Post job

Security engineer jobs in Englewood, OH

- 128 jobs
All
Security Engineer
Information Systems Engineer
Information Security Analyst
Securities Analyst
Security Architect
Information Systems Security Manager
Defense Analyst
Network Security Consultant
Cyber Security Analyst
Information Systems Security Officer
Information Security Manager
Cyber Security Specialist
Security System Engineer
  • Entry Level Cyber Security Analyst

    Reynolds and Reynolds Company 4.3company rating

    Security engineer job in Dayton, OH

    ":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks. You must also be able to communicate your findings and recommendations for management. You will work with teams across the organization including partnering with IT and Software Development on security related matters. If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance. We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off. At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center. We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation. Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment. Reynolds and Reynolds is an equal opportunity employer. ","
    $85k-110k yearly est. 60d+ ago
  • Cybersecurity and Network Protection SME

    Jmark Services 4.1company rating

    Security engineer job in Dayton, OH

    Cybersecurity and Network Protection SME Clearance Required: TS/SCI (active) Inc. At JMark Services Inc., we are committed to securing the mission. As a trusted partner to the Department of Defense and Intelligence Community, we specialize in cybersecurity, information assurance, and technical operations that protect critical systems and national interests. Our teams thrive at the intersection of innovation and accountability-where every decision matters. Position Title: Cybersecurity and Network Protection SME JMark is seeking a highly skilled Cybersecurity and Network Protection SME to support advanced cybersecurity assessment and compliance operations at Wright-Patterson AFB. In this role, you will lead risk evaluations, validate system security requirements, and play a critical part in maintaining secure, mission-ready environments across classified networks and platforms. Working under minimal supervision, you'll bring deep technical experience and policy fluency to a dynamic, mission-driven team. Key Responsibilities: Plan and conduct compliance audits and vulnerability assessments of systems and networks. Identify deviations from security standards and recommend corrective actions. Support risk mitigation strategies and ensure compliance with certification and accreditation processes. Assist in implementation of government policies such as NISPOM and DCID 6/3; recommend tailored improvements. Provide process, analysis, coordination, and documentation support for secure system operations. Conduct security certification test planning, participation, and reporting (ST&E). Perform hardware/software security research and support secure tech integration and release. Review system audits and track corrective actions through closure. Collaborate with stakeholders across technical, policy, and leadership levels. Required Qualifications: Bachelor's degree in Engineering, Computer Science, Information Technology, or a related field. Minimum of 10 years of relevant cybersecurity or information assurance experience. Strong understanding of vulnerability assessments, ST&E, and certification/accreditation frameworks. Experience applying federal security guidelines (NIST, STIGs, NISPOM, DCID 6/3, RMF). Exceptional problem-solving, organizational, and technical writing skills. Active TS/SCI clearance is required. Why Join JMark? Tackle real-world cybersecurity challenges that protect national defense systems Collaborate with high-caliber experts in a mission-critical environment Enjoy growth opportunities and technical leadership roles Competitive compensation, full benefits, and a values-driven culture Secure infrastructure. Reduce risk. Lead with integrity. Apply now to become a Cybersecurity and Network Protection SME at JMark Services Inc. - Wright-Patterson AFB.
    $71k-96k yearly est. 60d+ ago
  • Computer Network Defense Analyst

    Prime Time Consulting 4.5company rating

    Security engineer job in Dayton, OH

    Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Ohio, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Duties Conduct computer network defense. Conduct target development for use or decision by Government personnel. Analyze and produce intelligence information. Conduct computer/network security to provide advice to the Government. Create and maintain documentation of their analysis. Ensure to routinely follow oversight and compliance Acquire/share job knowledge/skill Partner with team members on the contract, including government personnel and other partner companies Qualifications Degree in Computer Science or equivalent technical field Level 1 - 6 years of experience can replace 2 years of experience with AA degree Level 2 - 9 years of experience can replace 4 years of experience with BS degree Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree Strong communication skills Works well in a team and alone Working knowledge of Microsoft Office Suite Company Perks At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance. Robust health plan including medical, dental, and vision Health Savings Account with company contribution Annual Paid Time Off and Paid Holidays Paid Parental Leave 401k with generous company match Training and Development Opportunities Award Programs Variety of Company Sponsored Events Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email [email protected] with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $49k-72k yearly est. Auto-Apply 35d ago
  • Infrastructure Security Analyst

