Network Engineer
Security engineer job in Middletown, DE
first PRO is seeking a hands-on Network Engineer to join a major enterprise network modernization initiative. This is a unique opportunity to work in a Cisco-centric environment and take ownership of large-scale network upgrades, design improvements, and operational support across data center, campus, and branch networks.
What You'll Do:
Lead hands-on hardware upgrades for Cisco Catalyst switches (2960, 9200), Nexus core devices, and ISR routers
Perform ASA to Firepower (FTD) firewall migrations and ongoing firewall administration
Configure and troubleshoot routing protocols such as BGP, OSPF, and static routes
Execute cutovers, stacking, racking, cabling, and other on-site network tasks
Support the SCADA network and remote site connectivity
Analyze complex network issues and provide clear, actionable solutions
Develop, maintain, and improve network documentation, runbooks, and topology maps
Simplify and optimize legacy configurations to modernize network operations
What We're Looking For:
Expert-level Cisco skills across Catalyst, Nexus, ISR routers, and ASA/FTD platforms
Experience with enterprise core and data center networks
Ability to troubleshoot independently without relying heavily on TAC
Proactive, ownership-driven, and engaged in network design conversations
Excellent communication skills and strong documentation habits
Hands-on field experience and the ability to respond to on-site issues when required
Why This Role Is Exciting:
Be part of a full network refresh: switches, routers, firewalls, and Nexus core replacement
Opportunity to influence network design decisions from day one
Work on data center modernization and SCADA network improvements
This is a high-impact, hands-on role for a Cisco engineer who enjoys both engineering and operational challenges. If you thrive in fast-paced modernization projects and want to make a tangible impact, this is the role for you.
Cyber Security Analyst
Security engineer job in Media, PA
As the Cyber Security Analyst, you will design and implement IT security policies and systems to protect the organization's computer networks from cyber-attacks. You will also help develop organization-wide best practices for IT security, including security training for staff. You will monitor computer networks for security issues, install security software, and document all security issues or breaches you find. You will report vulnerabilities to management as identified and in a timely manner and ensure remediation.
Essential Duties
Under the general direction of the CIO, the Cyber Security Analyst will:
* Create countywide cybersecurity policies for approval and implementation.
* Perform daily monitoring and support of all systems and networks to identify security issues.
* Investigate security breaches and other cybersecurity incidents.
* Install security measures and operate software to protect systems and information infrastructure, including firewalls, IDS/IPS, and other security systems.
* Document security breaches and assess the damage they cause.
* Work with the IT team to perform tests and uncover network vulnerabilities.
* Fix detected vulnerabilities to maintain a high-security standard.
* Stay current on IT security trends and news.
* Recommend changes to company policies to advance best practices for IT security.
* Perform vulnerability scanning and penetration testing.
* Help colleagues install security software and understand information security management.
* Participate in disaster recovery testing.
* Work cross-functionally as needed to improve the security posture of the organization, including SQA and development team resources.
* Coordinate the collection of security controls evidence in support of certification and customer audits; participate in audits as needed.
* Assist with completion of security questionnaires for customers, partners, and RFP responses.
Qualifications
* 3 years of experience working with Windows operating systems.
* 3 years of experience working with cloud services from a security perspective.
* 5 years of experience working with networking equipment, including switches, routers, firewalls, proxy servers, VPNs, and IDS/IPS.
* Detailed knowledge of network troubleshooting tools such as Fiddler, Wireshark, and Traceroute.
* 3 years of experience working with identity and access authorization systems such as Active Directory, LDAP, and Radius.
* Strong working knowledge of encryption protocols, ciphers, and the configuration of systems.
* Knowledge of current computer security practices and network protocols.
* Experience with Nexpose, Metasploit, or similar security software.
* Customer service-focused and detail-oriented.
* Ability to work effectively as an individual contributor and collaboratively in workgroups.
