Information systems security officer full time jobs - 46 jobs
Information Systems Security Officer (ISSO) III
General Dynamics 4.7
Dayton, OH
Full Part/Time: Full time Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
InformationSecurity, InformationSecurity Management, InformationSystemSecurity
Certifications:
Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC)
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description:
The InformationSystemsSecurityOfficer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.
This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
* Assist the ISSM in meeting their duties and responsibilities.
* Prepare, review, and update authorization packages.
* Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
* Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s).
* Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package.
* Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
* Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
* Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
* Ensure audit records are collected, reviewed, and documented (to include any anomalies)
* Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
* Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans.
* Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
* Prepare reports on the status of security safeguards applied to computer systems.
* Perform ISSO duties in support of in-house and external customers.
* Conduct continuous monitoring activities for authorization boundaries under your preview.
* Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts.
Experience:
* 5+ years related experience.
* 2+ years SAP experience required.
* Prior performance in roles such as System, Network Administrator or ISSO.
Education:
* Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
* IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire
Clearance Required to Start:
* TS/SCI required
* Must be able to Attain - TS/SCI with CI Polygraph
#AirforceSAPOpportunities
The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
$92.7k-125.5k yearly 34d ago
Looking for a job?
Let Zippia find it for you.
Information System Security Officer (ISSO)
Huntington Ingalls Industries 4.3
Dayton, OH
Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $72,181.00 - $100,000.00 Security Clearance: TS/SCI Level of Experience: Mid This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems.
HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners.
Meet HII's Mission Technologies Division
Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you.
To learn more about Mission Technologies, click here for a short video: ***************************
Job Description
As the InformationSystemsSecurityOfficer (ISSO) the individual works closely with the InformationSystemsSecurity Manager (ISSM) proposing, coordinating, implementing and enforcing informationsystemsecurity policies, standards and methodologies. Implementing operating systems and network devices security configuration in accordance with approved Security Technical Implementation Guides (STIGs). Collaborate with team members to define and implement cybersecurity requirements for managed systems and software. Conduct security assessments of Risk Management Framework (RMF) controls implemented for assigned systems. Identify corrective actions and mitigation strategies to achieve and sustain RMF compliance.
Job Duties Include: Performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP). Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD informationsystems.
Essential Job Responsibilities
Assist with all activities associated with the assessment and authorization (A&A) of all hosted computing environments. Perform cybersecurity site audits to verify architecture analysis, cybersecurity requirements and controls, verify mitigation actions, witness cybersecurity testing and evaluation and to assist the ISSM with the final approval for Authority to Operate (ATO) and/or Authority to Connect (ATC). Interface with end users to discuss IT, data management and collaboration tools understanding and benefits. Ensures software, hardware and firmware complies with appropriate security configuration guidelines. Coordinates changes or modifications with the ISSM and SCAR/SCA. Initiates protective or corrective measures, in coordination with the ISSM. Reports security incidents or vulnerabilities to the ISSM.
Minimum Qualifications
+ 2 years relevant experience with Bachelors in related field; 0 years experience with Masters in related field; or High School Diploma or equivalent and 6 years relevant experience.
+ Experience planning and implementing network layouts of varying classifications in SCIF/SAPF spaces.
+ Ability to coordinate and plan IT requirements across several Enterprise, MAJCOM, and agency partners.
+ Familiarity with ICD/ICS 705 Standards as they pertain to networks.
+ DoD 8570 (Sec+ or applicable) IAT level II cert required
+ Active TS/SCI clearance with ability to gain SAP/SAR
Preferred Requirements
Experience working as a COMSEC responsible Officer or familiarity handling and safeguarding COMSEC
Physical Requirements
May require working in an office or laboratory environment. Capable of climbing ladders and tolerating confined spaces and extreme temperature variances.
The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills.
Together we are working to ensure a future where everyone can be free and thrive.
All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.
Do You Need Assistance?
If you need a reasonable accommodation for any part of the employment process, please send an e-mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
$72.2k-100k yearly 60d+ ago
Information Systems Security Officer, Mid
Booz Allen Hamilton 4.9
Ada, OH
The Opportunity:
Cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to our clients. In all of this “cyber noise,” how can these organizations understand their risks and how to mitigate them? The answer is you. We need your knowledge as an informationsecurity risk specialist to help break down complex threats into manageable plans of action.
As an informationsecurity risk specialist on our team, you'll work with clients to discover their cyber risks, understand applicable policies, and develop a mitigation plan. You'll get technical and personnel details from colleagues to assess the entire threat landscape. Then, you'll help your team guide your client through a plan of action with presentations, whitepapers, and milestones.
You'll work on translating security concepts for your client so they can make the best decisions to secure their mission-critical systems. This is your opportunity to take an active role in informationsecurity while growing your skills in cloud technologies.
Be a part of our team as we protect our nation's critical informationsystems.
Join us. The world can't wait.
You Have:
5+ years of experience as an ISSO or InformationSystemSecurity Analyst (ISSA)
Experience conducting tools assessments and configuration analysis against best practices, vendor specifications, and government security guidelines and requirements
Experience with the implementation, oversight, and maintenance of the security configuration, practices, and procedures for systems
Experience implementing controls from NIST 800-53, FedRAMP, ICD 503, RMF, and DoD Information Levels, including applying them to the design and implementation of information technology solutions to achieve an authorization to operate (ATO)
Experience with eMASS or Xacta IA Manager
Ability to perform risk analysis
Active TS/SCI clearance; willingness to take a polygraph exam
HS diploma or GED
DoD 8570 IAM Level II Certification such as CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP Certification
Nice If You Have:
Experience with DoD security technical implementation guides (STIGs), checklists, and testing tools, including STIG Viewer, SCAP, and ACAS scanning tool
Experience assessing configuration changes such as new COTS tools or web application upgrades, to systemsecurity boundary
Experience with cyber-related tools such as Splunk or STIG Viewer
Experience with SAP
Knowledge of Zero Trust principles and concepts
Ability to work within a collaborative team and a fast-paced and dynamic environment
Possession of excellent written, organizational, presentation, and verbal communication skills
AWS, Azure, or GCP Certification
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
Compensation
At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.
Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $61,900.00 to $141,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date.
Identity Statement
As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.
If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility.
If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role.
