Security Engineer
Security architect job in Winston-Salem, NC
Job Summary: This is an intermediate level position performing duties and tasks as an individual contributor position that works under moderate supervision and is responsible for supporting the Security Department in the areas of identification, analysis and mitigation of threats and vulnerabilities to internal information technology systems and networks through fraud, cyber events and variance from established corporate policies.
Knowledge, Skill and Ability Requirements:
- Understanding of information security architecture, tools (SIEM, NAC, MDM, Firewall), strategy, intrusion detection and remediation/ proxy management
- Effective problem solving and analytical skills
- Knowledge of PC Operating systems and tools (Windows and Unix)
- Knowledge of basic MSOffice applications, such as Word, Excel and Outlook
- Customer-focused with the ability to communicate with non-technical users
- Ability to display good judgment and escalate issues and concerns, as needed
- Ability to provide written communication at appropriate level of detail with clarity, appropriate formatting, grammar and spelling
- Interpersonal skills to include good oral and written communication skills
- Attentive to detail and able to manage time to accomplish tasks
- Teamwork skills with the flexibility & adaptability to work in a changing environment
- Ability to learn new and complex tasks and concepts
- Willingness to work overtime when needed
Essential Duties and Responsibilities
Security Operations Support (Administrative): - 30% of time
- Provide process/procedure creation, maintenance, improvement and tracking for technical security tools
- Support technical teams on related IT Security programs and projects to assure security processes are not compromised
- Provide SBM/Change Management support, such as using security tools, performing user set-up and termination verifications, remediation and validation of security findings
- Support verification of IT Audit control requirements of the Information Security Program.
Security Operations Support (Technical) - 45% of time
- Perform incident management utilizing methods of log monitoring, adverse event analysis, and threat analysis which come in from various intelligence gathering resources
- Perform on premise and cloud-based analysis/examinations of IT assets
- Perform technical maintenance support for security tools/applications/appliances such as: Darktrace, Carbon Black, SonarQube, Tenable Security Center
- Perform monitoring of security systems, such as web filtering, analyzing logged events, and approving or escalating changes, including incident response
- Assist with updating and testing badge configuration software, used for employee and contractors; monitor and verify status routinely and the monitoring of physical security systems
- Perform security research and provide security relevant controls and standards to support new or on going IT Operations
Business Operations Support - 20% of time
- Maintain tools/applications/appliances within acceptable corporate standards using reasonable industry standards
- Respond to IT or business unit security inquiries and product or project security reviews, following security and change management policies
- Support and maintain technical controls as related to Essent's security program, such as GLBA, SOX, SSAE16, CFPB
IT & Security Operations Support - 5% of time
- Update and keep software license inventory logs current
- Provide other office location support as needed
Skills
Cloud, Siem, Network security, Security Operations, EDR, Vulnerability scanning, Vulnerability management, Information security, Cyber security
Top Skills Details
Cloud,Siem,Network security,Security Operations,EDR,Vulnerability scanning,Vulnerability management,Information security,Cyber security
Additional Skills & Qualifications
Special Requirements:
- Additional 2 years of Information Technology or other related business experience is preferred
- CC, GSEC, SSCP, OSCP or other relevant certifications is preferred
Experience Level
Intermediate Level
Job Type & Location
This is a Contract position based out of Winston-Salem, NC.
Pay and Benefits
The pay range for this position is $50.00 - $65.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: - Medical, dental & vision - Critical Illness, Accident, and Hospital - 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available - Life Insurance (Voluntary Life & AD&D for the employee and dependents) - Short and long-term disability - Health Spending Account (HSA) - Transportation benefits - Employee Assistance Program - Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a fully onsite position in Winston-Salem,NC.
Application Deadline
This position is anticipated to close on Dec 29, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
information Security Engineer
Security architect job in Greensboro, NC
Locus is a nimble, experienced consulting team specializing in information security, cloud computing, networking, and infrastructure. We have extensive experience delivering technology solutions in the Network, Cloud, and Security arenas to some of the largest companies in the world. Candidates are treated like unique individuals, not a commodity, and our career experts are committed to understanding all aspects of a candidate's wants and needs in order to find the best possible fit.
We are laser-focused on winning together and supporting both our internal team and clients alike for long-term shared success. We take a full-service approach with our process, understanding our clients and candidates needs to find the right fit from a skillset and a cultural perspective. People are at the cornerstone of what we do, and we'd love to hear from you.
Locus is currently searching for an Information Security Engineer for our client. This is a full time perm exempt role.
SUMMARY: Responsible for protecting the organization's computers, networks, and data against threats, such as security breaches, computer viruses, or attacks by cyber criminals. This position oversees the planning, development, coordination, implementation, and management of all Information Security functions and measures to regulate access and usage of Customer Information Systems in accordance with established company policies, standards and procedures. The Information Security Manager regularly interfaces with other department heads in matters pertaining to information security awareness and keeps abreast of changes in regulatory and compliance issues, which affect all phases of information security and Customer. This position is also responsible for administration of corporate Business Continuity Program.
ESSENTIAL JOB FUNCTIONS:
Develops Information Security (IS) architecture/designs, plans, controls, processes, standards, policies, and procedures to ensure alignment with IS standards and overall IS security strategy
Develop, implement, and manage security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information
Determines user requirements, plans projects, establishes priorities, and monitors progress
Manages the evaluation and testing of hardware, firmware, and software for possible impact on systems security
Maintains and monitors user access control for bank systems
Coordinates with other managers to integrate IS project components with other projects including application delivery, network, server, and hosted solutions
Manages and coordinates the enterprise Vendor Risk Management Program
Manages and coordinates Corporate Business Continuity Program
Communicate best practices and risks to Customer
Perform a risk assessment of Customer's vulnerabilities in the cybersecurity landscape and develop Customer's risk appetite for Information Security
Develop key risk indicators and dashboard metrics reporting to both the management team and the Board of Directors
JOB REQUIREMENTS:
Bachelor's Degree from an accredited university in the field of Audit, MIS, Computer Science or related field of study
Prior Information Security experience at a Financial Services company
Familiarity with Financial Services regulations
Familiarity with Federal Financial Institution Examination Council (FFIEC) guidance
Prior management experience
Certified Secure Software Lifecycle Professional (CSSLP) and/or Certified Information Security Manager (CISM) certification
KNOWLEDGE/SKILLS REQUIRED:
Knowledge of financial services industry and all applicable regulations and industry standards
Advanced ability to engineer security solutions
Intermediate relationship management skills
Intermediate knowledge of cybersecurity strategy management
Advanced cybersecurity monitoring and reporting skills
Advanced knowledge of security incident handling
Advanced knowledge of security risk assessment methodologies
Excellent customer service skills
Strong verbal and written communication skills
High level of attention to detail, with strong problem solving & organizational skills
Ability to perform effectively in fast-paced environment
PHYSICAL AND MENTAL QUALIFICATIONS:
Standing, walking, bending and stooping required
Must be able to sit at a desk for long periods of time and use a computer
Must be able to occasionally move or lift up to 10 pounds
May be asked to work supplemental hours periodically
Limited travel required during and after business hours
The above statements are intended to describe the general nature and level of work being performed by the incumbent assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties, and/or skills required of all personnel so classified. NOT A CONTRACT
INFO SECURITY ENGINEER 5 (Penetration Testing)
Security architect job in Winston-Salem, NC
Type: Contract Duration: 3 months Job description: • Conduct dynamic application security testing using both manual and automated testing tools. • Review test results from tools • Ensure that automated tests are completed successfully • Configure tools as required to be successful in evaluating VERA (Vendor remote access) applications
• Identify and remove any false positives from automated testing tool reports
• Triage & Disposition results and enforce a Bug Bar
• Verify/validate defect fixes
• Provide application security consulting SME Support to developers
• Assist developers with understanding of security defects and risk
• Assist in defining acceptable solution to fix defects
• Communicate Security risk to ISCs and ORCs to document security issues and controls for security planning purposes
• Help maintain Security Coding Standards and Bug Bar as required
• Assist in the Development of standards as required
• Provide training
• Stay up to speed on 3rd party (inside and outside Wells Fargo) known security vulnerabilities
• Develop and review malicious use cases/threat models
• Maintain a broad understanding of security technologies and products
• Actively participate on improving the security culture and education throughout the organization
Qualifications
Required skills:
• 5+ years of experience in security applications and systems
• Minimum of 5 years of Information Security Engineer/Consultant experience with application penetration testing.
