Principal Cloud Security Engineer
Information security analyst job in Philadelphia, PA
Title: Cloud Security Principal Engineer
Job Duration: 6 months (Contract to Hire)
We are seeking an experienced Cybersecurity Engineer to strengthen enterprise security across cloud and on-prem environments. This role focuses on enhancing identity, access, and threat protection capabilities while supporting automation, compliance, and continuous security improvement. The ideal candidate brings strong hands-on security engineering skills, deep Azure experience, and proven success designing and operating security controls within large, complex environments.
Responsibilities
Implement, configure, and maintain enterprise security tools including SIEM, EDR, IAM, and CSPM solutions
Engineer and operate security controls across Azure and hybrid environments
Lead IAM / RBAC / user access governance initiatives to improve authentication and authorization workflows
Monitor, investigate, and respond to security threats through SIEM and SOC processes
Drive automation of security and identity tasks using Terraform, PowerShell, and scripting
Collaborate with infrastructure, applications, and architecture teams to ensure secure design and deployment practices
Support vulnerability remediation, risk assessments, and compliance requirements
Contribute to security standards, documentation, and best practices for ongoing maturity and scalability
Required Qualifications
CISSP certification (mandatory)
12+ years overall IT experience across network, systems, and/or application platforms
6+ years in Cybersecurity with a focus on security engineering
3+ years in IAM / RBAC / identity governance
Strong hands-on knowledge of Azure Security, virtualization, and Microsoft security ecosystem
Experience with security monitoring and defense tools such as:
Microsoft Sentinel, Microsoft Defender, Splunk, Wiz (or similar)
Skilled in automation using Terraform, PowerShell, or equivalent scripting tools
Preferred Qualifications
Additional cloud security certifications (e.g., AZ-500, CCSP)
Experience supporting security in healthcare or regulated industries
Familiarity with DevSecOps practices and secure CI/CD integration
Work Environment
Hybrid: ~80% remote / 20% onsite each week
Location: Philadelphia Metro area
Contract-to-permanent conversion opportunity
Candidates must be willing to commute onsite as required
Why Join
Visible role influencing enterprise-wide security posture
Opportunity to work with modern security technologies in critical infrastructure
Long-term career potential through contract-to-hire pathway
Cloud Security Engineer
Information security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cyber Security Analyst
Information security analyst job in Media, PA
As the Cyber Security Analyst, you will design and implement IT security policies and systems to protect the organization's computer networks from cyber-attacks. You will also help develop organization-wide best practices for IT security, including security training for staff. You will monitor computer networks for security issues, install security software, and document all security issues or breaches you find. You will report vulnerabilities to management as identified and in a timely manner and ensure remediation.
Essential Duties
Under the general direction of the CIO, the Cyber Security Analyst will:
* Create countywide cybersecurity policies for approval and implementation.
* Perform daily monitoring and support of all systems and networks to identify security issues.
* Investigate security breaches and other cybersecurity incidents.
* Install security measures and operate software to protect systems and information infrastructure, including firewalls, IDS/IPS, and other security systems.
* Document security breaches and assess the damage they cause.
* Work with the IT team to perform tests and uncover network vulnerabilities.
* Fix detected vulnerabilities to maintain a high-security standard.
* Stay current on IT security trends and news.
* Recommend changes to company policies to advance best practices for IT security.
* Perform vulnerability scanning and penetration testing.
* Help colleagues install security software and understand information security management.
* Participate in disaster recovery testing.
* Work cross-functionally as needed to improve the security posture of the organization, including SQA and development team resources.
* Coordinate the collection of security controls evidence in support of certification and customer audits; participate in audits as needed.
* Assist with completion of security questionnaires for customers, partners, and RFP responses.
Qualifications
* 3 years of experience working with Windows operating systems.
* 3 years of experience working with cloud services from a security perspective.
* 5 years of experience working with networking equipment, including switches, routers, firewalls, proxy servers, VPNs, and IDS/IPS.
* Detailed knowledge of network troubleshooting tools such as Fiddler, Wireshark, and Traceroute.
* 3 years of experience working with identity and access authorization systems such as Active Directory, LDAP, and Radius.
* Strong working knowledge of encryption protocols, ciphers, and the configuration of systems.
* Knowledge of current computer security practices and network protocols.
* Experience with Nexpose, Metasploit, or similar security software.
* Customer service-focused and detail-oriented.
* Ability to work effectively as an individual contributor and collaboratively in workgroups.
Physical Requirements
While performing the duties of this position, the employee is frequently required to read documents in paper and electronic form, sit, walk, and talk or hear. Occasionally, the employee will need to stand and climb stairs; reach above shoulder height; and kneel, stoop, crouch, or squat. On rare occasions, the employee will need to lift or carry items.
Work Environment
* 8:30 a.m. to 5:00 p.m. 40 weekly hours.
* Extended hours may be required to meet agency needs.
Contact
To
Information Security Analyst
Information security analyst job in Philadelphia, PA
About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations.
Responsibilities:
Configure and maintain firewalls, VPNs, and IDS/IPS systems.
Perform network security monitoring and incident response.
Conduct penetration testing and simulate attacks to identify weaknesses.