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
$61.9k-141k yearly Auto-Apply 10d ago
Agency Information Security Professional 1 (20101539)
Dasstateoh
Columbus, OH
Agency InformationSecurity Professional 1 (20101539) (26000062) Organization: Rehabilitation & Correction - Operation Support CenterAgency Contact Name and Information: ************************** Unposting Date: Jan 23, 2026, 11:59:00 PMWork Location: DRC Central Office-Fran-ODOT 1980 West Broad Street Columbus 43223Primary Location: United States of America-OHIO-Franklin County-Columbus Compensation: 36.90Schedule: Full-time Classified Indicator: ClassifiedUnion: OCSEA Primary Job Skill: CybersecurityTechnical Skills: Forensics, Information Technology, Investigation, Security, CybersecurityProfessional Skills: Decision Making, Problem Solving, Results Oriented, Strategic Thinking, Written CommunicationPrimary Technology: Security Monitoring Agency Overview Who We Are… Guided by a single mission “To reduce recidivism among those we touch,” the Ohio Department of Rehabilitation and Correction believes that everyone is capable of positive change. Our staff embrace these core values and serves as role models for pro-social behavior conveying an attitude of dignity and respect in the treatment of others. What We Do… The Ohio Department of Rehabilitation and Correction has been tasked with front line crime reduction through rehabilitative treatment and programming efforts provided in a safe, secure and humane correctional environment and effective community supervision. Our goal is to protect the public through helping individuals turn away from crime and become productive, contributing members of our communities, ensuring a safer Ohio for all Ohioans now and in the future. To learn more about our agency, please visit our website at **************** Are You Ready? We are thrilled to see that you are interested in beginning your career with the Ohio Department of Rehabilitation and Correction! Without a doubt, this will be the most rewarding and meaningful work you'll ever find with a work family that is second to none! Job DescriptionLocation TBDThe full performance level class works under general supervision and requires considerable knowledge of electronic data processing, computer science and systems analysis to configure, support and monitor enterprise security tools such as endpoint protection, SecurityInformation and Event Management (SIEM), Intrusion Detection Systems (IDS) to safeguard State assets against malicious activity Characterize and monitor network traffic to identify anomalous activity and potential threats to network resources and analyze identified malicious activity to determine weaknesses exploited, exploitation methods and effects on system and information Evaluate and support documentation, validation and accreditation processes necessary to assure that new IT systems meet organization's information assurance and security requirements and/or support security audit activities and review security logs to validate access levels and activity Supports vulnerability scanning, remote support software and packet capture to ensure endpoints are patched and updated Responds to alerts of malicious activity and work with OISP as a member of the agency Security Point of Contact (SPOC) team Support the development of tools and assist with responses, and help support training for the agency Security Incident Response Team (SIRT) Works with IT Security Operations Team to evaluate solutions to meet organization's information assurance and security requirements Creates documentation for security initiatives Works with inter-agency contacts to develop solutions for agency initiatives Safeguards the organization's information assets and ensures confidentiality, integrity, and availability of systems and data Assists in the development, implementation, and maintenance of the enterprise-wide informationsecurity program Provides input in the creation and enforcement of informationsecurity policies, standards, and guidelines Ensures security policies align with industry's best practices and regulatory requirements Assists with promoting security awareness by helping staff with understanding security policies and best practices Provides input with risk assessments that identifies vulnerabilities and assesses the potential impact on the organization Collaborates with various teams to develop and implement risk mitigation strategies Participates in the development and execution of incident response plans Analyzes and responds to security incidents, providing timely resolution and analysis Monitors and manages vulnerability scanning tools Coordinates remediation efforts and ensure timely closure of identified vulnerabilities Ensure compliance with relevant laws, regulations, and industry standards Assists in preparing for and participating in audits and assessments Monitors security alerts and incidents Analyzes and responds to security events Proactively utilizes securityinformation and event management (SIEM) systems Maintains comprehensive documentation related to security policies, procedures, and incidents Provides regular reports on the status of the informationsecurity program Functions as mentor and primary contact for Security Analyst, Apprentice, and/or interns assigning work, developing, and assigning training, developing work structure and tasks for security initiatives, and evaluating deliverables Stays current regarding new technologies in area of IT assigned Why Work for the State of OhioAt the State of Ohio, we take care of the team that cares for Ohioans. We provide a variety of quality, competitive benefits to eligible full-time and part-time employees*. For a list of all the State of Ohio Benefits, visit our Total Rewards website! Our benefits package includes:
Medical Coverage
Free Dental, Vision and Basic Life Insurance premiums after completion of eligibility period
Paid time off, including vacation, personal, sick leave and 11 paid holidays per year
Childbirth, Adoption, and Foster Care leave
Education and Development Opportunities (Employee Development Funds, Public Service Loan Forgiveness, and more)
Public Retirement Systems (such as OPERS, STRS, SERS, and HPRS) & Optional Deferred Compensation (Ohio Deferred Compensation)
*Benefits eligibility is dependent on a number of factors. The Agency Contact listed above will be able to provide specific benefits information for this position.Qualifications36 mos. exp. in computer data security either through monitoring system/network traffic for anomalous activity, systems development or controlling accessibility of data. -Or completion of associate core program in computer science; 18 mos. trg. or 18 mos. exp. in computer data security either through monitoring system/network traffic for anomalous activity, systems development or controlling accessibility of data. -Or completion of undergraduate core program in computer science; 12 mos. trg. or 12 mos. exp. in computer data security either through monitoring system/network traffic for anomalous activity, systems development or controlling accessibility of data. -Or 12 mos. exp. as Information Technology Apprentice, 69910; successful completion of Ohio Cyber Apprenticeship program; additional 12 mos. trg. or exp. in InformationSystems/Information Technology with a focus in one of the following areas: Software Engineering/Development, Data Analytics/Business Intelligence, Database Administration, Network, or IT Security. -Or equivalent of Minimum Class Qualifications for Employment noted above. Note: The Ohio Cyber Apprenticeship program is a program offered by the Department Administrative Services. 2000 hrs. of on-the-job experience and 200 certified instructional credits must be earned in order to complete this program. Job Skill: Cybersecurity Supplemental InformationApplication Procedures: In order to be considered for this position, you must apply on-line through this posting website. (We no longer accept paper applications.) When completing your on-line Ohio Civil Service Application, be sure to clearly describe how you meet the minimum qualifications outlined on this job posting. We cannot give you credit for your qualifications, experience, education and training in the job selection process if you do not provide it in your on-line application.You can check the status of your application by signing into your profile on this website.We will communicate with you through the email you provided in your profile and job application. Be sure to check your email often.If you require a reasonable accommodation for the application process, please contact the Human Resources Office so proper arrangements can be made. Otherwise, you will be given specific instructions on requesting an accommodation if you are invited to an assessment and/or interview.The Ohio Department of Rehabilitation and Correction is a tobacco-free workplace.Pre-Employment Drug Testing:All final applicants tentatively selected for this position will be required to submit to urinalysis to test for illegal drug use prior to appointments. Testing will also be performed for the presence of marijuana. An applicant with a positive test shall not be offered employment unless the applicant submits medical documentation of legally prescribed medications or a recommendation for medical marijuana.Pre-Employment Background Investigation:The final applicant selected for the position will be required to undergo a criminal background check. An individual assessment of an applicant's prior criminal convictions will be made before excluding an applicant from consideration.The Ohio Department of Rehabilitation and Correction is prohibited from hiring: Individuals under a federal or state weapons disability if the position requires firearms certification/recertification and use;Individuals who have engaged in sexual abuse in a prison or other confinement facility; have been civilly or administratively adjudicated, or convicted of engaging or attempting to engage in sexual activity in the community facilitated by force, implied threats of force, or if the victim did not or was unable to consent; Individuals convicted of soliciting or providing support for an act of terrorism, terrorism, or money laundering to support terrorism; Individuals who have been convicted of or pled guilty to a felony where a direct correlation exists between the position and prior criminal behavior. ADA StatementOhio is a Disability Inclusion State and strives to be a model employer of individuals with disabilities. The State of Ohio is committed to providing access and inclusion and reasonable accommodation in its services, activities, programs and employment opportunities in accordance with the Americans with Disabilities Act (ADA) and other applicable laws.Drug-Free WorkplaceThe State of Ohio is a drug-free workplace which prohibits the use of marijuana (recreational marijuana/non-medical cannabis). Please note, this position may be subject to additional restrictions pursuant to the State of Ohio Drug-Free Workplace Policy (HR-39), and as outlined in the posting.
$70k-94k yearly est. Auto-Apply 7h ago
Senior Analyst, Security Compliance (SOX IT)
Coinbase 4.2
Columbus, OH
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
$167.3k-196.8k yearly 60d+ ago
Senior Offensive Security Engineer, Red Team
Procter & Gamble 4.8
Cincinnati, OH
Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands.
From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded.
The Opportunity
Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world's most advanced cyber security adversaries?
The InformationSecurity Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise.
Responsibilities:
+ Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR.
+ Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes.
+ Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails).
+ Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC.
+ Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership.
+ Mentor junior engineers; set standards for craft quality, methodology, and safety.
+ Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment.
+ Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use.
+ Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management.
Job Qualifications
Required:
+ BA or BS degree in InformationSecurity, Cyber Security, Computer Science, or related field (OR 7+ years of relevant experience required in lieu of a degree).
+ 5+ years running offensive or emulation operations in large/complex environments, with demonstrated impact on detections/response.
+ Expertise across 2+ domains: enterprise/web/mobile apps; identity; cloud (AWS/GCP/Azure); network/endpoint; IoT/OT; or directory services.
+ Proven ability to bypass preventative/detective controls and reach mission objectives while maintaining safety and ROE.
+ Strong engineering skills (Python, PowerShell, GO, C++, Web Frameworks); comfort with low-level concepts a plus) and familiarity with C2 tradecraft.
+ Deep command of MITRE ATT&CK and threat-informed defense; history partnering with DFIR/SOC and Detection Engineering.
+ Excellent executive and technical communication.
+ Ability to work in Cincinnati, Ohio based office 3 days per week.
Preferred:
+ Leadership of purple-team campaigns and incident-driven emulations; closed-loop improvements with measurable KPI movement.
+ Building program metrics/KPIs, standardizing reporting, and integrating with risk governance.
+ Threat-intel integration: actor/campaign analysis, hypothesis generation, and prioritization tied to business impact.