• Minimum of 5 years of demonstrated experience with automated penetration tools
• Minimum of 5 years of demonstrated experience with manual penetration testing tools
• Demonstrated experience with creating and communication of reports regarding web application vulnerabilities to various level of personnel within a large organization
Desired skills:
• Advanced Information Security technical skills
• Ability to manage complex issues and develop solutions
• Excellent verbal and written communication skills
• Knowledge and understanding of application or software security such as: web application penetration testing, secure code review, secure static code analysis
• Knowledge and understanding of banking or financial services industry
• Experience working in a large enterprise environment
• Strong analytical skills with high attention to detail and accuracy
• Knowledge and understanding of information security industry standards and government regulations
• Ability to manage multiple and competing priorities
• Ability to work with limited supervision
• Ability to take on a high level of responsibility, initiative, and accountability
• Good attention to detail and accuracy skills
• Strong collaboration and partnering skills
• Demonstrated experience developing and reviewing malicious use cases/threat models
Job expectations
• Ability to work weekends and holidays as needed or scheduled
Candidate will be required to work onsite at certain facilities in these cities: MN-Minneapolis; AZ-Chandler; NC-Charlotte;NC-Winston Salem; CA - San Francisco
Additional Information
All your information will be kept confidential according to EEO guidelines.
**Please let me know if you might someone to refer or if you are interested for the role.
**Please reply with an updated copy of your resume and preferred time for a call.
**You can call me back at
************
.
Global Assurance Analyst
Security architect job in Greensboro, NC
Now that you have found the job description, what is next?
At VF, we strive to foster a culture of belonging based on respect, connection, openness, and authenticity. As a purpose-led, performance-driven company, we are committed to inclusion, diversity, equity, and action. So, before we get to the job details, take a minute to learn a little more about us - our values and our culture - visit VF Careers or ************
What will you do?
A day in the life of an Analyst, Global Assurance at VF looks a little like this.
As an Analyst you will support the Senior Manager, Internal Audit, in managing projects within the region. You will participate in the delivery of the audit service plan for the AMER region.
Let us break down that day-in-the-life a bit more.
Participating in person in delivering Global Assurance audits and advisory projects both with reference to internal and external resources.
Conducting the audit/review and following through to report issuance for financial and operational audits.
Completing working papers ensuring that the audit objectives are met, and evidence supports the findings.
Preparing reports on findings and recommendations for Management.
This role will support divisions and subsidiaries in evaluating and suggesting improvements to business practices, processes, and control procedures.
Conducting bi-annual inventory observations and periodic SOX control reviews acting on behalf of our external auditors.
Evaluating the adequacy of internal controls over financial reporting per SOX compliance, conducting process walkthroughs, identifying deficiencies, assisting in remediation planning, and ensure timely and effective implementation of corrective actions.
Summarizing quarterly testing results, collaborate across departments to enhance system efficiency and SOX compliance, and maintain up-to-date knowledge of Section 302/404 requirements through ongoing education.
What do you need to succeed?
We all have unique skills that we bring to work and celebrate every day. For this role, there are foundation skills you will need to succeed and excel. Additionally, while formal education in a related field is great to have, we are most interested in your 1-3 years of experience and professional achievements.
The foundation skills you will need in this position are:
Minimum of a Bachelor's in one of the following fields of concentration - Data Analytics, Supply Chain, Accounting, or Business
Willingness to work towards a professional certification which may include CPA, CIA, and/or CFE
Prior experience in Public Accounting, Corporate Accounting/Finance, or Supply Chain highly preferred
Technological proficiency (i.e., Excel required and/or Power BI preferred)
Sense of urgency and strong organizational skills
Willingness to manage small project teams
Now WE have a question for YOU.
Are you in?
Hiring Range:
$56,000.00 USD - $70,000.00 USD annually
Incentive Potential: This position is eligible for additional compensation awards that may include an annual incentive plan, sales incentive, or commission potential. Specific details of the additional compensation eligibility for this position will be provided during the recruiting and interview process.
Benefits at VF Corporation: You can review a general overview of each benefit program offered, including this year's medical plan rates on ******************** and by clicking Looking to Join VF? Detailed information on your benefits will be provided during the hiring process.
P
lease note, our hiring ranges are determined and built from market pay data. In determining the specific compensation for this position, we comply with all local, state, and federal laws.
At VF, we value a diverse, inclusive workforce and we provide equal employment opportunity for all applicants and employees. All qualified applicants for employment will be considered without regard to an individual's race, color, sex, gender identity, gender expression, religion, age, national origin or ancestry, citizenship, physical or mental disability, medical condition, family care status, marital status, domestic partner status, sexual orientation, genetic information, military or veteran status, or any other basis protected by federal, state or local laws. If you are unable to submit your application because of incompatible assistive technology or a disability, please contact us at **********************. VF will reasonably accommodate qualified individuals with disabilities to the extent required by applicable law.
Pursuant to all applicable local Fair Chance Ordinance requirements, including but not limited to the San Francisco Fair Chance Ordinance, VF will consider for employment qualified applicants with arrest and conviction records.
Auto-ApplyDirector Cyber and Information Security
Security architect job in Winston-Salem, NC
Truliant's mission is to improve lives by putting our members first, providing great service and straightforward financial solutions. Our core values of Member Focus, Service, Guidance, Relationships, and Community define how we interact with members to fulfill our mission of improving lives and providing a foundation on which we conduct ourselves.
Our Promise to Our Teammates: Truliant strives to provide all teammates with an enjoyable place to work where they feel valued, empowered and rewarded for all that they do.
Purpose of the Job
The Director of Cyber and Information Security is responsible for developing, implementing, and overseeing comprehensive cybersecurity strategies, policies, and procedures to mitigate risks and protect against cyber threats. The leader plays a pivotal role in safeguarding our organization's digital assets and ensuring the integrity, confidentiality, and availability of sensitive information. The Director of Cyber and Information Security is a strong, obvious leader responsible for leading IT Security and IT Security Incident Response for the Credit Union. The Director is expected to possess a deep technical understanding of information security engineering and how to apply them to safeguard Credit Union assets effectively.
This role will work with business stakeholders to help define solution strategies and implement effective security controls that minimize risk while minimizing impact on user productivity, empowering the organization to navigate the evolving landscape of cyber threats and fostering a culture of security awareness and resilience. A crucial element of the Director's role is working with senior leaders, line-of-business managers, and other key decision-makers to determine acceptable levels of residual IT risk for the Credit Union as a whole. This role is also responsible for clearly understanding the levers and choices to mitigate risks as appropriate. This role will lead a best-in-class IT risk management and information security team in delivering advisory and cybersecurity services for Credit Union Information Security programs.
The Director is responsible for establishing security governance and executing an information security framework to safeguard information assets. This role will research, select, and negotiate contracts with best-in-class third-party providers for the potential implementation of additional information security products, services, and monitoring capabilities. The Director will lead by example, drive continuous improvement, ensure security, compliance, recoverability, and maintain a relentless focus on risk management.
Essential Functions and Responsibilities
Develops and oversees the implementation of a comprehensive security architecture that aligns with organizational goals and industry best practices.
Ensures security measures are integrated into all technology deployments, including cloud services, on-premises infrastructure, and third-party applications.
Conducts regular security assessments and audits to identify weaknesses in the architecture and recommend improvements.
Stays abreast of emerging technologies (e.g., AI, IoT) and evaluates their security implications, ensuring the architecture supports secure adoption.
Works closely with IT, application development, and network teams to ensure a unified approach to security across all platforms.
Collaborates with executive leadership and key stakeholders to advocate for security initiatives and secure necessary resources.
Defines and monitors key performance indicators (KPIs) to measure the effectiveness of security programs and initiatives.
Fosters a culture of continuous improvement by regularly reviewing and updating security programs based on industry trends, emerging threats, and organizational changes.
Implements and manages access control measures to safeguard data, ensuring that only authorized personnel can access sensitive information.
Oversees compliance with data-related regulations (NCUA, FFIEC, GLBA, PCI, etc.), ensuring the organization adheres to legal and ethical standards.
