personnel to maintain system integrity.
Prepare and maintain system security documentation, including System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and security assessment reports.
Participate in site inspections, compliance audits, and assessments by government or third-party assessors.
Education
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or a related STEM field from an accredited college or university.
Experience
At least 6 years of relevant experience coordinating security implementation, policy compliance, vulnerability/threat assessments, and supporting incident response and investigation efforts.
Certifications (one or more required):
Must meet IAM Level II IAWF baseline certification standards under DoD 8140/8570.01-M, with at least one of the following:
CAP (Certified Authorization Professional)
CASP+ CE (CompTIA Advanced Security Practitioner)
CISM (Certified Information Security Manager)
CISSP (or Associate)
GSLC (GIAC Security Leadership Certification)
CCISO (Certified Chief Information Security Officer)
HCISPP (HealthCare Information Security and Privacy Practitioner)
Benefits
Health Care Plan (Medical, Dental & Vision).
Retirement Plan (401K w/ employer matching).
Paid Time Off & Paid Federal Holidays.
Short and Long-Term Disability.
Healthy Work-Life Balance.
Auto-ApplyINFORMATION SYSTEM SECURITY OFFICER (ISSO) III (Req 25 066)
Information security analyst job in Philadelphia, PA
Responsibilities: Assists the Information System Security Managers (ISSM) in executing their duties and responsibilities. Ensures compliance with all cybersecurity policies. Ensures relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals. Coordinates cybersecurity processes and activities for assigned systems. Maintains and reports Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs. Provides oversight of Security Plans for assigned systems throughout their lifecycle. Manages and maintains Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and where possible, remediated. Assists with the identification of security control baselines and applicable overlays. Coordinates the validation of security controls with Navy Qualified Validators (NQV). Performs Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews. Adjudicates findings from Package Submitting Officer (PSO). Registers and maintains systems in Enterprise Mission Assurance Support Service (eMASS). Plans and coordinates security control testing during Risk Assessments and Annual Security Reviews. Reports changes in system security posture to the ISSM. Ensures the execution of Continuous Monitoring related requirements as defined in the System Level Continuous Monitoring (SLCM) Strategy. Reviews all data produced by Continuous Monitoring activities, updates the eMASS record as necessary, and escalates to leadership for action, if required. Correlates findings from non-RMF vulnerability assessments, penetration testing, Command Cyber Operational Readiness Inspection (CCORI), etc.) to RMF controls for tracking, ensuring a holistic risk assessment. Participates in change control and configuration management processes. Maintains vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Education: Bachelors degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited institution as recognized by the U.S. Department of Education
Experience: Six (6) years of DoD experience coordinating and enacting required security changes, within various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
Minimum Certification Requirement: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP is required.
Other: An Active Secret Security Clearance is required.
Benefits Information: We offer a generous benefits package including a 401k with employer match. Full time employees are also eligible for family medical, dental and vision benefits; as well as ancillary benefits including life and accidental death and dismemberment insurance; short- and long-term disability; flexible spending accounts; long-term care insurance; and accident, hospital, and critical illness insurance. Full-time employees are also eligible for 2 weeks vacation leave accrual per year (this accrual increase as tenure with company increases), 7 days sick leave, and 11 paid holidays, with additional leave time available for bereavement, jury duty, and military training days throughout the year.
Information System Security Officer III
Information security analyst job in Philadelphia, PA
Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization.
**This position is contingent upon award of contract**
Key Responsibilities:
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of information systems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Required Skills/Experience:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field.
A minimum of 6 years of relevant experience in cybersecurity or information systems security.
Prior experience supporting Navy programs.
Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M.
At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary.
Proficiency in cybersecurity frameworks, risk management processes, and security controls.
Strong analytical and problem-solving skills with attention to detail.
Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team.
Preferred Qualifications:
Experience with DoD security requirements and systems.
Familiarity with NIST, RMF, and other relevant cybersecurity standards.
Ability to work in a potentially remote environment with occasional on-site requirements.
Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment.
About Us:
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
GPS Sr. Specialist, Overnight Museum Security
Information security analyst job in Philadelphia, PA
Schedule: Full Time, 11 pm - 7 am, 5 days/wk
Rate: $21.01/hr.
Primary Function: The Guest and Protection Services Senior Specialist plays a key role in front-line operations by providing the team with constant visual surveillance information and access control to help provide an exceptional guest and staff experience, as well as to ensure the safety and protection of the art collection and the Foundation's buildings and grounds. The Senior Specialist provides a best-in-class experience to every person who works in and visits our institution. This includes engaging guests in conversation about the art collection and the Foundations history, answering questions, enforcing rules, looking out for suspicious behavior, and maintaining the integrity of our back of house spaces and processes. Guest and Protection Services Senior Specialists are part of a team that are truly the face of the Barnes Foundation and work under the direction of the Assistant Director of Guest and Protection Services to ensure a visit to the Barnes is informative, friendly, respectful and safe.
