Information security officer full time jobs - 47 jobs
Senior Analyst, Security Compliance (SOX IT)
Coinbase 4.2
Columbus, OH
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
$167.3k-196.8k yearly 60d+ ago
Looking for a job?
Let Zippia find it for you.
Senior Offensive Security Engineer, Red Team
Procter & Gamble 4.8
Cincinnati, OH
Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands.
From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded.
The Opportunity
Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world's most advanced cyber security adversaries?
The InformationSecurity Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise.
Responsibilities:
+ Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR.
+ Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes.
+ Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails).
+ Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC.
+ Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership.
+ Mentor junior engineers; set standards for craft quality, methodology, and safety.
+ Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment.
+ Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use.
+ Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management.
Job Qualifications
Required:
+ BA or BS degree in InformationSecurity, Cyber Security, Computer Science, or related field (OR 7+ years of relevant experience required in lieu of a degree).
+ 5+ years running offensive or emulation operations in large/complex environments, with demonstrated impact on detections/response.
+ Expertise across 2+ domains: enterprise/web/mobile apps; identity; cloud (AWS/GCP/Azure); network/endpoint; IoT/OT; or directory services.
+ Proven ability to bypass preventative/detective controls and reach mission objectives while maintaining safety and ROE.
+ Strong engineering skills (Python, PowerShell, GO, C++, Web Frameworks); comfort with low-level concepts a plus) and familiarity with C2 tradecraft.
+ Deep command of MITRE ATT&CK and threat-informed defense; history partnering with DFIR/SOC and Detection Engineering.
+ Excellent executive and technical communication.
+ Ability to work in Cincinnati, Ohio based office 3 days per week.
Preferred:
+ Leadership of purple-team campaigns and incident-driven emulations; closed-loop improvements with measurable KPI movement.
+ Building program metrics/KPIs, standardizing reporting, and integrating with risk governance.
+ Threat-intel integration: actor/campaign analysis, hypothesis generation, and prioritization tied to business impact.
+ Identity and cloud attack paths (SSO, MFA, OAuth, PAM; AWS/GCP/Azure control planes) with hardening collaboration across platform/IDAM teams.
+ Coordinating large third-party exercises and setting complex ROE.
Pay Range: $110,000 - $165,000
Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process.
Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE (******************************************************* .
P&G participates in e-verify as required by law.
Qualified individuals will not be disadvantaged based on being unemployed.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Job Schedule
Full time
Job Number
R000138781
Job Segmentation
Experienced Professionals
Starting Pay / Salary Range
$110,000.00 - $165,000.00 / year
$110k-165k yearly 60d+ ago
Information Technology Manager 1 - Security & Compliance Manager- 20078290
Dasstateoh
Columbus, OH
Information Technology Manager 1 - Security & Compliance Manager- 20078290 (250008DD) Organization: CommerceAgency Contact Name and Information: ************************ or **************Unposting Date: OngoingPrimary Location: United States of America-OHIO-Franklin County-Columbus Compensation: Pay range 16, step 1 $47.50/hr.Schedule: Full-time Work Hours: 8:00 am - 5:00 pm (Hours subject to change) Classified Indicator: UnclassifiedUnion: Exempt from Union Primary Job Skill: Information TechnologyTechnical Skills: Risk Management, CybersecurityProfessional Skills: Analyzation, Collaboration, Consultation, InnovationPrimary Technology: Security Monitoring Agency Overview This is a re-post. If you applied to posting 250006TA, you do not need to re-apply to be considered. The Mission of the Ohio Department of Commerce is promoting prosperity by protecting what matters most. The Division of Administration provides overall leadership and administrative support for all Divisions. The Division includes the Office of Director, Communications, Fiscal, Human Resources, IT, Legal and Legislative Affairs. As the state's chief regulator, the Department of Commerce impacts Ohioans every day. We are motivated by our mission to promote prosperity for businesses and licensees by protecting what matters most to the residents of our state. We ensure compliance through proactive outreach, education, and customer-focused service.Commerce is comprised of eight operating divisions and one standalone program that span a variety of industries including real estate, liquor, banking, securities, firefighting, construction and skilled trades, and cannabis. Through exceptional compliance practices and oversight, Commerce has a direct role in protecting Ohioans.Our Guiding PrinciplesMaking an IMPACT for the customer:InclusiveMotivatedProactiveAccountableCustomer-FocusedTeamwork Job DescriptionThe IT Security Manager will serve in a management role with technical capabilities and strategic planning oversight; responsible for overseeing and managing security programs, projects, personnel, logical/technical administration, and security acquisitions. Our preferred candidate possesses the ability and experience to focus on reducing security risks throughout the infrastructure to an acceptable level, in alignment with the organizations business needs and requirements. They will be capable of identifying, establishing, and adhering to tactical plans for achieving set goals within a dynamic fast-paced environment.
Duties include but are not limited to:
Lead the team responsible for security assessments, developing risk-based solutions and controls frameworks.
Serve as the subject matter expert for control validation in the Security team.
Create/Update/Maintain IT Security Guidelines and Standards.
Develop System Policies and establish system standards.
Communicate security controls and remediate any concerns.
Collaborate with various departments to safeguard our adherence to policies and other undertakings that influence the security, confidentiality, integrity, and accessibility of our application, infrastructure, and business operations.
Conduct, document, and report on internal and third-party risk program.
Collaborate with the DAS OISP team to ensure successful delivery of security & business objectives.
Lead the coordination of data gathering needed for internal and external audits, regulatory requirements, and other compliance and risk management needs requirements.
Be a highly analytical and effective communicator capable of influencing other teams and departments.
Why Work for the State of OhioAt the State of Ohio, we take care of the team that cares for Ohioans. We provide a variety of quality, competitive benefits to eligible full-time and part-time employees*. For a list of all the State of Ohio Benefits, visit our Total Rewards website! Our benefits package includes:
Medical Coverage
Free Dental, Vision and Basic Life Insurance premiums after completion of eligibility period
Paid time off, including vacation, personal, sick leave and 11 paid holidays per year
Childbirth, Adoption, and Foster Care leave
Education and Development Opportunities (Employee Development Funds, Public Service Loan Forgiveness, and more)
Public Retirement Systems (such as OPERS, STRS, SERS, and HPRS) & Optional Deferred Compensation (Ohio Deferred Compensation)
*Benefits eligibility is dependent on a number of factors. The Agency Contact listed above will be able to provide specific benefits information for this position.Qualifications8 1/2 years (102 mos.) exp. commensurate with job duties to be performed & knowledges & skills required as outlined in approved position description on file for position to be filled as advertised in job posting; 18 months exp. in performing project management functions as defined in series purpose. -Or completion of undergraduate core coursework in computer science, or completion of undergraduate core coursework in any academic major which included at least one course in each of the following: advanced-level computer programming language (for example, COBOL, Delphi, Java, Powerbuilder, Visual Basic, Pl 1, SAS PCS, Pacbase, Full Visual Suite, Designer 2000, Developer 2000, C, C++, Visual C, ECL, or Visual Studio), logic-based mathematics, data base concepts (for example, Oracle, Microsoft Access, Paradox, Sybase, IMS DB, DB2, Cache, DMS, or RDMS), computer systems analysis & design, & basic data processing concepts; additional 6 1/2 years (78 mos.) exp. commensurate with job duties to be performed & knowledges & skills required as outlined in approved position description on file for position to be filled as advertised in job posting.; 18 mos. exp. in performing project management functions as defined in series purpose. -Or 12 mos. exp. as Information Technology Supervisor 3, 64119, or equivalent. Or in offices of statewide information technology policy & planning, positions require completion of undergraduate core coursework in computer science, or completion of undergraduate core coursework in any academic major which included at least one course in each of the following: advanced-level computer programming language (for example, COBOL, Delphi, Java, Powerbuilder, Visual Basic, Pl 1, SAS PCS, Pacbase, Full Visual Suite, Designer 2000, Developer 2000, C, C++, Visual C, ECL, or Visual Studio), logic-based mathematics, data base concepts (for example, Oracle, Microsoft Access, Paradox, Sybase, IMS DB, DB2, Cache, DMS, or RDMS), computer systems analysis & design, & basic data processing concepts; 3 yrs. exp. in utilizing word processing software; 3 yrs. exp. in utilizing internet browser(s) for research; 54 mos. exp. which included following: knowledge of information technology architecture components, developing information technology strategic plans, preparing & making presentations/public speaking, writing information technology related policy & procedures, preparing & monitoring budget, providing cost & resources estimates, & contract management; 2 yrs. exp. in utilizing e-mail system; 18 mos. exp. in project management or lead role on information technology project;12 mos. exp. in utilizing spreadsheet software; 12 mos. exp. as Information Technology Supervisor 3, 64119, or equivalent. -Or equivalent of Minimum Class Qualifications For Employment noted above. Job Skills: Information TechnologySupplemental InformationApplications must clearly indicate how the applicant meets the minimum qualification for the position. If you meet minimum qualification due to educational achievement, please submit a copy of your unofficial transcript(s) with your application. All answers to the supplemental questions must be supported by information provided in the work experience &/or education sections on your civil service application. Please do not use “see resume” as a substitution for the completed application; assumptions will not be made. Application Status: You can check the status of your application online by signing into your profile. Careers to which you've applied will be listed. The application status is shown to the right of the position title and application submission details. The final candidate selected for this position will be required to undergo a criminal background check as well as other investigative reviews. Criminal convictions do not necessarily preclude an applicant from consideration for a position, unless restricted under state or federal law or federal restrictions. An individual assessment of an applicant's prior criminal convictions will be made before excluding an applicant from consideration.All final applicants tentatively selected for this position will be required to submit to urinalysis to test for illegal drug use prior to appointments. Testing will also be performed for the presence of marijuana. An applicant with a positive test shall not be offered employment unless the applicant submits medical documentation of legally prescribed medications or a recommendation for medical marijuana. Also, an applicant with a positive test will not be considered for any position with the State of Ohio for a period of one year.ADA StatementOhio is a Disability Inclusion State and strives to be a model employer of individuals with disabilities. The State of Ohio is committed to providing access and inclusion and reasonable accommodation in its services, activities, programs and employment opportunities in accordance with the Americans with Disabilities Act (ADA) and other applicable laws.Drug-Free WorkplaceThe State of Ohio is a drug-free workplace which prohibits the use of marijuana (recreational marijuana/non-medical cannabis). Please note, this position may be subject to additional restrictions pursuant to the State of Ohio Drug-Free Workplace Policy (HR-39), and as outlined in the posting.