Oversees the deployment and management of security information and event management (SIEM) systems and other monitoring tools.
Ensures real-time detection and alerting of potential security incidents, conducting regular reviews of logs and alerts.
Establishes and maintains an incident response plan, including protocols for containment, eradication, recovery, and lessons learned.
Leads the incident response team during security breaches, ensuring timely and effective incident response.
Conducts post-incident reviews to analyze incidents, document findings, and implement improvements.
Regularly assesses the organization's systems and networks for vulnerabilities and recommends remediation actions.
Conducts risk assessments to evaluate the potential impact of identified threats on business operations.
Maintains detailed documentation of security policies, procedures, and incidents for accountability and compliance.
Develops and implements organization-wide security awareness training programs for all employees.
Regularly assesses the organization's security posture and implements continuous improvement initiatives.
Other Duties and Responsibilities
Departmental financial management, budgeting, and reporting.
Team development, management, and performance.
Assists with other tasks and projects as assigned.
Knowledge, Skills, and Abilities
Must have advanced problem-solving and analytical skills, with the ability to assess complex security issues and develop innovative solutions. This position requires a blend of strategic thinking and operational excellence to deliver technical security services consistently across the Credit Union.
Must have excellent leadership and communication skills with all levels of Credit Union staff, including executives, auditors, finance, legal, IT staff, and third parties, in matters related to IT risk, Information Security, compliance, and audit requirements and remediation. Managerial solid and facilitation skills required.
Must have in-depth knowledge of cybersecurity principles, technologies, and methodologies, and a strong understanding of regulatory requirements such as GLBA, SOX, and PCI DSS.
Must have a deep understanding of cybersecurity frameworks (NIST, ISO, etc.).
Must know regulatory agencies' policies, procedures, and laws governing the security of data for financial institutions.
Must have the ability to make decisions, work independently, and guide the Information Security team, other IT team members, and business unit partners.
Must have strong strategic thinking and analytical skills.
Must have excellent communication and leadership abilities.
Must possess a deep technical understanding of information security engineering and infrastructure operations.
Physical Requirements
Occasional standing, walking, bending, and stooping required
Must be able to sit at a desk for long periods of time and use a computer
Must be able to moderately lift or move up to 5 pounds and occasionally lift or move up to 10 pounds
Education and Background
Requires a Bachelor's degree in computer science, cybersecurity, or a related field, or equivalent work-related experience. Master's Degree in a relevant discipline (preferred).
Requires professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP).
Minimum of 10 years of experience in information security or a related field required.
Minimum of 5 years in a leadership role, managing security teams and initiative required.
Proven experience in developing security strategies, risk management, and compliance required.
Minimum of 10 years of demonstrated success in leadership roles in compliance, risk management, information security, IT, and OT security required.
Minimum of 5 years of experience successfully supervising large-scale complex projects and programs that meet the objectives of excellence in a dynamic business environment required.
Minimum of 5 years of experience in extensive contract negotiations and management of 3rd parties that provide an array of IT services. Must be able to evaluate and determine appropriate data security terms and conditions for all significant organizational contracts required.
Requires demonstrated leadership with a minimum of 15 years of management experience in a technical capacity and the ability to interface effectively with a broad range of people and roles, including senior leadership, IT leaders, and external constituents.
Experience in cross-functional collaboration and budget management required.
If you have a passion for member service and would like to invest in a meaningful career with opportunity for growth, we encourage you to apply to Truliant!
As a member of the Truliant family, you will enjoy the following full time benefits:
No-cost employee Medical, dental, vision coverage
Prescription benefits (including mail order)
Paid holidays and Paid Time Off (PTO)
401(k) plan with contribution matching
Paid community involvement volunteers hours
Paid group life Insurance
Teammate loan discounts
Tuition reimbursement
Short and long-term disability
Health & Wellness program
Teledoc (physician video conferencing)
Onsite fitness facilities or health club reimbursement
Employee Assistance Program (EAP)
Medical flexible spending account
Dependent care flexible spending account
Auto-ApplySecurity Engineer - Secure Software Development
Security architect job in Greensboro, NC
By joining Sedgwick, you'll be part of something truly meaningful. It's what our 33,000 colleagues do every day for people around the world who are facing the unexpected. We invite you to grow your career with us, experience our caring culture, and enjoy work-life balance. Here, there's no limit to what you can achieve.
Newsweek Recognizes Sedgwick as America's Greatest Workplaces National Top Companies
Certified as a Great Place to Work
Fortune Best Workplaces in Financial Services & Insurance
Security Engineer - Secure Software Development
Security Engineer - Secure Software Development
**PRIMARY PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data, networks, and computer systems. To focus on executing security fundamentals for threat detection, investigation, and response efforts.
**ARE YOU AN IDEAL CANDIDATE?** We are looking for enthusiastic candidates who thrive in a collaborative environment, who are driven to deliver great work, are customer-oriented and are naturally empathetic.
**ESSENTIAL RESPONSIBLITIES MAY INCLUDE**
+ Engineers, implements and monitors security measures for the protection of computer systems, networks and information.
+ Identifies and defines system security requirements.
+ Designs computer security architecture and develops detailed cyber security designs.
+ Prepares and documents standard operating procedures and protocols.
+ Configures and troubleshoots security infrastructure devices.
+ Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks.
+ Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs.
+ Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management.
+ Analyzes client and customer needs as required and provides clear and concise reports to leadership.
+ Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained.
**QUALIFICATIONS**
Eight (8) years of encryption technologies/algorithms, digital forensics, network topologies, and access controls experience or equivalent combination of educated and experience required.
**Skills & Knowledge**
+ Knowledge of TCP/IP services
+ Knowledge of audit and compliance
+ Knowledge of vulnerability management
+ Knowledge of penetration testing
+ Knowledge of various operating systems
+ Knowledge of desktop productivity software
+ Knowledge of Carbon Black Protection
+ Knowledge of Symantec Endpoint Protection and host data loss prevention
+ Knowledge of information technology security frameworks
+ Excellent oral and written communication skills, including presentation skills
+ PC literate, including Microsoft Office products
+ Analytical and interpretive skills
+ Strong organizational skills
+ Excellent interpersonal skills
+ Ability to create and complete comprehensive, accurate and constructive written reports
+ Ability to work in a team environment
+ Ability to meet or exceed Performance Competencies
**Proficient in Snyk for Application Security:** Demonstrated expertise in integrating Snyk into CI/CD pipelines to proactively identify and remediate vulnerabilities in open-source dependencies, container images, and infrastructure as code. Skilled in leveraging Snyk's developer-first tools to maintain secure codebases, enforce security policies, and ensure compliance with industry standards. Experienced in configuring automated scans, interpreting results, and collaborating with development teams to implement effective remediation strategies, contributing to a robust DevSecOps culture.
**TAKING CARE OF YOU**
+ Career development and promotional growth opportunities
+ A diverse and comprehensive benefits offering including medical, dental vision, 401K, PTO and more
\#LI-TS1
Work environment requirements for entry-level opportunities include -
Physical: Computer keyboarding
Auditory/visual: Hearing, vision and talking
Mental: Clear and conceptual thinking ability; excellent judgement and discretion; ability to meet deadlines
Travels as required
The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions, duties, or local variances. Management retains the discretion to add or to change the duties of the position at any time.
Sedgwick is an Equal Opportunity Employer and a Drug-Free Workplace.
**If you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, consider applying for it anyway! Sedgwick is building a diverse, equitable, and inclusive workplace and recognizes that each person possesses a unique combination of skills, knowledge, and experience. You may be just the right candidate for this or other roles.**
**Sedgwick is the world's leading risk and claims administration partner, which helps clients thrive by navigating the unexpected. The company's expertise, combined with the most advanced AI-enabled technology available, sets the standard for solutions in claims administration, loss adjusting, benefits administration, and product recall. With over 33,000 colleagues and 10,000 clients across 80 countries, Sedgwick provides unmatched perspective, caring that counts, and solutions for the rapidly changing and complex risk landscape. For more, see** **sedgwick.com**
Information Systems Security Manager
Security architect job in Winston-Salem, NC
Job DescriptionSummit Federal Services, LLC (SFS) with headquarters in Oakland, Maryland, is a fast growing woman owned Small Business and HUBZone company with an outstanding record of performance providing more effective and efficient acquisition, business process, training, IT, administrative and security services to multiple federal agencies.