Physical Requirements
While performing the duties of this position, the employee is frequently required to read documents in paper and electronic form, sit, walk, and talk or hear. Occasionally, the employee will need to stand and climb stairs; reach above shoulder height; and kneel, stoop, crouch, or squat. On rare occasions, the employee will need to lift or carry items.
Work Environment
* 8:30 a.m. to 5:00 p.m. 40 weekly hours.
* Extended hours may be required to meet agency needs.
Contact
To
Product Security Engineer, Instagram
Security engineer job in Dover, DE
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Cyber Security Analyst II
Security engineer job in Dover, DE
Cyber Security Analyst II Location: Hybrid - residing within commutable distance to Newark or Dover, DE
What makes us great
At the heart of our Company is a dedication to delivering energy that drives progress. We put people first, work to keep them safe and build trusting relationships.
Your role in our success:
This position will be responsible for protecting the corporation's critical information and assets by integrating cybersecurity risk management best practices throughout the enterprise. This position will be responsible for detection and analysis of opportunistic and persistent threats, deploying counter measures and conducting risk and vulnerability assessments across the enterprise (including cloud). As a specialist on the Cyber security team, you will participate in detection and response of cyber incidents, assist in recovery of operations and assist in formulating, updating, and communicating short- and long-term organizational cybersecurity strategies and policies. In addition, you will provide technical support to others on adjacent technical teams and the greater organization. The ideal candidate will have a thorough understanding of incident response protocol and have an understanding of nation state threat actors and their TTPs.
What you'll be working on:
Monitor and analyze security intel generated by company security controls. Lead triage, containment and eradication.
Participate in threat hunting activities and “deep dive” analysis to maintain a high degree of awareness on the current threat landscape.
Participate in simulated “adversary emulation” exercises and have working knowledge of Red Team tools such as Atomic Red Team and Caldera.
Provide effective incident response, by correlating intelligence from IPS systems, endpoints and third parties.
Administer security awareness training and enterprise vulnerability management solutions, as required.
Administer and maintain leading enterprise commercial endpoint and network based security solutions
Develop and produce reports on all activities and incidents to help maintain day to day status,
Develop and report on trends, and provide focus and situational awareness on all issues.
Maintain documentation for all systems and create user guides and standard operating procedures.
Adhere to enterprise change management procedures and corporate security policies, including SLAs for responding to cyber related incidents.
Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management.
Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management.
Ensure changes are made using an approval process agreed to in advance.
Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible.
Additional Responsibilities
Maintain knowledge of the current threat landscape via OSINT.
Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training.
Interface to third party vendors as necessary for external audits.
Manage investigations involving Cyber Security, including the use of specialized software.
Create system performance metrics and trending for capacity planning
Meet availability and update requirements
Ability to travel 10%
Who you are:
Bachelor's Degree in computer engineering, computer science, or other closely related IT discipline OR 5 years of relevant work experience.
Must hold one of the following certifications: Security+, CEH, GCIH, GREM or CISSP
3 years specialized experience providing technical and end-user assistance on computer hardware and application software support.
2 years of progressively responsible experience in cyber security analysis, incident response, or related experience.
Working knowledge of MITRE ATT&CK and Lockheed Martin's Cyber Killchain
Working knowledge of memory analysis tools and DFIR best practices
Experience administering enterprise vulnerability management and security awareness solutions
Experience designing and implementing controls to protect OT environments.
Experience administering multi-factor authentication systems
Experience managing enterprise security appliances and/or security monitoring software (IPSs, firewalls etc.)
Experience with enterprise change management and test procedures.
Demonstrated experience dealing with customers and organizational skills are required.
Demonstrated strength in providing strong customer service support.
Strong analytical and problem solving skills.
Good interpersonal, organizational, written and verbal communication skills.
Experience working in a highly regulated environment.
Maintain composure and professional approach when dealing with employees and vendors.
Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form.
Ability to make decisions logically.
Capable of focusing on details with regards to procedures and workflow.
Ability to lift up to 40 pounds.
Benefits/what's in it for you?