$47.5 hourly Auto-Apply 13h ago
Information Technology Manager 1 - Security & Compliance Manager- 20078290
State of Ohio 4.5
Columbus, OH
Information Technology Manager 1 - Security & Compliance Manager- 20078290 (250008DD) Organization: CommerceAgency Contact Name and Information: ************************ or **************Unposting Date: OngoingPrimary Location: United States of America-OHIO-Franklin County-Columbus Compensation: Pay range 16, step 1 $47.50/hr.Schedule: Full-time Work Hours: 8:00 am - 5:00 pm (Hours subject to change) Classified Indicator: UnclassifiedUnion: Exempt from Union Primary Job Skill: Information TechnologyTechnical Skills: Risk Management, CybersecurityProfessional Skills: Analyzation, Collaboration, Consultation, InnovationPrimary Technology: Security Monitoring Agency Overview This is a re-post. If you applied to posting 250006TA, you do not need to re-apply to be considered. The Mission of the Ohio Department of Commerce is promoting prosperity by protecting what matters most. The Division of Administration provides overall leadership and administrative support for all Divisions. The Division includes the Office of Director, Communications, Fiscal, Human Resources, IT, Legal and Legislative Affairs. As the state's chief regulator, the Department of Commerce impacts Ohioans every day. We are motivated by our mission to promote prosperity for businesses and licensees by protecting what matters most to the residents of our state. We ensure compliance through proactive outreach, education, and customer-focused service.Commerce is comprised of eight operating divisions and one standalone program that span a variety of industries including real estate, liquor, banking, securities, firefighting, construction and skilled trades, and cannabis. Through exceptional compliance practices and oversight, Commerce has a direct role in protecting Ohioans.Our Guiding PrinciplesMaking an IMPACT for the customer:InclusiveMotivatedProactiveAccountableCustomer-FocusedTeamwork Job DescriptionThe IT Security Manager will serve in a management role with technical capabilities and strategic planning oversight; responsible for overseeing and managing security programs, projects, personnel, logical/technical administration, and security acquisitions. Our preferred candidate possesses the ability and experience to focus on reducing security risks throughout the infrastructure to an acceptable level, in alignment with the organizations business needs and requirements. They will be capable of identifying, establishing, and adhering to tactical plans for achieving set goals within a dynamic fast-paced environment.
Duties include but are not limited to:
Lead the team responsible for security assessments, developing risk-based solutions and controls frameworks.
Serve as the subject matter expert for control validation in the Security team.
Create/Update/Maintain IT Security Guidelines and Standards.
Develop System Policies and establish system standards.
Communicate security controls and remediate any concerns.
Collaborate with various departments to safeguard our adherence to policies and other undertakings that influence the security, confidentiality, integrity, and accessibility of our application, infrastructure, and business operations.
Conduct, document, and report on internal and third-party risk program.
Collaborate with the DAS OISP team to ensure successful delivery of security & business objectives.
Lead the coordination of data gathering needed for internal and external audits, regulatory requirements, and other compliance and risk management needs requirements.
Be a highly analytical and effective communicator capable of influencing other teams and departments.
Why Work for the State of OhioAt the State of Ohio, we take care of the team that cares for Ohioans. We provide a variety of quality, competitive benefits to eligible full-time and part-time employees*. For a list of all the State of Ohio Benefits, visit our Total Rewards website! Our benefits package includes:
Medical Coverage
Free Dental, Vision and Basic Life Insurance premiums after completion of eligibility period
Paid time off, including vacation, personal, sick leave and 11 paid holidays per year
Childbirth, Adoption, and Foster Care leave
Education and Development Opportunities (Employee Development Funds, Public Service Loan Forgiveness, and more)
Public Retirement Systems (such as OPERS, STRS, SERS, and HPRS) & Optional Deferred Compensation (Ohio Deferred Compensation)
*Benefits eligibility is dependent on a number of factors. The Agency Contact listed above will be able to provide specific benefits information for this position.Qualifications8 1/2 years (102 mos.) exp. commensurate with job duties to be performed & knowledges & skills required as outlined in approved position description on file for position to be filled as advertised in job posting; 18 months exp. in performing project management functions as defined in series purpose. -Or completion of undergraduate core coursework in computer science, or completion of undergraduate core coursework in any academic major which included at least one course in each of the following: advanced-level computer programming language (for example, COBOL, Delphi, Java, Powerbuilder, Visual Basic, Pl 1, SAS PCS, Pacbase, Full Visual Suite, Designer 2000, Developer 2000, C, C++, Visual C, ECL, or Visual Studio), logic-based mathematics, data base concepts (for example, Oracle, Microsoft Access, Paradox, Sybase, IMS DB, DB2, Cache, DMS, or RDMS), computer systems analysis & design, & basic data processing concepts; additional 6 1/2 years (78 mos.) exp. commensurate with job duties to be performed & knowledges & skills required as outlined in approved position description on file for position to be filled as advertised in job posting.; 18 mos. exp. in performing project management functions as defined in series purpose. -Or 12 mos. exp. as Information Technology Supervisor 3, 64119, or equivalent. Or in offices of statewide information technology policy & planning, positions require completion of undergraduate core coursework in computer science, or completion of undergraduate core coursework in any academic major which included at least one course in each of the following: advanced-level computer programming language (for example, COBOL, Delphi, Java, Powerbuilder, Visual Basic, Pl 1, SAS PCS, Pacbase, Full Visual Suite, Designer 2000, Developer 2000, C, C++, Visual C, ECL, or Visual Studio), logic-based mathematics, data base concepts (for example, Oracle, Microsoft Access, Paradox, Sybase, IMS DB, DB2, Cache, DMS, or RDMS), computer systems analysis & design, & basic data processing concepts; 3 yrs. exp. in utilizing word processing software; 3 yrs. exp. in utilizing internet browser(s) for research; 54 mos. exp. which included following: knowledge of information technology architecture components, developing information technology strategic plans, preparing & making presentations/public speaking, writing information technology related policy & procedures, preparing & monitoring budget, providing cost & resources estimates, & contract management; 2 yrs. exp. in utilizing e-mail system; 18 mos. exp. in project management or lead role on information technology project;12 mos. exp. in utilizing spreadsheet software; 12 mos. exp. as Information Technology Supervisor 3, 64119, or equivalent. -Or equivalent of Minimum Class Qualifications For Employment noted above. Job Skills: Information TechnologySupplemental InformationApplications must clearly indicate how the applicant meets the minimum qualification for the position. If you meet minimum qualification due to educational achievement, please submit a copy of your unofficial transcript(s) with your application. All answers to the supplemental questions must be supported by information provided in the work experience &/or education sections on your civil service application. Please do not use “see resume” as a substitution for the completed application; assumptions will not be made. Application Status: You can check the status of your application online by signing into your profile. Careers to which you've applied will be listed. The application status is shown to the right of the position title and application submission details. The final candidate selected for this position will be required to undergo a criminal background check as well as other investigative reviews. Criminal convictions do not necessarily preclude an applicant from consideration for a position, unless restricted under state or federal law or federal restrictions. An individual assessment of an applicant's prior criminal convictions will be made before excluding an applicant from consideration.All final applicants tentatively selected for this position will be required to submit to urinalysis to test for illegal drug use prior to appointments. Testing will also be performed for the presence of marijuana. An applicant with a positive test shall not be offered employment unless the applicant submits medical documentation of legally prescribed medications or a recommendation for medical marijuana. Also, an applicant with a positive test will not be considered for any position with the State of Ohio for a period of one year.ADA StatementOhio is a Disability Inclusion State and strives to be a model employer of individuals with disabilities. The State of Ohio is committed to providing access and inclusion and reasonable accommodation in its services, activities, programs and employment opportunities in accordance with the Americans with Disabilities Act (ADA) and other applicable laws.Drug-Free WorkplaceThe State of Ohio is a drug-free workplace which prohibits the use of marijuana (recreational marijuana/non-medical cannabis). Please note, this position may be subject to additional restrictions pursuant to the State of Ohio Drug-Free Workplace Policy (HR-39), and as outlined in the posting.
