Senior Offensive Security Engineer, Red Team
Security engineer job in Cincinnati, OH
Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands.
From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded.
The Opportunity
Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world's most advanced cyber security adversaries?
The Information Security Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise.
Responsibilities:
Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR.
Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes.
Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails).
Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC.
Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership.
Mentor junior engineers; set standards for craft quality, methodology, and safety.
Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment.
Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use.
Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management.
Network Engineer
Security engineer job in Cincinnati, OH
Looking for a role back in the office full time? Enjoy collaborating with a dynamic team? Tired of working for companies/industry that are not stable?
Key Benefits:
- $0 Deductible health insurance with low-cost premiums
- Profit Sharing
- 401k with market-leading employer match
- Dental and vision coverage
- Paid Time Off: 18 days starting in year one
- Paid holidays
- Tuition Reimbursement
- Additional company-paid benefits includes Short Term/Long Term Disability -and Life Insurance
Seeking a highly motivated and skilled Network Engineer team member with strong expertise in network systems, cloud platforms, and Windows environments. You will play a crucial role in designing, implementing, and maintaining our hybrid infrastructure, ensuring optimal performance, security, and scalability.
If you excel in both network and cloud engineering, with a solid foundation in Windows systems, we want to hear from you!
Key Responsibilities:
Design, implement, and manage network infrastructure (LAN, WAN, WLAN, VPN, Firewalls, Routers, Switches).
Architect, deploy, and manage cloud infrastructure across multiple providers (AWS, Azure), including IaaS, PaaS, and SaaS offerings.
Integrate and maintain Windows-based systems as part of hybrid environments.
Design and implement disaster recovery and business continuity plans for cloud and hybrid systems.
Configure and secure network and cloud environments, including firewalls, routers, switches, and VPNs.
Monitor infrastructure performance, address issues, and optimize for efficiency.
Collaborate on and enhance existing network and system monitoring tools.
Qualifications:
Bachelor's degree in Computer Science, Information Technology, or a related field (or equivalent experience).
7+ years of experience in network and cloud engineering with a focus on Windows integration.
Strong understanding of networking protocols (TCP/IP, BGP, OSPF).
Proficiency in configuring and administering Windows-based systems in hybrid environments, including Hyper-V, Clustering and Active Directory Services
Hands-on experience with major cloud platforms (AWS, Azure).
Expertise in network security principles and practices.
Skilled in using Powershell scripting for automation.
Strong troubleshooting abilities in complex, hybrid network and system setups.
Excellent communication, collaboration, and time management skills.
EOE/M/F/Disabled/Veteran/DFSP
Entry Level Cyber Security Analyst
Security engineer job in Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Cyber Network Defense Analyst
Security engineer job in Wright-Patterson Air Force Base, OH
Bowhead seeks a Cybersecurity Network Defense Analyst to join our team in Dayton, OH. The Cybersecurity Network Defense Analyst uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers.
The Cybersecurity Network Defense Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cyber security state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
**Responsibilities**
- Receive and distribute AS&W information
- Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions, and maintain internal and external source location information)
- Coordinate AS&W information from other sources to aid in analysis of alerts
- Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity
- Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops
- Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN
- Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats
- Collect intrusion artifacts (e.g., source code, malware, and trojans)
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
- Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
- Provide a 24/7x365 event/incident handling and analysis capability
- Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents
- Analyze detected cyber events to identify incidents
- Categorize and characterize cyber incidents
- Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process
- Analyze cyber incidents to develop specific responses
- Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers
- Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence
- Mitigate operational and/or technical impact due to cyber incidents
- Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures
**Qualifications**
- Must possess Bachelor's degree or equivalent experience
- Must have at least 2 years intrusion detection experience
- Must have at least 2 years relevant IT and/or System administrator experience and 2 years relevant Information Security experience
- Must have the certifications for DOD 8570 IAT Level II minimally
- Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder
- Must have the ability to earn DoD 8570 computing environment certification within 6 months
- Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
- Ability to demonstrate strong knowledge of computer security concepts
- Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience
- Advanced knowledge of network technologies and protocols
- Advanced understanding of current threats and trends present in the Information Security and Technology field
- Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified
SECURITY CLEARANCE REQUIRED: Must currently hold a security clearance at the Secret level. US Citizenship is a requirement for Secret clearance at this location.
Physical Demands:
- Must be able to lift up to 25 pounds
- Must be able to stand and walk for prolonged amounts of time
- Must be able to twist, bend and squat periodically
\#LI-MN1
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
All candidates must apply online at ****************** and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance (********************************************
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs.
**Join our Talent Community!**
Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events.
**ID** _2025-24272_
**Category** _Information Technology_
**Location : Location** _US-OH-Wright-Patterson AFB_
**Minimum Clearance Required** _Secret_
**Travel Requirement** _N/A_
Cybersecurity and Network Protection SME
Security engineer job in Dayton, OH
Cybersecurity and Network Protection SME Clearance Required: TS/SCI (active)
Inc.
At JMark Services Inc., we are committed to securing the mission. As a trusted partner to the Department of Defense and Intelligence Community, we specialize in cybersecurity, information assurance, and technical operations that protect critical systems and national interests. Our teams thrive at the intersection of innovation and accountability-where every decision matters.
Position Title: Cybersecurity and Network Protection SME
JMark is seeking a highly skilled Cybersecurity and Network Protection SME to support advanced cybersecurity assessment and compliance operations at Wright-Patterson AFB. In this role, you will lead risk evaluations, validate system security requirements, and play a critical part in maintaining secure, mission-ready environments across classified networks and platforms.
Working under minimal supervision, you'll bring deep technical experience and policy fluency to a dynamic, mission-driven team.