SFS/Merito is looking for a Information Systems Security Manager to spearhead their client organizations information security program. The ISSM will lead the development and implementation of security measures, ensuring compliance with industry regulations, frameworks, and company policies. The ideal candidate will bring expertise in cybersecurity, risk management, and information systems security compliance to protect the organization's critical assets
Location: Winston-Salem, NC, hybrid (Remote for first 5 months then reports onsite)
Job Type: Contract
Reports To: Corporate Compliance Manager & Facility Security Officer
Pay: Based on experience
Key Responsibilities:
• Lead the establishment and maintenance of classified networks and operating systems.
• Develop and maintain technical documentation and security policies for IT equipment within open storage areas.
• Determine technical Information Assurance (IA) requirements and conduct cyber risk assessments, including vulnerability analysis and implementation of mitigation solutions in alignment with RMF standards.
• Author and manage security documentation for system authorization, continuous monitoring, and information systems lifecycle management (e.g., Authorization to Operate (ATO), System Security Plan (SSP), Plans of Action and Milestones (POAM).
• Provide guidance and technical expertise in the creation of solutions for complex security problems, requiring deep knowledge of systems security.
• Ensure that security controls are implemented effectively and continuously throughout the information systems lifecycle.
• Utilize cybersecurity tools to provide ongoing security monitoring for infrastructure in accordance with Department of Defense (DoD) requirements.
• Perform system audits, vulnerability risk assessments, and investigations into security incidents or violations related to information assurance.
• Conduct regular training and awareness programs on cybersecurity best practices and risk mitigation strategies for all system users.
• Other duties as required.
Basic Qualifications:
• U.S. Citizenship.
• Active Secret Clearance.
• Prior experience as an ISSM or ISSO, with strong familiarity in establishing classified networks and information systems.
• Experience as a COMSEC Custodian and in handling security controls for classified information systems.
• Proficiency in cybersecurity frameworks and risk management practices, including the Risk Management Framework (RMF) and DoD compliance requirements.
Preferred Qualifications:
• Relevant certifications such as CISSP, CISM, or Security+
• Familiarity with cybersecurity tools, auditing processes, and incident response frameworks.
Summit Federal Services, LLC is an equal opportunity employer regardless of race, color, religion, creed, sex, marital status, national origin, disability, age, veteran status, on-the-job injury, sexual orientation, political affiliation or belief. Employment decisions are made without consideration of these or any other factors that employers are prohibited by law from considering. Any discriminatory action can be a cause for disciplinary action. Summit Federal Services, LLC also prohibits discrimination against individuals with disabilities and will reasonably accommodate applicants with a disability, upon request, and will also ensure reasonable accommodation for employees with a disability.
Powered by JazzHR
xz3civbeG0
Information Systems Security Officer
Security architect job in High Point, NC
Information Systems Security OfficerJob Category: Information TechnologyTime Type: Full time Minimum Clearance Required to Start: SecretEmployee Type: RegularPercentage of Travel Required: Up to 10%Type of Travel: Continental US* * *
Responsibilities:
Manage Risk Management Framework (RMF) process
Work with system development team to identify needed RMF artifacts and load them into the government's EMASS system.
Develop security plans, policies, and designs.
Configure and implement security solutions based upon the customer's performance criteria and specifications
Conduct systems pre-test and acceptance tests to validate the designed performance criteria
Structure mock designs based upon RFP specifications in support of the Bids & Proposal teams
Collaborate with government and /or subcontractors at customer site for security solution integration into existing infrastructure
Develop and perform technical presentations for customers
Mentor junior engineers and technicians
Serve as technical lead on projects.
Travel to other CACI Locations or Customer Sites as necessary
Proactively ensure a safe work environment and adhere to CACI EH&S policies and procedures
Perform other duties as required
Qualifications:
Required:
A Bachelors degree is required.
Knowledge of risk assessment tools, technologies, and methods including EMASS system
Experience designing secure networks, systems, and application architectures
Experience planning, researching, and developing security policies, standards, and procedures
Ability to communicate network security issues to peers and customers
Working knowledge of current Cyber technologies and experience with NIST 800 Series and DoD 8570 regulations and governing DISA STIGs and/or SRGs
Understanding of Information Assurance Vulnerability Management (IAVM) and Information Assurance Vulnerability Assessments (IAVAs
Prior experience with RMF controls, risk assessments, and POA&M generation
Strong working knowledge of Confidentiality, Integrity, and Availability (CIA) concepts, to include 2-factor authentication, Public Key encryption techniques, patch management, end-point security systems, intrusion detection, security event management and defense-in-depth.
Well versed in DoD cyber security Assessment and Authorizations (A&A) DoD Implementation, Directives, NIST Special Publications and other government cyber security standards, policies, and directives
Experience with Nessus, ACAS, SCAP
Experience completing and review DISA Security Technical Implementation Guides (STIGs)
Experience conducting risk analysis on products and system components through review of CVEs, plugins, IAVAs
Experience onboarding assets to centrally managed Enterprise solutions.
Application Security Architecture and Design experience
Security Compliance Operations and Application Security Assessment experience
DoD 8570.01 IAT level 2 or greater cyber security certification per DoD 8570.01 (such as Security+)
Experience designing and implementing Commercial Solutions for Classified (CSfC) Multi-Site Connectivity Capability Package desired
Systems integration experience
Excellent interpersonal and presentation skills
At least five years of continuous recent experience in the field of DoD information systems security and/or cybersecurity.
Possess an active Information Assurance Management (IAM) Level III certification. Additional cyber and/or IT certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA's Advanced Security Practitioner (CASP)
Possess an active DoD Secret clearance.
Desired:
At least five years of continuous recent experience as an Information System Security Manager (ISSM), Information Systems Security Engineer (ISSE), and/or Information Systems Security Officer (ISSO).
At least five years of continuous recent experience performing information systems security and/or cybersecurity roles in IT projects and obtaining ATO/ATC.
At least five years of continuous recent experience in DoD enterprise Mission Assurance Support Service (eMASS).
At least five years of continuous recent experience in networking and/or system engineering.
-
________________________________________________________________________________________
What You Can Expect:
A culture of integrity.
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
An environment of trust.
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
A focus on continuous growth.
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
Your potential is limitless. So is ours.
Learn more about CACI here.
________________________________________________________________________________________
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here.
Since this position can be worked in more than one location, the range shown is the national average for the position.
The proposed salary range for this position is:
$105,100-$231,100
CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
Auto-ApplyCyber Security Analyst
Security architect job in Greensboro, NC
Our client, a leading organization in the cybersecurity industry, is seeking a dedicated Cyber Security Analyst to join their team. As a Cyber Security Analyst, you will be an integral part of the Security Operations Center (SOC) supporting the organization's cybersecurity initiatives. The ideal candidate will demonstrate analytical thinking, proactive problem-solving skills, and excellent communication abilities, which will align successfully within the organization.
**Job Title:** Cyber Security Analyst
**Location:** Greensboro, NC
**Pay Range:**
**What's the Job?**
+ Monitor Security Operations Center (SOC) alert queues continuously and investigate detections to identify suspicious activities.
+ Rapidly analyze and respond to security breaches that could compromise sensitive organizational information.
+ Assess the nature and severity of security threats, determining appropriate actions to contain and mitigate risks.
+ Formulate temporary fixes to neutralize active threats, restore security posture, and ensure data integrity.
+ Handle true positive alerts and escalate incidents accordingly, ensuring swift resolution.
**What's Needed?**
+ Typically 2 to 5 years of relevant cybersecurity experience.
+ Strong knowledge of SOC operations, threat detection, and incident response.
+ Experience in analyzing and mitigating security threats and breaches.
+ Familiarity with security tools, frameworks, and best practices.
+ Ability to work independently with minimal supervision, managing complex scenarios with confidence.
**What's in it for me?**
+ Opportunity to work in a dynamic and innovative cybersecurity environment.
+ Engagement with cutting-edge security tools and technologies.
+ Chance to develop and enhance your cybersecurity skills and expertise.
+ Supportive team environment fostering professional growth.