$47.5 hourly Auto-Apply 1d ago
Information Systems Security Officer, Mid
Booz Allen Hamilton Inc. 4.9
Wright-Patterson Air Force Base, OH
The Opportunity: Cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to our clients. In all of this "cyber noise," how can these organizations understand their risks and how to mitigate them? The answer is you. We need your knowledge as an informationsecurity risk specialist to help break down complex threats into manageable plans of action.
As an informationsecurity risk specialist on our team, you'll work with clients to discover their cyber risks, understand applicable policies, and develop a mitigation plan. You'll get technical and personnel details from colleagues to assess the entire threat landscape. Then, you'll help your team guide your client through a plan of action with presentations, whitepapers, and milestones.
You'll work on translating security concepts for your client so they can make the best decisions to secure their mission-critical systems. This is your opportunity to take an active role in informationsecurity while growing your skills in cloud technologies.
Be a part of our team as we protect our nation's critical information systems.
Join us. The world can't wait.
You Have:
* 5+ years of experience as an ISSO or Information System Security Analyst (ISSA)
* Experience conducting tools assessments and configuration analysis against best practices, vendor specifications, and government security guidelines and requirements
* Experience with the implementation, oversight, and maintenance of the security configuration, practices, and procedures for systems
* Experience implementing controls from NIST 800-53, FedRAMP, ICD 503, RMF, and DoD Information Levels, including applying them to the design and implementation of information technology solutions to achieve an authorization to operate (ATO)
* Experience with eMASS or Xacta IA Manager
* Ability to perform risk analysis
* Active TS/SCI clearance; willingness to take a polygraph exam
* HS diploma or GED
* DoD 8570 IAM Level II Certification such as CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP Certification
Nice If You Have:
* Experience with DoD security technical implementation guides (STIGs), checklists, and testing tools, including STIG Viewer, SCAP, and ACAS scanning tool
* Experience assessing configuration changes such as new COTS tools or web application upgrades, to system security boundary
* Experience with cyber-related tools such as Splunk or STIG Viewer
* Experience with SAP
* Knowledge of Zero Trust principles and concepts
* Ability to work within a collaborative team and a fast-paced and dynamic environment
* Possession of excellent written, organizational, presentation, and verbal communication skills
* AWS, Azure, or GCP Certification
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
Compensation
At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.
Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $61,900.00 to $141,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date.
Identity Statement
As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.
* If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility.
* If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role.
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
$61.9k-141k yearly Auto-Apply 10d ago
Information Security Engineer - Level 2 - Cloud
Cintas 4.4
Mason, OH
Cintas is currently looking for an IT Security Engineer-Level 2 for the IT Security Team within IT. This role researches, recommends and implements changes to enhance information systems security and monitoring capabilities. The InformationSecurity Engineer-Level 2 is responsible for: engineering solutions (processes, technologies) to mitigate control gaps; presenting proposed solutions to IT management; coordinating with vendors for proof-of-concept, proof-of-value, and pilot exercises; reviewing information systems to identify potential security weaknesses, recommending improvements to reduce vulnerabilities; taking part of on-call rotation to triage any potential security incidents; participating in network and systems design to ensure implementation of appropriate systems security policies; maintaining and growing knowledge and understanding of informationsecurity, risk management and regulatory compliance topics, providing occasional after hours and weekend support for project efforts; acting as mentor for junior engineers; and working collaboratively with various Cintas partners to design, build, and deploy security frameworks.
**Skills/Qualifications**
REQUIRED:
+ High school diploma/GED required; Bachelor's degree in Computer Science or related IT area, preferred
+ Minimum 7 years of experience in Information Technology
+ Minimum 4 years of experience in InformationSecurity
+ Strong knowledge of cyber security practices and procedures
+ Strong knowledge of networking and infrastructure best practices
+ Ability to act as the primary SME for Cloud Security
+ Strong working knowledge of the CSF Framework
+ Strong working knowledge of GCP, GCVE required; Azure preferred
Preferred:
+ Industry certifications (e.g., GCP, ACE)
Benefits
Cintas offers comprehensive and competitive medical, dental and vision benefits, with premiums below the national average. We offer flexibility with four different medical plan options; one plan is offered at zero cost.
Additionally, our employee-partners enjoy:
- Competitive Pay
- 401(k) with Company Match/Profit Sharing/Employee Stock Ownership Plan (ESOP)
- Disability, Life and AD&D Insurance, 100% Company Paid
- Paid Time Off and Holidays
- Skills Development, Training and Career Advancement Opportunities
Company Information
Cintas Corporation helps more than one million businesses of all types and sizes get Ready to open their doors with confidence every day by providing products and services that help keep their customers' facilities and employees clean, safe, and looking their best. With offerings including uniforms, mats, mops, towels, restroom supplies, workplace water services, first aid and safety products, eye-wash stations, safety training, fire extinguishers, sprinkler systems and alarm service, Cintas helps customers get Ready for the Workday . Headquartered in the U.S., Cincinnati, OH, Cintas is a publicly held Fortune 500 company traded over the Nasdaq Global Select Market under the symbol CTAS and is a component of both the Standard & Poor's 500 Index and Nasdaq-100 Index.
Cintas Corporation is proud to be an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), national origin, age, genetic information, disability, protected veteran status, or any other characteristic or category protected by local, state, or federal law.
This job posting will remain open for at least five (5) days.
**Job Category:** Information Technology
**Organization:**
**Employee Status:** Regular
**Schedule:** Full Time
**Shift:** 1st Shift
$96k-119k yearly est. 60d+ ago
Information Systems Security Officer (ISSO) II
General Dynamics 4.7
Dayton, OH
Full Part/Time: Full time Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
InformationSecurity, InformationSecurity Management, Information System Security
Certifications:
Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC)
Experience:
2 + years of related experience
US Citizenship Required:
Yes
Job Description:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
* Assist the ISSM in meeting their duties and responsibilities
* Prepare, review, and update authorization packages
* Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
* Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
* Conduct periodic reviews of information systems to ensure compliance with the security authorization package
* Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
* Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
* Ensure all IS security-related documentation is current and accessible to properly authorized individuals
* Ensure audit records are collected, reviewed, and documented (to include any anomalies)
* Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
* Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
* Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
* Prepare reports on the status of security safeguards applied to computer systems
* Perform ISSO duties in support of in-house and external customers
* Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
* 2+ years related experience
* SAP experience required
* Prior performance in roles such as System, Network Administrator, or ISSO
Education:
* Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
* IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.)
Security Clearance:
* TS/SCI required
* Must be able to Attain - TS/SCI with CI Polygraph
Other Requirements:
* Must be able to regularly lift up to 50lbs
#AirforceSAPOpportunities
The likely salary range for this position is $86,615 - $117,185. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
$86.6k-117.2k yearly 26d ago
Cloud Security Engineer
Lubrizol 4.6
Ohio
Shape the Future with Us. At Lubrizol, we're transforming the [industry/market - link to relevant LZ business page, if applicable] through science, sustainability, and a culture of inclusion. As part of our global team, you'll be empowered to make a real impact-on your career, your community, and the world around you.
Travel: < 5% (very limited) Job Type: Full-time. Collaborate in person 4 days each week, with 1 flexible day.
How You'll Make an Impact
As a Cloud Security Engineer, you will strengthen Lubrizol's global cloud security posture across AWS, Azure, and GCP by implementing robust security protocols, policies, and procedures to safeguard cloud-based systems, applications, and data.