Job Qualifications
Education/Training/Experience:
Two (2) to three (3) years of any combination of training or experience in security or protection services, customer/guest services, hospitality, or event management.
High School diploma or equivalent education and experience.
Must have a pleasant demeanor and a genuine interest in communication with members of staff and the public. Outgoing personality with excellent interpersonal skills.
Demonstrates strong attention to detail with excellent observational and reasoning skills.
Ability to understand and apply a significant amount of detailed information. Shows a demonstrated ability to multi-task.
Ability to be a calm presence during periods of high volume, stress, or unusual events.
Proficiency in digital tools including patrol scanning devices, modern communication tools, and building security and access control systems, ticket scanners, tour devices, and the Barnes App.
Knowledge or interest in art, protection and safety. Art background/interest a plus.
Must be able to engage guests in conversational English; bilingual or multilingual skills a plus.
Highly organized.
Must have a flexible schedule with the ability to work weekends and holidays.
Physical A ctivities to Perform Essential Functions:
To perform this job successfully, an individual must be able to perform each essential job duty satisfactorily. Reasonable accommodations may be made to enable qualified individuals with disabilities to perform essential job functions.
Moving:
Ability to stand and walk for 8-hour shifts with minimal rest breaks.
Ability to occasionally transport up to 25 lbs. of files, equipment or supplies. Ability to move to access files, equipment or supplies.
Vision Requirements:
Continual use of computers and display screens.
Communication Requirements:
Clearly communicate in person, by phone, and by video conference. Communicate with others in conversational and written English.
Working Conditions:
Position operates in the foundation's buildings and on the foundation's grounds at the Philadelphia campus.
Position requires extended time on the computer.
Job Responsibilities:
Ensure that the building and grounds are welcoming and safe for visitors and guests.
Oversees the safety and protection of the Foundation's art collection, property, and grounds by enforcing Foundation rules and regulations. Upholds all Barnes service, protection, and communication policies.
Monitors the building and collection utilizing building video, security and access control systems. Provides access control to the facility, managing who enters and exits. When assigned, continuously monitors service yard and controls loading dock activity.
Superior level customer service ability; acts as a concierge providing information and advice to guests and staff on foundation policies in front and back of house. Will interact with guests, employees, board members, potential clients, event attendees, site contractors, vendors, and other partners.
Engages with guests on the Foundation's history, collection, programs, events, classes, and amenities. Coordinates guest services such as coat check, tour device preparation, and visitation collateral. Upholds protection policies in public spaces and ensures visitor compliance. Monitors guest behavior and reports anything unusual to his/her supervisor.
Manages the VIP process making sure our special guests are greeted, parties being visited are notified promptly, if necessary, and the overall experience at the Barnes Foundation is exceptional.
Handles challenging situations with the public quickly and effectively, with skill and professionalism.
Performs bag inspection to prevent prohibited items from entering the building.
Conducts continuous tours of both the interior and exterior of the building, inspecting areas for potential hazards, mechanical failures, and other abnormalities.
Provide pertinent information to supervisor for any issues or concerns that have significance and would need their attention. Continuously expands required knowledge of facility including services, collection, exhibitions, safety, protection and actively participating in trainings.
Ability to observe and report out of the ordinary circumstances based on working knowledge.
Completes required reports, logs, and journals as needed.
Serve as a critical member of the emergency response team, providing guidance and help to guests and information to the supervisor on duty for emergency situations including fire, theft, damage and protest.
Supports other Guest and Protection Services staff in their duties.
Adheres to and follows Foundation policies, including those regarding attendance, punctuality and dress code.
Performs other duties as assigned.
Organization-Wide Competencies:
1. Accountability:
a. Prepares for work assignments and meetings,
b. Conducts thorough fact-finding, decision-making and/or follow through,
c. Admits mistakes and errors and informs others when one is not able to meet a commitment.
2. Job Quality:
a. Dependably demonstrates job knowledge necessary for the position,
b. Produces timely, accurate, high quality work output,
c. Prioritizes work responsibilities effectively and produces work quantity expected for the role.
3. Service:
a. Identifies problems and collaborate with others to devise and create effective solutions.
b. Interacts and communicates with fellow employees in a manner that promotes a harmonious and
cooperative working environment in accordance with our Core Values.
c. Facilitates open communication and keeps an open mind about new ideas.
4. Leadership:
a. Sets a good example for others,
b. Demonstrates ethical decision-making and communication,
c. Makes decisions. Uses a solution-oriented, collaborative approach.