+ Participation in ongoing security initiatives to strengthen organizational defenses.
**Upon completion of waiting period consultants are eligible for:**
+ Medical and Prescription Drug Plans
+ Dental Plan
+ Vision Plan
+ Health Savings Account
+ Health Flexible Spending Account
+ Dependent Care Flexible Spending Account
+ Supplemental Life Insurance
+ Short Term and Long Term Disability Insurance
+ Business Travel Insurance
+ 401(k), Plus Match
+ Weekly Pay
If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!
**About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells.**
_ManpowerGroup (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands -_ **_Manpower, Experis, Talent Solutions, and Jefferson Wells_** _-_ creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent.
ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.
Information System Security Officer (ISSO) - Level III (Senior)
Security architect job in Sedalia, NC
Job Description
OneZero Solutions is an employee‑centric cybersecurity and engineering firm supporting federal and defense missions. We value our people and provide competitive benefits, including health coverage, 401(k) match, PTO, paid holidays, referral bonuses, and educational assistance.
Position Title: Information System Security Officer (ISSO) - Level III (Senior)
Clearance: Secret
Location: Elizabeth City, NC (Hybrid - 2-3 days onsite per week)
Position Overview
The ISSO Level III serves as a senior cybersecurity SME supporting USCG avionics systems, mission electronics, test equipment, and aviation maintenance platforms. This role provides critical senior level cybersecurity expertise and knowledge to projects and tasks related to execution of USCG avionics engineering mission area. Some positions will also provide strategic cybersecurity leadership, and supervision of junior ISSOs and teams
Key Responsibilities
- Lead and perform DOD RMF A&A lifecycle for multiple aviation systems
- Serve as senior cybersecurity advisor to government and engineering leadership
- Plan, execute, and manage cybersecurity Security Assessment and Authorization
- Supervise and mentor Level I/II ISSOs; assign tasks and review deliverables
- Participate in STIG implementation, vulnerability remediation, and compliance validation efforts
- Oversee and perform ISCM activities, audit preparation, and continuous monitoring improvements
- Support evaluations of avionics software, firmware, and maintenance systems
Required Qualifications
7+ years of cybersecurity engineering and RMF A&A experience
Expert knowledge of DoD RMF, and related standards and policies
Proven experience leading and performing cybersecurity Assessment and Authorization projects through ATO achievement.
Strong background in in the use of cybersecurity tools including eMASS, NESSUS, ACAS, HBSS/ESS etc.
Experience with aviation systems, avionics, or OT environments preferred
Strong communication and leadership skills
Required Certifications (one or more)
- CISSP
- CISM
- CISSP-ISSMP
- GSLC
Education
Bachelor's degree or higher in Cybersecurity, Engineering, or related technical field preferred
OneZero Solutions, LLC is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws.
To request an accommodation, please contact us at ************************* or call **************.
Job Posted by ApplicantPro
Cyber Defense Incident Responder, Senior (L3)
Security architect job in Greensboro, NC
Details:
Stefanini Group is hiring!
Stefanini is looking for a Cyber Defense Incident Responder, Senior (Level 3) in Greensboro, NC (Onsite)
For quick apply, please reach out to Krisha Lago
Call: ************** / Email: *************************
Work Location
7900 National Service Road Greensboro, NC 27409
Job Title: Cyber Defense Incident Responder, Senior (L3)
Days are M-F, 2pm to 10pm Eastern time
Training (During first month of the job): M-F, 10am to 6pm Eastern time
As a Senior Cyber Defense Incident Responder within the Global Cybersecurity Operations Center (CSOC) you will play a crucial role as a key technical expert responsible for managing and responding to advanced cyber threats, conducting in-depth investigations, and supporting the overall security posture of The Company. This role combines hands-on technical expertise with mentoring responsibilities, ensuring effective threat detection, incident response, and continuous improvement of SOC capabilities.
What you will do:
Analyze and respond to complex security incidents and alerts generated by SOC tools (e.g., SIEM, EDR, IDS/IPS)
Investigate and resolve escalated incidents from Level 1 and Level 2 analysts, ensuring swift containment and remediation
Lead investigations into cybersecurity incidents, including malware infections, data breaches, and insider threats
Perform digital forensics to collect, analyze, and preserve evidence for legal or compliance requirements
Provide incident reports with detailed root cause analyses and actionable recommendations
Use threat intelligence to identify patterns and indicators of compromise (IOCs) relevant to the organization
Work closely with junior analysts to provide guidance, training, and mentorship, fostering a culture of growth and knowledge-sharing
Collaborate with IT, cybersecurity, and business stakeholder teams to implement and improve security controls
Support the continuous improvement of SOC processes, tools, and technologies to enhance efficiency and effectiveness.
Identify gaps in detection and response capabilities and recommend improvements to SOC leadership.
Details:
In this role, you will bring:
Bachelor's degree in Computer Science or a related 4-year technical degree
Minimum 7 years of experience in supporting cyber defense operations in highly complex enterprise networks. Experience in SOC, SIRT, or CSIRT capacities
One or more of the following certifications: GIAC Certified Intrusion Analyst, GCIH Certified Incident Handler, GCIA Certified Intrusion Analyst, CISSP
Experience in enterprise cybersecurity environment investigating targeted intrusions through complex network segments
Expert understanding of Advanced Persistent Threat (APT), Cybercrime, and Hacktivist tactics, techniques, and procedures (TTPs)
Subject Matter Expert in cybersecurity principles, threat lifecycle management, incident management
Comprehensive knowledge of various operating systems (Windows, OS X, Linux), network protocols, and application layer protocols
Demonstratable experience in scripting languages (may include Powershell, Python, PERL, etc.)
Understanding of the Cyber Kill Chain methodology, the NIST framework, the MITRE ATT&CK framework, and SANS Critical Security controls
Working knowledge in modern cryptographic algorithms and systems
Experience working with and tuning signatures, rules, signatures, and security technologies (IDS/IPS, SIEM, Sandboxing tools, EDR, email security platforms, user behavior analytics
Network design knowledge including security architecture
Strong analytical and technical skills in network defense operations including experience with incident handling (detection, analysis, triage)
Conceptual understanding of cyber threat hunting
Prior experience and ability analyzing cybersecurity events to determine true positives and false positives. Including cybersecurity alert triage, incident investigation, implementing countermeasures, and managing incident response
Previous experience with SIEM platforms and log aggregation systems that perform collection, analysis, correlation, and alerting
Ability to develop rules, filters, views, signatures, countermeasures, and other cyber defense platforms as well as the ability to support analysis and detection continual improvement
Knowledge of new and emerging cybersecurity technologies
Ability to create technical documents as well as stakeholder sitreps and briefing documents
Preferred Qualifications:
Deep Cybersecurity Operations Center experience in the following: intelligence driven detection, security principles, threat lifecycle management, incident management, digital forensics and investigations, network monitoring, endpoint monitoring, OT security principles
CSOC Process Management experience, to include: process and procedure management, CSOC initiative management, continual operational improvement
Preferred certifications: CISSP, GCIH, GCIA, Linux+, CCNA, CCNP
Ability to demonstrate analytical skills, technical knowledge, and practical application of cyber and information security principles to both business leaders/key stakeholders as well as technical teams and SMEs
Demonstrated knowledge in cyber defense policies, procedures, and regulations
Knowledge of cyber vulnerability management processes
Knowledge of common user and system authentication and authorization mechanisms
Listed salary ranges may vary based on experience, qualifications, and local market.
Stefanini takes pride in hiring top talent and developing relationships with our future employees. Our talent acquisition teams will never make an offer of employment without having a phone conversation with you. Those face-to-face conversations will involve a description of the job for which you have applied. We also speak with you about the process including interviews and job offers.
About Stefanini Group
The Stefanini Group is a global provider of offshore, onshore, and nearshore outsourcing, IT digital consulting, systems integration, application, and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like the Americas, Europe, Africa, and Asia, and more than four hundred clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting company with a global presence. We are a CMM Level 5 company.
#LI-KL1
#LI-ONSITE
Easy ApplyCyber Security Analyst Co-op - Fall 2026
Security architect job in Salisbury, NC
Ahold Delhaize USA, a division of global food retailer Ahold Delhaize, is part of the U.S. family of brands, which includes five leading omnichannel grocery brands - Food Lion, Giant Food, The GIANT Company, Hannaford and Stop & Shop. Our associates support the brands with a wide range of services, including Finance, Legal, Sustainability, Commercial, Digital and E-commerce, Technology and more.