Flexible work arrangement
Competitive base salary
Fantastic opportunities for career growth
Cooperative, supportive and empowered team atmosphere
Annual bonus and salary increase opportunities
Monthly recognition events
Endless wellness initiatives and community events
Robust and customizable benefit packages-choose what works best with your life. Options include generous 401k, medical, dental and life insurance, tuition reimbursement, compensated volunteer hours and MORE!
Paid time off, holidays and a separate bank of sick time!
Chesapeake Utilities Corporation is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Applicants with a disability that need assistance applying for a position may email ****************.
Cyber Security Analyst
Security engineer job in Wilmington, DE
Details:
Stefanini Group is hiring!
Exciting opportunity awaits, let us help you get started!
Click Apply now or you may call: **************/ email: Deepak Tyagi (**************************) for faster processing!
Job Description:
The Cyber Monitoring Analyst will be part of the Cyber Operations team that is responsible for monitoring and investigating alerts to identify potential incidents. The individual will be required to work closely with other members of the Cyber Operations team to ensure the successful delivery of the alert monitoring, triage, and escalation. Specifically, the Cyber
Monitoring Associate will have the following key responsibilities:
Perform real-time analysis and correlation of logs/alerts.
Follow detailed operational procedures to appropriately analyze, escalate, and assist in remediation of security events.
Utilize multiple security technologies to investigate and analyses alerts.
Deliver timely and detailed documentation related to any incident including the findings, review, and follow-up activities
Participate in the creation, modification and maintenance of all Cyber Monitoring policies and procedures
Keep abreast of cyber security trends and the emerging threat landscape in general
Details:
What the ideal candidate looks like:
1-4 years of experience in IT, IT Security, Security, Technical helpdesk, Security Operations are preferred
Understanding various Cloud technologies such as Azure, AWS, GCP is highly desirable
Also desirable is if they have performed investigation of high severity threats, in on-Prem technologies or in cloud
Strong oral and written communication skills including the ability to interact directly with individuals that do not have an IT background.
Intermediate knowledge of endpoint and network security concepts and tools preferred.
Knowledge of ServiceNow.
Crowdstrike, highly desired.
Experience with event monitoring and security reporting
Ability to exercise sound technical, interpersonal, and organizational judgment while evaluating and solving complex problems.
*Listed salary ranges may vary based on experience, qualifications, and local market. Also, some positions may include bonuses or other incentives*
About Stefanini Group
The Stefanini Group is a global provider of offshore, onshore and near shore outsourcing, IT digital consulting, systems integration, application and strategic staffing services to Fortune 1000 enterprises around the world. Our presence is in countries like Americas, Europe, Africa and Asia, and more than 400 clients across a broad spectrum of markets, including financial services, manufacturing, telecommunications, chemical services, technology, public sector, and utilities. Stefanini is a CMM level 5, IT consulting, company with global presence. We are CMM Level 5 company.
#LI-DT1
#LI-HYBRID
Easy ApplyEngineer, Information Security and Risk
Security engineer job in Dover, DE
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Cyber Information Assurance Analyst
Security engineer job in Parkesburg, PA
APPLICATION INSTRUCTIONS: * CURRENT PENN STATE EMPLOYEE (faculty, staff, technical service, or student), please login to Workday to complete the internal application process. Please do not apply here, apply internally through Workday. * CURRENT PENN STATE STUDENT (not employed previously at the university) and seeking employment with Penn State, please login to Workday to complete the student application process. Please do not apply here, apply internally through Workday.
* If you are NOT a current employee or student, please click "Apply" and complete the application process for external applicants.
Approval of remote and hybrid work is not guaranteed regardless of work location. For additional information on remote work at Penn State, see Notice to Out of State Applicants.
POSITION SPECIFICS
We are searching for an experienced Information Systems Security Manager (ISSM) to join our Cybersecurity Division at the Applied Research Laboratory (ARL) at Penn State. Information Technology Services provides ARL's administrative and research computing environments and capabilities, delivering secure, responsive, efficient, effective, and compliant IT services and operations to meet the demanding needs of ARL's leading edge research.
