Post job

Security architect jobs in Gulfport, MS - 340 jobs

All
Security Architect
Senior Security Analyst
Information Systems Security Officer
Architect
Defense Analyst
Security Engineer
Information Security Director
  • Commercial/Residential Architect

    Spherion 4.4company rating

    Security architect job in Montgomery, AL

    We are seeking a skilled Architect to create, edit, and refine building designs, ensuring they meet our high standards and exceed client expectations. The Architect will be responsible for maintaining accurate and detailed master plan files, working collaboratively with various departments to ensure projects are completed on time and to the highest quality. The ideal candidate will apply expert knowledge of drafting to enhance project outcomes and have strong experience in commercial and residential projects. Key Responsibilities: Develop, edit, and refine architectural designs to meet project specifications and client expectations. Maintain detailed and accurate master plan files throughout the project lifecycle. Collaborate with multiple departments to ensure timely and high-quality project completion. Utilize advanced drafting skills to improve project efficiency and outcomes. Required Skills and Qualifications: Proven experience as an Architect with both commercial and residential industry is required. Proficiency in architecture and drafting software (e.g., AutoCAD, Revit, SketchUp). Ability to thrive in a fast-paced environment. Strong communication and teamwork skills. Registered Architect preferred but not required. Compensation: Salary will be based on experience.
    $83k-130k yearly est. 1d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Workfront Architect- must be an architect- EST/CST only

    Yoh, A Day & Zimmermann Company 4.7company rating

    Security architect job in Birmingham, AL

    Please contact Renu Goel ************ ***************** EST/CST hours only Architect scalable Workfront solutions: manage work intake, project/resource workflows, approvals, reporting dashboards, and automation rules Configure Workfront: setup custom forms, templates, approval processes, access levels, layout configurations, object types, and reporting dashboards Design & develop Fusion automations: build and maintain Fusion scenarios/modules, connect to AEM, Adobe Assets, Microsoft 365, Slack, Salesforce, Jira, etc. Lead integrations: architect and execute API-based integrations between Workfront and external systems; implement event-driven architectures Governance & change management: oversee system governance, data policies, UAT, training, and adoption strategies Stakeholder collaboration: gather requirements, train users, troubleshoot issues, mentor junior team members Required Skills & Experience 5+ years implementing and configuring Adobe Workfront in large or complex environments 2+ years designing and implementing Workfront Fusion automations and integrations Deep knowledge of Workfront's data model and platform: objects, workflows, templates, reporting Strong command of Fusion's low-code platform: scenarios, connectors, modules, APIs Proficiency integrating with Adobe Experience Cloud, AEM, AEM DAM , Jira, or similar Certifications such as Adobe Workfront Project Manager, Core Developer, and Fusion are highly desirable Additional Qualifications Background in marketing operations, creative project management, or enterprise workflow design Strong analytical, documentation, and communication skills to define processes, lead training, and support adoption Ability to manage full implementation lifecycle in collaboration with Global teams Estimated Min Rate: $59.50 Estimated Max Rate: $85.00 What's In It for You? We welcome you to be a part of the largest and legendary global staffing companies to meet your career aspirations. Yoh's network of client companies has been employing professionals like you for over 65 years in the U.S., UK and Canada. Join Yoh's extensive talent community that will provide you with access to Yoh's vast network of opportunities and gain access to this exclusive opportunity available to you. Benefit eligibility is in accordance with applicable laws and client requirements. Benefits include: Medical, Prescription, Dental & Vision Benefits (for employees working 20+ hours per week) Health Savings Account (HSA) (for employees working 20+ hours per week) Life & Disability Insurance (for employees working 20+ hours per week) MetLife Voluntary Benefits Employee Assistance Program (EAP) 401K Retirement Savings Plan Direct Deposit & weekly epayroll Referral Bonus Programs Certification and training opportunities Note: Any pay ranges displayed are estimations. Actual pay is determined by an applicant's experience, technical expertise, and other qualifications as listed in the job description. All qualified applicants are welcome to apply. Yoh, a Day & Zimmermann company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Visit ************************************************ to contact us if you are an individual with a disability and require accommodation in the application process. For California applicants, qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. All of the material job duties described in this posting are job duties for which a criminal history may have a direct, adverse, and negative relationship potentially resulting in the withdrawal of a conditional offer of employment. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. By applying and submitting your resume, you authorize Yoh to review and reformat your resume to meet Yoh's hiring clients' preferences. To learn more about Yoh's privacy practices, please see our Candidate Privacy Notice: **********************************
    $59.5 hourly 4d ago
  • Cybersecurity Endpoint Security Engineer

    Compqsoft 4.0company rating

    Security architect job in New Orleans, LA

    Apply Description Title: Cybersecurity Endpoint Security Engineer Clearance: Active Secret or Higher Duration: Long Term Certification: IAT LEVEL 2 Requirements We're seeking an experienced Cybersecurity Endpoint Security Engineer to join our cybersecurity team. This role is critical in protecting and defending enterprise endpoints across Windows, Linux, and cloud-based environments within a DoD cybersecurity framework. The right candidate brings at least 5 years of hands-on experience in endpoint security and a strong working knowledge of Zero Trust principles. What You'll Do Manage, deploy, and optimize endpoint security solutions across Linux, Microsoft Windows, and cloud environments. Operate, tune, and troubleshoot Microsoft Defender for Endpoint (MDE), Trellix suite (ePO, ENS, DLP, etc.). Operate, tune and troubleshoot ForeScout. Provide technical expertise with Host-Based Security System (HBSS), Endpoint Protection Platforms (EPP), and Assured Compliance Assessment Solution (ACAS). Support endpoint monitoring, detection, and response activities in compliance with DoD cybersecurity directives. Apply and integrate Zero Trust security models across endpoint and cloud-based architectures. Perform vulnerability scans, analyze results, and drive remediation actions with system owners. Collaborate with SOC, compliance, cloud, and system engineering teams to ensure secure configurations and continuous monitoring. Document processes, develop playbooks, and share expertise across the cybersecurity team. What We're Looking For Minimum 5 years of experience in Cybersecurity endpoint protection roles. High proficiency in both Linux OS and Microsoft Windows administration. Strong experience with endpoint security platforms and DoD cybersecurity requirements. Demonstrated experience working in cloud-based environments (AWS or similar). Familiarity with HBSS, EPP, ACAS, and other endpoint security tools in the federal/DoD ecosystem. Hands-on experience with MDE, Trellix ePO/ENS/DLP, and ForeScout. Strong knowledge and practical application of Zero Trust principles. Ability to troubleshoot complex endpoint and cloud endpoint issues, providing root cause analysis. Ability to script in one or more of the following languages: Poweshell, Python, Bash, or others. Strong communication skills to work across technical and non-technical teams. Preferred Qualifications DoD 8570 IAT II/III certification (e.g., Security+, CySA+, CISSP, CASP+). Secret Clearance BS Degree in a technical field, additional years of experience may be considered in lieu of degree Previous experience supporting DoD cybersecurity programs. Familiarity with compliance frameworks such as STIGs, RMF, and advanced Zero Trust adoption roadmaps.
    $77k-103k yearly est. 2d ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO)