Key Responsibilities:
Plan and conduct compliance audits and vulnerability assessments of systems and networks.
Identify deviations from security standards and recommend corrective actions.
Support risk mitigation strategies and ensure compliance with certification and accreditation processes.
Assist in implementation of government policies such as NISPOM and DCID 6/3; recommend tailored improvements.
Provide process, analysis, coordination, and documentation support for secure system operations.
Conduct security certification test planning, participation, and reporting (ST&E).
Perform hardware/software security research and support secure tech integration and release.
Review system audits and track corrective actions through closure.
Collaborate with stakeholders across technical, policy, and leadership levels.
Required Qualifications:
Bachelor's degree in Engineering, Computer Science, Information Technology, or a related field.
Minimum of 10 years of relevant cybersecurity or information assurance experience.
Strong understanding of vulnerability assessments, ST&E, and certification/accreditation frameworks.
Experience applying federal security guidelines (NIST, STIGs, NISPOM, DCID 6/3, RMF).
Exceptional problem-solving, organizational, and technical writing skills.
Active TS/SCI clearance is required.
Why Join JMark?
Tackle real-world cybersecurity challenges that protect national defense systems
Collaborate with high-caliber experts in a mission-critical environment
Enjoy growth opportunities and technical leadership roles
Competitive compensation, full benefits, and a values-driven culture
Secure infrastructure. Reduce risk. Lead with integrity.
Apply now to become a Cybersecurity and Network Protection SME at JMark Services Inc. - Wright-Patterson AFB.
Staff Product Security Engineer
Security engineer job in Cincinnati, OH
At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at *******************
Job Function:
R&D Product Development
Job Sub Function:
R&D Software/Systems Engineering
Job Category:
Scientific/Technology
All Job Posting Locations:
Cincinnati, Ohio, United States of America, Santa Clara, California, United States of America
:
About Surgery
Fueled by innovation at the intersection of biology and technology, we're developing the next generation of smarter, less invasive, more personalized treatments.
Are you passionate about improving and expanding the possibilities of MedTech surgery? Ready to join a team that's reimagining how we heal? Our MedTech Surgery team will give you the chance to deliver surgical technologies and solutions to surgeons and healthcare professionals around the world. Your contributions will help effectively treat some of the world's most prevalent conditions such as obesity, cardiovascular disease and cancer. Patients are waiting.
Your unique talents will help patients on their journey to wellness. Learn more at *******************/medtech.
We are searching for the best talent for a Staff Product Security Engineer position, to be located in Santa Clara, CA or Cincinnati, OH.
Job Description:
The Staff Product Security Engineer will be a key member of the Capital R&D organization, make vital contributions to the New Product Development (NPD) pipeline and transform patient care through innovation. They are accountable for leading our NPD teams and creating a strategy to implement cybersecurity into the design and development of product hardware and software for use in cutting edge medical devices and associated capital equipment
You will be responsible for:
Identify threats and vulnerabilities to patient safety and product integrity, assess current security controls and determine potential impact of a threat and the risk level associated with threat/vulnerability pairs.
Drive architecture, requirements, and design to ensure that decisions incorporate security considerations.
Advise embedded system security software to ensure system hardening and secure coding practices.
Support all stakeholders on patch management, vulnerability handling, and SBOM scanning
Document designs and specifications per design control processes and conform to Industry Standards for Medical Device Software (IEC 62304)
Qualifications / Requirements:
Education:
Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity or related degree
Experience and Skills
6+ years' experience (or 4+ with M.S.) establishing security architecture or implementing security solutions in consumer products or medical devices
3+ experience in a software engineering or software architectural role in a New Product Development (NPD) environment
Proven experience with threat modeling and risk assessments for connected products or medical devices
Ability to work autonomously and proactively seek out security opportunities within the different surgical robotics teams
Ability to think big picture and have attention to detail - aligning strategic objectives with tactical implementation.
Proven experience with electrical and embedded software design
Experience developing software for embedded Real-Time Operating Systems (RTOS)
Experience developing embedded software systems using Modern C++ (preferably standards 17+)
A results and performance driven demeanor with strong sense of accountability
Understanding of penetration testing, vulnerability scanning, and/or other general security testing principles
Preferred Skills & Experience:
Experience with FDA, data governance, and privacy standards (HIPAA, ISO 27001, UL 2900)
Work experience with Systems Engineering activities: requirements management and development, risk management, and verification
Strong collaboration, proven technical leadership capabilities, and conflict resolution skills
A security certification from an accredited body is preferred and may be considered in lieu of a portion of required years of experience
Experience working with secure boot, Trusted Platform Module (TPM), Data Distribution System (DDS), and QNX
Other Requirements:
Ability to travel up to 10% domestic US and Internationally
The anticipated base pay range for this position is $105,000- $169,050.
California Bay Area - The anticipated base pay range for this position is $141,000 - $227,000.
The Company maintains highly competitive, performance-based compensation programs. Under current guidelines, this position is eligible for an annual performance bonus in accordance with the terms of the applicable plan. The annual performance bonus is a cash bonus intended to provide an incentive to achieve annual targeted results by rewarding for individual and the corporation's performance over a calendar/performance year. Bonuses are awarded at the Company's discretion on an individual basis.
Employees and/or eligible dependents may be eligible to participate in the following Company sponsored employee benefit programs: medical, dental, vision, life insurance, short- and long-term disability, business accident insurance, and group legal insurance.
Employees may be eligible to participate in the Company's consolidated retirement plan (pension) and savings plan (401(k)).
This position is eligible to participate in the Company's long-term incentive program.