Design, deploy, and maintain cloud-native and third-party security tools and solutions that enhance monitoring, detection, and response capabilities across our environments.
Conduct cloud-specific vulnerability assessments, penetration testing, and risk evaluations to proactively identify and mitigate risks, prioritizing remediation to fortify defenses.
Ensure compliance with international regulations and industry frameworks (e.g., ISO 27001, GDPR, NIST, SCF, PCI DSS) through technical audits, assessments, and documentation.
Collaborate closely with DevOps, application development, and infrastructure teams to embed security into cloud architectures, CI/CD pipelines, and deployment processes using secure-by-design principles.
Continuously monitor emerging threats, technologies, and compliance requirements; recommend enhancements to our cloud security architecture and operational processes.
Contribute to incident response activities and other security initiatives that improve our global cybersecurity resilience.
Required Qualifications that Enable Your Success
Bachelor's degree in Computer Science, Information Technology, or a related field; or a relevant combination of education and 5+ years of experience.
3+ years of experience in cybersecurity or a related role with hands-on work in cloud security across AWS, Azure, and/or GCP.
Proficiency implementing security protocols, policies, and procedures; conducting vulnerability assessments, penetration testing, and risk evaluations for cloud or hybrid environments.
Experience performing technical security audits and assessments aligned to frameworks such as ISO 27001, NIST, GDPR, PCI DSS, SOC 2.
Practical experience integrating security into cloud architectures and CI/CD pipelines in collaboration with DevOps and application teams.
Strong analytical, problem-solving, and communication skills with the ability to influence and drive accountability across teams.
Working knowledge of identity and access management, PKI, MFA, and authentication/authorization protocols (e.g., SAML, OAuth).
Preferred Qualifications that Drive you Forward
Advanced degree in a relevant field.
Certifications such as GIAC Cloud Security Essentials (GCLD), GIAC Public Cloud Security (GPCS), GIAC Security Essentials (GSEC), Microsoft Azure Fundamentals, CompTIA Cloud Essentials, Automation certificates, or Microsoft 365.
Hands-on experience with cloud security platforms and tools (e.g., CASB, CSPM, CWPP) and SIEM solutions (e.g., Splunk ES, QRadar, XSIAM).
Familiarity with SAP S/4HANA, industrial control systems (DCS/PLC/SCADA), and related security considerations.
Experience with network security technologies (firewalls, IDS/IPS, VPN, NAC) and web application firewalls (e.g., F5 BIG-IP).
Knowledge of data encryption and key management (e.g., Azure Key Vault) and vulnerability management tools (e.g., Rapid7 InsightVM).
Your Work Environment
At Lubrizol, we're committed to providing a safe, inclusive, and empowering environment where you can do your best work-whether in a lab, on the production floor, or in a hybrid office setting. Depending on your role, your work environment may include:
Standing, walking, or operating equipment for extended periods
Working in a lab or manufacturing setting with appropriate PPE provided
Use of computers and digital tools in an office or hybrid environment
Occasional lifting or movement of materials
Adherence to rigorous safety protocols and ergonomic standards
We continuously invest in our facilities and technologies to ensure they support your well-being, productivity, and growth. If you require reasonable accommodation, we are committed to working with you to ensure an inclusive and accessible experience.
Benefits that Empower You
Competitive salary with performance-based bonus plans
401(k) match + Age-Weighted Defined Contribution
Comprehensive medical, dental & vision coverage
Health Savings Account (HSA)
Paid holidays, vacation, and parental leave
Flexible work environment
Learning and development opportunities
Career and professional growth
Inclusive culture and vibrant community engagement
Learn more at benefits.lubrizol.com!
Lubrizol: Imagined for Life. Enabled by Science.™ Delivered by You.
We tackle the world's toughest challenges with science-based solutions, deeply understanding our customers to deliver innovative chemistry and differentiated value. Our inclusive culture, dedication to safety, and incredible global talent drive our success. Our solutions meet the evolving needs of the modern world-brought to life by science and, most importantly, delivered by you.
Whether you're in the lab, on the production floor, or in the office, you'll be part of a team around the world that empowers you to think boldly, drive results, and contribute to solutions that shape a better, more sustainable future.
We win because of you. Let's build the future together.
#LZBUS #LI-CM1
$70k-87k yearly est. 3d ago
Information Security Engineer - Level 2 - Cloud
Default 4.5
Ohio
Cintas is currently looking for an IT Security Engineer-Level 2 for the IT Security Team within IT. This role researches, recommends and implements changes to enhance information systems security and monitoring capabilities. The InformationSecurity Engineer-Level 2 is responsible for: engineering solutions (processes, technologies) to mitigate control gaps; presenting proposed solutions to IT management; coordinating with vendors for proof-of-concept, proof-of-value, and pilot exercises; reviewing information systems to identify potential security weaknesses, recommending improvements to reduce vulnerabilities; taking part of on-call rotation to triage any potential security incidents; participating in network and systems design to ensure implementation of appropriate systems security policies; maintaining and growing knowledge and understanding of informationsecurity, risk management and regulatory compliance topics, providing occasional after hours and weekend support for project efforts; acting as mentor for junior engineers; and working collaboratively with various Cintas partners to design, build, and deploy security frameworks.
Skills/Qualifications
REQUIRED:
High school diploma/GED required; Bachelor's degree in Computer Science or related IT area, preferred
Minimum 7 years of experience in Information Technology
Minimum 4 years of experience in InformationSecurity
Strong knowledge of cyber security practices and procedures
Strong knowledge of networking and infrastructure best practices
Ability to act as the primary SME for Cloud Security
Strong working knowledge of the CSF Framework
Strong working knowledge of GCP, GCVE required; Azure preferred
Preferred:
Industry certifications (e.g., GCP, ACE)
Benefits
Cintas offers comprehensive and competitive medical, dental and vision benefits, with premiums below the national average. We offer flexibility with four different medical plan options; one plan is offered at zero cost.
Additionally, our employee-partners enjoy:
• Competitive Pay
• 401(k) with Company Match/Profit Sharing/Employee Stock Ownership Plan (ESOP)
• Disability, Life and AD&D Insurance, 100% Company Paid
• Paid Time Off and Holidays
• Skills Development, Training and Career Advancement Opportunities
Company Information
Cintas Corporation helps more than one million businesses of all types and sizes get Ready™ to open their doors with confidence every day by providing products and services that help keep their customers' facilities and employees clean, safe, and looking their best. With offerings including uniforms, mats, mops, towels, restroom supplies, workplace water services, first aid and safety products, eye-wash stations, safety training, fire extinguishers, sprinkler systems and alarm service, Cintas helps customers get Ready for the Workday . Headquartered in the U.S., Cincinnati, OH, Cintas is a publicly held Fortune 500 company traded over the Nasdaq Global Select Market under the symbol CTAS and is a component of both the Standard & Poor's 500 Index and Nasdaq-100 Index.
Cintas Corporation is proud to be an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), national origin, age, genetic information, disability, protected veteran status, or any other characteristic or category protected by local, state, or federal law.
This job posting will remain open for at least five (5) days.
Job Category: Information Technology
Organization:
Employee Status: Regular
Schedule: Full Time
Shift: 1st Shift
$98k-127k yearly est. 60d+ ago
Information Security Compliance Analyst
Reynolds and Reynolds Company 4.3
Dayton, OH
":"As an InformationSecurity Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cyber security assessments, help raise security awareness of associates, provide guidance on industry standard cyber security requirements, and track on-going activities that help meet our security and compliance goals.
If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"InformationSecurity Compliance Analyst","date":"2026-01-03","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
$80k-108k yearly est. 60d+ ago
Information System Security Officer (ISSO)
Huntington Ingalls Industries 4.3
Dayton, OH
Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $72,181.00 - $100,000.00 Security Clearance: TS/SCI Level of Experience: Mid This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems.
HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners.
Meet HII's Mission Technologies Division
Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you.
To learn more about Mission Technologies, click here for a short video: ***************************
Job Description
As the Information Systems SecurityOfficer (ISSO) the individual works closely with the Information Systems Security Manager (ISSM) proposing, coordinating, implementing and enforcing information system security policies, standards and methodologies. Implementing operating systems and network devices security configuration in accordance with approved Security Technical Implementation Guides (STIGs). Collaborate with team members to define and implement cybersecurity requirements for managed systems and software. Conduct security assessments of Risk Management Framework (RMF) controls implemented for assigned systems. Identify corrective actions and mitigation strategies to achieve and sustain RMF compliance.
Job Duties Include: Performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP). Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD information systems.