    Aerovironment 4.6company rating

    Security architect job in Redstone Arsenal, AL

    AV is looking for a highly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of our team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency (MDA). Job Description: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements List (CDRL) submissions and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&M). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). Required: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance. DoD 8570 compliant IAM Level II certification is required (Security +) Experience with DoD's RMF and SSP processes Desired: Experience with MDA specific RMF and SSP processes Self-Motivated Customer-oriented Clearance Level Secret ITAR Requirement: T his position requires access to information that is subject to compliance with the International Traffic Arms Regulations (“ITAR”) and/or the Export Administration Regulations (“EAR”). In order to comply with the requirements of the ITAR and/or the EAR, applicants must qualify as a U.S. person under the ITAR and the EAR, or a person to be approved for an export license by the governing agency whose technology comes under its jurisdiction. Please understand that any job offer that requires approval of an export license will be conditional on AeroVironment's determination that it will be able to obtain an export license in a time frame consistent with AeroVironment's business requirements. A “U.S. person” according to the ITAR definition is a U.S. citizen, U.S. lawful permanent resident (green card holder), or protected individual such as a refugee or asylee. See 22 CFR § 120.15. Some positions will require current U.S. Citizenship due to contract requirements. Benefits: AV offers an excellent benefits package including medical, dental vision, 401K with company matching, a 9/80 work schedule and a paid holiday shutdown. For more information about our company benefit offerings please visit: ********************************** We also encourage you to review our company website at ******************** to learn more about us. Principals only need apply. NO agencies please. Who We Are Based in California, AeroVironment (AVAV) is a global leader in unmanned aircraft systems (UAS) and tactical missile systems. Founded in 1971 by celebrated physicist and engineer, Dr. Paul MacCready, we've been at the leading edge of technical innovation for more than 45 years. Be a part of the team that developed the world's most widely used military drones and created the first submarine-launched reconnaissance drone, and has seven innovative vehicles that are part of the Smithsonian Institution's permanent collection in Washington, DC. Join us today in developing the next generation of small UAS and tactical missile systems that will deliver more actionable intelligence to our customers so they can proceed with certainty - and succeed. What We Do Building on a history of technological innovation, AeroVironment designs, develops, produces, and supports an advanced portfolio of unmanned aircraft systems (UAS) and tactical missile systems. Agencies of the U.S. Department of Defense and allied military services use the company's hand-launched UAS to provide situational awareness to tactical operating units through real-time, airborne reconnaissance, surveillance, and target acquisition. We are proud to be an EEO/AA Equal Opportunity Employer, including disability/veterans. AeroVironment, Inc. is an Equal Employment Opportunity (EEO) employer and welcomes all qualified applicants. Qualified applicants will receive fair and impartial consideration without regard to race, sex, color, religion, national origin, age, disability, protected veteran status, genetic data, sexual orientation, gender identity or other legally protected status. ITAR
    $61k-79k yearly est. Auto-Apply 4d ago
  • Enterprise Security Architect

    Hancock Whitney Corp 4.7company rating

    Security architect job in Gulfport, MS

    Thank you for your interest in our company! To apply, click on the button above. You will be required to create an account (or sign in with an existing account). Your account will provide you access to your application information. The email address used in establishing your account will be used to correspond with you throughout the application process. Please be sure and check the spam folder. You may review, modify, or update your information by visiting and logging into your account. JOB FUNCTION / SUMMARY: In conjunction with and/or at the direction of CISO, responsible for the overall "health & wellness" of security infrastructure related to enterprise networks and data systems; plans, coordinates, and implements security measures to safeguard data information against accidental or unauthorized modification, destruction, or disclosure by performing the following duties. ESSENTIAL DUTIES & RESPONSIBILITIES: Security Environment Analysis: * Responsible for the analysis & approval of business requirements associated with information security systems and/or processes. * Translates security design based on business requirements into functional processes while maintaining controls set forth by information security policies/procedures. * Develops and recommends new or enhanced security and system designs, including documentation of functional specifications for system configuration and supports system requirements as business processes evolve and system enables are identified. Information Security System Maintenance: * Responsible for the documentation and maintenance of security systems to include change management processes and tracking requests ensuring on-going changes and developments and upgrades to systems are performed. * Designs and develops tests, document testing results for newly created functionality associated with system maintenance, enhancements and upgrades to ensure all systems changes are successfully implemented. Information Security Technical Architecture: * Plans, researches, designs, analyzes, estimates, identifies options, recommends, installs, tests, schedules, implements, administers, documents, monitors, tunes performance and maintains all primary and auxiliary technical architecture across all information security system platforms as related to assigned areas of specialty to ensure the integrity, security, availability, reliability, and performance of enterprise network & data systems to meet client needs and expectations. Strategic & Tactical Planning: * Evaluates and recommends new information security system products or services related to technical architecture to management as needed for developing, monitoring, and maintaining line of business & corporate support unit strategic/tactical plans conforming to the vision, mission, values, and objectives of the organization. * Confers with management, programmers, risk assessment staff, auditors, facilities, and security departments and other personnel to identify and plan for data security for data, software applications, hardware, telecommunications, and computer installations. * Develops and implements tests of computer systems to monitor effectiveness of security. * Develops, coordinates, and implements disaster or emergency recovery procedures for information security systems to assure business continuity/disaster recovery. * Assists in the development of information security policy and procedures. * Analyze systems, network, and applications security and recommend/develop security measures to protect information against unauthorized access, modification, and/or loss. * Works closely with Project Management Office (PMO) through Strategic Services to ensure that all new IT-related projects are reviewed for security prior to rollout. * Develops and conducts information security risk assessments, reports findings and recommends corrective action, in applicable, to management. * Coordinates & oversees information security third-party service providers to validate contracted services are provided according to contract and/or service level agreements. * Supports Internal Auditor and contracted audit vendors related to information security audits and testing of controls SUPERVISORY RESPONSIBILITIES: None. MINIMUM REQUIRED EDUCATION, EXPERIENCE & KNOWLEDGE: * Required: Bachelor's degree in Computer Science, Computer Engineering or relevant science degree and 5+ years of related experience and/or training. * Preferred: Senior certifications (i.e. CISSP-ISSAP, SABSA) * An equivalent combination of education and experience is allowed ESSENTIAL MENTAL & PHYSICAL REQUIREMENTS: * Ability to work under stress and meet deadlines * Ability to operate a keyboard if required to perform the essential job functions * Ability to read and interpret a document if required to perform the essential job functions * Ability to travel if required to perform the essential job functions * Ability to lift/move/carry approximately 10 pounds if required to perform the essential job functions. If the employee is unable to lift/move/carry this weight and can be accommodated without causing the department/division an "undue hardship" then the employee must be accommodated; hence omitting lifting/moving/carrying as a physical requirement. Equal Opportunity/Affirmative Action Employers. All qualified applicants will receive consideration for employment without regard to race, color, religious beliefs, national origin, ancestry, citizenship, sex, gender, sexual orientation, gender identity, marital status, age, physical or mental disability or history of disability, genetic information, status as a protected veteran, disabled veteran, or other protected characteristics as required by federal, state and local laws.
    $101k-123k yearly est. Auto-Apply 7d ago
  • AWS Security Architect