Employees are eligible for the following time off benefits:
Vacation - up to 120 hours per calendar year
Sick time - up to 40 hours per calendar year
Holiday pay, including Floating Holidays - up to 13 days per calendar year
Work, Personal and Family Time - up to 40 hours per calendar year
Additional information can be found through the link below.
For additional general information on Company benefits, please go to: - *********************************************
This job posting is anticipated to close on 7/22/25. The Company may however extend this time-period, in which case the posting will remain available on *************************** to accept additional applications.
Johnson & Johnson is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or other characteristics protected by federal, state or local law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act.
Johnson & Johnson is committed to providing an interview process that is inclusive of our applicants' needs. If you are an individual with a disability and would like to request an accommodation, external applicants please contact us via
*******************/contact-us/careers
. internal employees contact AskGS to be directed to your accommodation resource.
#RADSW
#Li-Hybrid
Required Skills:
Preferred Skills:
Agility Jumps, Analytical Reasoning, Coaching, Collaborating, Critical Thinking, Model-Based Systems Engineering (MBSE), Product Design, Report Writing, Requirements Analysis, Research and Development, SAP Product Lifecycle Management, Scripting Languages, Software Architectures, Software Development Management, Software Engineering Practices, Software Quality Assurance (SQA), Systems Development Lifecycle (SDLC), Technologically Savvy
Auto-ApplyStaff Product Security Engineer
Security engineer job in Cincinnati, OH
At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at *******************
Job Function:
R&D Product Development
Job Sub Function:
R&D Software/Systems Engineering
Job Category:
Scientific/Technology
All Job Posting Locations:
Cincinnati, Ohio, United States of America, Santa Clara, California, United States of America
:
About Surgery
Fueled by innovation at the intersection of biology and technology, we're developing the next generation of smarter, less invasive, more personalized treatments.
Are you passionate about improving and expanding the possibilities of MedTech surgery? Ready to join a team that's reimagining how we heal? Our MedTech Surgery team will give you the chance to deliver surgical technologies and solutions to surgeons and healthcare professionals around the world. Your contributions will help effectively treat some of the world's most prevalent conditions such as obesity, cardiovascular disease and cancer. Patients are waiting.
Your unique talents will help patients on their journey to wellness. Learn more at *******************/medtech.
We are searching for the best talent for a Staff Product Security Engineer position, to be located in Santa Clara, CA or Cincinnati, OH.
Job Description:
The Staff Product Security Engineer will be a key member of the Capital R&D organization, make vital contributions to the New Product Development (NPD) pipeline and transform patient care through innovation. They are accountable for leading our NPD teams and creating a strategy to implement cybersecurity into the design and development of product hardware and software for use in cutting edge medical devices and associated capital equipment
You will be responsible for:
Identify threats and vulnerabilities to patient safety and product integrity, assess current security controls and determine potential impact of a threat and the risk level associated with threat/vulnerability pairs.
Drive architecture, requirements, and design to ensure that decisions incorporate security considerations.
Advise embedded system security software to ensure system hardening and secure coding practices.
Support all stakeholders on patch management, vulnerability handling, and SBOM scanning
Document designs and specifications per design control processes and conform to Industry Standards for Medical Device Software (IEC 62304)
Qualifications / Requirements:
Education:
Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity or related degree
Experience and Skills
6+ years' experience (or 4+ with M.S.) establishing security architecture or implementing security solutions in consumer products or medical devices
3+ experience in a software engineering or software architectural role in a New Product Development (NPD) environment
Proven experience with threat modeling and risk assessments for connected products or medical devices
Ability to work autonomously and proactively seek out security opportunities within the different surgical robotics teams
Ability to think big picture and have attention to detail - aligning strategic objectives with tactical implementation.
Proven experience with electrical and embedded software design
Experience developing software for embedded Real-Time Operating Systems (RTOS)
Experience developing embedded software systems using Modern C++ (preferably standards 17+)
A results and performance driven demeanor with strong sense of accountability
Understanding of penetration testing, vulnerability scanning, and/or other general security testing principles
Preferred Skills & Experience:
Experience with FDA, data governance, and privacy standards (HIPAA, ISO 27001, UL 2900)
Work experience with Systems Engineering activities: requirements management and development, risk management, and verification
Strong collaboration, proven technical leadership capabilities, and conflict resolution skills
A security certification from an accredited body is preferred and may be considered in lieu of a portion of required years of experience
Experience working with secure boot, Trusted Platform Module (TPM), Data Distribution System (DDS), and QNX
Other Requirements:
Ability to travel up to 10% domestic US and Internationally
The anticipated base pay range for this position is $105,000- $169,050.
California Bay Area - The anticipated base pay range for this position is $141,000 - $227,000.
The Company maintains highly competitive, performance-based compensation programs. Under current guidelines, this position is eligible for an annual performance bonus in accordance with the terms of the applicable plan. The annual performance bonus is a cash bonus intended to provide an incentive to achieve annual targeted results by rewarding for individual and the corporation's performance over a calendar/performance year. Bonuses are awarded at the Company's discretion on an individual basis.
Employees and/or eligible dependents may be eligible to participate in the following Company sponsored employee benefit programs: medical, dental, vision, life insurance, short- and long-term disability, business accident insurance, and group legal insurance.
Employees may be eligible to participate in the Company's consolidated retirement plan (pension) and savings plan (401(k)).
This position is eligible to participate in the Company's long-term incentive program.
Employees are eligible for the following time off benefits:
Vacation - up to 120 hours per calendar year
Sick time - up to 40 hours per calendar year
Holiday pay, including Floating Holidays - up to 13 days per calendar year
Work, Personal and Family Time - up to 40 hours per calendar year
Additional information can be found through the link below.