Harden routers, switches, and network devices.
Optimize performance without compromising security.
Requirements:
3+ years experience in network engineering/security.
Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls.
Experience with network protocols (TCP/IP, DNS, SSL, VPN).
CCNA Security, CCNP Security, or equivalent certifications.
Required Skills:
Information Security Security
Cyber Information Assurance Analyst
Information security analyst job in Parkesburg, PA
APPLICATION INSTRUCTIONS: * CURRENT PENN STATE EMPLOYEE (faculty, staff, technical service, or student), please login to Workday to complete the internal application process. Please do not apply here, apply internally through Workday. * CURRENT PENN STATE STUDENT (not employed previously at the university) and seeking employment with Penn State, please login to Workday to complete the student application process. Please do not apply here, apply internally through Workday.
* If you are NOT a current employee or student, please click "Apply" and complete the application process for external applicants.
Approval of remote and hybrid work is not guaranteed regardless of work location. For additional information on remote work at Penn State, see Notice to Out of State Applicants.
POSITION SPECIFICS
We are searching for an experienced Information Systems Security Manager (ISSM) to join our Cybersecurity Division at the Applied Research Laboratory (ARL) at Penn State. Information Technology Services provides ARL's administrative and research computing environments and capabilities, delivering secure, responsive, efficient, effective, and compliant IT services and operations to meet the demanding needs of ARL's leading edge research.
This position will have a focus on the unclassified space, overseeing and owning the unclassified information security program, including implementing our various compliance requirements like the Cybersecurity Maturity Model Certification (CMMC). This ISSM will however operate within and support both unclassified and collateral spaces, backing up fellow ISSM's and enforcing commonalities between environments where possible. They will be responsible for developing and maintaining policy and security documentation, providing cybersecurity recommendations for system, network, and application design, leading information system risk assessments, assist in leading incident response actions, setting standards for continuous monitoring processes such as auditing or vulnerability assessments, and ensuring cybersecurity requirements are effectively and efficiently communicated to operational and researcher team leadership to ensure integration into their respective team processes.
ARL is an authorized DoD SkillBridge partner and welcomes all transitioning military members to apply.
You will:
* Develop, validate, submit, and maintain information system security plans, certification and authorization packages, and plans of action and milestones in support of compliance requirements
* Oversee development and implementation of risk assessments against information systems in all phases of their lifecycles
* Provide cybersecurity recommendations for system, network, and application design
* Monitor and assist in the assessment and review of current and new systems and networks to ensure compliance with current cybersecurity policies, concepts, and measures
* Develop training material related to compliance and audit requirements to assist employees in individual compliance/audits as applicable
* Assist in technical requirements such as; vulnerability scanning, review of security/event logs, network analysis, and incident response on an as-needed basis
Required skills/experience areas include:
* Current eligibility for access to classified information at the Top-Secret level or higher and may be subject to a government background investigation to upgrade clearance eligibility, if required
* Assessment and Authorization experience of systems and networks using CMMC and RMF
* NIST/ISO standards (eg. NIST SP 800-53 and NIST SP 800-171), Department of Defense directives, DISA STIG, and regulatory requirements
* Strong technical background, with significant experience using multiple operating systems to include Windows and Linux
* Policy, procedure, plan of action and milestone, risk assessment and security plan development with experience of continuous monitoring for compliance with said documentation
* System functions, security policies, technical security safeguards, and operational security measures
* The ability to certify and maintain information security related certifications
(eg. Security+, CISSP, and any other required certifications)
* Excellent communications, analytical and problem-solving skills
* Efficient organizational, multitasking, and time management abilities
Preferred skills/experience areas include:
* A Bachelor's degree in Information Security, Information Technology, or Computer Science
* Management or leadership experience in IT and information security space
* Vulnerability scanning and mitigation utilizing Nessus, Retina, GFI Languard, or similar tool
* Experience with networking fundamentals including various concepts, tools, and administrative functions
* Working knowledge of container image security and experience overseeing security for containerized environments (docker, podman, etc)
* SEIM management or use for analysis, such as Splunk, ELK, or AlienVault
* VMWare and management of Virtual Machines
* Training material development
Your working location will be located in State College, PA in a hybrid on-site/work from home format. Questions related to flexible work should be directed to the hiring manager during the interview process. This position will require periodic travel to remote locations.
MINIMUM EDUCATION, WORK EXPERIENCE & REQUIRED CERTIFICATIONS
If filled as Cyber Information Assurance Analyst - Principal Professional, this position requires:
Master's Degree
8+ years of relevant experience; or an equivalent combination of education and experience accepted
Required Certifications:
None
If filled as Cyber Information Assurance Analyst - Senior Professional, this position requires:
Bachelor's Degree
6+ years of relevant experience; or an equivalent combination of education and experience accepted
Required Certifications:
None
ARL's purpose is to research and develop innovative solutions to challenging scientific, engineering, and technology problems in support of the Navy, the Department of Defense (DoD), and the Intel Community (IC).
FOR FURTHER INFORMATION on ARL, visit our web site at ****************
BACKGROUND CHECKS/CLEARANCES
Employment with the University will require successful completion of background check(s) in accordance with University policies.