    Precision Resources 4.4company rating

    Security architect job in Birmingham, AL

    Precision Resources, a division of the Trimarc Group Inc., is currently assisting a client with their search for an experienced AWS Security Architect. An AWS Security Architect is a specialized cybersecurity professional who designs, implements, and manages security strategies for cloud-based systems. They ensure that cloud environments and applications are secure, compliant, and resilient against threats. This involves defining security policies, implementing security controls, and continuously monitoring and improving the overall cloud security posture. Key Responsibilities: Designing Secure Cloud Architectures - Creating secure blueprints for cloud infrastructure, encompassing network security, access controls, data encryption, and more. Implementing Security Controls - Setting up and configuring security tools and technologies like firewalls, intrusion detection systems, and identity and access management solutions. Developing Security Policies - Creating and enforcing policies that govern how data and resources are accessed and used within the cloud environment. Conducting Security Assessments - Regularly evaluating the security of cloud systems, identifying vulnerabilities, and recommending remediation steps. Incident Response - Participating in the investigation and resolution of security incidents that may occur in the cloud environment. Staying Updated - Keeping abreast of the latest cloud security threats, vulnerabilities, and best practices. Collaboration - Working with other teams, like developers and operations, to integrate security into the entire cloud lifecycle. Essential Skills: Cloud Platform Expertise - Deep knowledge of AWS it's respective security services. Security Principles - Strong understanding of core security concepts such as encryption, authentication, authorization, and network security. Risk Management - Ability to assess and mitigate security risks within the cloud environment. Scripting and Automation - Proficiency in scripting languages (e.g., Python, PowerShell) for automating security tasks and building security tools. Communication and Collaboration - Excellent communication and interpersonal skills to effectively work with various teams and stakeholders. To upload your resume and apply directly, please visit: https://evoportalus.tracker-rms.com/PrecisionResources/apply?jobcode=1273
    $95k-139k yearly est. 60d+ ago
  • Director of Information Security