Co-op Program Overview:
Get an insider view of the fast-changing grocery retail industry while developing relevant business, technical and leadership skills geared towards enhancing your career. This paid Co-op experience is an opportunity to help drive business results in an environment designed to promote and reward diversity, innovation and leadership. Our mission is to create impactful early talent programs that provide cohorts with meaningful project work, learning and development sessions, and mentorship opportunities.
Applicants must be currently enrolled in a bachelor's or master's degree program. Applicants must be currently authorized to work in the United States on a full-time basis and be available from July 13, 2026 through December 4, 2026. We have a hybrid work environment that requires a minimum of three days a week in the office. Please submit your resume including your cumulative GPA. Transcripts may be requested at a future date.
* Approximate 6-month Co-op session with competitive pay
* Impactful project work to develop your skills/knowledge
* Career assistance & mentoring in obtaining full time positions within ADUSA
* Leadership speaker sessions and development activities
* One-on-one mentoring in your area of interest
* Involvement in group community service events
* Networking and professional engagement opportunities
* Access to online career development tools and resources
* Opportunity to present project work to company leaders and gain executive visibility
Department/Position Description:
The Cybersecurity team is responsible for protecting our organization's systems, and data from internal and external threats. The team monitors network activity, manages security tools, responds to incidents, and ensures compliance with regulatory standards. We also implement proactive measures such as vulnerability assessments, threat intelligence, and employee training to reduce risk and maintain a strong security posture across the enterprise. The Co-op will support the Infrastructure Services team by assisting with day-to-day operations, documentation, and project-related tasks. During their session, they will gain hands-on experience with enterprise systems, collaborate across departments, and develop a deeper understanding of IT service delivery in a large-scale environment.
Qualifications:
* Currently pursuing a degree in Cybersecurity, Information Technology, Computer Science, or a related field.
* Familiarity with basic cybersecurity concepts such as threat detection, network security, and vulnerability management through coursework or labs.
* Exposure to tools or platforms like Wireshark, Splunk, or basic scripting for security automation is a plus.
* Strong attention to detail and analytical thinking, especially when reviewing logs or identifying anomalies.
* Excellent communication skills and a collaborative mindset, with a willingness to learn in a fast-paced, security-focused environment.
Individual cohort pay rates vary based on location, academic year, and position.
ME/NC/PA/SC Salary Range: $20.90 - $35.70
IL/MA/MD Salary Range: $22.80 - $37.30
#LI-DNI
At Ahold Delhaize USA, we provide services to one of the largest portfolios of grocery companies in the nation, and we're actively seeking top talent.
Our team shares a common motivation to drive change, take ownership and enable our brands to better care for their customers. We thrive on supporting great local grocery brands and their strategies.
Our associates are the heartbeat of our organization. We are committed to offering a welcoming work environment where all associates can succeed and thrive. Guided by our values of courage, care, teamwork, integrity (and even a little humor), we are dedicated to being a great place to work.
We believe in collaboration, curiosity, and continuous learning in all that we think, create and do. While building a culture where personal and professional growth are just as important as business growth, we invest in our people, empowering them to learn, grow and deliver at all levels of the business.
IT Security Manager
Security architect job in Greensboro, NC
Greensboro North Carolina
Exp 5-7 yrs
Deg Bachelors
Occasional Travel
Job Description
The IT Security Manager is an experienced leadership role on the IT team responsible for developing, implementing, maintaining, communicating and auditing the security program to protect network availability and information on the global networks. The strategic security plan should foster confidence in the integrity of the organization and its information assets, assuring management, staff, customers, and trading partners that our information systems are safe and dependable. The role plays as a liaison to the
Security Team to ensure that security policies are adopted and adhered to
II. Key Responsibilities
• Manage enterprise-wide security, policies and systems
• Develop, document, implement, monitor and audit information systems security strategies, policies, and procedures
• Ensure all mandated security and compliance standards are met
• Coordinate with vendors, contractors and consultants to maintain and enhance data security
• Provide leadership, guidance, and training to information systems personnel on security practices
• Manage security audits, vulnerability and threat assessments by directing remediation activities to network or system security breaches
• Ensure fulfillment of legal and contractual information, security and privacy mandates including providing executive management with compliance reports and audit findings
• Drive project planning, coordination and delivery of quality IT security solutions on time and within budget
• Work with technology administrators to ensure the proper level of security for all computing systems and network connections is implemented
• Ensure associates are aware of security policies
• Provide recommend changes to improve security using new technologies
III. Relationships
• Position reports directly to the Director, Global IT Infrastructure
• Receives work direction from the Security Lead
• Works on cross functional teams across IT
• Works with Business Managers on security needs as identified
IV. Measures of Performance
• Maintain a high security index score (measures effectiveness of our security program)
• Quality and thoroughness of security program
• Number of security breaches and potential security risks to the business
• Define and execute projects on time
• Deliver solutions that meet requirements, quality, schedule, budget and cost goals
• Provide guidance and support to our companies ensuring 100% compliance to all security policies
• Strong oral and written communications skills
V. Background and Skill
• Bachelor's Degree in Computer Science, Information System Management or equivalent (required)
• 8-10 years' experience in IT with a broad range of exposure to infrastructure, systems analysis, and application development
• 4-7 years of IT Security experience
• Certified Information System Security Professional (CISSP) or equivalent certifications desirable
• Strong working knowledge of networking technologies; TCP/IP addressing, Routing, DHCP, DNS, VPN, Next Generation Firewalls, Firewalls, IPS, and DMZ
• IT auditor experience including SOX, SSAE16, COBIT, etc. (preferred)
• Effective utilization of productivity tools including MS Word, Excel, Outlook, Visio, and PowerPoint
• Excellent interpersonal, organizational, and time management skills
• Versatile, flexible and proactive when resolving technical issues
• Strong project management skills with the ability to multitask and manage multiple projects at one time
Additional Information
All your information will be kept confidential according to EEO guidelines.
Direct Staffing Inc
Cyber Security Engineer
Security architect job in Greensboro, NC
The Cybersecurity Engineer ensures information assurance and compliance design, integration, implementation, modification, and coordination of the installation, testing, operation, and disposition of hardware and software systems. Functions may include conducting analysis, developing functional and technical requirements and specifications, documentation, monitoring the availability, serviceability, and recoverability of installed technology security systems, implementing cyber security procedures and tools, maintaining systems configuration, managing the installation and integration of system patches updates, and enhancements, and ensuring the rigorous application of information security/information assurance policies, principles, and practices.
Responsibilities
Safeguards information systems by identifying potential and actual security problems.
Protects system by defining access privileges, control structures, and resources.
Recognizes problems by identifying abnormalities, reporting violations and mitigate vulnerabilities.
Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
Determines security violations and inefficiencies by conducting periodic audits.
Upgrade systems by implementing and maintaining security controls.
Conduct routine system checks and security assessments; preparing performance reports; communicating system status.
Maintains quality service by following organization standards.
Assist in the development, maintenance and implementation of security procedures and protocols.
Performs other duties as assigned.
Qualifications
EDUCATION:
Required: Bachelor's Degree and/or equivalent experience (10 years experience in IT with 5 years in IT Security is needed for equivalent experience)
EXPERIENCE:
Required: 5 years
LICENSURE/CERTIFICATION/REGISTRY/LISTING:
Required: Certified Information Systems Security Professional (CISSP) - Obtain within 12 months.
Auto-ApplyInformation Security Analyst
Security architect job in Greensboro, NC
XDIN subsidiary of ALTEN Group, includes 500 employees dedicated to the automotive engineering development. ALTEN is a Leader in Engineering & Information Technology system, and operates in over 21 countries (Europe, North America, Asia, Africa and Middle East) with more than 28,000 employees of which 88% are engineers.
At XDIN, we are always looking for world-class talent to lead our global teams through commitment and dedication to our OEM and Tier I clients. We believe in quality support from concept through production, and delivering the best customer experience while at the same time attaining a great place to work!
XDIN Offers
Competitive wages, BOE.