All positions at ARL require candidates to possess the ability to obtain a government security clearance; you will be notified during the interview process if this position is subject to a government background investigation. You must be a U.S. citizen to apply. Employment with the ARL will require successful completion of a pre-employment drug screen.
SALARY & BENEFITS
The salary range for this position, including all possible grades, is $86,300.00 - $145,700.00.THE PROPOSED SALARY RANGE MAY BE IMPACTED BY GEOGRAPHIC DIFFERENTIAL
Salary Structure - Information on Penn State's salary structure
Penn State provides a competitive benefits package for full-time employees designed to support both personal and professional well-being. In addition to comprehensive medical, dental, and vision coverage, employees enjoy robust retirement plans and substantial paid time off which includes holidays, vacation and sick time. One of the standout benefits is the generous 75% tuition discount, available to employees as well as eligible spouses and children. For more detailed information, please visit our Benefits Page.
CAMPUS SECURITY CRIME STATISTICS
Pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act and the Pennsylvania Act of 1988, Penn State publishes a combined Annual Security and Annual Fire Safety Report (ASR). The ASR includes crime statistics and institutional policies concerning campus security, such as those concerning alcohol and drug use, crime prevention, the reporting of crimes, sexual assault, and other matters. The ASR is available for review here.
EEO IS THE LAW
Penn State is an equal opportunity employer and is committed to providing employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. If you are unable to use our online application process due to an impairment or disability, please contact ************.
Federal Contractors Labor Law Poster
PA State Labor Law Poster
Penn State Policies
Copyright Information
Hotlines
Auto-ApplyCyber Security Analyst
Information security analyst job in Wilmington, DE
Details:
Stefanini Group is hiring!
Exciting opportunity awaits, let us help you get started!
Click Apply now or you may call: **************/ email: Deepak Tyagi (**************************) for faster processing!
Job Description:
The Cyber Monitoring Analyst will be part of the Cyber Operations team that is responsible for monitoring and investigating alerts to identify potential incidents. The individual will be required to work closely with other members of the Cyber Operations team to ensure the successful delivery of the alert monitoring, triage, and escalation. Specifically, the Cyber
Monitoring Associate will have the following key responsibilities:
Perform real-time analysis and correlation of logs/alerts.
Follow detailed operational procedures to appropriately analyze, escalate, and assist in remediation of security events.
Utilize multiple security technologies to investigate and analyses alerts.
Deliver timely and detailed documentation related to any incident including the findings, review, and follow-up activities
Participate in the creation, modification and maintenance of all Cyber Monitoring policies and procedures
Keep abreast of cyber security trends and the emerging threat landscape in general
Details:
What the ideal candidate looks like:
1-4 years of experience in IT, IT Security, Security, Technical helpdesk, Security Operations are preferred
Understanding various Cloud technologies such as Azure, AWS, GCP is highly desirable
Also desirable is if they have performed investigation of high severity threats, in on-Prem technologies or in cloud
Strong oral and written communication skills including the ability to interact directly with individuals that do not have an IT background.
Intermediate knowledge of endpoint and network security concepts and tools preferred.
Knowledge of ServiceNow.
Crowdstrike, highly desired.
Experience with event monitoring and security reporting
Ability to exercise sound technical, interpersonal, and organizational judgment while evaluating and solving complex problems.
*Listed salary ranges may vary based on experience, qualifications, and local market. Also, some positions may include bonuses or other incentives*
About Stefanini Group
The Stefanini Group is a global provider of offshore, onshore and near shore outsourcing, IT digital consulting, systems integration, application and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like Americas, Europe, Africa and Asia, and more than 400 clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting, company with global presence. We are CMM Level 5 company.
#LI-DT1
#LI-HYBRID
Easy ApplyInformation System Security Officer (ISSO) III
Information security analyst job in Philadelphia, PA
Full-time Description
Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity, we remain committed to upholding honesty, trust, respect, and ethical standards in all our endeavors. We are a certified SBA 8(a) small, disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offer our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense, make working here more than a job; it's the Digital family.
Digital Consultants seeks an Information System Security Officer (ISSO) III who provides cybersecurity support and oversight for Navy systems in accordance with DoD Risk Management Framework (RMF) and Navy Cybersecurity policies. The ISSO assists the ISSM in ensuring system compliance, maintains RMF package documentation, and supports vulnerability management and cybersecurity reporting in support of NSWCPD Code 104.
Duties to include:
Support the Information System Security Manager (ISSM) in all aspects of system cybersecurity compliance and accreditation.
Develop, review, and maintain RMF accreditation packages, including System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), POA&Ms, and Continuous Monitoring strategies.
Ensure implementation and validation of security controls in accordance with NIST SP 800-53, DoD 8510.01 (RMF), and Navy SCA business rules.
Monitor systems for vulnerabilities, review STIG and SRG scan results, and track remediation in eMASS/VRAM.
Conduct and document security incident response actions and report to the ISSM.
Provide cybersecurity status reporting, technical risk analysis, and compliance metrics to leadership.
Coordinate with system administrators, engineers, and Navy program offices to ensure security requirements are integrated into system lifecycle management.