+ Identity and cloud attack paths (SSO, MFA, OAuth, PAM; AWS/GCP/Azure control planes) with hardening collaboration across platform/IDAM teams.
+ Coordinating large third-party exercises and setting complex ROE.
Pay Range: $110,000 - $165,000
Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process.
Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE (******************************************************* .
P&G participates in e-verify as required by law.
Qualified individuals will not be disadvantaged based on being unemployed.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Job Schedule
Full time
Job Number
R000138781
Job Segmentation
Experienced Professionals
Starting Pay / Salary Range
$110,000.00 - $165,000.00 / year
$110k-165k yearly 60d+ ago
Entry Level Cyber Security Analyst
Reynolds and Reynolds Company 4.3
Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-12-23","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
$85k-110k yearly est. 60d+ ago
Information Security Engineer - Level 2 - Cloud
Default 4.5
Ohio
Cintas is currently looking for an IT Security Engineer-Level 2 for the IT Security Team within IT. This role researches, recommends and implements changes to enhance informationsystemssecurity and monitoring capabilities. The InformationSecurity Engineer-Level 2 is responsible for: engineering solutions (processes, technologies) to mitigate control gaps; presenting proposed solutions to IT management; coordinating with vendors for proof-of-concept, proof-of-value, and pilot exercises; reviewing informationsystems to identify potential security weaknesses, recommending improvements to reduce vulnerabilities; taking part of on-call rotation to triage any potential security incidents; participating in network and systems design to ensure implementation of appropriate systemssecurity policies; maintaining and growing knowledge and understanding of informationsecurity, risk management and regulatory compliance topics, providing occasional after hours and weekend support for project efforts; acting as mentor for junior engineers; and working collaboratively with various Cintas partners to design, build, and deploy security frameworks.
Skills/Qualifications
REQUIRED:
High school diploma/GED required; Bachelor's degree in Computer Science or related IT area, preferred
Minimum 7 years of experience in Information Technology
Minimum 4 years of experience in InformationSecurity
Strong knowledge of cyber security practices and procedures
Strong knowledge of networking and infrastructure best practices
Ability to act as the primary SME for Cloud Security
Strong working knowledge of the CSF Framework
Strong working knowledge of GCP, GCVE required; Azure preferred
Preferred:
Industry certifications (e.g., GCP, ACE)
Benefits
Cintas offers comprehensive and competitive medical, dental and vision benefits, with premiums below the national average. We offer flexibility with four different medical plan options; one plan is offered at zero cost.
Additionally, our employee-partners enjoy:
• Competitive Pay
• 401(k) with Company Match/Profit Sharing/Employee Stock Ownership Plan (ESOP)
• Disability, Life and AD&D Insurance, 100% Company Paid
• Paid Time Off and Holidays
• Skills Development, Training and Career Advancement Opportunities
Company Information
Cintas Corporation helps more than one million businesses of all types and sizes get Ready™ to open their doors with confidence every day by providing products and services that help keep their customers' facilities and employees clean, safe, and looking their best. With offerings including uniforms, mats, mops, towels, restroom supplies, workplace water services, first aid and safety products, eye-wash stations, safety training, fire extinguishers, sprinkler systems and alarm service, Cintas helps customers get Ready for the Workday . Headquartered in the U.S., Cincinnati, OH, Cintas is a publicly held Fortune 500 company traded over the Nasdaq Global Select Market under the symbol CTAS and is a component of both the Standard & Poor's 500 Index and Nasdaq-100 Index.
Cintas Corporation is proud to be an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), national origin, age, genetic information, disability, protected veteran status, or any other characteristic or category protected by local, state, or federal law.
This job posting will remain open for at least five (5) days.
Job Category: Information Technology
Organization:
Employee Status: Regular
Schedule: Full Time
Shift: 1st Shift
$98k-127k yearly est. 60d+ ago
Cloud Security Engineer
Lubrizol 4.6
Ohio
Shape the Future with Us. At Lubrizol, we're transforming the [industry/market - link to relevant LZ business page, if applicable] through science, sustainability, and a culture of inclusion. As part of our global team, you'll be empowered to make a real impact-on your career, your community, and the world around you.
Travel: < 5% (very limited) Job Type: Full-time. Collaborate in person 4 days each week, with 1 flexible day.
How You'll Make an Impact
As a Cloud Security Engineer, you will strengthen Lubrizol's global cloud security posture across AWS, Azure, and GCP by implementing robust security protocols, policies, and procedures to safeguard cloud-based systems, applications, and data.
Design, deploy, and maintain cloud-native and third-party security tools and solutions that enhance monitoring, detection, and response capabilities across our environments.
Conduct cloud-specific vulnerability assessments, penetration testing, and risk evaluations to proactively identify and mitigate risks, prioritizing remediation to fortify defenses.
Ensure compliance with international regulations and industry frameworks (e.g., ISO 27001, GDPR, NIST, SCF, PCI DSS) through technical audits, assessments, and documentation.
Collaborate closely with DevOps, application development, and infrastructure teams to embed security into cloud architectures, CI/CD pipelines, and deployment processes using secure-by-design principles.
Continuously monitor emerging threats, technologies, and compliance requirements; recommend enhancements to our cloud security architecture and operational processes.
Contribute to incident response activities and other security initiatives that improve our global cybersecurity resilience.
Required Qualifications that Enable Your Success
Bachelor's degree in Computer Science, Information Technology, or a related field; or a relevant combination of education and 5+ years of experience.
3+ years of experience in cybersecurity or a related role with hands-on work in cloud security across AWS, Azure, and/or GCP.
Proficiency implementing security protocols, policies, and procedures; conducting vulnerability assessments, penetration testing, and risk evaluations for cloud or hybrid environments.
Experience performing technical security audits and assessments aligned to frameworks such as ISO 27001, NIST, GDPR, PCI DSS, SOC 2.
Practical experience integrating security into cloud architectures and CI/CD pipelines in collaboration with DevOps and application teams.
Strong analytical, problem-solving, and communication skills with the ability to influence and drive accountability across teams.
Working knowledge of identity and access management, PKI, MFA, and authentication/authorization protocols (e.g., SAML, OAuth).
Preferred Qualifications that Drive you Forward
Advanced degree in a relevant field.
Certifications such as GIAC Cloud Security Essentials (GCLD), GIAC Public Cloud Security (GPCS), GIAC Security Essentials (GSEC), Microsoft Azure Fundamentals, CompTIA Cloud Essentials, Automation certificates, or Microsoft 365.
Hands-on experience with cloud security platforms and tools (e.g., CASB, CSPM, CWPP) and SIEM solutions (e.g., Splunk ES, QRadar, XSIAM).
Familiarity with SAP S/4HANA, industrial control systems (DCS/PLC/SCADA), and related security considerations.
Experience with network security technologies (firewalls, IDS/IPS, VPN, NAC) and web application firewalls (e.g., F5 BIG-IP).
Knowledge of data encryption and key management (e.g., Azure Key Vault) and vulnerability management tools (e.g., Rapid7 InsightVM).
Your Work Environment
At Lubrizol, we're committed to providing a safe, inclusive, and empowering environment where you can do your best work-whether in a lab, on the production floor, or in a hybrid office setting. Depending on your role, your work environment may include:
Standing, walking, or operating equipment for extended periods
Working in a lab or manufacturing setting with appropriate PPE provided
Use of computers and digital tools in an office or hybrid environment
Occasional lifting or movement of materials
Adherence to rigorous safety protocols and ergonomic standards
We continuously invest in our facilities and technologies to ensure they support your well-being, productivity, and growth. If you require reasonable accommodation, we are committed to working with you to ensure an inclusive and accessible experience.
Benefits that Empower You
Competitive salary with performance-based bonus plans
401(k) match + Age-Weighted Defined Contribution
Comprehensive medical, dental & vision coverage
Health Savings Account (HSA)
Paid holidays, vacation, and parental leave
Flexible work environment
Learning and development opportunities
Career and professional growth
Inclusive culture and vibrant community engagement
Learn more at benefits.lubrizol.com!
Lubrizol: Imagined for Life. Enabled by Science.™ Delivered by You.