    Open Roles

    Security architect job in New Orleans, LA

    The role: We are hiring a hands-on Director of Information Security to design, operate, and mature a security, privacy and compliance program that protects our data, enables secure vendor & partner integrations, and keeps RevOptimal audit-ready for SOC 2 and other certifications. You will help design and build a secure cloud architecture, lead SOC 2 and ISO 27001:2022 readiness, drive Zero Trust adoption, own security operations and incident response, and be accountable for privacy compliance across US state laws and GDPR. The role also includes hands-on IT operations for a small company ( What you'll do: Security strategy & architecture Define and execute the company security strategy and roadmap across cloud, data, application, and infrastructure security. Lead the design and pragmatic implementation of Zero Trust architecture principles (identity-centric controls, least-privilege access, micro-segmentation, device posture and conditional access). Design and enforce secure cloud architecture patterns (AWS best practices for S3, IAM, KMS, VPCs, cross-account roles and clean-room integrations). Implement secure key management, encryption at rest / in transit, and data classification & retention standards appropriate for sensitive data. Compliance, GRC & Privacy (SOC 2, ISO 27001 & Data Privacy) Own SOC 2 readiness, audit lifecycles and evidence automation. Lead ISO 27001:2022 readiness and the ISMS lifecycle when appropriate (scoping, risk assessment & treatment, SoA, internal/external audits). Own data privacy compliance frameworks across relevant regimes: US state privacy laws (e.g., CPRA/CCPA and other state statutes) and EU GDPR. Responsibilities include: Maintain a comprehensive data map / Record of Processing Activities (RoPA) covering personal data flows, storage locations, retention and processors. Run Data Protection Impact Assessments (DPIAs) for high-risk processing and partner integrations. Operate a DSAR / DSR process (data subject access/deletion/portability requests) and ensure timely responses that meet legal deadlines. Manage Data Processing Agreements (DPAs) and contractual privacy controls with vendors and partners. Implement and enforce privacy-by-design/default controls and data minimization across technical and product solutions. Ensure lawful cross-border data transfer mechanisms (e.g., SCCs, adequacy assessments, and technical safeguards) and document them appropriately. Operate and maintain compliance automation tooling (e.g., Vanta) and privacy management tooling; track remediation and evidence collection. Security operations & engineering Build and operate detection & monitoring (centralized logging, alerting and lightweight SIEM). Manage vulnerability scanning, third-party pen testing, remediation workflows and risk treatment. Partner & cloud integrations Secure onboarding and hardening of partner integrations (S3 buckets, IAM roles, cross-account access, clean-room patterns). Assess and govern third-party security and privacy posture with technical and contractual controls. IT operations & employee support Manage day-to-day IT for a company Own vendor relationships for IT/security/privacy services and provide escalated IT support. Team, communication & culture Evangelize security and privacy across the company: training, phishing simulations, privacy awareness. Report security and privacy KPIs to executives (SOC 2/ISO coverage, Zero Trust adoption, DSAR SLAs, MTTR). Required Qualifications: 7+ years of professional experience in information security, with at least 3 years in a leadership/managerial role. Hands-on cloud security experience in AWS (S3, IAM, KMS, CloudTrail, CloudWatch, VPCs, cross-account roles). Proven experience leading SOC 2 readiness and audit programs and operating compliance automation tools. Practical experience implementing Zero Trust principles in cloud environments. Practical experience with GDPR and with US state privacy laws (CCPA/CPRA and/or other modern state privacy statutes), including DSAR/DSR handling, DPIAs, RoPA, DPAs and breach notification processes. Strong operational security capabilities (vulnerability management, IR, logging/monitoring, IAM, encryption). Practical IT operations experience for small companies (MDM, SSO/MFA, onboarding/offboarding). Excellent written and verbal communication skills. Formal security certification preferred (CISSP, CISM). Preferred / nice-to-have Experience directly driving or supporting ISO 27001:2022 certification and managing an ISMS. Privacy certifications: CIPP/US, CIPP/E or equivalent. Experience designing and implementing Zero Trust at scale and familiarity with NIST SP 800-207. Familiarity with privacy and governance tooling (OneTrust, TrustArc, BigID) and with SOC 2 automation (Vanta). Infrastructure as code experience (Terraform/CloudFormation) and secure CI/CD pipelines. Experience with global privacy topics (Schrems II implications, SCCs, adequacy) and with managing cross-border transfer risk. Familiarity with CPRA, Virginia, Colorado, Connecticut, Utah privacy rules and breach notification regimes. Tools & technical environment (what you'll use) Cloud: AWS - S3, IAM, KMS, CloudTrail, CloudWatch, Inspector/Inspector2, cross-account roles, clean-room patterns. Compliance & privacy: Vanta (SOC 2 automation) and privacy management tools (OneTrust/TrustArc or equivalent) for RoPA/DPIAs/DSAR workflows. Identity & Zero Trust tooling: SSO/IdP (Okta/AWS SSO), MFA/conditional access, ZTNA/SASE or equivalent. Productivity & HR: Google Workspace, Slack, Atlassian (Jira/Confluence), Rippling. Detection/EDR/SIEM: CloudWatch/CloudTrail, AWS Inspector/Inspector2, chosen EDR/SIEM tooling.
    $99k-150k yearly est. 5d ago
  • Cyber Network Defense Analyst

    Leidos Holdings Inc. 4.7company rating

    Security architect job in Bay Saint Louis, MS

    Leidos is seeking a Cyber Network Defense Analyst (CNDA) to join our team on a highly visible cyber security single-award IDIQ vehicle that provides Network Operations Security Center (NOSC) support, cyber analysis, application development, and a 24x7x365 support staff. T he Network Operations Security Center (NOSC) is a U.S. Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the enterprise. The NOSC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a shared customer incident tracking system and other means of coordination and communication. The Monitoring and Analysis team provide 24x7 support across 4 different shifts. We have front half shifts (day and night) and back half shifts (day and night). The front half shift will work 12-hour shifts from Sunday - Tuesday and alternating Wednesdays. The back half shift will work 12-hour shifts from Thursday - Saturday and alternating Wednesdays. Candidates must have the ability to work non-core hours, if necessary. Duties include network security monitoring and detection, proactively searching for threats, inspecting traffic for anomalies and new malware patterns, investigating and analyzing logs, providing analysis and response to alerts, and documenting activity in NOSC investigations and Security Event Notifications (SENs). Primary Responsibilities: * Manage and conduct hands-on technical detection, analysis, containment, eradication, and remediation as a member of the Incident Response team * Guide and mentor peers and subordinates to provide cross training * Ensure accountability and punctuality of security analysts assigned to your shift * Capture cybersecurity metrics that support executive-level briefings (daily, weekly, monthly) * Articulate daily challenges to the Government Watch Officer (GWO) * Analyze web and host logs for indications of compromise * Remediate and coordinate the remediation of infected or compromised devices * Ensure shift continuity during call-outs and emergencies * Compile incident reports, executive summaries, and analysis reports of intrusions and/or security events * Document and update processes, workflows, and technical guides * Perform simple firewall rule changes (after training) Clearance Required: * Must have TS/SCI clearance to start. TS clearances candidates will be considered. Preference to candidates with current/active TS/SCI clearance. * US Citizenship required Basic Qualifications: Candidates should also demonstrate the following: Bachelor's Degree and 2-4 years of SOC analyst experience. Additional experience may be considered in lieu of a degree * Extensive knowledge of a SOC's/NOSC's purpose and role within an organization * Detailed understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc) * Expertise with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc). * Expertise with packet analysis tools such as Wireshark Certification Requirement: Sec+, CEH, CySA+ or SANS certs If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares. Original Posting: January 15, 2026 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $69,550.00 - $125,725.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
    $69.6k-125.7k yearly 4d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Security architect job in Montgomery, AL

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $81k-108k yearly est. Easy Apply 6d ago
  • Information Systems Security Officer (ISSO