Requirements
Clearance: Top Secret, US Citizen only
Education: Bachelor's Degree in Computer Science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Certifications: DoD 8570/8140 IAM Level II (CAP, CASP+ce, CISM, CISSP, GSLC, CCISO, HCISPP) OR IAT Level II baseline certification (CCNA-Security, CySA+, GICSP, GSEC, Security+ce, CND, SSCP)
Experience: Minimum 7 years of cybersecurity or A&A experience, with at least 5 years as an ISSO or equivalent security role. Experience must include:
Developing and maintaining RMF lifecycle documentation.
Assessing and validating implementation of security controls.
Conducting risk and vulnerability reviews, documenting results, and supporting system accreditation.
Expert knowledge of DoD RMF, NIST SP 800-53, and Navy cybersecurity compliance processes.
Proficiency in eMASS, ACAS, VRAM, and DISA STIG compliance tools.
Ability to coordinate across engineering, operations, and program management teams to resolve cybersecurity issues.
Ability to work on-site at NSWCPD Philadelphia and travel CONUS as required.
The candidate must, with or without reasonable accommodation, be able to sit, stand, use computers and monitors, and perform duties in an office environment for extended periods. The candidate must be able to lift up to 40 lbs. on occasion (e.g., moving a case of paper or similar task) that may occur occasionally.
Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, veteran status or any other protected characteristic.
We provide reasonable accommodation to individuals who require assistance at any stage of the employment process. If you need assistance navigating Digital Consultants' job openings or applying for a position, please email ************************** or call ************. Please provide your contact information so we can assist you.
Salary Description $130,000 - 170,000
Jr. Information Security Analyst (Controls Testing)
Information security analyst job in Malvern, PA
At Customers Bank, we believe in working hard, working smart, working together to deliver memorable customer experiences and having fun. Our vision, mission, and values guide us along our path to achieve excellence. Passion, attitude, creativity, integrity, alignment, and execution are cornerstones of our behaviors. They define who we are as an organization and as individuals. Everyone is encouraged to have personal development plans. By doing so, our team members are on their way to achieve their highest potential and be successful in their personal and professional lives.
This role is required to be ONSITE in Malvern, PA Monday through Thursday with Friday remote.
Must be eligible to work in the U.S. without requiring sponsorship now or in the future.
Who is Customers Bank?
Founded in 2009, Customers Bank is a super-community bank with over $22 billion in assets. We believe in dedicated personal service for the businesses, professionals, individuals, and families we work with.
We get you further, faster.
Focused on you: We provide every customer with a single point of contact. A dedicated team member who's committed to meeting your needs today and tomorrow.
On the leading edge: We're innovating with the latest tools and technology so we can react to market conditions quicker and help you get ahead.
Proven reliability: We always ground our innovation in our deep experience and strong financial foundation, so we're a partner you can trust.
What you'll do:
* Control Testing & Evaluation: Assist in definition of and execute testing procedures to assess the design and effectiveness of key internal controls across business units, technology, and operational processes.
* Risk & Compliance Alignment: Ensure testing activities are aligned with regulatory standards (SOX, FFIEC, FDIC, etc.) and internal policies.
* Issue Identification & Reporting: Document test results, identify control deficiencies, and provide clear recommendations for remediation.
* Collaboration: Work closely with business process owners, auditors, compliance, and risk teams to ensure timely resolution of identified issues.
* Process Improvement: Recommend enhancements to testing methodologies, control design, and risk management practices to strengthen the bank's control environment. Maintain awareness of industry regulatory environment and threat landscape.
* Documentation & Communication: Prepare executive-ready reports, dashboards, and presentations for senior management and regulators, and information technology peers.
* Continuous Monitoring: Participate in ongoing monitoring and follow-up activities to confirm remediation effectiveness and sustainability.
What do you need?
* Must-Haves
* 3+ years of experience in internal audit, compliance testing, risk management, or internal controls.
* Strong knowledge of information security and IT risk control frameworks (e.g., COSO, COBIT, NIST).
* Understanding of financial, operational, and IT control environments.
* Strong analytical skills with attention to detail and accuracy.
* Excellent written and verbal communication skills with the ability to present complex findings clearly.
* Bachelor's degree in information systems, or related field.
* Key Skills
* Risk and control assessments in highly regulated environments
* Understanding of information technology infrastructure (networking, Active Directory, backups, etc.)
* Process analysis and documentation.
* Strong interpersonal skills to work across departments.
* Proficiency with Microsoft Office applications (Excel, Word, PowerPoint).
* Develop and maintain working relationships with audit, GRC, and IT teams to promote continuous control awareness and improvements.
* Nice-to-Haves
* Professional certifications such as CIA, CISSP, CISA, Microsoft certifications, or CRMA.
* Experience with GRC (Governance, Risk, and Compliance) tools.
* Banking or financial services industry experience
Customers Bank is an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
We also provide "reasonable accommodations", upon request, to qualified individuals with disabilities, in accordance with the Americans with Disabilities Act and applicable state and local laws.