We tackle the world's toughest challenges with science-based solutions, deeply understanding our customers to deliver innovative chemistry and differentiated value. Our inclusive culture, dedication to safety, and incredible global talent drive our success. Our solutions meet the evolving needs of the modern world-brought to life by science and, most importantly, delivered by you.
Whether you're in the lab, on the production floor, or in the office, you'll be part of a team around the world that empowers you to think boldly, drive results, and contribute to solutions that shape a better, more sustainable future.
We win because of you. Let's build the future together.
#LZBUS #LI-CM1
$70k-87k yearly est. 4d ago
Lead Security Engineer - DevOps
Jpmorgan Chase & Co 4.8
Columbus, OH
JobID: 210701359 JobSchedule: Full time JobShift: : Take on a crucial role where you'll be a key part of a high-performing team delivering secure software solutions. Make a real impact as you help shape the future of software security at one of the world's largest and most influential companies.
As a Lead Security Engineer at JP Morgan Chase within the Cybersecurity & Technology Controls, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions.
* Specific experience deploying commercial software at scale into an enterprise environment.
* Develop and enforce robust change management practices to ensure system integrity and security.
* Show strong experience defining and implementing infrastructure as Code (IaC), working with CI/CD pipelines, and associated automation tooling.
* Function in systems engineering, systems integrations, and systems administration roles. Demonstrate strong working knowledge of Windows and Linux systems internals.
* Execute on key deliverables in the security engineering space. Design and develop production deployments with the ability to think beyond routine or conventional approaches in order to deliver technology solutions for key stakeholders.
* Develop secure and high-quality production code and review and debug code written by others. Able to implement complex business logic in Python, Bash, PowerShell, and other scripting languages.
* Engage effectively with third-party vendors and communicate and collaborate with a broad range of internal teams.
* Minimize security vulnerabilities by following industry insights and government regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls.
* Work with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability.
* Add to team culture of diversity, equity, inclusion, and respect.
Required qualifications, capabilities, and skills
* Formal training or certification on Engineering and/or Cybersecurity concepts and 5+ years applied experience as a cloud engineer, deployment engineer, DevOps engineer, or equivalent role.
* Experience with cloud engineering, deployment engineering, DevOps engineering, or equivalent
* Demonstrated skills in planning, designing, and implementing enterprise level security solutions.
* Strong experience defining and implementing infrastructure as Code (IaC), working with CI/CD pipelines, and associated automation tooling
* Commanding knowledge of a programming/scripting language for automation and integration tasks.
* Proficiency in all aspects of the Software Development Life Cycle.
* Strong analytical experience with problem solving mindset and the ability to solve complex challenges.
* Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security.
Preferred qualifications, capabilities, and skills
* Cloud computing related certifications with an AWS focus are strongly preferred, such as Certified Solutions Architect, DevOps Engineer, or similar.
* Experience effectively communicating with senior business leaders.
$86k-112k yearly est. Auto-Apply 7d ago
Security Engineer - Airlock
Blue Star Partners LLC 4.5
Columbus, OH
Job Description
Job Title: Security Engineer - Cloud & Endpoint Security
Pay Rate: $50/hr - $85/hr
Duration: 2/10/2025 - 12/31/2025 (Temp-to-Hire)
Contract Type: W2 (must be authorized to work in the US; no sponsorships or C2C)
Job Overview
Our Cloud and Endpoint Security team is looking for a Security Engineer to drive the deployment and management of an allowlisting/reverse proxy solution (Airlock). This engineer will collaborate with cross-functional teams to ensure integration with existing infrastructure, refine security policies, and contribute to the enhancement of the organization's cybersecurity posture. The role involves hands-on configuration, monitoring, and ongoing maintenance of security solutions, while remaining adaptable to changing threats and technologies.
Key Responsibilities
Allowlisting & Reverse Proxy Deployment: Lead the deployment and configuration of Airlock, ensuring seamless integration with current systems and networks.
Policy Development: Define and implement allowlisting policies to enhance application security, access control, and threat detection.
Incident Response Collaboration: Work closely with the incident response team to optimize alerting and logging capabilities, ensuring swift detection and remediation of potential security incidents.
Security Strategy & Best Practices: Assist in shaping the broader cybersecurity strategy, aligning it with business objectives and recognized frameworks (e.g., NIST, MITRE, ISO 27001).
Automation & Reporting: Identify opportunities to automate configurations, streamline reporting processes, and enhance visibility into system performance.
Monitoring & Analysis: Track solution performance and review security logs for emerging threats or anomalies; implement proactive measures where necessary.
Research & Continuous Improvement: Stay informed about the latest cybersecurity threats and trends, applying relevant findings to enhance Airlock's configurations.
Documentation & Maintenance: Support the development of incident response plans, secure access protocols, and maintain thorough documentation of all configurations and processes.
Qualifications
Minimum Requirements
Bachelor's Degree in a related field or equivalent work experience.
3+ years of experience in cybersecurity, IT, or related roles.
1+ years of hands-on experience deploying or managing application allowlisting or reverse proxy solutions.
1+ years of experience with security frameworks (e.g., NIST, MITRE, ISO 27001).
Proficiency with Windows and Linux environments, including command-line configurations.
Preferred Skills
Experience using Airlock or similar allowlisting tools.
Familiarity with scripting/automation (Python, PowerShell, Bash) for configuration and reporting.
Industry certifications (e.g., Sec+, CCSP, GIAC).
Strong analytical and problem-solving abilities, especially in process development and root cause analysis.
Additional Information
Temp-to-Hire: This is a W2 contract position with potential to convert to a full-time role, contingent on performance and business needs.
Work Arrangements: Local candidates are preferred; remote candidates will be considered if necessary.
Team Environment: The Cloud & Endpoint Security team collaborates with multiple departments, playing a crucial part in establishing security best practices and ensuring incident response readiness.
$50 hourly 21d ago
Application Security Engineer
Central Insurance 3.6
Columbus, OH
Location: Van Wert, OH; Dublin, OHWork Model: Hybrid Position type: Full time - salary We're a team of employees passionate about delivering best-in-class customer service and driving innovation in IT support. Integrity, relationships, and excellence are at the heart of everything we do.
Our employees fully utilize their talents and bring their best selves to work. We believe who you are is just as important as what you do!
Help shape the future of secure software at Central. We're looking for a detail-oriented, and innovative Application Security Engineer to join our cybersecurity team. In this role, you'll be responsible for embedding security into the software development lifecycle, identifying vulnerabilities, and collaborating with developers to build resilient applications. If you're passionate about threat modeling, testing, and hardening within the application environment including AI applications and driving a culture of security across engineering teams, we'd love to have you on board.
Key Responsibilities of the Role
Conduct secure code reviews, threat modeling, and vulnerability assessments.
Collaborate with engineers to integrate security controls into CI / CD pipelines.
Develops, maintains, and champions secure coding guidelines and training materials.
Collaborates with DevOps and Software Engineering to integrate security into the SDLC process.
Implements and manages application security tools (SAST, DAST, SCA, WAF, etc..)
Assists with monitoring security events and contributes with the incident response. team
Collaborates on data security to ensure secure data access configurations with Data Engineering and Infrastructure.
Collaborates with Software Engineering to integrate security into AI/ML pipelines and governance frameworks.
Responsible for scripting automation for integration of security tools and functions.
Utilizes scripting for meta-data aggregation to allow for the creation of dashboards or other metrics for security analytics.
Stay current with emerging threats, vulnerabilities, and security technologies.
Required Qualifications
Bachelor's degree in Computer Science or related field and 2 years related experience
Or 4 years related experience
Preferred Qualifications
CISSP, CASE, GWAPT, or CSSLP certifications preferred
Knowledge, Skills, and Abilities
Creativity and passion for application security
Curious mind and strong desire to constantly learn.
Strong understanding of OWASP Top Ten, secure coding practices, and common attack vectors.
Proven ability to apply secure design principles within application architecture.
Strong analytical, research, and problem-solving skills
Understanding of the software development life cycle.
Understanding of security tools such as Burp Suite, Snyk, Rapid7, or similar tools.
Familiarity with CI/CD tools such as Azure DevOps, GitLab, Jenkins or similar tools.
Ability to work with product, software, data, and infrastructure engineering teams.
Strong understanding of data protection principles and technologies (Encryption, DLP, IAM)
Understanding of scripting automation using Python, PowerShell, Bash.