Major health, dental insurance benefits and vision savings plan. 401k, and basic life.
Supplemental benefits such as short-term disability, accident, cancer and life insurance.
Paid company holidays and earned time off.
We place a high value on thought leadership. We want every employee to develop all the skills required to become an engineering and technology thought leader; contributing to the knowledge assets of our team and our clients. From day one, every consultant is trained and mentored to elevate their careers.
Responsibilities:
Performs network and application technical vulnerability assessments using vulnerability assessment tools.
Performs penetration testing activities to detect vulnerabilities and attack chains.
Utilizes penetration testing skills to conduct analyses to gather deeper situational awareness and provide greater security insight of the environment.
Lead the Security Awareness efforts, including facilitating presentations on topics of relevance, evaluating and implementing awareness training
Assist in network security efforts including Data Loss Prevention, Intrusion Prevention and SIEM analysis
Test security measures including OS patches, system hardening, and application configuration
Monitor, review and troubleshoot alerts
Review, interpret and adapt customer, regulatory and corporate security and compliance requirements into technical design options
Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements.
Produce security policies, standards, and guidelines
Perform security research
Produce security risk advisories based on newly identified threats and risk assessment
Assist in performing IT audit, third party evaluations, and risk assessment activities
Requirements:
Bachelor's degree in Information Technology, Computer Science or a related discipline
Approximately 3 years' work experience in Information Security in an enterprise network (Internships and Co-Ops can be included)
A recognized information security certification or accreditation such as Security+, CISSP, or CEH is a plus.
Fundamental understanding of penetration testing techniques and technologies
Fundamental understanding of application development security concepts such as OWASP Top 10 Vulnerabilities
Fundamental understanding of Active Directory administration and Windows authentication
Fundamental understanding of security technologies such as SIEM, IDS/IPS, Web filters, two-factor authentication, web application firewalls
Fundamental understanding of Malware detection, analysis, exploitation, containment, and eradication techniques experience
Experience with systems analysis including, but not limited to: Gathering requirements from stakeholders, Constructing RFP/RFQs, devising and planning proof-of-concepts, defining use and test cases, driving critical security infrastructure projects, creating cogent status reports for senior management, strong technical understanding of vulnerabilities, and how attackers can exploit vulnerabilities to compromise systems.
Excellent verbal, written, and presentation skills; in particular, demonstrated ability to effectively communicate technical and business issues and solutions to multiple organizational levels internally and externally as needed
Knowledge of security frameworks and governance such as NIST, ISO27000 series, HIPAA, GDPR, PCIDSS
Solid analytical and problem solving skills; ability to think strategically and turn ideas into actions
Familiarity with Project Management concepts.
Familiarity with scripting languages such as Python
Ability to work with little supervision and consistently deliver results
The Location: This opportunity is based in Greensboro, NC.
Auto-ApplyInformation Security Analyst
Security architect job in Liberty, NC
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret/SCI
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Cybersecurity, Information Security, System Security
Certifications:
None
Experience:
3 + years of related experience
US Citizenship Required:
Yes
:
Job Description
Transform technology into opportunity as an Information Security Analyst with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
At GDIT, people are our differentiator. As an Information Security Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on TS/SCI cleared Information Security Analysts joining our team to support our intelligence customer at Fort Liberty, NC.
HOW AN INFORMATION SECURITY ANALYST WILL MAKE AN IMPACT
The Information Assurance Analyst is primarily responsible for incident handling, incident response, intrusion analysis, threat hunting, digital forensic analysis, vulnerability scanning, Data Loss Prevention (DLP).
Tracks and handles cyber security incidents/events from initial detection to final resolution; coordinates with appropriate parties to investigate and maintain communications.
Collaborates with specialty teams to investigate and resolve complex problems.
Troubleshoots security tools on the network to ensure successful operation, compatibility with other applications, and minimal impact to the users.
Ensures ACAS vulnerability scanning mechanisms are operational and providing relevant results to the vulnerability management and admin teams.
Performs Information Systems Security Officer (ISSO) duties, and acts as the POC between parent organization and cyber security teams.
Conducts change requests, software authorizations, static code analysis, account reviews, and other Assessment & Authorization (A&A) tasks as required.
Acts as a central point of contact for all inquiries potentially regarding cyber security, and if necessary, redirects to the appropriate entities.
WHAT YOU'LL NEED TO SUCCEED
EDUCATION
Associate Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
8570 Certification
REQUIRED EXPERIENCE:
3+ years of related experience in data security administration.
REQUIRED TECHNICAL SKILLS:
Minimum IAT II: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP
Within 6 months of hire - CSSP Incident Responder (IR): CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+, GCFA, GCIH, SCYBER
Preferred certifications: GCIH, GCFA, GCIA, GNFA, Linux+, CCNA R&S, Splunk Power User
SECURITY CLEARANCE:
TS/SCI (Required)
REQUIRED SKILLS AND ABILITIES:
Proficient at navigating Windows 10/Server 2012/Server 2016 operating systems to perform intrusion analysis and systems maintenance
Proficient at navigating Linux: Ubuntu/RHEL 6/7/8 to facilitate cyber security engineering and systems maintenance
Basic scripting skills using Windows command-line, PowerShell, or BASH
Understanding of network ports, protocols, and services
Intrusion analysis via HBSS, Splunk or other SIEM tools, Windows Event Logging, Open Source Intelligence (OSINT) sources
Incident investigations via McAfee HBSS suite, SolarWinds, Cisco ISE, Cylance, Splunk, Phantom, StealthWatch, WireShark, ForeScout, ACAS, PowerShell, command-line tools
Build and maintain ACAS infrastructure; analyze vulnerability scan results and provide recommendations for remediation
PREFERRED SKILLS:
Strong desire to learn new skills, techniques, tactics, and procedures to improve knowledge and existing processes
Must be able to multi-task and adapt to changing priorities in highly stressful situations
Highly resilient and motivated to investigate unfamiliar and anomalous problems in a robust OPTEMPO environment, including follow-through to complete resolution
Critical thinking skills required to apply and correlate data from multiple sources to solve complex problems
Strong ability to quickly and clearly articulate operational impacts of cyber security incidents/events to leadership
Ability to communicate efficiently and precisely to target audience, as well as build strong rapport with other teams
Location:
On Company Site
Citizenship Required
US citizenship
GDIT IS YOUR PLACE:
● 401K with company match
● Comprehensive health and wellness packages
● Internal mobility team dedicated to helping you own your career
● Professional growth opportunities including paid education and certifications
● Cutting-edge technology you can learn from
● Rest and recharge with paid vacation and holidays
The likely salary range for this position is $76,500 - $103,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
25-50%
Telecommuting Options:
Onsite
Work Location:
USA NC Fort Liberty
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyCyber Security Engineer
Security architect job in High Point, NC
Cyber Security EngineerJob Category: Information TechnologyTime Type: Full time Minimum Clearance Required to Start: Top SecretEmployee Type: RegularPercentage of Travel Required: Up to 50%Type of Travel: Continental US* * *
The Opportunity:
Join a high-impact engineering team supporting the standardization and modernization of information and infrastructure capabilities for the US Army. As a Cyber Engineer, you'll play a hands-on role in designing and implementing modernized solutions.
From conducting site surveys to implementing innovative designs, you'll contribute to delivering high-performance and modern solutions that enhance mission readiness across Army CONUS locations.
Responsibilities:
Designs, implements, and tests cybersecurity solutions to meet DoD and NSA cybersecurity and RMF compliance standards
Analyzes complex security issues and develops effective solutions and incident response to maintain cybersecurity compliance and readiness and limit cyber impact
Assesses emerging cybersecurity policies, technologies, and best practices to make recommendations that improve the efficiency and effectiveness of cybersecurity operations and overall security posture
Functions as a cybersecurity subject matter expert on DoD accreditation strategies, Army regulations, RMF 2.0 framework, continuous monitoring, DoDI 8510, and USAREUR-AF G6 cybersecurity policies, procedures, and plans
Manages the RMF program and the development and maintenance of Assessment and Authorization (A&A), architectural, and other documentation in the authoritative location, including external systems and Cross-Domain Solutions (CDS), under the purview of the MPs
Performs Security Control Assessment (SCA) reporting and services, including inspecting/assessing networks, generating POA&M documentation, preparing exceptions for Government review, performing risk assessments, generating findings, and recommending courses of action
Prepares certification testing and evaluation risk reports and artifacts, final reports, RMF scorecards, and security assessment reports
Develops and conducts Test and Evaluation visit in-briefs and out-briefs and discusses results with the system owner
Communicates and presents security concepts and recommendations effectively
Frequently participates in and contributes to strategic discussions and standards development related to cybersecurity
Mentors less experienced cybersecurity personnel
Leads and supervises cybersecurity teams
Qualifications:
Required:
US Citizen with active Top Secret security clearance with Sensitive Compartmented Information (SCI) eligibility.