    Versiti 4.3company rating

    Security engineer job in Dayton, OH

    Versiti is a fusion of donors, scientific curiosity, and precision medicine that recognize the gifts of blood and life are precious. We are home to the world-renowned Blood Research Institute, we enable life saving gifts from our donors, and provide the science behind the medicine through our diagnostic laboratories. Versiti brings together outstanding minds with unparalleled experience in transfusion medicine, transplantation, stem cells and cellular therapies, oncology and genomics, diagnostic lab services, and medical and scientific expertise. This combination of skill and knowledge results in improved patient outcomes, higher quality services and reduced cost of care for hospitals, blood centers, hospital systems, research and educational institutions, and other health care providers. At Versiti, we are passionate about improving the lives of patients and helping our healthcare partners thrive. Position Summary The Infrastructure Security Analyst will play a critical role in ensuring the security and integrity of our IT systems and networks. This position involves a balanced focus on IT Systems and Network Support and Cybersecurity with a concentration on Vulnerability Management. The ideal candidate will possess both technical expertise and strong analytical skills to identify, mitigate, and manage vulnerabilities while supporting the overall IT infrastructure. The candidate will thrive in a dynamic, team-oriented environment, where knowledge sharing, and continuous learning are encouraged. As an integral part of our collaborative team, the Infrastructure Security Analyst will work closely with various IT departments, including network operations, system administration, and application development. This role includes direct collaboration with the Senior Cybersecurity Engineer to ensure thorough analysis, identification, and mitigation of infrastructure vulnerabilities. Together, the team will address evolving cyber threats, communicate complex security concepts to stakeholders across all levels, and promote an organization-wide security culture while supporting Versiti's business and operational goals. This position values teamwork, encouraging information sharing and joint problem-solving to fortify the organization's defenses. This role is essential in building a resilient IT infrastructure that can adapt to evolving threats while supporting the organization's business objectives. Total Rewards Package Benefits Versiti provides a comprehensive benefits package based on your job classification. Full-time regular employees are eligible for Medical, Dental, and Vision Plans, Paid Time Off (PTO) and Holidays, Short- and Long-term disability, life insurance, 7% match dollar for dollar 401(k), voluntary programs, discount programs, others. Responsibilities Provide technical support for IT infrastructure, including servers, networks, and cloud services. Monitor system performance, troubleshoot issues, and perform regular maintenance on IT systems and document system configurations, changes, and procedures for future reference and compliance audits. Collaborate with IT teams to implement and maintain secure network configurations and ensure compliance with organizational policies while assisting in the deployment and configuration of hardware and software as needed. Respond to and resolve service requests and incidents in a timely manner. Conduct regular vulnerability assessments and penetration testing to identify security weaknesses within IT systems and networks and collaborate with IT teams to develop and implement mitigation strategies for identified vulnerabilities. Analyze vulnerability scan reports and prioritize remediation efforts based on risk assessment and monitor security alerts and incidents, responding to security breaches or threats as necessary. Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and trends. Utilize threat intelligence feeds and monitoring tools to proactively identify and mitigate potential security threats. Provide recommendations for security improvements and help implement new security controls. Performs other duties as required or assigned which are reasonably within the scope of the duties in this job classification Understands and performs in accordance with all applicable regulatory and compliance requirements Complies with all standard operating policies and procedures Qualifications Education Bachelor's Degree Computer Science, Information Technology, Cybersecurity, or a related field preferred Experience 4-6 years Demonstrated experience installing, managing and troubleshooting Linux and/or Microsoft Server environments. required 4-6 years Experience with Enterprise Data Center Server and Network environments. required 4-6 years Experience in conducting vulnerability assessments and penetration testing. required Demonstrated experience with VMware Server and storage management. preferred Knowledge, Skills and Abilities Understanding of patch management processes and tools required Knowledge of common security frameworks (e.g., NIST, ISO 27001, CIS Controls) required Strong analytical and problem-solving skills. required Excellent communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders. required Strong attention to detail and ability to work independently as well as part of a team. required Experience with ticketing systems and IT service management processes. required Familiarity with scripting languages (e.g., PowerShell, Python). preferred Licenses and Certifications Certified Ethical Hacker (CEH) desired CISSP Certified Information Systems Security Professional desired Microsoft Certified Systems Engineer (MCSE) preferred Microsoft Certified Systems Administrator (MCSA) preferred CompTIA Network+ Certification preferred CompTIA Security+ Certification preferred Tools and Technology Proficiency in network protocols, firewalls, VPNs, and security appliances. required Knowledge of operating systems (Windows, Linux) and cloud environments (AWS, Azure). required Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). preferred Experience with container technologies (e.g., Docker, Kubernetes) preferred Familiarity with threat intelligence and incident response processes. preferred #LI-EH1 #LI-Hybrid Not ready to apply? Connect with us for general consideration.
    $66k-97k yearly est. Auto-Apply 7d ago
  • Information Systems Security Officer (ISSO) III

    GDIT

    Security engineer job in Dayton, OH

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: None Experience: 5 + years of related experience US Citizenship Required: Yes Job Description: The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities. Prepare, review, and update authorization packages. Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. Notify ISSM when changes occur that might affect the authorization determination of the information system(s). Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change. Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure all IS security-related documentation is current and accessible to properly authorized individuals. Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties. Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans. Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them. Prepare reports on the status of security safeguards applied to computer systems. Perform ISSO duties in support of in-house and external customers. Conduct continuous monitoring activities for authorization boundaries under your preview. Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts. Experience: 5+ years related experience. 2+ years SAP experience required. Prior performance in roles such as System, Network Administrator or ISSO. Education: Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years) Certifications: IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire Clearance Required to Start: TS/SCI required Must be able to Attain - TS/SCI with CI Polygraph #AirforceSAPOpportunities The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA OH Dayton Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $92.7k-125.5k yearly Auto-Apply 7d ago
  • Systems Security Engineer