Possess a positive, professional, cooperative, and quality-conscious attitude
Possesses verbal and written communication skills, including negotiation, presentation, and influence skills
Ability to understand Central Insurance's policies and processes
Total Rewards
Central establishes base pay based on several factors including labor market data and an evaluation of candidate qualifications relative to role requirements. Base pay is one component of a comprehensive total rewards package designed to support employees' financial, health, career, and retirement objectives. Central provides extensive health and wellness benefits to promote flexibility, work-life balance, and long-term financial security. For more information, see Central Insurance Benefits
$84k-106k yearly est. 60d+ ago
Information Security Analyst
Bakerhostetler Career 4.8
Cleveland, OH
This role is primarily responsible for executing the tactical and strategic initiatives of the InformationSecurity team to include programs such as risk and vulnerability management, incident response, security architecture, cloud security and third-party vendor management. Work is typically assigned by the InformationSecurity Manager, although the InformationSecurity Analyst is expected to operate with minimal oversight and be able to identify areas of opportunity to get involved with informationsecurity tasks and initiatives. The ideal candidate is comfortable working in a fast-paced environment, communicating to technical and non-technical staff, and capable of switching between tasks as situations and criticality arise and be passionate about learning and continuous education.
ESSENTIAL DUTIES AND RESPONSIBILITIES include the following. Other duties may be assigned.
Execute on security strategy as defined by the InformationSecurity Manager.
Participation in the Firm's Vulnerability Management Program, working with cross-functional teams to identify, manage and mitigate security vulnerabilities across the Firm.
Assist with the administration of the Firm's Vendor Risk Management process, including analyzing and responding to third-party risk assessments.
Monitor and respond to informationsecurity alerts and notifications (IDS/IPS, SIEM, AV/EDR, etc.).
Design, review and administer Azure cloud security controls and architecture, including auditing Azure cloud environments.
Utilize scripting languages such as PowerShell and Python to automate tasks and improve security operations.
Collaborate and advise on IT projects to ensure security issues are addressed throughout the project life cycle.
Assist other IT teams in developing and employing security solutions across various applications and product platforms.
Administer and utilize various endpoint and network security tools, such as CrowdStrike, SIEM tools, Fortinet or other comparable advanced detection and response tools.
Administer and utilize vulnerability scanning, packet analysis and exploitation tools such as Nessus, nmap, Wireshark, tcpdump, Metasploit or similar technologies.
Design, review and aid with implementation of secure networks and system architecture (ex. network topology reviews, firewall ruleset reviews, minimum security baselines, etc.).
Apply appropriate controls referenced in various security frameworks and standards, such as the NIST CSF 2.0 Framework, NIST 800-53, CIS Controls, etc.
Monitor and secure Microsoft client and server systems, along with Fortinet and Cisco (or comparable) network devices.
Assist with the management and maintenance of user security policy education, training and awareness programs.
Conduct security research to stay abreast of latest security issues, including laws and regulations which may affect the Firm.
Other duties as requested and assigned.
QUALIFICATION REQUIREMENTS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
EDUCATION/EXPERIENCE:
Bachelor's Degree in Computer Science, Management InformationSystems or related field with a minimum of 5-7 years of experience in Information Technology, or equivalent combination of education and experience. This must include 3-5 years of experience in InformationSecurity with two or more of the following domains: Windows Systems Administration, UNIX/Linux Systems Administration, Networking, Access Control, Incident Response, and Information & Data Security.
Preferred Certifications:
Certified InformationSystemsSecurity Professional (CISSP)
GIAC GSEC, GCIH, GCIA, GCWN, or equivalent certification
CompTIA Security+, CySA+, Network+, CASP or equivalent certification
Microsoft Azure Security Certifications (i.e. AZ-500, SC-100 to SC-400)
TECHNICAL SKILLS:
Demonstrated proficiency in Microsoft Office Suite including Word, Outlook, Excel, and PowerPoint.
Proven aptitude to learn new software applications.
LANGUAGE SKILLS:
Very strong communication skills, both written and oral. Excellent interpersonal communication skills necessary to maintain effective relationships with staff, trusted third-party partners, attorneys and clients. Establish credibility with staff and attorney base through quality work and communications that bring to bear the right mix of confidence, tact, persistence and reliability. Written communications must be concise, professional and accurate.
MATHEMATICAL SKILLS:
Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.
REASONING ABILITY:
Ability to apply common sense understanding to carry out instructions furnished in written, oral, or diagram form.
Ability to deal with problems involving several concrete variables in standardized situations.
Ability to define problems, collect data, establish facts and draw valid conclusions.
Ability to interpret an extensive variety of instructions and deal with several abstract and concrete variables.
Exhibit independent thinking and decision making.
Ability to interpret an extensive variety of instructions in mathematical or diagram form and deal with several abstract and concrete variables.
Ability to think strategically, develop tactics and execute pragmatically.
OTHER SKILLS and ABILITIES:
Excellent organizational and planning skills with ability to prioritize multiple tasks and projects to meet deadlines.
Ability to work under pressure in a fast-paced environment with demanding individuals.
Strong analytical and organizational skills with a tolerance for uncertainty and an ability to prioritize and complete simultaneous projects with minimal supervision.
Outstanding creativity; flexibility and persistence; motivation and energy with the ability to work with little supervision and collaborate with other members of the team.
Ability to work overtime when needed. Work occasionally requires more than 40 hours per week to perform the essential duties of the position.
A tolerance for uncertainty and an ability to prioritize and complete simultaneous projects with minimal supervision.
Thorough understanding of technologies that can be applied to firm operations and enhance working efficiency.
Ability to exercise discretion with confidential and sensitive information.
PHYSICAL DEMANDS: The physical demands described here are representative of those that should be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel objects, documents, books, pen/pencil, paper, controls and manipulate a keyboard, and input data into a PC; and talk or hear. The employee is frequently required to walk.
The employee is occasionally required to use hands to prepare correspondence and reports on a personal computer.
The employee is occasionally required to stand and reach with hands and arms. And stoop, kneel, bend, crouch or crawl.
Ability to operate a variety of standard office equipment including a computer, copy and facsimile machines.
The employee must occasionally lift and/or move up to 25 pounds.
Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception and the ability to adjust focus.
WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually moderate.
The salary offered in any location will be determined by a wide range of factors, including, but not limited to, experience level, education/training, geographic region, and relevant skills. Associates also participate in a performance- and hours-based bonus program. The expected annual salary for this position ranges from $100,000- $115,000
Baker & Hostetler LLP is an Equal Opportunity Employer.
#LI-Remote
$100k-115k yearly 59d ago
Network Information Security Engineer
Medpace 4.5
Cincinnati, OH
We are hiring a full-time Cybersecurity Engineer who is technical, dedicated to learning new things, security-minded, has strong initiative, and is able to manage projects autonomously. The InformationSecurity team defends the company's digital infrastructure by designing, implementing, and improving the company's cybersecurity architecture. This is a critical role responsible for protecting infrastructure, cloud, edge devices, and data against unauthorized use, modification, exfiltration, or damage. If you're excited to be part of a fast-growing team, then Medpace is a great place to grow your career.
Responsibilities
* Engineer security solutions without oversight while collaborating with multiple internal departments and vendors;
* Analyze securitysystems and drive continuous improvements;
* Research vulnerabilities, perform vulnerability scanning and remediate threats;
* Mature security best practices and policies internal to the organization;
* Develop new processes while cross-training coworkers and assisting employees on security-related matters;
* Provide security awareness training and testing for employees to verify proper security protocols are being adhered to;
* Performing cyber security incident triage, reviewing logs, and performing remediation activities; and;
* Review and reduce inappropriate/overprovisioned access to drive least privileged access.
Qualifications
* Minimum of bachelor's degree, preferably in Cybersecurity or Information Technology;
* 3 years of experience in implementing, sustaining, and supporting InformationSecurity solutions;
* Understanding of security best practices and how to implement them within an enterprise environment;
* Experience with managing, configuring, and deploying enterprise-grade security solutions in some of the following areas:
* Zero Trust networking and network segmentation
* Networking protocol analysis and forensics
* Firewall configuration, Intrusions Detection and Prevention Systems (IDS/IPS)
* Configuring Azure network architecture, working with Azure policies and Defender for Cloud
Nice to have:
* Experience with vulnerability assessment tools such as Nessus and Tenable;
* Experience with enterprise web proxy solutions, web filters, and VPN such as Zscaler;
* Experience with governing Windows environment including GPO;
* Previous employment or experience in a highly regulated industry such as healthcare, financial, or defense experience with standards such as ISO, NIST, HIPPA, and/or SOC2; and
* Auditing and policy-writing experience.