5. Collaboration:
a. Seeks win-win outcomes in decision-making,
b. Shows a proactive, inclusive, helpful, and respectful attitude to colleagues, guests and others,
c. Takes initiative to contribute to diversity, equity, inclusion, and accessibility initiatives.
Auto-ApplySpecialist, Information Assurance Compliance II (SIAC2)
Information security analyst job in Philadelphia, PA
Job Description
Type: Full Time
Overtime Exempt: Exempt
Reports To: ARMADA HQ
Travel Required: Yes
Security Clearance Required: Active Secret Security Clearance
************CONTINGENT UPON AWARD***************
Duties & Responsibilities:
Specialist, Information Assurance Compliance II (SIAC2) will collect and collate system or site information and use it to evaluate and document in Enterprise Mission Assurance Support Service (eMASS) the security posture of the system or site being Assessed, Authorized, and maintained. Will have access to the unclassified and classified Navy eMASS system.
Develop, submit, and maintain RMF packages in accordance with DoD Instruction 8510.01, NAVSEA Business Rules, DON RMF Process Guides, NAVSEA Standard Operating Procedures (SOPs), and the business rules of cognizant review offices. Should there be any conflicting interpretations, request for clarification/adjudication will be resolved in the Technical Instruction.
Specialist, Information Assurance Compliance II (SIAC2) will develop the RMF package documentation required for submission in accordance with DoD/NAVSEA directives. Some examples include AO Determination Request Package and Checklist, System Platform IT (PIT) Determination, Categorization Form, HW/SW lists, Authorization Boundary Diagrams, Defense in Depth Diagrams, PPSM list, Privacy Impact Assessment (PIA). E-Authentication Questionnaire, System Level Continuous Monitoring Strategy (SLCM), Security Plan (SP), RMF Step SOP checklists, Plan of Actions and Milestones (POA&M), Security Assessment Plan (SAP), Security Technical Implementation Guide (STIG), Alternate Forms of Compliance, Security Assessment Report (SAR), Risk Assessment Report (RAR), Security Authorization Package, Package Endorsement Letters. Products shall be created in the appropriate software (i.e. Microsoft Visio, scanning software, eMASS DISA STIG Viewer, eMASSTER etc.).
Develop or revise existing policies, plans, and strategy documents to meet requirements for RMF Control Families and ensure all IA requirements have been addressed. Some examples include an Incident Response plan, Contingency plan, Information Assurance Vulnerability Management plan, Configuration Management plan, System Development plan, and Physical Security plan. Evaluate all discrepancies and recommend potential mitigation measures for reducing or eliminating specific risks.
Specialist, Information Assurance Compliance II (SIAC2) will conduct risk and vulnerability assessments of planned and installed systems to identify vulnerabilities, risks and protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on package content and assessment results and documenting for the Security Controls Assessor's (SCA) and higher level review.
Execute Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Specialist, Information Assurance Compliance II (SIAC2) will develop and maintain in eMASS a Plan of Action and Milestone (POA&M) for all IA-related tasks and deliverables. The POA&M should include findings from required Security Technical Implementation Guides (STIGs), vulnerability test results, automated scan reviews, Assured Compliance Assessment Solution (ACAS) scans, Security Content Automation Protocol (SCAP), Evaluate STIG, and other DoD-mandated assessment-utilities. eMASS shall be utilized to assist in POA&M creation.
Conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate and represent the current risk posture of the system.
Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, Security Information and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS).
Specialist, Information Assurance Compliance II (SIAC2) will assess impacts from observed risks and report via the Cybersecurity Program chain of command.
Executing Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Specialist, Information Assurance Compliance II (SIAC2) will perform the evaluation of system administrator, security engineer, and/or system owner proposed corrections to ensure compliance and best-fit solution.
Present and submit data to management, develop reports, and produce procedural documentation in a comprehensive and cohesive manner.
Specialist, Information Assurance Compliance II (SIAC2) will develop and update, at frequency specified in each package, all required eMASS documents, to include Plan of Actions and Milestones (POA&Ms)/ Risk Assessment Reports (RARs) and Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs); products shall be created in the appropriate software (i.e. Microsoft Visio, scanning software, eMASS DISA STIG Viewer, etc.)
Determine a system's compliance with all applicable Controls and Assessment Procedures (APs) for an assigned DoN system, including developing the appropriate test procedures, if necessary; executing the test procedures; and accurately documenting the results of security The analysts shall update the eMASS record for the assigned system(s).
Track deliverables and action items in accordance with A&A guidance.
Specialist, Information Assurance Compliance II (SIAC2) will manage, attend, and support configuration control board practices.