    Modern Technology Solutions, Inc. 4.6company rating

    Security engineer job in Wright-Patterson Air Force Base, OH

    Apply an understanding of DoD, Air Force and common engineering/scientific principles, processes and procedures to improve performance and sustainability of existing and future weapon systems. Translate user requirements into weapon system requirements which will be used to design, develop, fabricate, test and evaluate weapon systems, subsystems and equipment for eventual fielding and deployment. Perform technical/mission analyses of existing and future operational requirements, assist in developing systems concepts and perform technical trade-off assessments of designs/modifications. Develop and maintain Risk Management Framework documentation necessary to obtain Authorizations including but not limited to the System Security Plan (SSP), Architecture Analysis Report (AAR), Continuous Monitoring Plan, Security Control Traceability Matrix (SCTM), Security Assessment Report (SAR) and Risk Assessment Report (RAR). Provide support to produce or review technical documentation for acquisition programs including Cybersecurity Strategy, Test and Evaluation Master Plan (TEMP), Clinger-Cohen Act Compliance, Capabilities Development Document, Concept of Operations and more. Support system engineering and program management in conducting and reviewing milestone documentation including System Requirements Review (SRR), Preliminary Design Reviews (PDR), Critical Design Reviews (CDR) and Program Management Reviews (PMR). Perform information system security engineering tasks, ensuring that information security requirements are properly implemented throughout the processes of security architecture, design, development, configuration, and implementation. Develop, implement, and enforce information systems security policies ensuring system security requirements are addressed during all phases of the acquisition and Information System lifecycle. Review, analyze and validate system security designs within embedded avionics systems to validate security control and architecture implementations Conduct Assessment & Authorization (A&A) tasks in accordance with the Risk Management Framework (RMF) and National Institute of Standards and Technology (NIST) policy; identify deficiencies and provide recommendations of risk mitigation to program management. Employ best practices when implementing security controls, including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels Assist program managers, system engineers and cyber test engineers in conducting Mission Based Cyber Risk Assessments Identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies Apply knowledge of cybersecurity policy, procedures, and workforce structure to implement secure networking, computing, and enclave environments Identify system and/or network designs that encompass multiple enclaves to include those with differing data protection/classification requirements REQUIRED: Education: BS degree from an accredited university including classes in Computer Science, Cybersecurity, Electrical/Electronics/Systems/Computer Engineering, or related field. Experience: 5+ years of experience in systems security architecture or engineering, ideally within a government or DoD environment. Certifications: Relevant certifications related to a Security Architect in accordance with DoD 8140 (CISSP, CISM, CCSP). Knowledge: Deep understanding of cybersecurity frameworks (NIST) and standards, RMF, DISA STIGs, and system accreditation processes. Technical Skills: Expertise with security concerns in avionics, embedded systems, Operational Technology and Supervisory Control and Data Acquisition systems. Familiarity with network security, firewalls, intrusion detection/prevention systems, secure coding practices, and vulnerability scanning tools. Must possess an active Top Secret clearance with eligibility for SCI. Experience with government contracting and DoD security program management.
    $56k-72k yearly est. Auto-Apply 13d ago
  • Information Systems Security Engineer (ISSE)

    Tlingit Haida Tribal Business Corporation

    Security engineer job in Dayton, OH

    Job Description Subsidiary: KIRA Information Solutions Job Title: Information System Security Engineer (ISSE) Job Location: Hybrid-Position working with Wright-Patterson Air Force Base, Dayton, OH Labor Category: Exempt Clearance Requirement: Secret Clearance, if required In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer Travel Requirement: Minimal, as needed Salary: $120,000- $180,000 Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide. THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Scope of Work: This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision. Essential duties: The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE [RD2] [KG3] assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows. The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. Required qualifications: Bachelor's degree in engineering, science, mathematics, or a related field. Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises. Five years' experience in information technology management. Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II). U.S. citizenship. Preferred qualifications: Bachelor's degree in Computer Science or Information Management. Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices. Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.). Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities. Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth). Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability. To perform this job successfully, an individual must be able to perform all the essential duties of the position satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions. May be required to obtain and maintain a security clearance, including successfully completing a thorough background investigation. If you need reasonable accommodations for any part of the employment process, please contact us and let us know the nature of your request. Requests for accommodation will be considered on a case-by-case basis. Program Details: This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. ETIMS is the Air Force System of Record for Technical Order (TO) management and is the Air Force's Enterprise Defense Business System (DBS) for managing TOs. TOs are military orders containing the authoritative procedures and instructions for operating and maintaining all U.S. Department of the Air Force equipment and systems. ETIMS supports ~178,000 users at ~385 sites worldwide. It also supports ~60,000 eTOs, 54,000 ETIMS eTools, 14,000 paper TOs, and more than 13,000 TO libraries across the Air Force Enterprise. Agencies that rely on ETIMS for Air Force-related TOs and Computer Program Identification Numbers (CPINs) include the Army, Navy, Marines, Coast Guard, Foreign Military Sales (FMS), the National Aeronautics and Space Administration (NASA), The White House, and numerous Military Industrial Complex partners. ETIMS provides access to the official TO cataloging, managing, storing, distributing, and viewing capabilities needed by the operators and maintainers to support all Air Force weapon systems and equipment items. ETIMS is a cloud-based enterprise system hosting Java and Windows applications accessing Oracle database in the AWS environment. The ETIMS migration to the Amazon Web Services (AWS) Air Force Cloud 1 environment and leveraging Agile Principles allows for processes to mature across the user community and enables streamlining and process improvement realized by the rapid delivery of follow-on capabilities. ETIMS has been modernized over the years to provide a fully capable Air Force enterprise TO Management system. The Government Program Office is located at Wright Patterson Air Force Base in Dayton, Ohio. The development and support team are geographically dispersed and teleworking our daily working protocol.
    $120k-180k yearly 24d ago
  • Security Analyst - Indefinite US Work Authorization Required