Medpace Overview
Medpace is a full-service clinical contract research organization (CRO). We provide Phase I-IV clinical development services to the biotechnology, pharmaceutical and medical device industries. Our mission is to accelerate the global development of safe and effective medical therapeutics through its scientific and disciplined approach. We leverage local regulatory and therapeutic expertise across all major areas including oncology, cardiology, metabolic disease, endocrinology, central nervous system, anti-viral and anti-infective. Headquartered in Cincinnati, Ohio, employing more than 5,000 people across 40+ countries.
Why Medpace?
People. Purpose. Passion. Make a Difference Tomorrow. Join Us Today.
The work we've done over the past 30+ years has positively impacted the lives of countless patients and families who face hundreds of diseases across all key therapeutic areas. The work we do today will improve the lives of people living with illness and disease in the future.
Cincinnati Perks
* Cincinnati Campus Overview
* Flexible work environment
* Competitive PTO packages, starting at 20+ days
* Competitive compensation and benefits package
* Company-sponsored employee appreciation events
* Employee health and wellness initiatives
* Community involvement with local nonprofit organizations
* Discounts on local sports games, fitness gyms and attractions
* Modern, ecofriendly campus with an on-site fitness center
* Structured career paths with opportunities for professional growth
* Discounted tuition for UC online programs
Awards
* Named a Top Workplace in 2024 by The Cincinnati Enquirer
* Recognized by Forbes as one of America's Most Successful Midsize Companies in 2021, 2022, 2023 and 2024
* Continually recognized with CRO Leadership Awards from Life Science Leader magazine based on expertise, quality, capabilities, reliability, and compatibility
What to Expect Next
A Medpace team member will review your qualifications and, if interested, you will be contacted with details for next steps.
$71k-97k yearly est. Auto-Apply 11d ago
Security Engineer, Identity Management
Interstate Gas Supply 4.8
Ohio
For this role, we are looking for a curious and innovative Security Engineer with a passion for informationsecurity, customer service, and compliance. You will be responsible for guiding security best practices while following security frameworks such as NIST, and SOC2. You will be leading the security programs to ensure minimal risk exposure. At IGS, we take a risk-based approach to our decisions and utilize industry best practices and security frameworks to guide us along the way. We are looking for someone that is good at understanding and solving complex and ambiguous problems and constantly seek improvement.
Primary Responsibilities
Architect and manage Azure Entra infrastructure, including tenant design, hybrid identity configurations, and conditional access policies.
Maintain and optimize Active Directory environments, including domain controllers, group policies, organizational units, and security hardening.
Design and implement Active Directory Federation Services (ADFS) and manage complex federation trusts between internal and external identity providers.
Plan and execute domain trust relationships, including forest trusts, external trusts, and realm trusts across complex enterprise environments.
Lead identity platform through organizational transitions, including tenant-to-tenant migrations, directory consolidations, and identity lifecycle transitions.
Manage multi-tenant Microsoft 365 migrations, ensuring secure data transfer and seamless user transitions during organizational changes.
Develop and maintain disaster recovery and business continuity plans for identity infrastructure.
Implement identity security best practices, including privileged access management, MFA enforcement, and identity protection policies.
Monitor identity infrastructure health, performance, and security posture, responding to incidents and anomalies.
Collaborate with business stakeholders during organizational transitions to ensure smooth identity transitions with minimal business impact.
Other Responsibilities
Work closely with IT and other departments to ensure security measures are integrated into all aspects of the organization's technology and operations.
Apply knowledge of informationsecurity principles and practices.
Ability to think strategically but willingness to handle, first-hand, the mechanics of technology services required by the business.
Other duties and responsibilities as assigned.
Required Skills
Proven experience managing complex Microsoft 365 environments, particularly multi-tenant migrations and consolidations.
Strong understanding of Active Directory Federation Services, domain trusts, and forest architectures.
Hands-on experience with Azure Entra, including conditional access, privileged identity management, and hybrid identity configurations.
Solid understanding of authentication protocols (SAML, OAuth 2.0, OpenID Connect, Kerberos, LDAP).
Exceptional organizational skills, follow through, and multitasking abilities.
Decisiveness, good judgment, analytical aptitude, and problem-solving skills to act with authority and take risks in an environment with little direction from others.
Excellent communicator with strong organizational savvy and leadership skills necessary to interface with and influence all levels of organization.
Ability to work in a fast-paced and dynamic environment.
Minimum Education and Experience
Minimum of 5 years of technical experience, with at least 3 years of security focus.
Demonstrated knowledge of, and experience in implementing security technologies and processes.
Professional certifications within security-related areas, while not a minimum requirement, would be highly desirable.
#LI-AM1
Work Authorization: Applicants must be authorized to work in the US on a full-time basis. Unfortunately, a current or future need for sponsorship is not supported or available for this position.
Salary Range:
$87,630.00 - $140,210.00
*This range reflects base pay only. Incentive earnings, like commissions or bonuses, are not included.
This role is also eligible for an annual incentive plan based on company performance. How We Support Your Wellbeing:
Our employees are our most valuable asset. That's why at IGS, we are committed to offering a holistic benefit program that allows employees to stay healthy, feel secure, and maintain flexibility in their wellbeing journey.
Healthcare Essentials: Comprehensive coverage including medical (plus free telehealth), dental, vision, and employer health savings account contributions.
Mental Wellbeing: Robust support through Headspace and free mental healthcare visits for you and your dependents.
Family Planning Support: Extensive assistance with Maven, paid family and caregiver leave, and fertility, adoption, and surrogacy services.
Financial Readiness: Strong financial foundation with a 401(k) plan, company match, and access to financial wellbeing tools.
Work-Life Balance: paid time off, tuition reimbursement, paid leaves, employee hardship fund, and a wide range of additional perks.
Equal Opportunity Employment:
It is the policy of IGS Energy to ensure equal employment opportunity in accordance with all applicable federal and state regulations and guidelines. Employment discrimination against employees and applicants due to race, color, religion, sex (including sexual harassment), national origin, disability, age, sexual orientation, gender identity, military status, and veteran status or other legally protected class under applicable law is prohibited.
$87.6k-140.2k yearly Auto-Apply 20d ago
Applications Security Architect
Crown Equipment Corporation 4.8
New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Job Posting External**
**Primary Responsibilities**
+ Define security architecture standards and blueprints for web, mobile, cloud, and Application Programming Interface (API)-based applications.
+ Review design documents and perform architecture risk assessments for new and existing applications.
+ Collaborate with DevOps, Engineering, and Infrastructure teams to ensure architectures align with secure design principles.
+ Integrate automated security testing/scanning tools (Static Application Security Testing (SAST), Software Composition Analysis (SCA)) into Continuous Integration (CI) or Continuous Delivery (CD) pipelines.
+ Define and enforce secure coding standards and practices across development teams.
+ Provide training and guidance to developers on secure development principles and vulnerability prevention.
+ Conduct threat modeling and attack surface reviews for high-risk or critical applications.
+ Identify potential security flaws and recommend mitigations early in development process.
+ Track and communicate technical risk to product managers, developers, and leadership teams.
+ Develop and maintain application security policies, baselines, and architecture frameworks.
+ Ensure application security practices align with regulations including General Data Protection Regulation (GDPR) and Payment Card Industry Data Security Standard (PCI-DSS).
+ Support audit and compliance initiatives by providing documentation and evidence of secure development practices.
**Minimum Qualifications**
+ Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related field is required, along with 2-4 years related experience. _Non-degree considered if 12+ years of related experience along with a high school diploma or GED_
**Preferred Qualifications**
+ 5+ years in cybersecurity with at least 3 years in application security or secure software development experience.
+ Secure Software Development Life Cycle (SDLC) in development. Deep knowledge of Open Web Application Security Project (OWASP) Top 10, National Institute of Standards and Technology (NIST), and secure coding frameworks.
+ Experience with Securing Secrets and Service Accounts.