For additional general information on Company benefits, please go to: - *********************************************
This job posting is anticipated to close on 7/22/25. The Company may however extend this time-period, in which case the posting will remain available on *************************** to accept additional applications.
Johnson & Johnson is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or other characteristics protected by federal, state or local law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act.
Johnson & Johnson is committed to providing an interview process that is inclusive of our applicants' needs. If you are an individual with a disability and would like to request an accommodation, external applicants please contact us via
*******************/contact-us/careers
. internal employees contact AskGS to be directed to your accommodation resource.
#RADSW
#Li-Hybrid
Required Skills:
Preferred Skills:
Agility Jumps, Analytical Reasoning, Coaching, Collaborating, Critical Thinking, Model-Based Systems Engineering (MBSE), Product Design, Report Writing, Requirements Analysis, Research and Development, SAP Product Lifecycle Management, Scripting Languages, Software Architectures, Software Development Management, Software Engineering Practices, Software Quality Assurance (SQA), Systems Development Lifecycle (SDLC), Technologically Savvy
Auto-ApplyInformation Security Specialist: Governance & Compliance Engineer
Security engineer job in Cincinnati, OH
The Information Security Specialist works with the IT security team to ensure the security of court systems and serve as a security resource to courts within the Sixth Circuit for their governance and compliance program. The major responsibilities and duties include the following:
In coordination with the Circuit IT Security Officer (ITSO), respond to emergent threats, assist court units in the circuit, and track and report progress. Assist in identifying, prioritizing, and coordinating the protection of critical cyber infrastructure and key resources.
Provide guidance and assistance in implementing and maintaining business objectives (i.e. security scorecard, CIS controls, assessments, internal audit controls, security data calls).
Manage information security projects (or security-related aspects of other IT projects). Coordinate and lead IT staff and court users to identify, plan, and implement initiatives and projects. Prepare and present reports and training.
Develop and maintain a documentation template repository; modernize and maintain the circuit's data repository. Review and advise courts on documentation requirements.
Assist the Circuit ITSO in performing, analyzing, and archiving SWOT and other gap analyses to ensure compliance with required frameworks, controls, and assessment.
Manage CIS controls self-assessment too; provide guidance and assistance to courts on documentation, program management, etc.
Assist the Circuit ITSO in creating, tracking, and maintaining KPIs. Prepare scheduled data points and KPIs for use in reports to circuit-wide executives and other Judiciary stakeholders.
Research custom solutions for courts as needed.
Qualifications
Required: Four years of experience in information security systems. Experience with cybersecurity compliance programs. Strong communication and interpersonal skills; excellent customer service skills. Detailed, organized, and self-driven. Ability to work under pressure and within the constraints of conflicting deadlines. Proactive, problem-solving approach. Ability to respond effectively in critical situations. Ability to work independently and in a team environment. Ability to travel (25% - 50%).
Preferred: Bachelor's degree in computer science or related field. Related cybersecurity or IT project management certifications. Related experience in a court, government agency, or equivalent environment.
Total Rewards & Work/Life Balance
Compensation*: $87,791 - $142,732 (CL 29) (*Salary commensurate with qualifications)
Benefits: Employer subsidized health and life insurance plans. Dental and vision insurance plans. Flexible spending accounts for health care, dependent care, and commuter expenses. Eligibility for Public Service Loan Forgiveness Program and mass transit subsidies. On-site fitness center. Federal retirement entails a pension plan (FERS-FRAE) and employer-matching Thrift Savings Plan (similar to a 401K). Retirees may carry insurance plans into retirement while paying the same premiums as employees. Visit ********************************* to learn more about the Judiciary's competitive benefits.
Work/Life: Annual time off - 13 vacation days, 13 sick leave days, and 11 paid holidays. Vacation days increase to 20 days after three years and to 26 days after fifteen years. Hybrid telework schedule may be available.
Conditions of Employment
Travel for this position is required. The selected candidate is provisionally hired pending results of background investigation/check and fingerprinting. This position is subject to updated background investigations every five years. Applicants selected for an interview must complete the Optional Background Information section on the Judiciary's application. Employees are required to adhere to the
Judicial Code of Conduct for Judicial Employees
.
Electronic Fund Transfer for payroll direct deposit is required. Positions with the U.S. Courts are at-will, excepted service appointments, and may be terminated with or without cause by the Court. For citizenship requirements and additional information about careers in the Judiciary, visit ************************* The Court reserves the right to modify the conditions of this announcement, or to withdraw the announcement for any reason without notice.
How To Apply
Please submit a single PDF application packet, including (1) a cover letter addressing your qualifications and experience in relation to the job duties and how you learned of the position, (2) a current resume, to the Director of Human Resources via the Resume button on our online application system. Position is open until filled; preference given to applications received by January 5, 2026. Virtual interviews available.
The United States Court of Appeals for the Sixth Circuit is an equal opportunity employer. For a reasonable accommodation during the recruitment process, contact Human Resources at **************.
Senior Security Engineer
Security engineer job in Cincinnati, OH
Job Title: Senior Security Engineer
TOP SKILLS:
Top 3 Required Skills:
Experience managing data protection and security controls in MS O365 (SharePoint, OneDrive, Teams)
Hands-on experience configuring Data Classification Labels, Retention Policies, and DLP rules
Strong technical communication and collaboration skills, with the ability to gather business context and explain security solutions clearly
What You'll Do
We are seeking a highly technical, hands-on Security Engineer to support our enterprise data protection initiatives within MS O365. This mid- to senior-level contractor will play a key role in building and managing security controls across SharePoint, OneDrive, and Teams environments. The role focuses on implementing and tuning Data Loss Prevention (DLP), Retention Policies, and Data Classification Labels.