Essential Job Responsibilities
Assist with all activities associated with the assessment and authorization (A&A) of all hosted computing environments. Perform cybersecurity site audits to verify architecture analysis, cybersecurity requirements and controls, verify mitigation actions, witness cybersecurity testing and evaluation and to assist the ISSM with the final approval for Authority to Operate (ATO) and/or Authority to Connect (ATC). Interface with end users to discuss IT, data management and collaboration tools understanding and benefits. Ensures software, hardware and firmware complies with appropriate security configuration guidelines. Coordinates changes or modifications with the ISSM and SCAR/SCA. Initiates protective or corrective measures, in coordination with the ISSM. Reports security incidents or vulnerabilities to the ISSM.
Minimum Qualifications
+ 2 years relevant experience with Bachelors in related field; 0 years experience with Masters in related field; or High School Diploma or equivalent and 6 years relevant experience.
+ Experience planning and implementing network layouts of varying classifications in SCIF/SAPF spaces.
+ Ability to coordinate and plan IT requirements across several Enterprise, MAJCOM, and agency partners.
+ Familiarity with ICD/ICS 705 Standards as they pertain to networks.
+ DoD 8570 (Sec+ or applicable) IAT level II cert required
+ Active TS/SCI clearance with ability to gain SAP/SAR
Preferred Requirements
Experience working as a COMSEC responsible Officer or familiarity handling and safeguarding COMSEC
Physical Requirements
May require working in an office or laboratory environment. Capable of climbing ladders and tolerating confined spaces and extreme temperature variances.
The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills.
Together we are working to ensure a future where everyone can be free and thrive.
All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.
Do You Need Assistance?
If you need a reasonable accommodation for any part of the employment process, please send an e-mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
$72.2k-100k yearly 60d+ ago
Applications Security Architect
Crown Equipment 4.8
Ohio
:
Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
Job Posting External
Primary Responsibilities
Define security architecture standards and blueprints for web, mobile, cloud, and Application Programming Interface (API)-based applications.
Review design documents and perform architecture risk assessments for new and existing applications.
Collaborate with DevOps, Engineering, and Infrastructure teams to ensure architectures align with secure design principles.
Integrate automated security testing/scanning tools (Static Application Security Testing (SAST), Software Composition Analysis (SCA)) into Continuous Integration (CI) or Continuous Delivery (CD) pipelines.
Define and enforce secure coding standards and practices across development teams.
Provide training and guidance to developers on secure development principles and vulnerability prevention.
Conduct threat modeling and attack surface reviews for high-risk or critical applications.
Identify potential security flaws and recommend mitigations early in development process.
Track and communicate technical risk to product managers, developers, and leadership teams.
Develop and maintain application security policies, baselines, and architecture frameworks.
Ensure application security practices align with regulations including General Data Protection Regulation (GDPR) and Payment Card Industry Data Security Standard (PCI-DSS).
Support audit and compliance initiatives by providing documentation and evidence of secure development practices.
Minimum Qualifications
Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related field is required, along with 2-4 years related experience.
Non-degree considered if 12+ years of related experience along with a high school diploma or GED
Preferred Qualifications
5+ years in cybersecurity with at least 3 years in application security or secure software development experience.
Secure Software Development Life Cycle (SDLC) in development. Deep knowledge of Open Web Application Security Project (OWASP) Top 10, National Institute of Standards and Technology (NIST), and secure coding frameworks.
Experience with Securing Secrets and Service Accounts.
Experience with Web Application Firewall (WAF) implementation/support.
Familiarity with Identity and Access Management and cloud security practices (AWS, Azure).
Certified Information Systems Security Professional (CISSP), Certified Secure Software Lifecycle Professional (CISSP), Certified Ethical Hacker (CEH) certified.
Familiarity with container security (Docker, Kubernetes).
Experience in Threat Modeling.
Understanding of authentication protocols (Open Authorization (OAuth) and Security Assertion Markup Language (SAML)).
Experience with DEVSECOPStools and container security tools.
Work Authorization:
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
Compensation and Benefits:
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
$100k-123k yearly est. 60d+ ago
Lead Security Engineer - GCP
Jpmorgan Chase & Co 4.8
Columbus, OH
JobID: 210683473 JobSchedule: Full time JobShift: : As a Cloud Security Engineer at JPMorgan Chase within the Cybersecurity & Technology Controls (CTC) group, your primary responsibility will be to ensure that Public Cloud is adopted in a secure and compliant manner. You will play an important role in identifying and managing risk related issues and actions with respective technology. You will have an eye for detail and an ability to see the big picture across security issues.
Job responsibilities
* Lead the execution and continuous improvement of information risk and control strategies to secure public cloud assets.
* Conduct and oversee risk-based assessments of technology controls for cloud services, platforms, and architecture.
* Advise and guide business technology teams on firm control requirements and best practices across diverse cloud architectures.
* Review and provide feedback on infrastructure-as-code for cloud platform development, ensuring alignment with security standards.
* Develop and maintain documentation, and contribute to agile processes supporting security initiatives.
* Collaborate with CTC teams to ensure seamless integration with security operations, threat intelligence, IAM, and network security.
* Mentor junior engineers and contribute to knowledge sharing within the team.
Required qualifications, capabilities, and skills
* Formal training or certification on security engineering concepts and 5+ years applied experience.
* Strong analytical, problem-solving, and communication skills.
* Experience planning, designing, building and implementing enterprise level security engineering products and solutions in a public cloud environment (i.e. AWS, GCP, Azure)
* Experience working in cross-functional teams and managing multiple priorities.
Preferred qualifications, capabilities, and skills
* Advanced understanding of public cloud security concepts and technologies.
* Hands-on experience with cloud engineering, architecture, and infrastructure-as-code (Terraform, etc.).
* Familiarity with DevOps, CI/CD, and agile methodologies.
* Experience mentoring or training junior staff.
$86k-112k yearly est. Auto-Apply 60d+ ago
Security Engineer - Airlock
Blue Star Partners 4.5
Columbus, OH
Job Title: Security Engineer - Cloud & Endpoint Security
Pay Rate: $50/hr - $85/hr
Duration: 2/10/2025 - 12/31/2025 (Temp-to-Hire)
Contract Type: W2 (must be authorized to work in the US; no sponsorships or C2C)
Job Overview
Our Cloud and Endpoint Security team is looking for a Security Engineer to drive the deployment and management of an allowlisting/reverse proxy solution (Airlock). This engineer will collaborate with cross-functional teams to ensure integration with existing infrastructure, refine security policies, and contribute to the enhancement of the organization's cybersecurity posture. The role involves hands-on configuration, monitoring, and ongoing maintenance of security solutions, while remaining adaptable to changing threats and technologies.
Key Responsibilities
Allowlisting & Reverse Proxy Deployment: Lead the deployment and configuration of Airlock, ensuring seamless integration with current systems and networks.
Policy Development: Define and implement allowlisting policies to enhance application security, access control, and threat detection.
Incident Response Collaboration: Work closely with the incident response team to optimize alerting and logging capabilities, ensuring swift detection and remediation of potential security incidents.
Security Strategy & Best Practices: Assist in shaping the broader cybersecurity strategy, aligning it with business objectives and recognized frameworks (e.g., NIST, MITRE, ISO 27001).
Automation & Reporting: Identify opportunities to automate configurations, streamline reporting processes, and enhance visibility into system performance.
Monitoring & Analysis: Track solution performance and review security logs for emerging threats or anomalies; implement proactive measures where necessary.
Research & Continuous Improvement: Stay informed about the latest cybersecurity threats and trends, applying relevant findings to enhance Airlock's configurations.
Documentation & Maintenance: Support the development of incident response plans, secure access protocols, and maintain thorough documentation of all configurations and processes.
Qualifications
Minimum Requirements
Bachelor's Degree in a related field or equivalent work experience.
3+ years of experience in cybersecurity, IT, or related roles.
1+ years of hands-on experience deploying or managing application allowlisting or reverse proxy solutions.
1+ years of experience with security frameworks (e.g., NIST, MITRE, ISO 27001).
Proficiency with Windows and Linux environments, including command-line configurations.
Preferred Skills
Experience using Airlock or similar allowlisting tools.
Familiarity with scripting/automation (Python, PowerShell, Bash) for configuration and reporting.
Industry certifications (e.g., Sec+, CCSP, GIAC).
Strong analytical and problem-solving abilities, especially in process development and root cause analysis.
Additional Information
Temp-to-Hire: This is a W2 contract position with potential to convert to a full-time role, contingent on performance and business needs.
Work Arrangements: Local candidates are preferred; remote candidates will be considered if necessary.
Team Environment: The Cloud & Endpoint Security team collaborates with multiple departments, playing a crucial part in establishing security best practices and ensuring incident response readiness.