+ Experience with Web Application Firewall (WAF) implementation/support.
+ Familiarity with Identity and Access Management and cloud security practices (AWS, Azure).
+ Certified InformationSystemsSecurity Professional (CISSP), Certified Secure Software Lifecycle Professional (CISSP), Certified Ethical Hacker (CEH) certified.
+ Familiarity with container security (Docker, Kubernetes).
+ Experience in Threat Modeling.
+ Understanding of authentication protocols (Open Authorization (OAuth) and Security Assertion Markup Language (SAML)).
+ Experience with DEVSECOPStools and container security tools.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
$99k-123k yearly est. 60d+ ago
Senior Security Analyst
Layerzero Power Systems
Aurora, OH
Full-time Description
About Us:
LayerZero Power Systems Inc. is a globally recognized leader in providing state-of-the-art power distribution solutions for critical industries. With a strong focus on reliability, innovation, and customer satisfaction, we deliver advanced power systems products that ensure uninterrupted and dependable power supply in mission-critical environments. Our customer base is comprised of companies in the transaction processing, financial, computer service provision and semiconductor manufacturing sectors. LayerZero Power Systems is on a trajectory of sustained growth, with a loyal customer base of existing Fortune 100 customers and an expanding portfolio of new customers.
Position Description: Senior Security Analyst
Responsible for monitoring, analyzing, and responding to security events across LayerZero's IT environment. This role requires a proactive professional with strong technical skills who can identify risks, investigate incidents, and support the implementation of security controls and best practices.
Primary Duties:
• Monitoring & Incident Response
• Monitor security alerts, logs, and dashboards for potential threats.
• Investigate and respond to security incidents, escalating as needed.
• Perform root cause analysis and recommend corrective actions.
• Risk Management & Compliance
• Assist with vulnerability assessments, penetration testing, and remediation efforts.
• Support compliance initiatives and audits (e.g., ISO, NIST, SOC).
• Maintain documentation of policies, procedures, and incident reports.
• Security Operations
• Manage endpoint protection, firewalls, intrusion detection/prevention systems, and SIEM tools.
• Ensure timely patching and updates across systems.
• Collaborate with IT teams to enforce access controls and data protection practices.
• Continuous Improvement
• Stay current on emerging threats, tools, and best practices.
• Recommend improvements to security architecture and processes.
• Provide training and awareness to employees on cybersecurity practices.
Requirements
Skills & Experience
• Familiarity with SIEM platforms, firewalls, IDS/IPS, and endpoint protection tools.
• Knowledge of security frameworks (NIST, ISO, CIS).
• Strong analytical and problem-solving skills.
• Excellent communication and documentation abilities.
Education:
• Bachelor's degree in InformationSecurity, Computer Science, or related field (preferred).
• 2-4 years of experience in IT security or systems administration.
What We Offer:
Competitive pay with performance incentives
100% company-paid medical, dental, and vision
401(k) with company match
3 weeks PTO, 8 paid holidays, and 2 floating holidays
Why You Will Love Working with Us:
Impact: Develop your skills and expertise in a rapidly growing industry, with your work directly influencing the success of mission-critical projects.
Innovation: Immerse yourself in an environment that celebrates forward-thinking and continuous improvement.
Collaborative spirit: Work closely with engineers, marketers, and other professionals to bring ideas to life.
Grow with us: We are committed to your personal and professional development, offering endless opportunities to improve your skills and advance your career.
At LayerZero, we are proud to be an Equal Opportunity Employer. We welcome and celebrate diversity, and we are committed to creating an inclusive environment for all employees.
Salary Description $85k-115k Annually based on Skills & Experience
$85k-115k yearly 44d ago
Staff Product Security Engineer
6041-Ethicon Endo Surgery Legal Entity
Cincinnati, OH
At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at *******************
Job Function:
R&D Product Development
Job Sub Function:
R&D Software/Systems Engineering
Job Category:
Scientific/Technology
All Job Posting Locations:
Cincinnati, Ohio, United States of America, Santa Clara, California, United States of America
:
About Surgery
Fueled by innovation at the intersection of biology and technology, we're developing the next generation of smarter, less invasive, more personalized treatments.
Are you passionate about improving and expanding the possibilities of MedTech surgery? Ready to join a team that's reimagining how we heal? Our MedTech Surgery team will give you the chance to deliver surgical technologies and solutions to surgeons and healthcare professionals around the world. Your contributions will help effectively treat some of the world's most prevalent conditions such as obesity, cardiovascular disease and cancer. Patients are waiting.
Your unique talents will help patients on their journey to wellness. Learn more at *******************/medtech.
We are searching for the best talent for a Staff Product Security Engineer position, to be located in Santa Clara, CA or Cincinnati, OH.
Job Description:
The Staff Product Security Engineer will be a key member of the Capital R&D organization, make vital contributions to the New Product Development (NPD) pipeline and transform patient care through innovation. They are accountable for leading our NPD teams and creating a strategy to implement cybersecurity into the design and development of product hardware and software for use in cutting edge medical devices and associated capital equipment
You will be responsible for:
Identify threats and vulnerabilities to patient safety and product integrity, assess current security controls and determine potential impact of a threat and the risk level associated with threat/vulnerability pairs.
Drive architecture, requirements, and design to ensure that decisions incorporate security considerations.
Advise embedded systemsecurity software to ensure system hardening and secure coding practices.
Support all stakeholders on patch management, vulnerability handling, and SBOM scanning
Document designs and specifications per design control processes and conform to Industry Standards for Medical Device Software (IEC 62304)
Qualifications / Requirements:
Education:
Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity or related degree
Experience and Skills
6+ years' experience (or 4+ with M.S.) establishing security architecture or implementing security solutions in consumer products or medical devices
3+ experience in a software engineering or software architectural role in a New Product Development (NPD) environment
Proven experience with threat modeling and risk assessments for connected products or medical devices
Ability to work autonomously and proactively seek out security opportunities within the different surgical robotics teams
Ability to think big picture and have attention to detail - aligning strategic objectives with tactical implementation.
Proven experience with electrical and embedded software design
Experience developing software for embedded Real-Time Operating Systems (RTOS)
Experience developing embedded software systems using Modern C++ (preferably standards 17+)
A results and performance driven demeanor with strong sense of accountability
Understanding of penetration testing, vulnerability scanning, and/or other general security testing principles
Preferred Skills & Experience:
Experience with FDA, data governance, and privacy standards (HIPAA, ISO 27001, UL 2900)
Work experience with Systems Engineering activities: requirements management and development, risk management, and verification
Strong collaboration, proven technical leadership capabilities, and conflict resolution skills
A security certification from an accredited body is preferred and may be considered in lieu of a portion of required years of experience
Experience working with secure boot, Trusted Platform Module (TPM), Data Distribution System (DDS), and QNX
Other Requirements:
Ability to travel up to 10% domestic US and Internationally
The anticipated base pay range for this position is $105,000- $169,050.
California Bay Area - The anticipated base pay range for this position is $141,000 - $227,000.
The Company maintains highly competitive, performance-based compensation programs. Under current guidelines, this position is eligible for an annual performance bonus in accordance with the terms of the applicable plan. The annual performance bonus is a cash bonus intended to provide an incentive to achieve annual targeted results by rewarding for individual and the corporation's performance over a calendar/performance year. Bonuses are awarded at the Company's discretion on an individual basis.
Employees and/or eligible dependents may be eligible to participate in the following Company sponsored employee benefit programs: medical, dental, vision, life insurance, short- and long-term disability, business accident insurance, and group legal insurance.
Employees may be eligible to participate in the Company's consolidated retirement plan (pension) and savings plan (401(k)).
This position is eligible to participate in the Company's long-term incentive program.
Employees are eligible for the following time off benefits:
Vacation - up to 120 hours per calendar year
Sick time - up to 40 hours per calendar year
Holiday pay, including Floating Holidays - up to 13 days per calendar year
Work, Personal and Family Time - up to 40 hours per calendar year
Additional information can be found through the link below.
For additional general information on Company benefits, please go to: - *********************************************
This job posting is anticipated to close on 7/22/25. The Company may however extend this time-period, in which case the posting will remain available on *************************** to accept additional applications.
Johnson & Johnson is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or other characteristics protected by federal, state or local law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act.