Diversity Statement:
At Customers Bank, we believe in working smart, working together, and having fun while delivering innovative solutions and memorable experiences for our customers. We are committed to the continual advancement of a culture which reflects the value we place on diversity, equity, and inclusion. We honor the diverse experiences, perspectives, and identities of our team members, and we recognize that it is their passion, creativity, and integrity that drives our success. Step into your future with us! Let's take on tomorrow.
Auto-ApplyAnalyst III - Information Security
Information security analyst job in Conshohocken, PA
Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today!
Job Details
Job Description for IAM Hygiene Analyst III role
This role is responsible for supporting the Execution and Improvement of IAM operations across the enterprise, specifically within the IAM Hygiene space. This role will assist with continuously detecting, remediating, and preventing identity-related risks by maintaining accurate, minimal, and secure identity data, access configurations, and authentication mechanisms, as well as assisting with other IAM Governance related functions where needed. The Analyst II will be responsible to generate possible hygiene actions (hypotheses), using approved Cencora tooling, to proactively identify and escalate potential identity-related control gaps, data integrity issues, process deficiencies, and other hygiene concerns; collaborate with stakeholders to validate gaps, evaluate root causes and drive timely remediation.
This role is key to creating and maintaining a mature IAM Hygiene function to ensure access is controlled, organized, and following the concept of āleast privilegeā. The ideal candidate will have hands-on experience remediating identity and access related risks.
This role works closely with more senior IAM analysts, engineers, and business stakeholders to ensure secure and efficient access to systems and data. The Analyst II also supports the development of IAM procedures, participates in user support and troubleshooting, and contributes to continuous improvement efforts. They are expected to demonstrate learning agility, attention to detail, and a strong commitment to operational excellence and user experience.
Primary Duties and Responsibilities:
Identify and take appropriate actions around unused or stale accounts.
Identify and take appropriate actions around unused or stale accounts.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Monitor and analyze identity-related activities to identify and remediate risky accounts, authorizations, and configurations, ensuring compliance with policies.
Assist in the development and maintenance of comprehensive processes for identity threat detection and response, including the creation of runbooks and workflows.
Collaborate with cross-functional teams to evaluate and align on identity analytics tools and data structures to enhance IAM capabilities.
Develop and track key performance indicators (KPIs) and key risk indicators (KRIs) for IAM hygiene, providing insights and recommendations to improve identity management practices.
Support the establishment of a culture of continuous improvement by leveraging incident learnings to refine IAM processes and protocols.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Qualifications:
4+ years of experience IAM or related field
1+ years in an IAM Hygiene or IAM Governance role
Bachelors degree or equivalent experience
Skills and Knowledge:
Behavioral:
Strong understanding of IAM concepts, practices, and technologies including Least Privilege, Privileged Access Management (PAM), Identity Lifecycle management and access controls
Familiarity with SailPoint
Familiarity with Axonius (preferred)
Familiarity with NIST framework
Strong analytical and problem-solving skills, with the ability to interpret data and make informed decisions.
Ability to operate independently and within a team structure
Effective communication and collaboration skills
Strong time management, with ability to multi-task and shift from task to task effectively in a fast-paced environment.
Technical Skills:
IAM Lifecycle and Access provisioning
Authentication Support (MFA and SSO)
IAM Policy and Standards (NIST, ISO 27001, HITRUST)
IT Risk and Compliance Awareness
Root Cause Analysis and Incident Support
Reporting and Documentation
Threat Monitoring and Alert Response
Tools Knowledge:
IAM Platforms (e.g., SailPoint, Saviynt, Okta, Ping Identity)
Directory Services (Active Directory, Azure AD)
ITSM Tools (e.g., ServiceNow)
Security Tools (SIEM, EDR, SOAR)
Programming/Scripting (e.g., Python, PowerShell, SQL)
Microsoft Office Suite
What Cencora offers
We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members' ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit **************************************
Full time Equal Employment Opportunity
Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law.
The company's continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory.
Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call ************ or email ****************. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned
Affiliated CompaniesAffiliated Companies: AmerisourceBergen Services Corporation
Auto-ApplyInformation Systems Security Officer (ISSO)
Information security analyst job in Philadelphia, PA
ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:
* Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades.
* Maintain responsibility for managing cybersecurity risk from an organizational perspective.
* Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.
* Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.
* Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).
* Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
* Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.
* Provide subject matter expertise for cyber security and trusted system technology.
* Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.
* Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes.
* Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.
* Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:
* Bachelor's Degree.
* A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.
* eMASS experience.
* Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.
* Strong desktop publishing skills using Microsoft Word and Excel.
* Experience with industry writing styles such as grammar, sentence form, and structure.
* Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:
* CISSP, CASP, or a similar certificate is preferred.
* Master's Degree in Cybersecurity or related field.
* Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.
* Demonstrated ability to work well independently and as a part of a team.
* Excellent work ethic and a high commitment to quality.
Our Commitment:
Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.
Health, Dental, and Vision
Life Insurance
401k
Flexible Spending Account (Health, Dependent Care, and Commuter)
Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!
Explore additional job opportunities with CGS on our Job Board:
*************************************
For more information about CGS please visit: ************************** or contact:
Email: [email protected]
#CJ
$92,213.33 - $125,146.66 a year
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Information System Security Officer III
Information security analyst job in Philadelphia, PA
Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization.