    Crown Equipment Corporation 4.8company rating

    Security engineer job in New Bremen, OH

    : Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership. **Job Posting External** **Primary Responsibilities:** + Lead the design and implementation of SIEM correlation rules and alert logic to detect advanced threats and suspicious behaviors. + Build and optimize SOAR playbooks to automate multi-step incident response actions. + Continuously tune alert thresholds and logic to reduce false positives and improve detection accuracy. + Integrate threat intelligence feeds into SIEM and SOAR platforms to enhance alert context and prioritization. + Investigate and respond to alerts, coordinating with IT, MDR, and security teams to validate and remediate incidents. + Maintain documentation for alert logic, playbook workflows, and incident handling procedures. + Mentor junior analysts on alert development, tuning, and automation best practices. + Participate in an on-call rotation to support timely response to critical alerts and incidents. **Minimum Qualifications:** + High school diploma or equivalent is required. + Familiarity with SIEM platforms and basic alert logic. + Experience with scripting languages such as PowerShell or Python. + Understanding of cybersecurity fundamentals, including threat types and detection techniques. + 1+ years of experience in cybersecurity or a related field. + Strong analytical and problem-solving skills. + Willingness to participate in an on-call rotation. **Preferred Qualifications:** + Bachelor's degree in cybersecurity, computer science, information technology, or a related field. + Exposure to SOAR platforms and basic playbook development. + Experience working with third-party MDR or managed security service providers. + Certification such as Security+, GSEC, or CEH. + Familiarity with threat intelligence sources and enrichment techniques. + Understanding of compliance frameworks such as NIST CSF or ISO 27001. **Work Authorization:** Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire. No agency calls please. **Compensation and Benefits:** Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more. EOE Veterans/Disabilities
    $80k-101k yearly est. 60d+ ago
  • Cyber Security Specialist

    Interactive Process Technology 4.1company rating

    Security engineer job in Kettering, OH

    Kettering, OH/Remote IPTA's Technology Solutions Team is passionate about providing our customers with technical solutions that satisfy their business needs. Through collaborative interactions with customers, team members, subject matter experts (SMEs), technical leaders, and partners we design practical solutions that solve real problems for major government and business organizations. As a member of our Technology Solutions group, you will work with a team of technologists focused on delivering innovative business solutions using emerging technologies through proven successful methods. Our Team: We are looking for talented people who are enthusiastic about applying technology to deliver innovative outcomes with "fierce determination, fearless integrity, and passionate service." Our belief is that our people are the key to success. By encouraging and enabling continued learning, our team members grow to achieve their personal career goals. We are looking for: Smart people with a passion for technology Ability to solve challenging business problems Self-directed professionals Hunger to continually learn and grow Responsibilities: Identifies and resolves highly complex issues to prevent cyber attacks on information systems and to keep computer information systems secure from interruption of service, intellectual property theft, network viruses, data mining, financial theft, and theft of sensitive customer data, allowing business to continue as normal. Designs, installs, and manages security mechanisms that protect networks and information systems against hackers, breaches, viruses, and spyware. Responds to incidents, investigates violations, and recommends enhancements to plug potential security gaps. Analyzes data to spot trends, and creates tools to support research efforts. Mitigates threats by gathering information and developing plans, and monitors networks for security breaches. Develops best practices and security standards, and trains users on security protocols. Creates and tests disaster recovery procedures to keep IT running in the event of a security breach. Researches data, learns about new technologies, and gathers information on the latest risks. Utilizes specialized expertise, up-to-date knowledge, and proficiency in analysis, forensics, and reverse engineering to monitor and diagnose malware events and vulnerability issues resulting in web threats that facilitate cyber crime, including malware, phishing, viruses, denial-of-service attacks, information warfare, and hacking. Makes recommendations for solutions, including hardware and software programs that can help mitigate risk. Designs firewalls, monitors use of data files, and regulates access to safeguard information and protect the network. Keeps up-to-date on current virus reports, and protects networks from these viruses. Trains users, promotes security awareness, develops policies and procedures, and provides updates and reports to management and executive staff. Requirements: Bachelor's degree in a related field Eight (8) years of prior experience in a similar role DoD 8570 Level II/II certification required Active Security Clearance Required IPTA is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment opportunity to all qualified employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, religion, sex, sexual orientation, national origin, age, physical disability, mental disability, medical condition, status as a veteran or disabled veteran or any other characteristic protected by law. We base all employment decisions, including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, returns from lay-off, terminations, and social and recreational programs on the principles of equal employment opportunity. Our employees have diverse backgrounds, skills, and ideas that collectively contribute to a rich working environment and greater opportunity for innovation.
    $69k-93k yearly est. 12d ago
  • Manager, Information Security