    Cyber Security Analyst I In San Diego, California

    Security architect job in Montgomery, AL

    Abacus Technology is seeking an Information Systems Security Officer (ISSO) to provide security and information assurance support for the Air Force Intranet Control (AFINC) III Support program at Maxwell AFB/Gunter Annex. This is a full-time position. Responsibilities Perform security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards. Implement the Assessment and Authorization (A&A) processes under the Risk Managed Framework (RMF) for new and existing information systems. Maintain a current authorization to operate (ATO), and approval to connect (ATC) (if required), and in implementing corrective actions identified in the plan of action and milestones. Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA) and Risk Acceptance Letters. Develop an Information System Continuous Monitoring (ISCM) strategy and monitor any proposed or actual changes to the system and its environment to maintain compliance. Audit systems to ensure security posture integrity. Conduct assessments and test/analysis data to document state of compliance with security requirements. Conduct risk assessments and investigations, recommend implementation of risk mitigations, and coordinate incident response activities. Conduct periodic hardware/software inventory assessments. Supervise the development and deployment of program information security for all program systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures. Manage assigned team to facilitate effective execution of the RMF. Coordinate and participate in security assessments and audits. Prepare, review, and present technical reports and briefings. Register, maintain, verify, submit exceptions, conduct annual review, or decommission systems ports, protocols, and services (PPS) as necessary to ensure compliance with the DoD PPS Category Assurance List (CAL) and DoD PPS Vulnerability Assessment reports. Qualifications 5+ years experience in a cyber security or information assurance role including at least 3 years supporting the RMF. HS diploma or GED. Must be CISM or CISSP certified (or hold an equivalent certification in compliance with DoD 8140/8570 IAM II). Must hold the Certified in Governance, Risk and Compliance (CGRC) certification and have participated in training for DISA ACAS Supervisor and Operator and DISA Enterprise Mission Assurance Support Service (eMASS). Additional certifications such as CCNA or Microsoft Certified: Information Security Administrator Associate preferred. Experience with DoD cybersecurity policies and implementation of Risk Management Framework (RMF): e.g. NIST SP 800 series, CNSSI 1253. Experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs. Experience in assessing and documenting test or analysis data to show cybersecurity compliance. Experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include: NESSUS, ACAS, DISA STIGs, Audit Tools, ESS, eMASS, PPS. Outstanding communication skills across all levels of the organization. Must be a US citizen and hold a current Top Secret clearance with SCI Access (TS/SCI). Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information. EOE/M/F/Vet/Disabled
    $61k-84k yearly est. Auto-Apply 39d ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO) (Job ID: 4062)

    Valkyrie Enterprises 4.9company rating

    Security architect job in Huntsville, AL

    Cyber Security Engineer/Information Systems Security Officer (ISSO) Contingent upon prime contractor approval Purpose: Valkyrie Enterprises has need for a Cyber Security Engineer/Information Systems Security Officer (ISSO) in Huntsville, AL. In this role you will be providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. Job Description: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). Qualifications: Must have a Bachelor's degree and 7+ years of related professional experience. Must have DoD 8570 compliant IAM Level II certification (Sec +). Must have experience with DoD's RMF and SSP processes. Desired Qualifications: Experience with MDA specific RMF and SSP processes, preferred. Self-Motivated Customer-oriented Security Requirements: Must have an Active DOD Secret Security clearance, and the ability to maintain clearance. Travel Requirements: Minimal Travel; 10% or less If position requires travel by domestic flight or access to secure federal facilities/military bases, candidate must be able to obtain (by start of position) and maintain appropriate identification credentials, such as REAL ID. (More information regarding REAL ID can be found: **************************** Physical Requirements: Remaining in a stationary position, often standing, or sitting for prolonged periods Able to sit and work on a computer for long periods of time Moving about to accomplish tasks or moving from one worksite to another Communicating with others to exchange information Light work that includes moving objects up to 20 pounds Valkyrie strictly adheres to a policy of equal employment opportunity. This policy is based on Valkyrie's commitment to hire and retain qualified employees consistent with position requirements; and to seek, employ, promote and treat all employees and applicants for employment without regard to race, color, religious creed, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental disability, age, military status or protected veteran status, marital status, registered domestic partner or civil union status, gender (including sex stereotyping and gender identity or expression), medical condition, genetic information or sexual orientation or other protected characteristics Additionally, Valkyrie Enterprises provides a variety of benefits to eligible employees to support your best health, wellness, and future, to include medical/dental/vision options, company paid life and disability insurances, 401k with match, education reimbursement, as well as company paid holidays and paid time off (PTO)
    $64k-84k yearly est. 9d ago
  • Information Systems Security Officer

    Seneca Holdings

    Security architect job in Huntsville, AL

    Job Description Seneca Global Services, LLC is part of the Seneca Nation Group (SNG) portfolio of companies. SNG is Seneca Holdings' federal government contracting business that meets mission-critical needs of federal civilian, defense, and intelligence community customers. Our portfolio comprises multiple subsidiaries that participate in the Small Business Administration 8(a) program. To learn more about SNG, visit the website and follow us on LinkedIn. At Seneca, our team of talented individuals is what makes us successful. To support our team, we provide a balanced mix of benefits and programs. Your total rewards package includes competitive pay, benefits, and perks, flexible work-life balance, professional development opportunities, and performance and recognition programs. We offer a comprehensive benefits package that includes medical, dental, vision, life, and disability, voluntary benefit programs (critical illness, hospital, and accident), health savings and flexible spending accounts, and retirement 401K plan. One of our fundamental principles at Seneca Holdings is to offer competitive health and welfare benefits to our team members, providing coverage and care for you and your family. Full-time employees working at least 30 hours a week on a regular basis are eligible to participate in our benefits and paid leave programs. We pride ourselves on our collaborative work environment and culture, which embraces our mission of providing financial and non-financial benefits back to the members of the Seneca Nation. Seneca Global Services, LLC seeks a highly motivated Information Systems Security Officer (ISSO) to join our technical team supporting the National Cyber Range Complex (NCRC). The NCRC plays a critical role in enhancing the resilience of DoD systems and the effectiveness of U.S. cyber operations by delivering full-spectrum test and evaluation, workforce training, and mission rehearsal events. As the NCRC continues to evolve as a best-of-breed cyber range, the ISSO will contribute directly to ensuring secure facilities, tools, and expertise for some of the most demanding test, training, and mission rehearsal requirements in the Department of Defense. As a key member of the cybersecurity team, the ISSO will act as a security liaison across multiple domains-including physical, personnel, information, cyber, operations, Anti-Terrorism/Force Protection, law enforcement, communications, and technical security-while working closely with the Information Systems Security Manager (ISSM) to ensure compliance, readiness, and secure mission execution. Responsibilities include, but are not limited to: Provide direct support to the ISSM on activities such as Assessment & Authorization (A&A), execution of Continuous Monitoring Plans, and facilitation of Security Controls Assessments. Administer and monitor Risk Management Framework (RMF) steps and activities throughout the system lifecycle to maintain an appropriate security posture. Implement cybersecurity programs, policies, and procedures for assigned systems. Maintain working knowledge of current and upcoming events, system functions, policies, safeguards, and security measures. Serve as a subject matter expert in RMF core concepts and processes. Coordinate with applicable stakeholders across the enterprise to ensure security compliance and readiness. Maintain Authorization to Operate (ATO) packages for assigned systems within the designated A&A System of Record (e.g., eMASS, XACTA 360, Keystone). Review and analyze audit logs (e.g., Splunk, Windows EVTX, Linux syslogs) to detect potential anomalies or threats. Perform validation checks to ensure CM-approved software and antivirus definitions are installed on assigned systems. Conduct compliance/vulnerability scans and manual checks to identify and mitigate risks. Execute ISSO-specific tasks as outlined in program security plans. Deliver cybersecurity education, training, and awareness to system users as required by the ISSM. Basic Qualifications: Active Top Secret clearance with SCI eligibility. Bachelor's degree in Cybersecurity, Information Systems, or related discipline, and/or 8+ years of relevant experience (additional experience may substitute for degree). Minimum of 5 years of extensive experience in cybersecurity, information assurance, and RMF processes. DoDD 8140.01 IAT Level II certification or higher. At least 2 years of experience conducting IT application, system, or network reviews and providing DoD cybersecurity policy and technical guidance. Desired Skills: Certifications aligned to DoDM 8140.03 / DoD Cyberspace Workforce Framework. Familiarity or background with some of the following technologies: CISCO equipment (routing and switching technologies) Zero-trust requirements VMWare (vSphere, vCenter, NSX, ESXi) RHEL (Ansible, Kubernetes, StackRox, OpenShift) AWS / Azure cloud technologies and containerization F5 BIG-IP, Cisco networking, and distributed technologies STIG and IAVA implementation NetApp storage technologies Dell Blade Servers Equal Opportunity Statement: Seneca Holdings provides equal employment opportunities to all employees and applicants without regard to race, color, religion, sex/gender, sexual orientation, national origin, age, disability, marital status, genetic information and/or predisposing genetic characteristics, victim of domestic violence status, veteran status, or other protected class status. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leave of absence, compensation and training. The Company also prohibits retaliation against any employee who exercises his or her rights under applicable anti-discrimination laws. Notwithstanding the foregoing, the Company does give hiring preference to Seneca or Native individuals. Veterans with expertise in these areas are highly encouraged to apply.
    $61k-83k yearly est. 28d ago
  • Cyber Security Engineer/ Information Systems Security Officer (ISSO)