**This position is contingent upon award of contract**
Key Responsibilities:
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of information systems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Required Skills/Experience:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field.
A minimum of 6 years of relevant experience in cybersecurity or information systems security.
Prior experience supporting Navy programs.
Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M.
At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary.
Proficiency in cybersecurity frameworks, risk management processes, and security controls.
Strong analytical and problem-solving skills with attention to detail.
Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team.
Preferred Qualifications:
Experience with DoD security requirements and systems.
Familiarity with NIST, RMF, and other relevant cybersecurity standards.
Ability to work in a potentially remote environment with occasional on-site requirements.
Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment.
About Us:
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Information System Security Officer (ISSO) III - Naval Surface Warfare Center
Information security analyst job in Philadelphia, PA
Requirements
**Target Education:** - Bachelor's degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering, and mathematics (STEM) degree from an accredited college or university.
**Target Experience:**
- A minimum of six (6) years of experience in coordinating and executing required security changes, ensuring compliance with organizational policies.
- Extensive experience conducting cybersecurity vulnerability assessments, threat analyses, and supporting cyber incident response activities.
**Skills:**
- Strong analytical and problem-solving skills to assess cybersecurity issues and recommend solutions.
- Excellent communication skills for conveying complex information effectively to various audiences.
- In-depth knowledge of cybersecurity principles, policies, and best practices.
- Familiarity with the DoD A&A process and RMF guidelines.
Salary Description 85,000 - 150,000
Information System Security Officer (Contingent)
Information security analyst job in Philadelphia, PA
Information System Security Officer (ISSO) Rothe Development, Inc. (RDI) is seeking a skilled Information System Security Officer (ISSO) to support the cybersecurity posture of Navy information systems. The ISSO will play a critical role in ensuring systems are secure, compliant, and resilient against cyber threats in accordance with DoD and Navy cybersecurity policies. Contingent upon contract award to Rothe, this position will be based on-site in Philadelphia, Pennsylvania, and requires an active Secret security clearance. Key Responsibilities:
Implement and manage security controls for Navy information systems in compliance with DoD directives and RMF (Risk Management Framework).
Conduct system security risk assessments and vulnerability analyses.
Develop and maintain system security plans (SSPs), POA&Ms, and other required documentation.
Monitor system security status and support continuous monitoring activities.
Coordinate with system owners, administrators, and other stakeholders to ensure security requirements are met.
Support incident response efforts and investigations as needed.
Ensure compliance with NIST, DoD, and Navy cybersecurity standards and policies.
Qualifications:
U.S. Citizenship and active Secret clearance required.
Bachelor's degree in Cybersecurity, Information Technology, or related field (or equivalent experience).
Minimum of 3-5 years of experience in information system security, preferably within DoD environments.
Strong knowledge of RMF, NIST SP 800-53, and DoD cybersecurity policies.
Experience with eMASS, ACAS, and other DoD cybersecurity tools is preferred.
Security+ CE or equivalent DoD 8570 IAT Level II certification required.
Work Environment:
This is an on-site position located in Philadelphia, PA. Remote work is not available. Rothe is an EEO/AA/Disability/Vets Employer and complies with E-Verify Rothe shall abide by the requirements of 41 CFR 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities, and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sexual orientation, gender identity, national origin, disability or veteran status. To apply complete online submission at **************************
Information System Security Officer (ISSO) III (Contingent)
Information security analyst job in Philadelphia, PA
The Information System Security Officer (ISSO) provides direct cybersecurity and information assurance support to Information System Security Managers (ISSMs), ensuring compliance with all DoD, DON, and NAVSEA cybersecurity policies.
This position is contingent upon contract award.
Please ensure resume has the following information:
Name
Updated Contact information
Dates of employment MM/YYYY to MM/YYYY
Key Responsibilities:
Maintain and report Assessment & Authorization (A&A) status for assigned systems.
Manage Plans of Action and Milestones (POA&Ms) and ensure vulnerability remediation.
Register and maintain systems in eMASS and VRAM; oversee continuous monitoring activities.
Coordinate security control validations with Navy Qualified Validators (NQV).
Review Risk Management Framework (RMF) Standard Operating Procedures and adjudicate findings.
Track, document, and escalate changes in security posture as needed.
Correlate results from non-RMF vulnerability assessments to RMF controls for comprehensive risk tracking.
Qualifications:
Bachelor's degree in Computer Science, Cybersecurity, or related discipline.
DoD 8570 compliant certification (e.g., CISSP, CISM, Security+ CE).
7+ years of experience in system security and RMF implementation.
Information System Security Officer (ISSO) III
Information security analyst job in Philadelphia, PA
Paragon Cyber Solutions is hiring a skilled Information System Security Officer (ISSO) III to support cybersecurity and compliance functions in direct support of the Naval Surface Warfare Center Philadelphia Division (NSWCPD). This position is contingent upon contract award.
The ISSO III will play a vital role in implementing and maintaining security controls, supporting incident response, and ensuring overall system compliance with Department of Defense (DoD) cybersecurity standards and frameworks. If you're looking for an opportunity to make an impact while supporting national security, we want to hear from you.