Ensure RMF artifacts are in compliance with published Navy, NAVSEA Business Rules (OPNAV N2N6 and/or NAVSEA), NIST SP-800-37 and SP-800-53 Rev 4. In addition, local NSWCPD policies and procedures may apply. Command Information System Security Manager (ISSM) will resolve any conflicting interpretations.
Specialist, Information Assurance Compliance II (SIAC2) will write technical documentation such as user manuals, reports, documentation, policies, presentations, Plan of Action and Milestones (POA&Ms), risk assessments, proposals, outlines, and summaries in support of both ashore and afloat systems across multiple platforms. Support the development of technical documents across multiple platforms including conļ¬guration management, milestone, issue tracking, web site content management and RMF documentation.
may be required to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). The estimated number of trips is 14 per year (estimated 25%-30% travel).
Other duties as assigned.
Knowledge, Skills, and Abilities (KSAs):
Ability to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe).
Proficient in Microsoft Windows Operating System Administration, including Windows 11, Windows 10, Windows 7, and Windows XP (at a minimum).
Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance.
Possess excellent organizational and file management skills and the ability to plan and execute administrative work with little supervision.
Possess excellent oral and written communication skills.
Required Certifications:
Minimum of one (1) IAM Level II listed certificate required:
IAM Level II certifications (CAP - Certified Authorization Professional, CASP+ CE - CompTIA Advanced Security Practitioner, CISM - Certified Information Security Manager, CISSP (or Associate of CISSP), GSLC - GIAC Security Leadership Certification, CCISO - Certified Chief Information Security Officer, HCISPP - HealthCare Information Security and Privacy Practitioner)
Minimum/General Experience:
Four (4) years of professional experience in Information Assurance Compliance.
Minimum Education:
Bachelor's degree (Computer Science, Information Technology or related technical degree) from accredited College or University.
Disclaimer:
The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ******************
Special Notes: Relocation is not available for these jobs
ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
Information Systems Security Engineer III (ISSE III)
Information security analyst job in Philadelphia, PA
Dynamic Solutions Technology, LLC, a premier strategic services firm that meets IT and Service needs for commercial and government clients, is seeking a full-time Information Systems Security Engineer III (ISSE III). This position is an exempt role that support will be provided on site in the government customer's area of operation in the Philadelphia, PA location.
----------------------------------------------------- Active Secret Clearance Required --------------------------------------
RESPONSIBILIES
Assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans, which include System Categorization Forms, Platform Information Technology (PIT) Determination
Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams,
Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M).
Execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO).
Identify and tailor IT and Cyber Security (CS) control baselines based on RMF guidelines and categorization of the RMF boundary.
Perform Ports, Protocols, and Services Management (PPSM).
Perform IT and CS vulnerability-level risk assessments.
Execute security control testing as required by a risk assessment or annual security review (ASR).
Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements.
Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS).
Develop and maintain system level IT and CS policies and procedures for respective RMF boundaries in accordance with guidance provided by the command ISSMs.
Implement and assess STIG and SRGs.
Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG.
Deploy security updates to Information System components.
Perform routine audits of IT system hardware and software components.
Maintain inventory of Information System components.
Participate in IT change control and configuration management processes.
Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Image or re-image assets that are part of the assigned RMF boundary.
Install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries' assets.
Assist with removal of Solid-State Drive (SSD), Hard Disk Drive (HDD) or other critical components of assets before destruction and removal from the RMF boundary.
Support configuration change documentation and control processes and maintaining DOD STIG Compliance.
Support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware; This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware.
Report compliance issues of network hardware to management to avoid operational loss of the network.
EXPERIENCE AND EDUCATION REQUIREMENTS:
Secret security clearance required
Bachelor's degree in computer science, information technology, or an equivalent STEM l degree from an accredited college or university.
Minimum Seven (7) years professional relevant experience
Must Meet DoD IAT-III level Certification Requirements: At a minimum 2-3 of one of the following certifications: CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP
Experience and Skills:
Excellent oral and written skills.
Excellent critical thinking skills.
Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook.
Ability to work independently and as a team member
Ability to learn and apply technical concepts to assigned duties
Information Security Systems Engineer-Ss
Information security analyst job in Philadelphia, PA
McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division.
The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments.
Requirements
Key Responsibilities
Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems.
Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series.
Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP.
Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals.
Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements.
Required Qualifications
Education: BS in Computer Science or relevant field.
Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments.
Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP.
Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial.
Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance.
Equal Employment Opportunity Statement:
McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws.
EEO is the Law:
Applicants and employees are protected under Federal law from discrimination.
Information Systems Security Officer (ISSO)
Information security analyst job in Philadelphia, PA
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Easy Apply