This is an ideal opportunity for someone with an administrative background in MS O365 who is transitioning into or expanding their career in security engineering. The ideal candidate will be a proactive “doer” who thrives in a collaborative environment and is comfortable engaging directly with end users to understand business needs and secure data accordingly.
Top 3 Required Skills:
Experience managing data protection and security controls in MS O365 (SharePoint, OneDrive, Teams)
Hands-on experience configuring Data Classification Labels, Retention Policies, and DLP rules
Strong technical communication and collaboration skills, with the ability to gather business context and explain security solutions clearly
Additional Requirements:
Background in Microsoft 365 administration with a desire to focus on security
Familiarity with secure handling of large file volumes and resolving oversharing risks
Experience implementing or tuning custom security controls within Microsoft 365 environments
Ability to validate data use cases and work with end users to align controls with business needs
Responsibilities:
Build, configure, and maintain MS O365 security controls, including DLP policies, Retention Labels, and Data Classification Labels
Evaluate and tune existing configurations to improve protection of enterprise data
Help reduce risk from overshared files, stale data, or inappropriate access across large MS O365 environments
Engage directly with end users and business teams to gather context and guide the implementation of appropriate security controls
Take ownership of solutions-this role is for someone who will recommend, implement, and follow through on actions
Contribute to the security posture of the OneDrive, SharePoint, and Teams environment across the organization
What You'll Get
Competitive base salary
Medical, dental, and vision insurance coverage
Optional life and disability insurance provided
401(k) with a company match and optional profit sharing
Paid vacation time
Paid Bench time
Training allowance offering
You'll be eligible to earn referral bonuses!
All done!
Your application has been successfully submitted!
Other jobs
Network Information Security Engineer
Security engineer job in Cincinnati, OH
We are hiring a full-time Cybersecurity Engineer who is technical, dedicated to learning new things, security-minded, has strong initiative, and is able to manage projects autonomously. The Information Security team defends the company's digital infrastructure by designing, implementing, and improving the company's cybersecurity architecture. This is a critical role responsible for protecting infrastructure, cloud, edge devices, and data against unauthorized use, modification, exfiltration, or damage. If you're excited to be part of a fast-growing team, then Medpace is a great place to grow your career.
Responsibilities
* Engineer security solutions without oversight while collaborating with multiple internal departments and vendors;
* Analyze security systems and drive continuous improvements;
* Research vulnerabilities, perform vulnerability scanning and remediate threats;
* Mature security best practices and policies internal to the organization;
* Develop new processes while cross-training coworkers and assisting employees on security-related matters;
* Provide security awareness training and testing for employees to verify proper security protocols are being adhered to;
* Performing cyber security incident triage, reviewing logs, and performing remediation activities; and;
* Review and reduce inappropriate/overprovisioned access to drive least privileged access.
Qualifications
* Minimum of bachelor's degree, preferably in Cybersecurity or Information Technology;
* 3 years of experience in implementing, sustaining, and supporting Information Security solutions;
* Understanding of security best practices and how to implement them within an enterprise environment;
* Experience with managing, configuring, and deploying enterprise-grade security solutions in some of the following areas:
* Zero Trust networking and network segmentation
* Networking protocol analysis and forensics
* Firewall configuration, Intrusions Detection and Prevention Systems (IDS/IPS)
* Configuring Azure network architecture, working with Azure policies and Defender for Cloud
Nice to have:
* Experience with vulnerability assessment tools such as Nessus and Tenable;
* Experience with enterprise web proxy solutions, web filters, and VPN such as Zscaler;
* Experience with governing Windows environment including GPO;
* Previous employment or experience in a highly regulated industry such as healthcare, financial, or defense experience with standards such as ISO, NIST, HIPPA, and/or SOC2; and
* Auditing and policy-writing experience.
Medpace Overview
Medpace is a full-service clinical contract research organization (CRO). We provide Phase I-IV clinical development services to the biotechnology, pharmaceutical and medical device industries. Our mission is to accelerate the global development of safe and effective medical therapeutics through its scientific and disciplined approach. We leverage local regulatory and therapeutic expertise across all major areas including oncology, cardiology, metabolic disease, endocrinology, central nervous system, anti-viral and anti-infective. Headquartered in Cincinnati, Ohio, employing more than 5,000 people across 40+ countries.
Why Medpace?
People. Purpose. Passion. Make a Difference Tomorrow. Join Us Today.
The work we've done over the past 30+ years has positively impacted the lives of countless patients and families who face hundreds of diseases across all key therapeutic areas. The work we do today will improve the lives of people living with illness and disease in the future.
Cincinnati Perks
* Cincinnati Campus Overview
* Flexible work environment
* Competitive PTO packages, starting at 20+ days
* Competitive compensation and benefits package
* Company-sponsored employee appreciation events
* Employee health and wellness initiatives
* Community involvement with local nonprofit organizations
* Discounts on local sports games, fitness gyms and attractions
* Modern, ecofriendly campus with an on-site fitness center
* Structured career paths with opportunities for professional growth
* Discounted tuition for UC online programs
Awards
* Named a Top Workplace in 2024 by The Cincinnati Enquirer
* Recognized by Forbes as one of America's Most Successful Midsize Companies in 2021, 2022, 2023 and 2024
* Continually recognized with CRO Leadership Awards from Life Science Leader magazine based on expertise, quality, capabilities, reliability, and compatibility
What to Expect Next
A Medpace team member will review your qualifications and, if interested, you will be contacted with details for next steps.