    Banner Defense, Inc.

    Security architect job in Huntsville, AL

    Job Description Cyber Security Engineer/Information Systems Security Officer (ISSO) Join our team! Be a part of our passionate and determined team on a mission to use our skills and experiences to make a difference in the defense and aerospace industry. Position Description: Banner Defense is looking for a Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of a federal solutions team providing Systems Project Office for the Missile Defense Agency. Responsibilities: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). Required Skills/Experience: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance DoD 8570 compliant IAM Level II certification is required (Sec +) Experience with DoD's Risk Management Framework (RMF) and Source Selection Plan (SSP) processes Desired Skills/Experience: Experience with MDA-specific RMF and SSP processes Self-Motivated Customer-oriented APPLY TODAY!! Service-Disabled Veteran Owned Small Business Equal Employment Opportunity (EEO) employer Reasonable accommodation may be made to enable qualified individuals with disabilities to perform essential job functions. Job Posted by ApplicantPro
    $61k-83k yearly est. 10d ago
  • Cyber Security Engineer/Information Systems Security Officer (ISSO)

    Mission Driven Research

    Security architect job in Huntsville, AL

    Job Description MDR is looking for an amazingly talented Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of Parsons' Federal Solutions team providing Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency. What You'll Be Doing: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). What Required Skills You'll Bring: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance DoD 8570 compliant IAM Level II certification is required (Sec +) Experience with DoD's RMF and SSP processes What Desired Skills You'll Bring: Experience with MDA specific RMF and SSP processes Self-Motivated Customer-oriented Position Requirements Clearance Required Secret Position Level Mid FT/PT Full Time Years Related Work Experience 7 Education Level Required 4-yr Mission Driven Research is an Equal Opportunity Employer, including disability/veterans. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you are interested in applying for employment with Mission Driven Research and need special assistance or an accommodation to use our website, please contact us by email (****************************) or by phone by calling **************. When contacting us, please provide your contact information and state the nature of your accessibility issue. Job Posted by ApplicantPro
    $61k-83k yearly est. 10d ago
  • Information System Security Officer (ISSO)