Johnson & Johnson is committed to providing an interview process that is inclusive of our applicants' needs. If you are an individual with a disability and would like to request an accommodation, external applicants please contact us via
*******************/contact-us/careers
. internal employees contact AskGS to be directed to your accommodation resource.
#RADSW
#Li-Hybrid
Required Skills:
Product Security, Threat Modeling
Preferred Skills:
C++ STL, Embedded C++
$74k-102k yearly est. Auto-Apply 60d+ ago
Cloud Security Engineer
Uhhospitals
Ohio
Cloud Security Engineer - (23000FK6) Description The Cloud Security Engineer (CSE) should be hands-on in all aspects of Azure security including implementing security controls and threat protection, manage identity and access management, defining organizational structure and policies, using Azure technologies in order to provide data protection, configuring network security defenses, collecting and analyzing Azure logs, managing incident responses, and an understanding of regulatory concerns.
As a Cloud Security Engineer you design and implement a secure end-to-end infrastructure on Azure in a hybrid cloud setup.
Essential FunctionsMonitor security events daily, performing investigations and working with appropriate team members, business teams and Technology teams to develop solutions that address critical security concerns Maintain and improve the security posture of the Azure platform, identifying, and remediating vulnerabilities by using a variety of security tools.
Provide cyber security expertise in the analysis, assessment, development, and evaluation of security solutions and architectures to secure applications, operating systems, databases, and networks.
Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that apps, containers, infrastructure, and networks are protected.
Implementing threat protection and responding to security incident escalations.
Automate security controls, data, and processes to provide better metrics and operational support using security-as-code.
Configure access within a cloud solution environment using the defense-in-depth principle Configure network security including in a hybrid context with traditional network centric controls Ensure data protection Manage operations within a cloud solution environment such as operations tasks, using cloud native tools, like Log Analytics, Azure Monitor and Azure Security Center or other monitoring tooling.
Support our cloud engineers to implement security best-practices and enable secure development and release processes.
Deep understanding of configuring security policies and securing applications and data.
Required For All JobsPerforms other duties as assigned.
Complies with all policies and standards.
For specific duties and responsibilities, refer to documentation provided by the department during orientation.
Must abide by all requirements to safely and securely maintain Protected Health Information (PHI) for our patients.
Annual training, the UH Code of Conduct and UH policies and procedures are in place to address appropriate use of PHI in the workplace.
Qualifications QualificationsEducationBachelor's Degree in Information Technology, Computer Science, or a related field Required Work Experience5+ years IT security experience Required and 3+ years building and maintaining secure azure cloud solution and tools (Azure Monitor, Log Analytics, Azure Security Center) Required Knowledge, Skills, & Abilities Understand agile and DevOps concepts in a security context such as “trust but verify”, central vs decentral controls, make agile teams as autonomous as possible while ensuring the teams adhere to the NonFunctional-Requirements.
A deep understanding of networking, e.
g.
IP subnetting, Network Security Groups, routing, Azure Firewall, ExpressRoute, load balancer, DNS.
Strong familiarity with cloud capabilities and products and services for Azure, e.
g.
Azure Active Directory, Privileged Identity Management, VMs, Container Registry, Azure Kubernetes Services (AKS), Data Services, KeyVault.
Have the intrinsic quality to want to continuously improve and do better Hands-on and can-do mentality Feeling of ownership Good communication and presentation skills Team player Able to express ideas effectively in individual and group situations.
Able to execute a task in a good manner and with good results with limited supervision Strong skills in scripting and automation, Infrastructure-as-Code and using CI/CD concepts.
Experience with pipeline tooling for automated deployments and applying security controls.
Experience with Experience with infrastructure orchestration tools such as Terraform and other cloud-specific infrastructure automation tools (Azure Resource Manager, Google Cloud Deployment Manager) to automate the creation of staging, testing and production environments.
Work experience from large, international companies and have dealt with or worked for global service providers.
Licenses and CertificationsCertified InformationSystemSecurity Professional (CISSP) Preferred Certified Ethical Hacker (CEH) Preferred Additional Licenses and Certifications Microsoft Azure Security related certifications Microsoft Certified: Azure Security Engineer Associate, Microsoft Certified: Information Protection Administrator Associate, or Microsoft Certified: Security Operations Analyst Associate) Preferred Certified Cloud Security Professional (CCSP) Preferred Certificate of Cloud Security Knowledge (CCSK) Preferred Global Information Assurance Certification (GIAC) Preferred Physical DemandsStanding Occasionally Walking Occasionally Sitting Constantly Lifting Rarely 20 lbs Carrying Rarely 20 lbs Pushing Rarely 20 lbs Pulling Rarely 20 lbs Climbing Rarely 20 lbs Balancing Rarely Stooping Rarely Kneeling Rarely Crouching Rarely Crawling Rarely Reaching Rarely Handling Occasionally Grasping Occasionally Feeling Rarely Talking Constantly Hearing Constantly Repetitive Motions Frequently Eye/Hand/Foot Coordination Frequently Primary Location: United States-Ohio-Shaker_HeightsWork Locations: 3605 Warrensville Center Road 3605 Warrensville Center Road Shaker Heights 44122Job: Information TechnologyOrganization: UHHS_Information_TechnologySchedule: Full-time Employee Status: Regular - ShiftDaysJob Type: StandardJob Level: ProfessionalTravel: NoRemote Work: YesJob Posting: Nov 14, 2025, 1:58:20 PM
$76k-104k yearly est. Auto-Apply 7h ago
Information Security Analyst I - Cincinnati, OH
Whitedog Cyber
Cincinnati, OH
WhiteDog is seeking an InformationSecurity Analyst to join our Security Operations Center team. The Analyst will help coordinate and report on cyber incidents impacting SOC-as-a-Service customers. This position involves critical duties and responsibilities that must continue to be performed during crisis situations and contingency operations, which may necessitate extended hours of work.
Onsite Location: Cincinnati, OH (no remote available)
Employment Type: Full-Time, hourly
Compensation: $22-$28/hour
Key Responsibilities:
Responsible for working in a 24x7 Security Operation Center (SOC) in person. (Hours - 7:00pm-7:00am PST)
Provide analysis and trending of security log data from a large number of heterogeneous security devices.
Provide Incident Response (IR) support when analysis confirms actionable incident.
Provide threat and vulnerability analysis as well as security advisory services.
Analyze and respond to previously undisclosed software and hardware vulnerabilities.
Investigate, document, and report on informationsecurity issues and emerging trends.
Integrate and share information with other analysts and other teams.
Ability to work and be available for on-call activities
Other duties as assigned.
Experience and Skills:
Experience in security device management and SIEM.
Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix.
Knowledge of applications, databases, middleware to address security threats against the same.
Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusion detection systems).
Knowledge of TCP/IP Protocols, network analysis, and network/security applications.
Knowledge of common Internet protocols and applications.
Ability to multi-task, prioritize, and manage time effectively.
Strong attention to detail.
Excellent interpersonal skills and professional demeanor.
Excellent verbal and written communication skills.
Excellent customer service skills.
Proficient in Microsoft Office Applications.
Qualifications:
The successful candidate will possess the personality traits, work habits, communication, and social skills necessary to work effectively within a dynamic and highly operational environment. This person will have exemplary personal and professional integrity and demonstrate strong interpersonal skills. In addition, the qualified candidate will have a strong desire to succeed in a nationally and internationally recognized operational environment.
Bachelor's or Master's degree in a related field or equivalent demonstrated experience and knowledge.
You must be a US Citizen
1-3 years' experience as a Security/Network Administrator or equivalent knowledge.
Security Essentials Certification (GSEC)
Certified Intrusion Analyst (GCIA)
Certified Incident Handler (GCIH)
Certified Ethical Hacker (CEH)
Certified Penetration Tester (CWAPT)
CompTIA Network+
CompTIA Security+
Benefits:
WhiteDog offers a competitive compensation plan with great earning potential. Our benefits include medical coverage, dental coverage, disability, life insurance, 401K and an amazing work environment!
We are an Equal Opportunity Employer. All qualified applicants receive consideration for employment without regard to race, ethnicity, religious affiliation, gender, gender identity or expression, sexual orientation, national origin, or disability status. EOE AA M/ F/Vet/Disabled
$22-28 hourly Auto-Apply 60d+ ago
Learn more about information systems security officer jobs