Requirements
Ensure security compliance across information systems by implementing DoD cybersecurity policies, standards, and guidelines.
Assist in applying Risk Management Framework (RMF) requirements for system security accreditation and authorization.
Coordinate and enforce required security changes and control implementations across systems and networks.
Conduct vulnerability scans, threat assessments, and cyber risk analysis on mission systems.
Support cyber incident response efforts including investigation, containment, documentation, and reporting.
Perform continuous monitoring of system security postures and coordinate with other cybersecurity personnel to maintain system integrity.
Prepare and maintain system security documentation, including System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and security assessment reports.
Participate in site inspections, compliance audits, and assessments by government or third-party assessors.
Education
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or a related STEM field from an accredited college or university.
Experience
At least 6 years of relevant experience coordinating security implementation, policy compliance, vulnerability/threat assessments, and supporting incident response and investigation efforts.
Certifications (one or more required):
Must meet IAM Level II IAWF baseline certification standards under DoD 8140/8570.01-M, with at least one of the following:
CAP (Certified Authorization Professional)
CASP+ CE (CompTIA Advanced Security Practitioner)
CISM (Certified Information Security Manager)
CISSP (or Associate)
GSLC (GIAC Security Leadership Certification)
CCISO (Certified Chief Information Security Officer)
HCISPP (HealthCare Information Security and Privacy Practitioner)
Benefits
Health Care Plan (Medical, Dental & Vision).
Retirement Plan (401K w/ employer matching).
Paid Time Off & Paid Federal Holidays.
Short and Long-Term Disability.
Healthy Work-Life Balance.
Auto-ApplyINFORMATION SYSTEM SECURITY OFFICER (ISSO) III (Req 25 066)
Information security analyst job in Philadelphia, PA
Responsibilities: Assists the Information System Security Managers (ISSM) in executing their duties and responsibilities. Ensures compliance with all cybersecurity policies. Ensures relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals. Coordinates cybersecurity processes and activities for assigned systems. Maintains and reports Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs. Provides oversight of Security Plans for assigned systems throughout their lifecycle. Manages and maintains Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and where possible, remediated. Assists with the identification of security control baselines and applicable overlays. Coordinates the validation of security controls with Navy Qualified Validators (NQV). Performs Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews. Adjudicates findings from Package Submitting Officer (PSO). Registers and maintains systems in Enterprise Mission Assurance Support Service (eMASS). Plans and coordinates security control testing during Risk Assessments and Annual Security Reviews. Reports changes in system security posture to the ISSM. Ensures the execution of Continuous Monitoring related requirements as defined in the System Level Continuous Monitoring (SLCM) Strategy. Reviews all data produced by Continuous Monitoring activities, updates the eMASS record as necessary, and escalates to leadership for action, if required. Correlates findings from non-RMF vulnerability assessments, penetration testing, Command Cyber Operational Readiness Inspection (CCORI), etc.) to RMF controls for tracking, ensuring a holistic risk assessment. Participates in change control and configuration management processes. Maintains vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Please go to Openings | Amelex to apply for this position.
Certificates/Security Clearances/Other
An Active Secret Security Clearance is required.
Minimum Certification Requirement: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP is required.
Education: Bachelor's degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited institution as recognized by the U.S. Department of Education
Experience: Six (6) years of DoD experience coordinating and enacting required security changes, within various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
Information System Security Officer (ISSO) III - Naval Surface Warfare Center
Information security analyst job in Philadelphia, PA
The Naval Surface Warfare Center Philadelphia Division (NSWCPD) is a Department of Defense entity focused on research and development, test and evaluation, engineering, and fleet support for the Navy's ships, submarines, military watercraft, and unmanned vehicles. We are seeking a knowledgeable Information System Security Officer (ISSO) to join NSWCPD Code 104, which oversees the Information Technology Operations Division, providing cybersecurity and information assurance support for the Navy Marine Corp Intranet (NMCI) Network and associated Business Systems.
**Position Summary:**
The ISSO III will be responsible for the development, monitoring, and execution of the Cybersecurity Program in support of Code 104. This includes managing the DoD Information Assessment and Authorization (A&A) process and implementing Risk Management Framework (RMF) services. The candidate will develop and enforce cybersecurity policies, review A&A artifacts, conduct A&A validation, and ensure the implementation of appropriate security postures across various systems. The ISSO III will provide subject matter expertise in cybersecurity lifecycle management, coordinate the sustainment of labs under RMF, and support organizational incident response efforts.
**Key Responsibilities:**
- Develop, implement, and maintain the Cybersecurity Program in accordance with DoD guidelines.
- Coordinate and enact necessary security changes to ensure compliance with published policies at various organizational levels.
- Conduct cybersecurity vulnerability and threat analyses, providing actionable insights and recommendations.
- Support cyber incident responses, including isolating potentially affected assets and conducting initial investigations and data collection.
- Perform ongoing reviews of A&A artifacts, ensuring that all documentation meets compliance requirements.
- Validate A&A processes and ensure that security postures are effectively implemented and sustained.
- Collaborate with various teams to coordinate the implementation and operation of labs under RMF.
- Provide training and support to staff on cybersecurity best practices and policies.