This position will have a focus on the unclassified space, overseeing and owning the unclassified information security program, including implementing our various compliance requirements like the Cybersecurity Maturity Model Certification (CMMC). This ISSM will however operate within and support both unclassified and collateral spaces, backing up fellow ISSM's and enforcing commonalities between environments where possible. They will be responsible for developing and maintaining policy and security documentation, providing cybersecurity recommendations for system, network, and application design, leading information system risk assessments, assist in leading incident response actions, setting standards for continuous monitoring processes such as auditing or vulnerability assessments, and ensuring cybersecurity requirements are effectively and efficiently communicated to operational and researcher team leadership to ensure integration into their respective team processes.
ARL is an authorized DoD SkillBridge partner and welcomes all transitioning military members to apply.
You will:
* Develop, validate, submit, and maintain information system security plans, certification and authorization packages, and plans of action and milestones in support of compliance requirements
* Oversee development and implementation of risk assessments against information systems in all phases of their lifecycles
* Provide cybersecurity recommendations for system, network, and application design
* Monitor and assist in the assessment and review of current and new systems and networks to ensure compliance with current cybersecurity policies, concepts, and measures
* Develop training material related to compliance and audit requirements to assist employees in individual compliance/audits as applicable
* Assist in technical requirements such as; vulnerability scanning, review of security/event logs, network analysis, and incident response on an as-needed basis
Required skills/experience areas include:
* Current eligibility for access to classified information at the Top-Secret level or higher and may be subject to a government background investigation to upgrade clearance eligibility, if required
* Assessment and Authorization experience of systems and networks using CMMC and RMF
* NIST/ISO standards (eg. NIST SP 800-53 and NIST SP 800-171), Department of Defense directives, DISA STIG, and regulatory requirements
* Strong technical background, with significant experience using multiple operating systems to include Windows and Linux
* Policy, procedure, plan of action and milestone, risk assessment and security plan development with experience of continuous monitoring for compliance with said documentation
* System functions, security policies, technical security safeguards, and operational security measures
* The ability to certify and maintain information security related certifications
(eg. Security+, CISSP, and any other required certifications)
* Excellent communications, analytical and problem-solving skills
* Efficient organizational, multitasking, and time management abilities
Preferred skills/experience areas include:
* A Bachelor's degree in Information Security, Information Technology, or Computer Science
* Management or leadership experience in IT and information security space
* Vulnerability scanning and mitigation utilizing Nessus, Retina, GFI Languard, or similar tool
* Experience with networking fundamentals including various concepts, tools, and administrative functions
* Working knowledge of container image security and experience overseeing security for containerized environments (docker, podman, etc)
* SEIM management or use for analysis, such as Splunk, ELK, or AlienVault
* VMWare and management of Virtual Machines
* Training material development
Your working location will be located in State College, PA in a hybrid on-site/work from home format. Questions related to flexible work should be directed to the hiring manager during the interview process. This position will require periodic travel to remote locations.
MINIMUM EDUCATION, WORK EXPERIENCE & REQUIRED CERTIFICATIONS
If filled as Cyber Information Assurance Analyst - Principal Professional, this position requires:
Master's Degree
8+ years of relevant experience; or an equivalent combination of education and experience accepted
Required Certifications:
None
If filled as Cyber Information Assurance Analyst - Senior Professional, this position requires:
Bachelor's Degree
6+ years of relevant experience; or an equivalent combination of education and experience accepted
Required Certifications:
None
ARL's purpose is to research and develop innovative solutions to challenging scientific, engineering, and technology problems in support of the Navy, the Department of Defense (DoD), and the Intel Community (IC).
FOR FURTHER INFORMATION on ARL, visit our web site at ****************
BACKGROUND CHECKS/CLEARANCES
Employment with the University will require successful completion of background check(s) in accordance with University policies.