Bachelor's Degree in Cybersecurity, Information Assurance (IA), or relevant IT degree with demonstrated coursework related to cybersecurity an/or information assurance (additional 4 years of relevant experience may be considered in lieu of BS/BA degree)
10+ years of cybersecurity or information assurance experience, with at least 2 years of experience leading cyber or IA personnel or teams
Must meet DoD Approved 8570 certification requirements for IAT-III
Certifications and/or experience in Zero Trust preferred
Knowledge of risk assessment tools, technologies, and methods including eMASS
Familiarity with vulnerability management tools and techniques, including HBSS and ACAS (Nessus)
Ability to support designing secure networks, systems, and application architectures
Must be able to support planning, researching, and developing security policies, standards, and procedures
Ability to communicate network security issues to peers and customers
Proficient in Microsoft software applications and other software applications as required, including Microsoft SharePoint
Excellent interpersonal and presentation skills
Strong communications skills, both written and oral
Desired:
Prior experience with Army network modernization programs.
Understanding of Department of Defense Military standards
Experience with DoD IT security requirements
-
________________________________________________________________________________________
What You Can Expect:
A culture of integrity.
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
An environment of trust.
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
A focus on continuous growth.
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
Your potential is limitless. So is ours.
Learn more about CACI here.
________________________________________________________________________________________
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here.
The proposed salary range for this position is:
$85,800 - $180,200
CACI is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any other protected characteristic.
Auto-ApplyInformation System Security Officer (ISSO) - Level II
Security architect job in Sedalia, NC
Job Description
OneZero Solutions is an employee‑centric cybersecurity and engineering firm supporting federal and defense missions. We value our people and provide competitive benefits, including health coverage, 401(k) match, PTO, paid holidays, referral bonuses, and educational assistance.
Position Title: Information System Security Officer (ISSO) - Level II
Location: Elizabeth City NC (Hybrid - 2-3 days onsite per week)
Clearance: Secret Clearance
Position Overview
The ISSO Level II provides mid‑level cybersecurity support for USCG avionics systems, aviation software, and maintenance test platforms. This role helps achieve and sustain ATO compliance through DoD and NIST cybersecurity frameworks and aviation‑specific standards.
Key Responsibilities
- Execute the NIST RMF A&A lifecycle for aviation-related systems
- Conduct vulnerability assessments and direct remediation
- Implement and validate STIGs and SCAP compliance results
- Support continuous monitoring, configuration management, and audits
- Assist in evaluating avionics updates, patches, and maintenance tools
- Collaborate with engineering, maintenance personnel, OEMs, and leadership stakeholders
Required Qualifications
3+ years of ISSO or cybersecurity experience in DoD/Federal environments
Working knowledge of the NIST RMF and related standards, DoD security policies and standards (DoD 8510.01, DoD 8500, STIG etc.), and the DoD Security Assessment and Authorization process.
Demonstrated proficiency in the use of security tools such as eMASS, Tenable Nessus, ACAS, etc.
Experience with ACAS/Tenable, HBSS/ESS, and STIG/SCAP tools
Ability to develop and update cybersecurity documentation and artifacts
Experience with aircraft support systems, OT, or maintenance tools preferred
Required Certifications (one or more):
- Security+
- CGRC (CAP)
- CASP+ / SecurityX
- CCISO
- CCSP
- Cloud+
- SSCP
- CSSLP
Education
Bachelor's degree in Cybersecurity, Computer Science, or related field preferred
OneZero Solutions, LLC is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws.
To request an accommodation, please contact us at ************************* or call **************.
Job Posted by ApplicantPro
IT Security Manager
Security architect job in Greensboro, NC
The IT Security Manager is an experienced leadership role on the IT team responsible for developing, implementing, maintaining, communicating and auditing the security program to protect network availability and information on the global networks. The strategic security plan should foster confidence in the integrity of the organization and its information assets, assuring management, staff, customers, and trading partners that our information systems are safe and dependable. The role plays as a liaison to the
Security Team to ensure that security policies are adopted and adhered to
II. Key Responsibilities
• Manage enterprise-wide security, policies and systems
• Develop, document, implement, monitor and audit information systems security strategies, policies, and procedures
• Ensure all mandated security and compliance standards are met
• Coordinate with vendors, contractors and consultants to maintain and enhance data security
• Provide leadership, guidance, and training to information systems personnel on security practices
• Manage security audits, vulnerability and threat assessments by directing remediation activities to network or system security breaches
• Ensure fulfillment of legal and contractual information, security and privacy mandates including providing executive management with compliance reports and audit findings
• Drive project planning, coordination and delivery of quality IT security solutions on time and within budget
• Work with technology administrators to ensure the proper level of security for all computing systems and network connections is implemented
• Ensure associates are aware of security policies
• Provide recommend changes to improve security using new technologies
III. Relationships
• Position reports directly to the Director, Global IT Infrastructure
• Receives work direction from the Security Lead
• Works on cross functional teams across IT
• Works with Business Managers on security needs as identified
IV. Measures of Performance
• Maintain a high security index score (measures effectiveness of our security program)
• Quality and thoroughness of security program
• Number of security breaches and potential security risks to the business
• Define and execute projects on time
• Deliver solutions that meet requirements, quality, schedule, budget and cost goals
• Provide guidance and support to our companies ensuring 100% compliance to all security policies
• Strong oral and written communications skills
V. Background and Skill
• Bachelor's Degree in Computer Science, Information System Management or equivalent (required)
• 8-10 years' experience in IT with a broad range of exposure to infrastructure, systems analysis, and application development
• 4-7 years of IT Security experience
• Certified Information System Security Professional (CISSP) or equivalent certifications desirable
• Strong working knowledge of networking technologies; TCP/IP addressing, Routing, DHCP, DNS, VPN, Next Generation Firewalls, Firewalls, IPS, and DMZ
• IT auditor experience including SOX, SSAE16, COBIT, etc. (preferred)
• Effective utilization of productivity tools including MS Word, Excel, Outlook, Visio, and PowerPoint
• Excellent interpersonal, organizational, and time management skills
• Versatile, flexible and proactive when resolving technical issues
• Strong project management skills with the ability to multitask and manage multiple projects at one time
Additional Information
All your information will be kept confidential according to EEO guidelines.
Direct Staffing Inc
Systems Security Specialist - SQL Server/IIS
Security architect job in Greensboro, NC
Our local customer is looking for someone to support their upcoming hardening project. This person will be part of their information security team and support the application and database server teams to focus on validating and securing their servers (SQL Server and IIS). They work as the go to security resource to implement configuration changes and updates in accordance with security policies and frameworks, particularly CIS Framework as reference.
Skills
Security, Information security, SQL Server, iis server, CIS Framework, System Security, Vulnerability
Top Skills Details
Security,Information security,SQL Server,iis server,CIS Framework,System Security,Vulnerability
Additional Skills & Qualifications
- Understand of SQL database hardening and security best practices. As well as SQL Server authentication methods and access management.
- Familiarity with SQL Server Configuration Manager.
- Will need strong documentation and communication skills as they will work directly with application owners and various business/IT stakeholders for testing and validation/troubleshooting efforts
Job Type & Location
This is a Contract position based out of Greensboro, NC.
Pay and Benefits
The pay range for this position is $45.00 - $50.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: - Medical, dental & vision - Critical Illness, Accident, and Hospital - 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available - Life Insurance (Voluntary Life & AD&D for the employee and dependents) - Short and long-term disability - Health Spending Account (HSA) - Transportation benefits - Employee Assistance Program - Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a hybrid position in Greensboro,NC.
Application Deadline
This position is anticipated to close on Dec 19, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.