Requirements
**Target Education:**
- Bachelor's degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering, and mathematics (STEM) degree from an accredited college or university.
**Target Experience:**
- A minimum of six (6) years of experience in coordinating and executing required security changes, ensuring compliance with organizational policies.
- Extensive experience conducting cybersecurity vulnerability assessments, threat analyses, and supporting cyber incident response activities.
**Skills:**
- Strong analytical and problem-solving skills to assess cybersecurity issues and recommend solutions.
- Excellent communication skills for conveying complex information effectively to various audiences.
- In-depth knowledge of cybersecurity principles, policies, and best practices.
- Familiarity with the DoD A&A process and RMF guidelines.
Salary Description 85,000 - 150,000
INFORMATION SYSTEM SECURITY OFFICER (ISSO) III (Req 25 066)
Information security analyst job in Philadelphia, PA
Responsibilities: Assists the Information System Security Managers (ISSM) in executing their duties and responsibilities. Ensures compliance with all cybersecurity policies. Ensures relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals. Coordinates cybersecurity processes and activities for assigned systems. Maintains and reports Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs. Provides oversight of Security Plans for assigned systems throughout their lifecycle. Manages and maintains Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and where possible, remediated. Assists with the identification of security control baselines and applicable overlays. Coordinates the validation of security controls with Navy Qualified Validators (NQV). Performs Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews. Adjudicates findings from Package Submitting Officer (PSO). Registers and maintains systems in Enterprise Mission Assurance Support Service (eMASS). Plans and coordinates security control testing during Risk Assessments and Annual Security Reviews. Reports changes in system security posture to the ISSM. Ensures the execution of Continuous Monitoring related requirements as defined in the System Level Continuous Monitoring (SLCM) Strategy. Reviews all data produced by Continuous Monitoring activities, updates the eMASS record as necessary, and escalates to leadership for action, if required. Correlates findings from non-RMF vulnerability assessments, penetration testing, Command Cyber Operational Readiness Inspection (CCORI), etc.) to RMF controls for tracking, ensuring a holistic risk assessment. Participates in change control and configuration management processes. Maintains vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Education: Bachelors degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited institution as recognized by the U.S. Department of Education
Experience: Six (6) years of DoD experience coordinating and enacting required security changes, within various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
Minimum Certification Requirement: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP is required.
Other: An Active Secret Security Clearance is required.
Benefits Information: We offer a generous benefits package including a 401k with employer match. Full time employees are also eligible for family medical, dental and vision benefits; as well as ancillary benefits including life and accidental death and dismemberment insurance; short- and long-term disability; flexible spending accounts; long-term care insurance; and accident, hospital, and critical illness insurance. Full-time employees are also eligible for 2 weeks vacation leave accrual per year (this accrual increase as tenure with company increases), 7 days sick leave, and 11 paid holidays, with additional leave time available for bereavement, jury duty, and military training days throughout the year.
Principal Data Center Security Systems Engineer
Information security analyst job in Middletown, DE
Insight Global is seeking an experienced, driven Principal Security Systems Engineer to join a growing AI and GPU infrastructure start-up based in SF, NYC, or Seattle. This is a full-time, permanent role with competitive salary, bonus, equity, and benefits.
In this role, the Principal Data Center Security Systems Engineer will lead and design the multi-layer physical security stack that protects this company's data. This engineer's work spans perimeter hardening to rack-level tamper detection, all integrated into a zero-trust monitoring framework.
Day-to-day responsibilities:
- Manage all aspects of the security system for data centers coordinating with all other discipline requirements
- Create strategy for data center security system design and deployment
- Develop security system standards in compliance with US - DoD and other international standards
- Develop and maintain the basis of design, master specification, master drawings
- Facilitate developing project specific drawings and documentation based on the master design with local adaptation working with external design consultants
- Engineer access-control, CCTV, intrusion-detection and biometric systems to meet SOC 2 & ISO 27001
- Create zoning and mantrap layouts, badge/biometric authentication flows and visitor-management SOPs
- Specify encryption and retention policies for video, logs and alarms
- Integrate security events into DCIM and corporate SIEM platforms
- Drive resiliency (dual-path comms, battery backup) and regular penetration-test programs
We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form (****************************************** Og4IQS1J6dRiMo) . The EEOC "Know Your Rights" Poster is available here (*********************************************************************************************** .
To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** .
Skills and Requirements
- 10+ years designing hyperscale / enterprise or mission-critical physical-security systems.
- Deep knowledge of ONVIF, SIA DC-09, OSDP, Wiegand, BACnet.
- Experience with Genetec, LenelS2, Honeywell or Avigilon ecosystems.
- CISSP-ISSAP or PSP certification is desirable
Information Security Systems Engineer-Ss
Information security analyst job in Philadelphia, PA
McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division.
The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments.
Requirements
Key Responsibilities
Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems.
Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series.
Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP.
Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals.
Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements.
Required Qualifications
Education: BS in Computer Science or relevant field.
Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments.
Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP.
Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial.
Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance.
Equal Employment Opportunity Statement:
McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws.
EEO is the Law:
Applicants and employees are protected under Federal law from discrimination.