    Wright-Patt Credit Union 3.9company rating

    Security engineer job in Beavercreek, OH

    The Manager, Information Security is responsible for implementing and executing WPCU's Information Security program and strategies under the leadership of the VP, Information Security. This role will collaborate with all lines of business through projects, risk assessments, controls, and control effectiveness reviews. The manager will oversee tools utilized by the Information Security team to provide feedback on vendors and applications. Position will be responsible for collaboration with various business units during a data incident to ensure incidents are properly documented and evidence is captured. This role will be expected to provide thought leadership to ensure the efficiency and effectiveness of the Information Security team. The major activities for this position include: 1) Information Security Operations (40%) a) Develop and oversee control effectiveness reviews to ensure all activities align in scope and frequency with information security policies and approved information security frameworks. b) Develop and oversee information security's involvement with vendor due diligence processes. c) Develop and oversee Identity Access Governance processes to ensure alignment with the principle of least privilege access. d) Develop and oversee information security related risk assessments. Develop and oversee processes to rate criticality of applications and controls to ensure risk assessments are aligned. e) Ensure all assessments are completed in a timely manner including developing appropriate cross training plans to schedule impacts. f) Develop and oversee reporting related to all assessments to ensure risk levels are appropriately assigned and management responses are captured. g) Ensure identified gaps from information security assessments are appropriately tracked. Coordinate with various business units to collect timely updates. 2) Personnel Management & Procedures (20%) a) Mentor assigned partners by administering individual development plans, making recommendations for promotions, or implementing coaching plans. This includes performing regular 1-on-1s with partners and completing annual reviews. b) Ensure departmental procedures are effective, up-to-date, and follow company standards. 3) Project Management (20%) a) Participate in project planning events to provide estimated work effort for projects including pro-active escalation of resources constraints to the VP of Information Security. b) Assist in fostering an enterprise-wide security first culture by participating in project requirement gathering session. Inform project owners of applicable controls, audit findings, or control effectiveness gaps that are appropriate for the project. c) Attend on-going project meetings to advise and ensure information security controls are addressed. 4) Incident Management (10%) a) Role will be responsible for ensuring data incidents are tracked, properly documented, and evidence has been collected. b) Provide regular status updates to the VP of Information Security on open data incidents. 5) Audit and Regulatory Exam Support (10%) a) Assist the Vice President of Information Security with internal and external audits to ensure document collections are completed in a timely manner and properly vetted. b) Serve as subject matter expert during internal and external audits related to activities completed by Information Security. c) Ensure assigned business units are operating efficiently and reliably, are in compliance with applicable laws, regulations, and rules, have appropriate operating controls to mitigate risk, and are performing at a high level. Required Skills This leader in information security must be skilled at developing and leading strategic Information Security programs across the enterprise in a complex, multi-system and multi-vendor environment. Strong, practical knowledge of Information Security concepts and technical architecture are essential. Expert knowledge of risk and information security frameworks are essential. 1) A bachelor's degree is required, preferably in Information Technology, Information Security, or a related field. A master's degree in a related discipline is preferred. 2) At least 7+ years of experience in Information Technology or Information Security is required, with at least 3+ years of experience in a leadership role. Demonstrated experience with developing mapping controls to business processes, building control effectiveness reviews, or building risk ratings to allow business units to identify priorities is preferred. 3) A Certified Information System Security Professional (CISSP), Certified Information Security manager (CISM), or similar certification is required. 4) Demonstrate experience in evaluating vendor due diligence and vendor risk assessment processes. 5) Demonstrate experience in Identity Access Management including how to perform user access and rights reviews to align with least privilege access. 6) Demonstrate experience with developing and implementing a risk assessment process that is collaborative with business units and documents risk in accordance with board approved risk appetite. 7) Demonstrate strong leadership skills including the ability to work collaboratively and manage a remote workforce. 8) Demonstrate ability to drive and manage initiatives that increase operational efficiency, enhances quality, and improves/maintains service levels.
    $90k-104k yearly est. 60d+ ago
  • Information Security Analyst (On-Site Position)