Auto-ApplyInformation System Security Officer (ISSO)
Security engineer job in Dayton, OH
ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Why Work with us?â¯
âApplied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.â¯Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.â¯â¯
Responsibilities:
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
Report all security-related incidents to the ISSM
Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
Serve as member of the CCB, if designated by the ISSM;
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Responsibilities:
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or related
field
5-8 years demonstrated performance in related technology
Top Secret w/ SCI eligibility
Other duties as assigned
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Cyber Security Engineer
Security engineer job in Miamisburg, OH
WilmerHale is a leading, full-service international law firm with 1,000 lawyers located throughout 12 offices in the United States, Europe and Asia. Our lawyers work at the intersection of government, technology and business, and we remain committed to our guiding principles of providing quality, excellent legal and client services; developing diversity among our lawyers and staff and cultivating an environment that promotes an ambitious spirit, collaboration and collegiality by drawing on the extraordinary talents and dynamic experience of our lawyers. Our goal is to reflect the diversity of our clients and the communities in which we practice.
Serves as the expert providing solutions and services to defense against malicious threats by delivering foundational security solutions and services. The role must identify evolving trends, weakness, and vulnerabilities and craft robust countermeasures to prevent malicious attacks. The role develops, implements, and supervises cybersecurity technology solutions and Tier I, II and III security operation center (SOC) contracted services to protect information resources, services, infrastructure, and endpoint solutions. The role must design and implement cybersecurity strategies and contribute to comprehensive cybersecurity architecture. The expert identifies, defines, and documents system security requirements and recommends solutions to senior management. Additionally, the role configures, troubleshoots, and maintains security infrastructure software and hardware in coordination with IT infrastructure, application, help desk and endpoint management functional groups.
The person leads in monitoring systems for irregular behavior and sets up preventive measures. In partnership with the Director of Information Security, the person plans, develops, implements, and updates the firm's information security strategy. The expert investigates and analyzes all response activities related to cybersecurity incidents within the IT enterprise and external party systems and services. The expert collects data/logs/events/alerts from a variety of IT systems and tools including intrusion detection/prevention, insider threat, data loss prevention, endpoint detection response, firewall, antivirus, email security gateway, infrastructure, and host systems to analyze events that occur across the information technology enterprise and Internet interface.
About This Role
* Detect, identify, report, respond, and recover from possible malicious attacks/intrusions, anomalous and misuse activities.
* Administer technologies that directly support cybersecurity and the protection of firm information technology systems, services, data resources, and firm/client data.
* Provides cybersecurity operational support for identity and access, access control, endpoint protection, firewalls, intrusion detection, network controls, software patch, endpoint, and vulnerability management
* Provides cybersecurity operational support to service tickets, reporting and dashboard reporting
* Regularly audits and reviews the technical configuration and operational policies of information security tools and work with governance, risk and compliance (GRC) personnel and auditors to ensure compliance across firm systems.
* Recommends and implements mitigation actions in response to sophisticated information security vulnerabilities and risk mitigation concepts based on the analysis and ISO 27001 and NIST guidance
* Performs scripting and information analysis in general support of firm technology infrastructure. Perform initial, forensically sound collection of log data and security events to support security event investigation and analysis.
* Provides options for persistent monitoring of all designated networks, enclaves, and systems.
* Coordinate and support information security remediation projects and plan-of-action activities to ensure they are efficiently implemented across Information Services departments and report on progress to management.
* Lead the analysis of alerts, notifications, events, and log entries from several sources including Security information and event management (SIEM), endpoint Detection and Response (EDR) tools and Manages Security Service providers (MSSP) and correlates incident data to identify specific vulnerabilities and appropriate remediations.
* Leads contractors to complete network, system, or application vulnerability assessments and penetration testing using reverse engineering techniques to analyze impacts to firm systems.
* Evaluate system security configurations and provide recommendations for the remediation of weaknesses though technical or non-technical changes that improve the security posture of the firm.
* Coordinate cyber defense and incident triage, to include ascertaining scope, vitality, and potential impact, identifying the specific vulnerability, and making recommendations that enable immediate and complete remediations and threat mitigation.
Required Skills
Your Qualifications/What You Will Bring
* Demonstrated problem solving abilities, analytical skills, and demonstrable ability to meet ambitious deadlines required.
* Makes logical conclusions, anticipates obstacles, and considers different approaches that are relevant to the decision-making process.
* Ability to lead as part of a cybersecurity threat response team, with coordination of efforts between internal IT groups and contractors.
* Experience with the use and development of a Splunk security incident and event management system (SIEM), DLP solutions, UEBA tools, and host/network forensic solutions.
* Authority in the fundamentals of quantitative and qualitative risk scoring, threat analysis, and threat modeling.
* Experience and work knowledge of MITRE ATT&CK/D3FEND, NIST and Center for Internet Security (CIS) standards and frameworks.
* Experience with MS Windows Active Directory (AD) and Azure AD security monitoring.
* Proven experience with custom scripting and Python for log analysis, data collection, and the production of security reports and dashboards.
* Effectively meets challenges, influences, and drives consensus within the team.
* Proven interpersonal and written communication skills.
Required Experience
Experience
* 6+ years or more work experience required supporting information security in a large and sophisticated environment or other equivalent combination of education and experience that provides the required knowledge and skills. Extensive experience in crafting cyber security solutions including cloud security configuration, computer network defense tools, incident response, threat assessment, and use of security event and information management technologies.
* 1+ years of AI experience in large, complex environments, including experience completing an AI implementation.
Education
* Bachelor's degree in computer science, information security, or related field; or equitable work experience.
* Security certification (e.g., CISSP, CEH, CompTIA Security+) preferred.
This job description is intended to describe the general nature and level of the work being performed by employees in the position. It is not intended to be a complete list of all responsibilities, duties, and skills for positions. The firm reserves the right at all times, in its sole discretion, to add or subtract duties and responsibilities, as it deems necessary.