All positions at ARL require candidates to possess the ability to obtain a government security clearance; you will be notified during the interview process if this position is subject to a government background investigation. You must be a U.S. citizen to apply. Employment with the ARL will require successful completion of a pre-employment drug screen.
SALARY & BENEFITS
The salary range for this position, including all possible grades, is $86,300.00 - $145,700.00.THE PROPOSED SALARY RANGE MAY BE IMPACTED BY GEOGRAPHIC DIFFERENTIAL
Salary Structure - Information on Penn State's salary structure
Penn State provides a competitive benefits package for full-time employees designed to support both personal and professional well-being. In addition to comprehensive medical, dental, and vision coverage, employees enjoy robust retirement plans and substantial paid time off which includes holidays, vacation and sick time. One of the standout benefits is the generous 75% tuition discount, available to employees as well as eligible spouses and children. For more detailed information, please visit our Benefits Page.
CAMPUS SECURITY CRIME STATISTICS
Pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act and the Pennsylvania Act of 1988, Penn State publishes a combined Annual Security and Annual Fire Safety Report (ASR). The ASR includes crime statistics and institutional policies concerning campus security, such as those concerning alcohol and drug use, crime prevention, the reporting of crimes, sexual assault, and other matters. The ASR is available for review here.
EEO IS THE LAW
Penn State is an equal opportunity employer and is committed to providing employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. If you are unable to use our online application process due to an impairment or disability, please contact ************.
Federal Contractors Labor Law Poster
PA State Labor Law Poster
Penn State Policies
Copyright Information
Hotlines
Auto-ApplyLead Security Engineer - AI/ML
Security engineer job in Wilmington, DE
JobID: 210684456 JobSchedule: Full time JobShift: : As a Lead AIML Security Engineer at JPMorgan Chase within the Cybersecurity and Technology Controls organization, you are an integral part of a team that works to deliver software solutions that satisfy functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior.
Job responsibilities
* Builds AIML technical controls software solutions: design, development, and technical troubleshooting across multiple cloud platforms (AWS, Azure, GCP), with the ability to think beyond routine or conventional approaches to build solutions or break down technical problems
* Develops secure high-quality production code, and reviews and debugs code written by others
* Produces architecture and design artifacts for complex applications while being accountable for ensuring design constraints are met by software code development
* Leads evaluation sessions with external vendors, startups, and internal teams to drive outcomes-oriented probing of architectural designs, technical credentials, and applicability for use within existing systems and information architecture
* Contributes to software engineering communities of practice and events that explore new and emerging technologies
* Adds to team culture of diversity, opportunity, inclusion, and respect
Required qualifications, capabilities, and skills
* Formal training or certification on software engineering concepts and 5+ years applied experience
* Advanced in one or more programming language(s): Python, Java, Golang
* Extensive practical experience with at least one public cloud (Google Cloud Platform, Amazon Web Services)
* Hands on practical experience in system design, application development, testing, and operational stability across AWS, Azure, and GCP
* Subject matter expert in securing AIML systems with practical experience in AI and machine learning technologies
* Knowledgeable in AI safety, AI alignment, AI cybersecurity concepts, and trends, including GenAI security
* Ability to tackle design and functionality problems independently with little to no oversight
* Proficient in all aspects of the Software Development Life Cycle
* Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security
Preferred qualifications, capabilities, and skills
* Experience designing, deploying, and managing solutions across AWS, Azure, and GCP.
* Google Cloud Professional is a plus.
Auto-ApplyA4.9-Security Analyst 5026 Dover,DE
Security engineer job in Dover, DE
Job Description
100% on site.
Our direct client has an opening for a Security Analyst 5026
is up to 13 months with the option of extension. The client is located in Dover,DE
If you are interested, please submit the following:
YOUR CURRENT RESUME
YOUR HOURLY RATE
Key Responsibilities
Security Monitoring: Continuously monitor network traffic, system logs, and other security tools to detect unusual or suspicious activities that could indicate an incident or vulnerability.