    Spry Methods 4.3company rating

    Security architect job in Huntsville, AL

    Job DescriptionWho We're Looking For (Position Overview):This role is critical in ensuring the security posture of mission-critical applications and infrastructure across multiple network enclaves (Unclassified, Secret, Top Secret). The ISSO will be responsible for developing, maintaining, and enforcing security policies, implementing cybersecurity controls, managing Authority to Operate (ATO) documentation, and conducting continuous monitoring and risk assessments in compliance with FISMA, NIST, DOJ, and other federal mandates.What Your Day-To-Day Looks Like (Position Responsibilities): Serve as the principal cybersecurity advisor to system owners and stakeholders. Design, analyze, and test of information security systems, products, cloud architectures and cloud solutions. Provide recommendations and/or alternatives to mitigate impact of system security boundary changes as part of any potential re-architecting and/or re-design activities. Develop, implement, and evaluate security controls, measures, and frameworks in cloud-based systems to ensure data integrity, confidentiality, and availability. Perform risk analysis, vulnerability assessments, and security audits to identify and address potential weaknesses in cloud environments. Follow all appropriate security authorization process for requesting and maintaining an Authority to Operate (ATO). Responsible for ensuring operational security is maintained for assigned information systems. Ensure systems are operated, maintained, disposed of in accordance with security policies and practices. Perform Security Incident Reporting and Response. Coordinate with the Office of the Chief Information Officer (OCIO), Security Division, and others to provide documentation to the system Certification and Accreditation process. Ensure audits and reviews are responded to with accurate information. Perform system access control responsibilities. Participate in the change management process for assigned applications. Work with Product Owner, Product Manager, OCIO, Security Division, and other stakeholders to ensure security concerns are addressed during all phases of system lifecycle. Perform continuous system security monitoring. Implement and manage cloud-native and third-party security tools for monitoring, threat detection and vulnerability management. Act as a SME on Cloud Security while applying methods, standards, and approaches for ensuring the baseline security safeguards are appropriately implemented and documented. Provides reports to superiors regarding effectiveness of data security and makes recommendations for the adoption of new procedures. Draft and keep updated information security documentation to include System Security Plan, Information System Contingency Plan, Plan of Actions and Milestones (POA&M), Privacy Threat Assessment, Privacy Impact Assessment, and Configuration Management Plan. Responsible for ensuring the implementation and maintenance of annual security controls assessments. Assist with FISMA System audits as necessary. Leverage necessary vulnerability assessment and scanning tools including Nessus and ACSA to identify vulnerabilities, Splunk tools to monitor, detect and rectify misconfigurations. Working directly with development, platform, and infrastructure teams on security problems. What You Need to Succeed (Minimum Requirements): Top Secret (TS) Clearance with SCI eligibility. 3 - 5 years of experience required. Extensive experience with federal cybersecurity frameworks, including RMF, NIST 800-53, CNSS, and FISMA. Experience supporting cloud security in environments such as AWS GovCloud, C2S, SC2S, and Microsoft Azure. Analyze logs using Splunk and AWS tools. Hands-on experience with vulnerability assessment and configuration tools such as Nessus, ACSA, and Splunk. Work with GRC tools such as Xacta/JCAM Hold at least one of the following security certifications. Example: Security +, CGRC, CASP, CISSP Experience using Atlassian suite tools such as JIRA/CONFLUENCE Experience with Agile Methodologies/SAFe Expertise on Information Security Principles, processes and guidelines Able to obtain and maintain an Authority to Operate (ATO) for Information Systems. Experience with scanning tools such as Tenable Nessus Ability to work on multiple projects with various timelines, at times very short deadlines. Ideally, You Also Have (Preferred Qualifications): Certifications: CISSP, CISM, CAP, Security+, AWS Certified Security - Specialty, or other relevant certifications. Experience in a high-side or multi-enclave (U/S/TS) environment. Experience working with Agile development teams and CI/CD pipelines. Familiarity with Infrastructure as Code (IaC) and cloud configuration management tools (e.g., Terraform, Ansible). Familiarity with NIST 800-53 Rev. 5 #CJ We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $63k-82k yearly est. 4d ago
  • Senior Security Analyst

    Neptune Technology Group 4.4company rating

    Security architect job in Tallassee, AL

    Neptune Technology Group Inc. is a technology company serving water utilities across North America. Since 1892, we have continually focused on the evolving needs of water utilities - revenue optimization, operational efficiencies, and improved customer service. With our portfolio of smart water meters, data collection systems and software, we make data actionable for our customers - so they can remain focused on the business of water. For additional information, please visit the company website at ****************** Senior Security Analyst Position Summary As a Senior Security Analyst, you will be a key member of Neptune's 24×7 Security Operations program, supporting incident response, SIEM management, and threat detection across a hybrid environment (on-prem, cloud, SaaS). You'll work closely with the SOC Manager to execute detection, response, and reporting processes that protect Neptune and meet compliance requirements. Responsibilities: Threat Detection & Monitoring * Monitor and analyze security alerts from SIEM and EDR platforms * Investigate anomalies and suspicious activity across endpoints, networks, and cloud environments * Maintain high-fidelity alerting and reduce false positives through tuning Incident Response & Management * Execute playbooks for triage, containment, and remediation of security incidents * Assist in forensic investigations and contribute to post-mortem reports * Participate in tabletop exercises and readiness drills SIEM & Security Logging * Maintain SIEM health and ensure reliable telemetry across all assets * Develop and refine detection rules and correlation logic * Support automation and orchestration workflows for incident handling Identity & Access Management * Monitor identity-related events for anomalies and privilege escalation attempts * Support IAM lifecycle processes and enforce least privilege principles Threat Intelligence & Modeling * Integrate threat intelligence feeds into detection workflows * Assist in threat modeling to identify potential attack paths Reporting & Metrics * Document incidents and provide timely updates to SOC Manager for reporting to parent company * Track and report operational metrics (MTTD, MTTR, alert volumes, etc.) Security Standards & Architecture * Apply secure-by-design principles in collaboration with engineering teams * Support zero trust initiatives and network segmentation projects Relevant Platforms (experience with several is expected): * SIEM/SecOps: e.g. Google SecOps (Chronicle) * EDR & Identity: e.g. CrowdStrike, Microsoft AD/Entra * Network Security: e.g. FortiGate NGFW, FortiSASE * Secure Browsing: e.g. Prisma * Patching & Config: e.g. Automox * Secrets Management: e.g. Keeper * Asset Management: e.g. Axonius, Cyclops * Email & Data Security: e.g. Mimecast, Microsoft Purview Minimum Qualifications: * Bachelor's degree (or equivalent experience) * 3+ years in Security Operations or Incident Response * Hands-on experience with SIEM, EDR, and threat detection * Familiarity with NIST, ISO, MITRE ATT&CK, and zero trust principles * Strong analytical and communication skills Preferred Qualifications: * Security certifications (e.g., GCIH, GCIA, CISSP) * Experience with cloud security (AWS, Azure, GCP) * Exposure to SOAR automation and scripting * Travel Requirements: Typically requires overnight travel less than 10% of the time. Travel Requirements: Typically requires overnight travel less than 10% of the time. Location: Duluth, GA, Tallassee, AL
    $73k-100k yearly est. 40d ago
  • Foundry Architect