    Danis Construction

    Security engineer job in Miamisburg, OH

    IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE ** At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life. We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally. One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO. Why Join Danis? Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities. Competitive Compensation: Enjoy annual merit increases and bonuses. Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options. Secure Your Future: 401K plan and profit-sharing opportunities. Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work. Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects. Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career. What You'll Bring Bachelor's degree in Cybersecurity, Information Technology, or a related field. 3+ years of hands-on experience in cybersecurity or a related discipline. Working knowledge of security frameworks (e.g., NIST, ISO 27001). Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners). Strong analytical and investigative mindset. Clear, confident communication and collaboration skills. Experience managing cross-functional projects and navigating complex security challenges. Responsibilities Your Impact: Strategic Leadership Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices. Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives. Governance, Risk, & Compliance Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps. Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act). Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics. Training & Awareness Drive cybersecurity awareness through engaging education initiatives. Oversee new hire onboarding for required cyber training. Facilitate tabletop exercises to simulate and prepare for real-world scenarios. Threat Detection & Response Continuously monitor systems for suspicious activity or breaches. Respond swiftly to security incidents and ensure thorough documentation. Engage in proactive threat hunting and analysis to detect emerging risks. Vulnerability & Risk Management Lead regular system assessments and vulnerability scans. Ensure robust network segmentation, firewall health, and secure backups. Security Architecture & Tools Oversee the deployment and management of critical security tools. Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT. Evaluate and enhance our security technology stack. Collaboration & Communication Build trusted partnerships across IT and the broader organization to strengthen security culture. Support business continuity and disaster recovery planning with department leads. Manage vendor risk and ensure third-party compliance with internal standards. Preferred Skills Familiarity with enterprise systems and platforms (e.g., ERP, CRM). Deep expertise in endpoint protection, network monitoring, and DLP tools. Calm, strategic approach to crisis management. Your Impact: Strategic Leadership Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices. Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives. Governance, Risk, & Compliance Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps. Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act). Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics. Training & Awareness Drive cybersecurity awareness through engaging education initiatives. Oversee new hire onboarding for required cyber training. Facilitate tabletop exercises to simulate and prepare for real-world scenarios. Threat Detection & Response Continuously monitor systems for suspicious activity or breaches. Respond swiftly to security incidents and ensure thorough documentation. Engage in proactive threat hunting and analysis to detect emerging risks. Vulnerability & Risk Management Lead regular system assessments and vulnerability scans. Ensure robust network segmentation, firewall health, and secure backups. Security Architecture & Tools Oversee the deployment and management of critical security tools. Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT. Evaluate and enhance our security technology stack. Collaboration & Communication Build trusted partnerships across IT and the broader organization to strengthen security culture. Support business continuity and disaster recovery planning with department leads. Manage vendor risk and ensure third-party compliance with internal standards. Preferred Skills Familiarity with enterprise systems and platforms (e.g., ERP, CRM). Deep expertise in endpoint protection, network monitoring, and DLP tools. Calm, strategic approach to crisis management. Qualifications Working Environment: Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure. Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement. Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments. Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively. Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity. Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack. Working Environment: Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure. Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement. Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments. Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively. Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity. Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack. EEO Statement Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need. Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees. #LI-ONSITE
    $71k-100k yearly est. Auto-Apply 60d+ ago
  • Information System Security Engineer (ISSE)

    Applied Research Solutions 3.4company rating

    Security engineer job in Dayton, OH

    ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. **Why Work with us?** Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers. **Responsibilities:** + Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations. + Automate threat assessment and reporting activities. + Analyze and report system and organizational security posture trends to the ISSM/ISSO. + Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities. + Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. + Plan and recommend modifications or adjustments based on exercise results. + Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM + Audit support responsibilities + Analyze and report organizational security posture trends to the ISSM/ISSO + Analyze and report system security posture trends to the ISSM/ISSO + Apply security policies to meet security objectives of the system to the ISSM/ISSO + Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO + Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO + Assess the effectiveness of security controls and reports findings to the ISSM + Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements + Ensure all systems security operations and maintenance activities are properly documented and updated as necessary + Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM + Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed + Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation + Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM + Plan and recommend modifications or adjustments based on exercise results or system environment + Properly document all systems security implementation, operations and maintenance activities and updates necessary + Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities + Verify and update security documentation reflecting the application/system security design features + Verify minimum security requirements are in place for all applications + Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data + Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements + Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents + Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective + Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks + Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident + Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package + Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks. + Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system. + Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum + Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum + Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures + Monitors and investigates security breaches + Educates employees or clients about security procedures and programs + Other duties as assigned **Requirements:** + Must be a US citizen + Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics. + Security+ Certification + 5+ years related experience in SCI/SAP environments. + Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience. + 8-12 years demonstrated performance in related technology. Minimum Security Clearance Required + Top Secret w/ SCI eligibility Additional or Preferred Qualifications + 5+ years leadership experience in relevant area of business. + Technical certifications in Azure All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
    $72k-95k yearly est. 32d ago
  • Information System Security Engineer (ISSE)

    Cyber Defense Technologies 3.9company rating

    Security engineer job in Dayton, OH

    Information System Security Engineer Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Information System Security Engineer onsite in Dayton, OH with a Secret Clearance or Higher. Responsibilities: Design, test, and implement secure operating systems, networks, security monitoring, and tuning. Responsible for the management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with program security strategy. Identify and mitigate potential security threats and vulnerabilities. Perform regular security audits and recommend enhancement to improve overall security posture. Qualifications: Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 5+ years of relevant experience Relevant experience may be considered in lieu of required education. Relevant certifications (e.g. CISSP, CISM, CEH, Security +) Why Join Cyber Defense Technologies? At CDT, we offer a collaborative and inclusive work environment where your expertise can help shape the future of cybersecurity and engineering solutions. Compensation and Benefits: Competitive salary based on experience. Comprehensive benefits package, including health, dental, and retirement plans. Opportunities for professional development and career advancement. CDT is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity employer making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. Apply Now: If you are a proactive ISSE and thrive in dynamic environments, we encourage you to apply and join the CDT team!
    $71k-95k yearly est. 60d+ ago
  • Information Security Compliance Analyst

    Reynolds and Reynolds Company 4.3company rating

    Security engineer job in Dayton, OH

    ":"As an Information Security Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cyber security assessments, help raise security awareness of associates, provide guidance on industry standard cyber security requirements, and track on-going activities that help meet our security and compliance goals. If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Information Security Compliance Analyst","date":"2025-12-04","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance. We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off. At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center. We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation. Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment. Reynolds and Reynolds is an equal opportunity employer. ","
    $80k-108k yearly est. 60d+ ago
  • Computer Network Defense Analyst