Wilmer Cutler Pickering Hale and Dorr LLP (WilmerHale) is an equal opportunity employer and is committed to compliance with all applicable laws prohibiting employment discrimination. It is our policy to take all employment actions and make all employment decisions without regard to race, color, religion, creed, gender, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, ancestry, age, marital status, citizenship status, genetic predisposition or carrier status, disability, military status, status as a disabled or other protected veteran, or any other protected status under applicable law. WilmerHale will make reasonable accommodations for qualified individuals with disabilities and otherwise as required by applicable law.
For more information about Equal Employment Opportunity, please click here.
For additional information about our benefits, please click here.
Job Location Miamisburg, Ohio, United States Position Type Full-Time/Regular
Information Security Analyst (On-Site Position)
Security engineer job in Cincinnati, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE **
At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
Competitive Compensation: Enjoy annual merit increases and bonuses.
Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
Secure Your Future: 401K plan and profit-sharing opportunities.
Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects.
Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
Bachelor's degree in Cybersecurity, Information Technology, or a related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (e.g., NIST, ISO 27001).
Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
Strong analytical and investigative mindset.
Clear, confident communication and collaboration skills.
Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Qualifications Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
Auto-ApplyComputer & Information Security Analyst 2
Security engineer job in Cincinnati, OH
This position will primarily be responsible for monitoring and analyzing security alerts using our Security Information and Event Management (SIEM) platform, conducting regular vulnerability assessments and configuration compliance scans, managing email security measures, and providing technical support for various cybersecurity tools as needed.
Responsibilities
Monitor and analyze security alerts using the SIEM system and other specialized monitoring tools.
Triage and investigate potential cybersecurity incidents, prioritizing threats based on severity and potential impact on the system.
Conduct a thorough investigation of security violations and incidents, collaborating with other team members and/or escalating to manager as necessary.
Conduct regular vulnerability assessments and configuration compliance scans across internal and external networks.
Collaborate with cross-functional IT teams on vulnerability remediation efforts and address configuration baseline deviations, ensuring timely resolution and improved security posture.
Monitor and analyze email security systems, including user-reported phishing attempts. Perform appropriate investigation and remediation actions as necessary.
Identify and develop ways to improve the efficiency of security, network, and application log monitoring.
Provide technical and end-user support for cybersecurity tools as needed.
Qualifications
Bachelors degree in technology-related field and 2-4 years of job-related experience. An equivalent combination of education and experience requiring similar knowledge, skills, abilities, and performing duties as described may be substituted for the minimum requirements.
Experience conducting vulnerability scanning and assessments using tools like Nessus Professional and Qualys.
Familiarity with cybersecurity frameworks and standards, such as National Institute of Standards and Technology (NIST) SP 800-53, NIST SP 800-171, and NIST cybersecurity framework is preferred.
Experience with configuration baselines such as Center for Internet Security (CIS) Benchmarks and Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGS) is preferred.
Fundamental networking knowledge, such as TCP/IP and common protocols (HTTP, HTTPS, FTP, SSH, DNS, etc.).
Fundamental understanding of firewalls, intrusion detection/prevention systems (IDS/IPS), data loss prevention (DLP), endpoint antivirus, and email security.
Ability to read and interpret various system and security logs, such as Windows Event Logs, firewall logs, antivirus logs, email security/filtering logs, and IDS/IPS logs is required.
Basic knowledge of SIEM systems such as LogRhythm, QRadar, Splunk, ELK stack, etc.
Must have good verbal and written communication skills.
Must be able to clearly document findings, incidents, and procedures.
Must be able to pass a National Agency Check with Inquiries (NACI/Tier 1) background check.
Working Place: Cincinnati, Ohio, United States Company : ORAU- Oct 29th Virtual Fair
Information Security Analyst 2
Security engineer job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Information Security Analyst 2**
**Job Duties**
+ Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's).
+ Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines.
+ Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
+ Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned.
**Minimum Qualifications**
+ 2-4 years related experience
+ Associate's degree (Information Technology, Cyber Security, Computer Science)
+ Non-degree considered if 6+ years of related experience along with a high school diploma (GED)
**Preferred Qualifications**
Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Senior Offensive Security Engineer, Red Team
Security engineer job in Cincinnati, OH
Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands.
From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded.
The Opportunity
Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world's most advanced cyber security adversaries?
The Information Security Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise.
Responsibilities:
+ Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR.
+ Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes.
+ Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails).
+ Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC.
+ Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership.
+ Mentor junior engineers; set standards for craft quality, methodology, and safety.
+ Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment.
+ Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use.
+ Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management.
Job Qualifications
Required:
+ BA or BS degree in Information Security, Cyber Security, Computer Science, or related field (OR 7+ years of relevant experience required in lieu of a degree).
+ 5+ years running offensive or emulation operations in large/complex environments, with demonstrated impact on detections/response.
+ Expertise across 2+ domains: enterprise/web/mobile apps; identity; cloud (AWS/GCP/Azure); network/endpoint; IoT/OT; or directory services.
+ Proven ability to bypass preventative/detective controls and reach mission objectives while maintaining safety and ROE.
+ Strong engineering skills (Python, PowerShell, GO, C++, Web Frameworks); comfort with low-level concepts a plus) and familiarity with C2 tradecraft.
+ Deep command of MITRE ATT&CK and threat-informed defense; history partnering with DFIR/SOC and Detection Engineering.
+ Excellent executive and technical communication.
+ Ability to work in Cincinnati, Ohio based office 3 days per week.
Preferred:
+ Leadership of purple-team campaigns and incident-driven emulations; closed-loop improvements with measurable KPI movement.
+ Building program metrics/KPIs, standardizing reporting, and integrating with risk governance.