    Compqsoft 4.0company rating

    Security architect job in Huntsville, AL

    Apply Job Type Full-time, Contract Description Foundry Architect Duration: Longterm Clearance Required: Active Secret Clearance Education & Qualification: Requires a MA/MS and 10+yrs experience or BA/BS w/12+yrs experience) Requirements Position Overview The role of a Foundry Architect will lead design and architectural planning for the migration of applications and tableau workbooks into Vantage. The candidate will create high level technical designs and architectural diagrams. The candidate will lead technical discussions, make critical technical decisions, and mentor developers. The candidate will translate business needs to technical solutions in Vantage; often with level of effort estimates and multiple solution options for client to choose from. The candidate will meet with stakeholders to collect and manage requirements; as well as ensuring architectural design align with business goals. Qualifications: * Communication Skills: Excellent verbal and written communication skills to collaborate effectively with cross-functional teams, including engineers, technicians, and customers. * Technical Documentation: Strong ability to document processes clearly and comprehensively, including creating and maintaining process manuals and technical reports. * Vantage Platform Proficiency: Deep understanding of TSMC's Vantage platform, including its tools, services, and design flows. * IP Integration: Experience in integrating third-party intellectual property (IP) cores into customer designs using the Vantage platform. * Ecosystem Knowledge: Familiarity with the ecosystem surrounding the Vantage platform, including design tools, IP providers, and system houses. * Cloud-based Design and Verification: Proficiency in cloud-based design and verification tools, given the Vantage platform's emphasis on cloud-based services. * Security Knowledge: Understanding of security considerations in semiconductor design, especially as they apply to cloud-based platforms like Vantage. * Agile Methodologies: Familiarity with agile and DevOps practices, as these are often used in cloud-based development environments. Experience drafting user stories and acceptance criteria to enable development to begin. * Data Analytics: Skills in data analytics to leverage the wealth of data generated by the Vantage platform for process improvements and yield optimization. * Virtual Prototyping: Experience with virtual prototyping tools to facilitate early software development and system validation. * High-Performance Computing (HPC): Understanding of HPC systems, as they're crucial for handling the large datasets involved in semiconductor design and simulation. * API Development: Proficiency in developing APIs to facilitate communication between different software tools and systems.
    $101k-138k yearly est. 3d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Security architect job in Birmingham, AL

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $80k-107k yearly est. Easy Apply 6d ago
  • Cyber Network Defense Analyst

    Leidos Holdings Inc. 4.7company rating

    Security architect job in Bay Saint Louis, MS

    At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers' success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. If this sounds like the kind of environment where you can thrive, keep reading! The Digital Modernization Sector brings together our digital transformation and IT programs, allowing us to better serve our customers through scale and repeatability. . Leidos is seeking a Cyber Network Defense Analyst (CNDA) to join our team on a highly visible cyber security single-award IDIQ vehicle that provides Network Operations Security Center (NOSC) support, cyber analysis, application development, and a 24x7x365 support staff. The Network Operations Security Center (NOSC) is a U.S. Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the enterprise. The NOSC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a shared customer incident tracking system and other means of coordination and communication. The Monitoring and Analysis team provide 24x7 support across 4 different shifts. We have front half shifts (day and night) and back half shifts (day and night). The front half shift will work 12-hour shifts from Sunday - Tuesday and alternating Wednesdays. The back half shift will work 12-hour shifts from Thursday - Saturday and alternating Wednesdays. Candidates must have the ability to work non-core hours, if necessary. Duties include network security monitoring and detection, proactively searching for threats, inspecting traffic for anomalies and new malware patterns, investigating and analyzing logs, providing analysis and response to alerts, and documenting activity in NOSC investigations and Security Event Notifications (SENs). Primary Responsibilities: * Manage and conduct hands-on technical detection, analysis, containment, eradication, and remediation as a member of the Incident Response team * Guide and mentor peers and subordinates to provide cross training * Ensure accountability and punctuality of security analysts assigned to your shift * Capture cybersecurity metrics that support executive-level briefings (daily, weekly, monthly) * Articulate daily challenges to the Government Watch Officer (GWO) * Analyze web and host logs for indications of compromise * Remediate and coordinate the remediation of infected or compromised devices * Ensure shift continuity during call-outs and emergencies * Compile incident reports, executive summaries, and analysis reports of intrusions and/or security events * Document and update processes, workflows, and technical guides * Perform simple firewall rule changes (after training) Clearance Required: * Active/current TS/SCI required to be considered. * US Citizenship required Basic Qualifications: Candidates should also demonstrate the following: Bachelor's Degree and 0-2 years of SOC analyst experience. Additional experience may be considered in lieu of a degree * Extensive knowledge of a SOC's/NOSC's purpose and role within an organization * Detailed understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc) * Expertise with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc). * Expertise with packet analysis tools such as Wireshar If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares. Original Posting: January 15, 2026 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: Pay Range $57,850.00 - $104,575.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
    $57.9k-104.6k yearly 4d ago
  • Cyber Security Engineer/ Information Systems Security Officer (ISSO)

    Banner Defense

    Security architect job in Huntsville, AL

    Cyber Security Engineer/Information Systems Security Officer (ISSO) Join our team! Be a part of our passionate and determined team on a mission to use our skills and experiences to make a difference in the defense and aerospace industry. Position Description: Banner Defense is looking for a Cyber Security Engineer/Information Systems Security Officer (ISSO) to join our team! In this role you will be part of a federal solutions team providing Systems Project Office for the Missile Defense Agency. Responsibilities: Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC) and, Authority to Operate (ATO) packages. Perform technical work utilizing the Risk Management Framework (RMF) process including analyzing and solving Information Assurance (IA)-related technical problems. Ensure that system security artifacts are developed, reviewed, and updated as needed. Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within Enterprise Mission Assurance Support Service (eMASS). Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions. Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Perform vulnerability/risk analysis of systems using expertise in relevant information systems security. Track and monitor Plan of Action and Milestones (POA&Ms). Conduct reviews of cybersecurity artifacts and technical briefings and work with customer to resolve any findings. Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle. Track deliverables (i.e., artifacts, schedules, metrics). Required Skills/Experience: Bachelor's degree and 7+ years of related professional experience. Active Secret clearance DoD 8570 compliant IAM Level II certification is required (Sec +) Experience with DoD's Risk Management Framework (RMF) and Source Selection Plan (SSP) processes Desired Skills/Experience: Experience with MDA-specific RMF and SSP processes Self-Motivated Customer-oriented APPLY TODAY!! Service-Disabled Veteran Owned Small Business Equal Employment Opportunity (EEO) employer Reasonable accommodation may be made to enable qualified individuals with disabilities to perform essential job functions.
    $61k-83k yearly est. 10d ago

Learn more about security architect jobs

How much does a security architect earn in Gulfport, MS?

The average security architect in Gulfport, MS earns between $79,000 and $173,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Gulfport, MS

$117,000

What are the biggest employers of Security Architects in Gulfport, MS?

The biggest employers of Security Architects in Gulfport, MS are:
  1. Hancock Whitney
Job type you want
Full Time
Part Time
Internship
Temporary