    Prime Time Consulting 4.5company rating

    Security engineer job in Dayton, OH

    Job DescriptionPrime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Ohio, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Duties Conduct computer network defense. Conduct target development for use or decision by Government personnel. Analyze and produce intelligence information. Conduct computer/network security to provide advice to the Government. Create and maintain documentation of their analysis. Ensure to routinely follow oversight and compliance Acquire/share job knowledge/skill Partner with team members on the contract, including government personnel and other partner companies Qualifications Degree in Computer Science or equivalent technical field Level 1 - 6 years of experience can replace 2 years of experience with AA degree Level 2 - 9 years of experience can replace 4 years of experience with BS degree Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree Strong communication skills Works well in a team and alone Working knowledge of Microsoft Office Suite Company Perks At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance. Robust health plan including medical, dental, and vision Health Savings Account with company contribution Annual Paid Time Off and Paid Holidays Paid Parental Leave 401k with generous company match Training and Development Opportunities Award Programs Variety of Company Sponsored Events Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email ******************************* with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $49k-72k yearly est. 29d ago
  • Information Systems Security Engineer (ISSE)

    Tlingit Haida Tribal Business Corporation

    Security engineer job in Dayton, OH

    Subsidiary: KIRA Information Solutions Job Title: Information System Security Engineer (ISSE) Job Location: Hybrid-Position working with Wright-Patterson Air Force Base, Dayton, OH Labor Category: Exempt Clearance Requirement: Secret Clearance, if required In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer Travel Requirement: Minimal, as needed Salary: $120,000- $180,000 Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide. THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Scope of Work: This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision. Essential duties: The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE [RD2] [KG3] assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows. The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. Required qualifications: Bachelor's degree in engineering, science, mathematics, or a related field. Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises. Five years' experience in information technology management. Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II). U.S. citizenship. Preferred qualifications: Bachelor's degree in Computer Science or Information Management. Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices. Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.). Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities. Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth). Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability. To perform this job successfully, an individual must be able to perform all the essential duties of the position satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions. May be required to obtain and maintain a security clearance, including successfully completing a thorough background investigation. If you need reasonable accommodations for any part of the employment process, please contact us and let us know the nature of your request. Requests for accommodation will be considered on a case-by-case basis. Program Details: This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. ETIMS is the Air Force System of Record for Technical Order (TO) management and is the Air Force's Enterprise Defense Business System (DBS) for managing TOs. TOs are military orders containing the authoritative procedures and instructions for operating and maintaining all U.S. Department of the Air Force equipment and systems. ETIMS supports ~178,000 users at ~385 sites worldwide. It also supports ~60,000 eTOs, 54,000 ETIMS eTools, 14,000 paper TOs, and more than 13,000 TO libraries across the Air Force Enterprise. Agencies that rely on ETIMS for Air Force-related TOs and Computer Program Identification Numbers (CPINs) include the Army, Navy, Marines, Coast Guard, Foreign Military Sales (FMS), the National Aeronautics and Space Administration (NASA), The White House, and numerous Military Industrial Complex partners. ETIMS provides access to the official TO cataloging, managing, storing, distributing, and viewing capabilities needed by the operators and maintainers to support all Air Force weapon systems and equipment items. ETIMS is a cloud-based enterprise system hosting Java and Windows applications accessing Oracle database in the AWS environment. The ETIMS migration to the Amazon Web Services (AWS) Air Force Cloud 1 environment and leveraging Agile Principles allows for processes to mature across the user community and enables streamlining and process improvement realized by the rapid delivery of follow-on capabilities. ETIMS has been modernized over the years to provide a fully capable Air Force enterprise TO Management system. The Government Program Office is located at Wright Patterson Air Force Base in Dayton, Ohio. The development and support team are geographically dispersed and teleworking our daily working protocol.
    $120k-180k yearly Auto-Apply 60d+ ago
  • Security Analyst - Indefinite US Work Authorization Required

    Crown Equipment Corporation 4.8company rating

    Security engineer job in New Bremen, OH

    : Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership. Job Posting External Primary Responsibilities: * Lead the design and implementation of SIEM correlation rules and alert logic to detect advanced threats and suspicious behaviors. * Build and optimize SOAR playbooks to automate multi-step incident response actions. * Continuously tune alert thresholds and logic to reduce false positives and improve detection accuracy. * Integrate threat intelligence feeds into SIEM and SOAR platforms to enhance alert context and prioritization. * Investigate and respond to alerts, coordinating with IT, MDR, and security teams to validate and remediate incidents. * Maintain documentation for alert logic, playbook workflows, and incident handling procedures. * Mentor junior analysts on alert development, tuning, and automation best practices. * Participate in an on-call rotation to support timely response to critical alerts and incidents. Minimum Qualifications: * High school diploma or equivalent is required. * Familiarity with SIEM platforms and basic alert logic. * Experience with scripting languages such as PowerShell or Python. * Understanding of cybersecurity fundamentals, including threat types and detection techniques. * 1+ years of experience in cybersecurity or a related field. * Strong analytical and problem-solving skills. * Willingness to participate in an on-call rotation. Preferred Qualifications: * Bachelor's degree in cybersecurity, computer science, information technology, or a related field. * Exposure to SOAR platforms and basic playbook development. * Experience working with third-party MDR or managed security service providers. * Certification such as Security+, GSEC, or CEH. * Familiarity with threat intelligence sources and enrichment techniques. * Understanding of compliance frameworks such as NIST CSF or ISO 27001. Work Authorization: Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire. No agency calls please. Compensation and Benefits: Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more. EOE Veterans/Disabilities Nearest Major Market: Lima Nearest Secondary Market: Findlay Job Segment: Computer Science, Warehouse, Forklift, Technology, Manufacturing
    $80k-101k yearly est. 60d+ ago
  • Information Security Analyst (On-Site Position)