$50 hourly 60d+ ago
Security Engineer, Identity Management
Interstate Gas Supply 4.8
Ohio
For this role, we are looking for a curious and innovative Security Engineer with a passion for informationsecurity, customer service, and compliance. You will be responsible for guiding security best practices while following security frameworks such as NIST, and SOC2. You will be leading the security programs to ensure minimal risk exposure. At IGS, we take a risk-based approach to our decisions and utilize industry best practices and security frameworks to guide us along the way. We are looking for someone that is good at understanding and solving complex and ambiguous problems and constantly seek improvement.
Primary Responsibilities
Architect and manage Azure Entra infrastructure, including tenant design, hybrid identity configurations, and conditional access policies.
Maintain and optimize Active Directory environments, including domain controllers, group policies, organizational units, and security hardening.
Design and implement Active Directory Federation Services (ADFS) and manage complex federation trusts between internal and external identity providers.
Plan and execute domain trust relationships, including forest trusts, external trusts, and realm trusts across complex enterprise environments.
Lead identity platform through organizational transitions, including tenant-to-tenant migrations, directory consolidations, and identity lifecycle transitions.
Manage multi-tenant Microsoft 365 migrations, ensuring secure data transfer and seamless user transitions during organizational changes.
Develop and maintain disaster recovery and business continuity plans for identity infrastructure.
Implement identity security best practices, including privileged access management, MFA enforcement, and identity protection policies.
Monitor identity infrastructure health, performance, and security posture, responding to incidents and anomalies.
Collaborate with business stakeholders during organizational transitions to ensure smooth identity transitions with minimal business impact.
Other Responsibilities
Work closely with IT and other departments to ensure security measures are integrated into all aspects of the organization's technology and operations.
Apply knowledge of informationsecurity principles and practices.
Ability to think strategically but willingness to handle, first-hand, the mechanics of technology services required by the business.
Other duties and responsibilities as assigned.
Required Skills
Proven experience managing complex Microsoft 365 environments, particularly multi-tenant migrations and consolidations.
Strong understanding of Active Directory Federation Services, domain trusts, and forest architectures.
Hands-on experience with Azure Entra, including conditional access, privileged identity management, and hybrid identity configurations.
Solid understanding of authentication protocols (SAML, OAuth 2.0, OpenID Connect, Kerberos, LDAP).
Exceptional organizational skills, follow through, and multitasking abilities.
Decisiveness, good judgment, analytical aptitude, and problem-solving skills to act with authority and take risks in an environment with little direction from others.
Excellent communicator with strong organizational savvy and leadership skills necessary to interface with and influence all levels of organization.
Ability to work in a fast-paced and dynamic environment.
Minimum Education and Experience
Minimum of 5 years of technical experience, with at least 3 years of security focus.
Demonstrated knowledge of, and experience in implementing security technologies and processes.
Professional certifications within security-related areas, while not a minimum requirement, would be highly desirable.
#LI-AM1
Work Authorization: Applicants must be authorized to work in the US on a full-time basis. Unfortunately, a current or future need for sponsorship is not supported or available for this position.
Salary Range:
$87,630.00 - $140,210.00
*This range reflects base pay only. Incentive earnings, like commissions or bonuses, are not included.
This role is also eligible for an annual incentive plan based on company performance. How We Support Your Wellbeing:
Our employees are our most valuable asset. That's why at IGS, we are committed to offering a holistic benefit program that allows employees to stay healthy, feel secure, and maintain flexibility in their wellbeing journey.
Healthcare Essentials: Comprehensive coverage including medical (plus free telehealth), dental, vision, and employer health savings account contributions.
Mental Wellbeing: Robust support through Headspace and free mental healthcare visits for you and your dependents.
Family Planning Support: Extensive assistance with Maven, paid family and caregiver leave, and fertility, adoption, and surrogacy services.
Financial Readiness: Strong financial foundation with a 401(k) plan, company match, and access to financial wellbeing tools.
Work-Life Balance: paid time off, tuition reimbursement, paid leaves, employee hardship fund, and a wide range of additional perks.
Equal Opportunity Employment:
It is the policy of IGS Energy to ensure equal employment opportunity in accordance with all applicable federal and state regulations and guidelines. Employment discrimination against employees and applicants due to race, color, religion, sex (including sexual harassment), national origin, disability, age, sexual orientation, gender identity, military status, and veteran status or other legally protected class under applicable law is prohibited.
$87.6k-140.2k yearly Auto-Apply 19d ago
Application Security Engineer
Central Insurance 3.6
Van Wert, OH
Location: Van Wert, OH; Dublin, OHWork Model: Hybrid Position type: Full time - salary We're a team of employees passionate about delivering best-in-class customer service and driving innovation in IT support. Integrity, relationships, and excellence are at the heart of everything we do.
Our employees fully utilize their talents and bring their best selves to work. We believe who you are is just as important as what you do!
Help shape the future of secure software at Central. We're looking for a detail-oriented, and innovative Application Security Engineer to join our cybersecurity team. In this role, you'll be responsible for embedding security into the software development lifecycle, identifying vulnerabilities, and collaborating with developers to build resilient applications. If you're passionate about threat modeling, testing, and hardening within the application environment including AI applications and driving a culture of security across engineering teams, we'd love to have you on board.
Key Responsibilities of the Role
Conduct secure code reviews, threat modeling, and vulnerability assessments.
Collaborate with engineers to integrate security controls into CI / CD pipelines.
Develops, maintains, and champions secure coding guidelines and training materials.
Collaborates with DevOps and Software Engineering to integrate security into the SDLC process.
Implements and manages application security tools (SAST, DAST, SCA, WAF, etc..)
Assists with monitoring security events and contributes with the incident response. team
Collaborates on data security to ensure secure data access configurations with Data Engineering and Infrastructure.
Collaborates with Software Engineering to integrate security into AI/ML pipelines and governance frameworks.
Responsible for scripting automation for integration of security tools and functions.
Utilizes scripting for meta-data aggregation to allow for the creation of dashboards or other metrics for security analytics.
Stay current with emerging threats, vulnerabilities, and security technologies.
Required Qualifications
Bachelor's degree in Computer Science or related field and 2 years related experience
Or 4 years related experience
Preferred Qualifications
CISSP, CASE, GWAPT, or CSSLP certifications preferred
Knowledge, Skills, and Abilities
Creativity and passion for application security
Curious mind and strong desire to constantly learn.
Strong understanding of OWASP Top Ten, secure coding practices, and common attack vectors.
Proven ability to apply secure design principles within application architecture.
Strong analytical, research, and problem-solving skills
Understanding of the software development life cycle.
Understanding of security tools such as Burp Suite, Snyk, Rapid7, or similar tools.
Familiarity with CI/CD tools such as Azure DevOps, GitLab, Jenkins or similar tools.
Ability to work with product, software, data, and infrastructure engineering teams.
Strong understanding of data protection principles and technologies (Encryption, DLP, IAM)
Understanding of scripting automation using Python, PowerShell, Bash.
Possess a positive, professional, cooperative, and quality-conscious attitude
Possesses verbal and written communication skills, including negotiation, presentation, and influence skills
Ability to understand Central Insurance's policies and processes
Total Rewards
Central establishes base pay based on several factors including labor market data and an evaluation of candidate qualifications relative to role requirements. Base pay is one component of a comprehensive total rewards package designed to support employees' financial, health, career, and retirement objectives. Central provides extensive health and wellness benefits to promote flexibility, work-life balance, and long-term financial security. For more information, see Central Insurance Benefits
$84k-106k yearly est. 60d+ ago
Staff Product Security Engineer
Johnson & Johnson 4.7
Cincinnati, OH
At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at *******************
Job Function:
R&D Product Development
Job Sub Function:
R&D Software/Systems Engineering
Job Category:
Scientific/Technology
All Job Posting Locations:
Cincinnati, Ohio, United States of America, Santa Clara, California, United States of America
:
About Surgery
Fueled by innovation at the intersection of biology and technology, we're developing the next generation of smarter, less invasive, more personalized treatments.
Are you passionate about improving and expanding the possibilities of MedTech surgery? Ready to join a team that's reimagining how we heal? Our MedTech Surgery team will give you the chance to deliver surgical technologies and solutions to surgeons and healthcare professionals around the world. Your contributions will help effectively treat some of the world's most prevalent conditions such as obesity, cardiovascular disease and cancer. Patients are waiting.
Your unique talents will help patients on their journey to wellness. Learn more at *******************/medtech.
We are searching for the best talent for a Staff Product Security Engineer position, to be located in Santa Clara, CA or Cincinnati, OH.