+ Threat-intel integration: actor/campaign analysis, hypothesis generation, and prioritization tied to business impact.
+ Identity and cloud attack paths (SSO, MFA, OAuth, PAM; AWS/GCP/Azure control planes) with hardening collaboration across platform/IDAM teams.
+ Coordinating large third-party exercises and setting complex ROE.
Pay Range: $110,000 - $165,000
Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process.
Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE (******************************************************* .
P&G participates in e-verify as required by law.
Qualified individuals will not be disadvantaged based on being unemployed.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Job Schedule
Full time
Job Number
R000138781
Job Segmentation
Experienced Professionals
Starting Pay / Salary Range
$110,000.00 - $165,000.00 / year
Information Security Compliance Analyst
Security engineer job in Dayton, OH
":"As an Information Security Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cyber security assessments, help raise security awareness of associates, provide guidance on industry standard cyber security requirements, and track on-going activities that help meet our security and compliance goals.
If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Information Security Compliance Analyst","date":"2025-11-04","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Job Title: Information Security Engineer - Vulnerability Management III
Security engineer job in Cincinnati, OH
TOP SKILLS:
Must Have
Brinq
Excellent communication and presentation skills, and a proven background of presenting to senior leaders, large groups, etc. on relevant matters pertaining to large projects and impacting key functionality.
Lead and Implementation Experience
Performing referral to principle
proven consistent experience in vulnerability management, security engineering, security consulting etc
Proven experience with proactive threat management, research, escalation, discovery etc.
Security
Solid understanding of popular security tooling and understanding of security architecture/interconnectedness of processes and tooling.
Nice To Have
CISSP, CISA, CISM, AWS Solutions Architect certifications
GRC/audit management experience
Scripting/automation experience - python preferred
Solid proven experience with tooling such as Qualys, Brinqa, Archer, ServiceNOW, Checkmarx, Prisma (and any AWS experience is great as well)
What You'll Do
Responsible for performing all functions required to support day-to-day data security operations and accountable for security and networking infrastructure component availability and integrity, monitoring compliance with IT security policy, and coordinating investigation and reporting of security incidents.
Primary Responsibilities:
Define, deliver, and support enterprise security tools and architecture in collaboration with other teams.
Enhance the Bank's network vulnerability management program for in-scope subsidiaries and affiliates.
Define security environments and lead the implementation and onboarding of new applications, programs, processes, projects, and initiatives into the Enterprise Vulnerability Management Program.
Communicate, escalate, support, and guide the resolution of open vulnerabilities, including infrastructure, application security, and configuration management vulnerabilities.
Conduct security research on threats and remediation techniques/technology, make recommendations to IS/IT teams, and oversee their implementation.
Proactively monitor and investigate security alerts from managed security service providers and in-house security tools.
Conduct risk assessments to evaluate the effectiveness of existing controls and determine the impact of proposed changes to business processes, applications, and systems.
Support ad hoc requests for reporting and control evidence, as needed.
Perform threat analysis and incident response by interpreting events.
Support the Bank's operational information security responsibilities, including developing and maintaining standards, procedures, and guidelines for the Enterprise Vulnerability Management Program.
Share knowledge and industry best practices with team members.
Serve as a security engineer/consultant on projects.
What You'll Get
Competitive base salary
Medical, dental, and vision insurance coverage
Optional life and disability insurance provided
401(k) with a company match and optional profit sharing
Paid vacation time
Paid Bench time
Training allowance offering
You'll be eligible to earn referral bonuses!
All done!
Your application has been successfully submitted!
Other jobs
Information System Security Engineer (ISSE)
Security engineer job in Dayton, OH
ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
**Why Work with us?**
Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.
**Responsibilities:**
+ Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.
+ Automate threat assessment and reporting activities.
+ Analyze and report system and organizational security posture trends to the ISSM/ISSO.
+ Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
+ Plan and recommend modifications or adjustments based on exercise results.
+ Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM
+ Audit support responsibilities
+ Analyze and report organizational security posture trends to the ISSM/ISSO
+ Analyze and report system security posture trends to the ISSM/ISSO
+ Apply security policies to meet security objectives of the system to the ISSM/ISSO
+ Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO
+ Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO
+ Assess the effectiveness of security controls and reports findings to the ISSM
+ Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements
+ Ensure all systems security operations and maintenance activities are properly documented and updated as necessary
+ Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM
+ Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation
+ Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM
+ Plan and recommend modifications or adjustments based on exercise results or system environment
+ Properly document all systems security implementation, operations and maintenance activities and updates necessary
+ Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities
+ Verify and update security documentation reflecting the application/system security design features
+ Verify minimum security requirements are in place for all applications
+ Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data
+ Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements
+ Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents
+ Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective
+ Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks
+ Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident
+ Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package
+ Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks.
+ Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system.
+ Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum
+ Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum
+ Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures
+ Monitors and investigates security breaches
+ Educates employees or clients about security procedures and programs
+ Other duties as assigned
**Requirements:**
+ Must be a US citizen
+ Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
+ Security+ Certification
+ 5+ years related experience in SCI/SAP environments.
+ Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.
+ 8-12 years demonstrated performance in related technology.
Minimum Security Clearance Required
+ Top Secret w/ SCI eligibility
Additional or Preferred Qualifications
+ 5+ years leadership experience in relevant area of business.
+ Technical certifications in Azure
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
Information Security Analyst (On-Site Position)
Security engineer job in Miamisburg, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE **
At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
Competitive Compensation: Enjoy annual merit increases and bonuses.
Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
Secure Your Future: 401K plan and profit-sharing opportunities.
Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects.
Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
Bachelor's degree in Cybersecurity, Information Technology, or a related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (e.g., NIST, ISO 27001).
Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
Strong analytical and investigative mindset.
Clear, confident communication and collaboration skills.
Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Qualifications Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
Auto-Apply