    Danis Construction

    Security engineer job in Miamisburg, OH

    IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life. We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally. One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO. Why Join Danis? * Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities. * Competitive Compensation: Enjoy annual merit increases and bonuses. * Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options. * Secure Your Future: 401K plan and profit-sharing opportunities. * Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work. * Give Back: Participate in our "Constructing Hope" program to contribute to meaningful community outreach projects. * Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career. What You'll Bring * Bachelor's degree in Cybersecurity, Information Technology, or a related field. * 3+ years of hands-on experience in cybersecurity or a related discipline. * Working knowledge of security frameworks (e.g., NIST, ISO 27001). * Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners). * Strong analytical and investigative mindset. * Clear, confident communication and collaboration skills. * Experience managing cross-functional projects and navigating complex security challenges. Responsibilities Your Impact: Strategic Leadership * Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices. * Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives. Governance, Risk, & Compliance * Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps. * Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act). * Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics. Training & Awareness * Drive cybersecurity awareness through engaging education initiatives. * Oversee new hire onboarding for required cyber training. * Facilitate tabletop exercises to simulate and prepare for real-world scenarios. Threat Detection & Response * Continuously monitor systems for suspicious activity or breaches. * Respond swiftly to security incidents and ensure thorough documentation. * Engage in proactive threat hunting and analysis to detect emerging risks. Vulnerability & Risk Management * Lead regular system assessments and vulnerability scans. * Ensure robust network segmentation, firewall health, and secure backups. Security Architecture & Tools * Oversee the deployment and management of critical security tools. * Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT. * Evaluate and enhance our security technology stack. Collaboration & Communication * Build trusted partnerships across IT and the broader organization to strengthen security culture. * Support business continuity and disaster recovery planning with department leads. * Manage vendor risk and ensure third-party compliance with internal standards. Preferred Skills * Familiarity with enterprise systems and platforms (e.g., ERP, CRM). * Deep expertise in endpoint protection, network monitoring, and DLP tools. * Calm, strategic approach to crisis management. Qualifications Working Environment: * Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure. * Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement. * Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments. * Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively. * Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity. * Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack. EEO Statement Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need. Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees. #LI-ONSITE
    $71k-100k yearly est. Auto-Apply 60d+ ago
  • Information System Security Engineer (ISSE)

    Applied Research Solutions 3.4company rating

    Security engineer job in Dayton, OH

    ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Why Work with us?  ​Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.   Responsibilities: Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations. Automate threat assessment and reporting activities. Analyze and report system and organizational security posture trends to the ISSM/ISSO. Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities. Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. Plan and recommend modifications or adjustments based on exercise results. Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM Audit support responsibilities Analyze and report organizational security posture trends to the ISSM/ISSO Analyze and report system security posture trends to the ISSM/ISSO Apply security policies to meet security objectives of the system to the ISSM/ISSO Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO Assess the effectiveness of security controls and reports findings to the ISSM Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements Ensure all systems security operations and maintenance activities are properly documented and updated as necessary Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM Plan and recommend modifications or adjustments based on exercise results or system environment Properly document all systems security implementation, operations and maintenance activities and updates necessary Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities Verify and update security documentation reflecting the application/system security design features Verify minimum security requirements are in place for all applications Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks. Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system. Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures Monitors and investigates security breaches Educates employees or clients about security procedures and programs Other duties as assigned Requirements: Must be a US citizen Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics. Security+ Certification 5+ years related experience in SCI/SAP environments. Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience. 8-12 years demonstrated performance in related technology. Minimum Security Clearance Required Top Secret w/ SCI eligibility Additional or Preferred Qualifications 5+ years leadership experience in relevant area of business. Technical certifications in Azure All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
    $72k-95k yearly est. 31d ago
  • Information Security Analyst 2

    Crown Equipment Corporation 4.8company rating

    Security engineer job in New Bremen, OH

    : Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership. **Information Security Analyst 2** **Job Duties** + Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's). + Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines. + Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. + Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned. **Minimum Qualifications** + 2-4 years related experience + Associate's degree (Information Technology, Cyber Security, Computer Science) + Non-degree considered if 6+ years of related experience along with a high school diploma (GED) **Preferred Qualifications** Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values. **Work Authorization:** Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire. No agency calls please. **Compensation and Benefits:** Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more. EOE Veterans/Disabilities
    $80k-102k yearly est. 60d+ ago

Learn more about security engineer jobs

How much does a security engineer earn in Englewood, OH?

The average security engineer in Englewood, OH earns between $65,000 and $119,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Englewood, OH

$88,000
Job type you want
Full Time
Part Time
Internship
Temporary