Job Description:
The Staff Product Security Engineer will be a key member of the Capital R&D organization, make vital contributions to the New Product Development (NPD) pipeline and transform patient care through innovation. They are accountable for leading our NPD teams and creating a strategy to implement cybersecurity into the design and development of product hardware and software for use in cutting edge medical devices and associated capital equipment
You will be responsible for:
* Identify threats and vulnerabilities to patient safety and product integrity, assess current security controls and determine potential impact of a threat and the risk level associated with threat/vulnerability pairs.
* Drive architecture, requirements, and design to ensure that decisions incorporate security considerations.
* Advise embedded system security software to ensure system hardening and secure coding practices.
* Support all stakeholders on patch management, vulnerability handling, and SBOM scanning
* Document designs and specifications per design control processes and conform to Industry Standards for Medical Device Software (IEC 62304)
Qualifications / Requirements:
Education:
* Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity or related degree
Experience and Skills
* 6+ years' experience (or 4+ with M.S.) establishing security architecture or implementing security solutions in consumer products or medical devices
* 3+ experience in a software engineering or software architectural role in a New Product Development (NPD) environment
* Proven experience with threat modeling and risk assessments for connected products or medical devices
* Ability to work autonomously and proactively seek out security opportunities within the different surgical robotics teams
* Ability to think big picture and have attention to detail - aligning strategic objectives with tactical implementation.
* Proven experience with electrical and embedded software design
* Experience developing software for embedded Real-Time Operating Systems (RTOS)
* Experience developing embedded software systems using Modern C++ (preferably standards 17+)
* A results and performance driven demeanor with strong sense of accountability
* Understanding of penetration testing, vulnerability scanning, and/or other general security testing principles
Preferred Skills & Experience:
* Experience with FDA, data governance, and privacy standards (HIPAA, ISO 27001, UL 2900)
* Work experience with Systems Engineering activities: requirements management and development, risk management, and verification
* Strong collaboration, proven technical leadership capabilities, and conflict resolution skills
* A security certification from an accredited body is preferred and may be considered in lieu of a portion of required years of experience
* Experience working with secure boot, Trusted Platform Module (TPM), Data Distribution System (DDS), and QNX
Other Requirements:
* Ability to travel up to 10% domestic US and Internationally
The anticipated base pay range for this position is $105,000- $169,050.
California Bay Area - The anticipated base pay range for this position is $141,000 - $227,000.
The Company maintains highly competitive, performance-based compensation programs. Under current guidelines, this position is eligible for an annual performance bonus in accordance with the terms of the applicable plan. The annual performance bonus is a cash bonus intended to provide an incentive to achieve annual targeted results by rewarding for individual and the corporation's performance over a calendar/performance year. Bonuses are awarded at the Company's discretion on an individual basis.
Employees and/or eligible dependents may be eligible to participate in the following Company sponsored employee benefit programs: medical, dental, vision, life insurance, short- and long-term disability, business accident insurance, and group legal insurance.
Employees may be eligible to participate in the Company's consolidated retirement plan (pension) and savings plan (401(k)).
This position is eligible to participate in the Company's long-term incentive program.
Employees are eligible for the following time off benefits:
* Vacation - up to 120 hours per calendar year
* Sick time - up to 40 hours per calendar year
* Holiday pay, including Floating Holidays - up to 13 days per calendar year
* Work, Personal and Family Time - up to 40 hours per calendar year
Additional information can be found through the link below.
For additional general information on Company benefits, please go to: - *********************************************
This job posting is anticipated to close on 7/22/25. The Company may however extend this time-period, in which case the posting will remain available on *************************** to accept additional applications.
Johnson & Johnson is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or other characteristics protected by federal, state or local law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act.
Johnson & Johnson is committed to providing an interview process that is inclusive of our applicants' needs. If you are an individual with a disability and would like to request an accommodation, external applicants please contact us via *******************/contact-us/careers . internal employees contact AskGS to be directed to your accommodation resource.
* #RADSW
* #Li-Hybrid
Required Skills:
Product Security, Threat Modeling
Preferred Skills:
C++ STL, Embedded C++
$70k-93k yearly est. Auto-Apply 14d ago
Information Security Analyst
Bakerhostetler Career 4.8
Cleveland, OH
This role is primarily responsible for executing the tactical and strategic initiatives of the InformationSecurity team to include programs such as risk and vulnerability management, incident response, security architecture, cloud security and third-party vendor management. Work is typically assigned by the InformationSecurity Manager, although the InformationSecurity Analyst is expected to operate with minimal oversight and be able to identify areas of opportunity to get involved with informationsecurity tasks and initiatives. The ideal candidate is comfortable working in a fast-paced environment, communicating to technical and non-technical staff, and capable of switching between tasks as situations and criticality arise and be passionate about learning and continuous education.
ESSENTIAL DUTIES AND RESPONSIBILITIES include the following. Other duties may be assigned.
Execute on security strategy as defined by the InformationSecurity Manager.
Participation in the Firm's Vulnerability Management Program, working with cross-functional teams to identify, manage and mitigate security vulnerabilities across the Firm.
Assist with the administration of the Firm's Vendor Risk Management process, including analyzing and responding to third-party risk assessments.
Monitor and respond to informationsecurity alerts and notifications (IDS/IPS, SIEM, AV/EDR, etc.).
Design, review and administer Azure cloud security controls and architecture, including auditing Azure cloud environments.
Utilize scripting languages such as PowerShell and Python to automate tasks and improve security operations.
Collaborate and advise on IT projects to ensure security issues are addressed throughout the project life cycle.
Assist other IT teams in developing and employing security solutions across various applications and product platforms.
Administer and utilize various endpoint and network security tools, such as CrowdStrike, SIEM tools, Fortinet or other comparable advanced detection and response tools.
Administer and utilize vulnerability scanning, packet analysis and exploitation tools such as Nessus, nmap, Wireshark, tcpdump, Metasploit or similar technologies.
Design, review and aid with implementation of secure networks and system architecture (ex. network topology reviews, firewall ruleset reviews, minimum security baselines, etc.).
Apply appropriate controls referenced in various security frameworks and standards, such as the NIST CSF 2.0 Framework, NIST 800-53, CIS Controls, etc.
Monitor and secure Microsoft client and server systems, along with Fortinet and Cisco (or comparable) network devices.
Assist with the management and maintenance of user security policy education, training and awareness programs.
Conduct security research to stay abreast of latest security issues, including laws and regulations which may affect the Firm.
Other duties as requested and assigned.
QUALIFICATION REQUIREMENTS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
EDUCATION/EXPERIENCE:
Bachelor's Degree in Computer Science, Management Information Systems or related field with a minimum of 5-7 years of experience in Information Technology, or equivalent combination of education and experience. This must include 3-5 years of experience in InformationSecurity with two or more of the following domains: Windows Systems Administration, UNIX/Linux Systems Administration, Networking, Access Control, Incident Response, and Information & Data Security.
Preferred Certifications:
Certified Information Systems Security Professional (CISSP)
GIAC GSEC, GCIH, GCIA, GCWN, or equivalent certification
CompTIA Security+, CySA+, Network+, CASP or equivalent certification
Microsoft Azure Security Certifications (i.e. AZ-500, SC-100 to SC-400)
TECHNICAL SKILLS:
Demonstrated proficiency in Microsoft Office Suite including Word, Outlook, Excel, and PowerPoint.
Proven aptitude to learn new software applications.
LANGUAGE SKILLS:
Very strong communication skills, both written and oral. Excellent interpersonal communication skills necessary to maintain effective relationships with staff, trusted third-party partners, attorneys and clients. Establish credibility with staff and attorney base through quality work and communications that bring to bear the right mix of confidence, tact, persistence and reliability. Written communications must be concise, professional and accurate.
MATHEMATICAL SKILLS:
Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.
REASONING ABILITY:
Ability to apply common sense understanding to carry out instructions furnished in written, oral, or diagram form.
Ability to deal with problems involving several concrete variables in standardized situations.
Ability to define problems, collect data, establish facts and draw valid conclusions.
Ability to interpret an extensive variety of instructions and deal with several abstract and concrete variables.
Exhibit independent thinking and decision making.
Ability to interpret an extensive variety of instructions in mathematical or diagram form and deal with several abstract and concrete variables.
Ability to think strategically, develop tactics and execute pragmatically.
OTHER SKILLS and ABILITIES:
Excellent organizational and planning skills with ability to prioritize multiple tasks and projects to meet deadlines.
Ability to work under pressure in a fast-paced environment with demanding individuals.
Strong analytical and organizational skills with a tolerance for uncertainty and an ability to prioritize and complete simultaneous projects with minimal supervision.
Outstanding creativity; flexibility and persistence; motivation and energy with the ability to work with little supervision and collaborate with other members of the team.
Ability to work overtime when needed. Work occasionally requires more than 40 hours per week to perform the essential duties of the position.
A tolerance for uncertainty and an ability to prioritize and complete simultaneous projects with minimal supervision.
Thorough understanding of technologies that can be applied to firm operations and enhance working efficiency.
Ability to exercise discretion with confidential and sensitive information.
PHYSICAL DEMANDS: The physical demands described here are representative of those that should be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel objects, documents, books, pen/pencil, paper, controls and manipulate a keyboard, and input data into a PC; and talk or hear. The employee is frequently required to walk.
The employee is occasionally required to use hands to prepare correspondence and reports on a personal computer.
The employee is occasionally required to stand and reach with hands and arms. And stoop, kneel, bend, crouch or crawl.
Ability to operate a variety of standard office equipment including a computer, copy and facsimile machines.
The employee must occasionally lift and/or move up to 25 pounds.
Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception and the ability to adjust focus.
WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually moderate.
The salary offered in any location will be determined by a wide range of factors, including, but not limited to, experience level, education/training, geographic region, and relevant skills. Associates also participate in a performance- and hours-based bonus program. The expected annual salary for this position ranges from $100,000- $115,000
Baker & Hostetler LLP is an Equal Opportunity Employer.
#LI-Remote
$100k-115k yearly 58d ago
Cloud Security Engineer
Uhhospitals
Ohio
Cloud Security Engineer - (23000FK6) Description The Cloud Security Engineer (CSE) should be hands-on in all aspects of Azure security including implementing security controls and threat protection, manage identity and access management, defining organizational structure and policies, using Azure technologies in order to provide data protection, configuring network security defenses, collecting and analyzing Azure logs, managing incident responses, and an understanding of regulatory concerns.
As a Cloud Security Engineer you design and implement a secure end-to-end infrastructure on Azure in a hybrid cloud setup.
Essential FunctionsMonitor security events daily, performing investigations and working with appropriate team members, business teams and Technology teams to develop solutions that address critical security concerns Maintain and improve the security posture of the Azure platform, identifying, and remediating vulnerabilities by using a variety of security tools.
Provide cyber security expertise in the analysis, assessment, development, and evaluation of security solutions and architectures to secure applications, operating systems, databases, and networks.
Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that apps, containers, infrastructure, and networks are protected.
Implementing threat protection and responding to security incident escalations.
Automate security controls, data, and processes to provide better metrics and operational support using security-as-code.
Configure access within a cloud solution environment using the defense-in-depth principle Configure network security including in a hybrid context with traditional network centric controls Ensure data protection Manage operations within a cloud solution environment such as operations tasks, using cloud native tools, like Log Analytics, Azure Monitor and Azure Security Center or other monitoring tooling.
Support our cloud engineers to implement security best-practices and enable secure development and release processes.
Deep understanding of configuring security policies and securing applications and data.
Required For All JobsPerforms other duties as assigned.
Complies with all policies and standards.
For specific duties and responsibilities, refer to documentation provided by the department during orientation.
Must abide by all requirements to safely and securely maintain Protected Health Information (PHI) for our patients.
Annual training, the UH Code of Conduct and UH policies and procedures are in place to address appropriate use of PHI in the workplace.
Qualifications QualificationsEducationBachelor's Degree in Information Technology, Computer Science, or a related field Required Work Experience5+ years IT security experience Required and 3+ years building and maintaining secure azure cloud solution and tools (Azure Monitor, Log Analytics, Azure Security Center) Required Knowledge, Skills, & Abilities Understand agile and DevOps concepts in a security context such as “trust but verify”, central vs decentral controls, make agile teams as autonomous as possible while ensuring the teams adhere to the NonFunctional-Requirements.
A deep understanding of networking, e.
g.
IP subnetting, Network Security Groups, routing, Azure Firewall, ExpressRoute, load balancer, DNS.
Strong familiarity with cloud capabilities and products and services for Azure, e.
g.
Azure Active Directory, Privileged Identity Management, VMs, Container Registry, Azure Kubernetes Services (AKS), Data Services, KeyVault.
Have the intrinsic quality to want to continuously improve and do better Hands-on and can-do mentality Feeling of ownership Good communication and presentation skills Team player Able to express ideas effectively in individual and group situations.
Able to execute a task in a good manner and with good results with limited supervision Strong skills in scripting and automation, Infrastructure-as-Code and using CI/CD concepts.
Experience with pipeline tooling for automated deployments and applying security controls.
Experience with Experience with infrastructure orchestration tools such as Terraform and other cloud-specific infrastructure automation tools (Azure Resource Manager, Google Cloud Deployment Manager) to automate the creation of staging, testing and production environments.
Work experience from large, international companies and have dealt with or worked for global service providers.
Licenses and CertificationsCertified Information System Security Professional (CISSP) Preferred Certified Ethical Hacker (CEH) Preferred Additional Licenses and Certifications Microsoft Azure Security related certifications Microsoft Certified: Azure Security Engineer Associate, Microsoft Certified: Information Protection Administrator Associate, or Microsoft Certified: Security Operations Analyst Associate) Preferred Certified Cloud Security Professional (CCSP) Preferred Certificate of Cloud Security Knowledge (CCSK) Preferred Global Information Assurance Certification (GIAC) Preferred Physical DemandsStanding Occasionally Walking Occasionally Sitting Constantly Lifting Rarely 20 lbs Carrying Rarely 20 lbs Pushing Rarely 20 lbs Pulling Rarely 20 lbs Climbing Rarely 20 lbs Balancing Rarely Stooping Rarely Kneeling Rarely Crouching Rarely Crawling Rarely Reaching Rarely Handling Occasionally Grasping Occasionally Feeling Rarely Talking Constantly Hearing Constantly Repetitive Motions Frequently Eye/Hand/Foot Coordination Frequently Primary Location: United States-Ohio-Shaker_HeightsWork Locations: 3605 Warrensville Center Road 3605 Warrensville Center Road Shaker Heights 44122Job: Information TechnologyOrganization: UHHS_Information_TechnologySchedule: Full-time Employee Status: Regular - ShiftDaysJob Type: StandardJob Level: ProfessionalTravel: NoRemote Work: YesJob Posting: Nov 14, 2025, 8:58:20 AM
$76k-104k yearly est. Auto-Apply 13h ago
Information Security Analyst I - Cincinnati, OH
Whitedog Cyber
Cincinnati, OH
WhiteDog is seeking an InformationSecurity Analyst to join our Security Operations Center team. The Analyst will help coordinate and report on cyber incidents impacting SOC-as-a-Service customers. This position involves critical duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Onsite Location: Cincinnati, OH (no remote available)
Employment Type: Full-Time, hourly
Compensation: $22-$28/hour
Key Responsibilities:
Responsible for working in a 24x7 Security Operation Center (SOC) in person. (Hours - 7:00pm-7:00am PST)
Provide analysis and trending of security log data from a large number of heterogeneous security devices.
Provide Incident Response (IR) support when analysis confirms actionable incident.
Provide threat and vulnerability analysis as well as security advisory services.
Analyze and respond to previously undisclosed software and hardware vulnerabilities.
Investigate, document, and report on informationsecurity issues and emerging trends.
Integrate and share information with other analysts and other teams.
Ability to work and be available for on-call activities
Other duties as assigned.
Experience and Skills:
Experience in security device management and SIEM.
Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix.
Knowledge of applications, databases, middleware to address security threats against the same.
Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
Knowledge of common Internet protocols and applications.
Ability to multi-task, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent verbal and written communication skills.
Excellent customer service skills.
Proficient in Microsoft Office Applications.
Qualifications:
The successful candidate will possess the personality traits, work habits, communication, and social skills necessary to work effectively within a dynamic and highly operational environment. This person will have exemplary personal and professional integrity and demonstrate strong interpersonal skills. In addition, the qualified candidate will have a strong desire to succeed in a nationally and internationally recognized operational environment.
Bachelor's or Master's degree in a related field or equivalent demonstrated experience and knowledge.
You must be a US Citizen
1-3 years' experience as a Security/Network Administrator or equivalent knowledge.
Security Essentials Certification (GSEC)
Certified Intrusion Analyst (GCIA)
Certified Incident Handler (GCIH)
Certified Ethical Hacker (CEH)
Certified Penetration Tester (CWAPT)
CompTIA Network+
CompTIA Security+
Benefits:
WhiteDog offers a competitive compensation plan with great earning potential. Our benefits include medical coverage, dental coverage, disability, life insurance, 401K and an amazing work environment!
We are an Equal Opportunity Employer. All qualified applicants receive consideration for employment without regard to race, ethnicity, religious affiliation, gender, gender identity or expression, sexual orientation, national origin, or disability status. EOE AA M/ F/Vet/Disabled
$22-28 hourly Auto-Apply 60d+ ago
Learn more about information security officer jobs