Incident Detection and Response: Identify and categorize security incidents such as malware infections, data breaches, and insider threats. Respond swiftly to contain, mitigate, and resolve incidents.
Alert Triage: Assess alerts generated by security tools, determine their severity, and prioritize responses accordingly.
Threat Intelligence and Hunting: Stay updated on the latest cybersecurity threats, vulnerabilities, and attack techniques to enhance monitoring and response efforts. Leverage these findings to conduct proactive threat hunting across SIEM and EDR platforms.
Log Analysis: Examine logs from a range of sources including firewalls, intrusion detection systems, antivirus software, and system endpoints to identify irregularities that may signal a threat.
Security Tool Management: Operate and manage security technologies such as SIEM systems, IDS/IPS, firewalls, PKI management, and endpoint security solutions.
Documentation and Compliance: Maintain accurate records of security incidents and ensure compliance with industry standards and regulations.
Collaboration: Work closely with other security and IT professionals to investigate and resolve security issues.
Continuous Improvement: Contribute to refining security processes and developing new detection and prevention rules.
Required Skills
Technical Proficiency: Strong understanding of IT basics, including operating systems, network protocols, and security tools.
Hands-on Experience with Security Tools: Proficiency in using SIEM systems, IDS/IPS, firewalls, antivirus, and endpoint detection tools.
Coding Skills: Knowledge of programming languages like Python or PowerShell for automating tasks and creating scripts.
Forensics Knowledge: Basic understanding of computer forensics for incident investigation.
Log Analysis: Ability to analyze logs to spot patterns and anomalies.
Incident Response: Experience in responding to security incidents effectively.
Threat Intelligence: Understanding of attack patterns and tactics used by cybercriminals.
Communication: Excellent communication skills for reporting and collaboration.
Problem-Solving: Strong analytical and problem-solving abilities.
Adaptability: Ability to adapt quickly to evolving cyber threats.
Qualifications
Education: Bachelor's degree or higher in Computer Science, Information Technology, Cybersecurity, or a related field.
Experience: Previous experience in a security-related role with a strong understanding of cybersecurity principles and technologies.
Certifications: Relevant certifications such as CompTIA Security+ or equivalent are beneficial.
Skill
Technical Proficiency: Strong understanding of IT basics, including operating systems, network protocols, and security tools.
Skill
Hands-on Experience with Security Tools: Proficiency in using SIEM systems, IDS/IPS, firewalls, antivirus, and endpoint detection tools.
Skill
Coding Skills: Knowledge of programming languages like Python or PowerShell for automating tasks and creating scripts.
Skill
Forensics Knowledge: Basic understanding of computer forensics for incident investigation.
By replying to this job advertisement, I agree I want to receive additional job advertisements from Focused HR Solutions, including email, phone and mail to the contact information I am submitting. I consent to Focused HR Solutions, its affiliates, third parties and partners processing my personal data for these purposes and as described in the Privacy Policy. I understand that I can withdraw my consent at anytime.
System Engineer - On-Site - Security Clearance Required
Security engineer job in Aberdeen Proving Ground, MD
Job Description
About the Role:
As a System Engineer, you will be responsible for designing, implementing, and maintaining computer systems and solutions that meet the needs of our clients. You will work on-site and be required to have a security clearance. Your main goal will be to ensure that our clients' computer systems are secure, reliable, and efficient. You will work closely with other engineers and technical staff to ensure that all systems are integrated and functioning properly.
Minimum Qualifications:
Experience designing and implementing computer systems
Strong knowledge of computer hardware, software, and operating systems
Excellent problem-solving and analytical skills
Ability to obtain and maintain a U.S. Federal Security Clearance
Preferred Qualifications:
Experience working with government clients
Experience with system security and encryption
Certifications in relevant technologies such as Microsoft or CompTIA
Responsibilities:
Design and implement computer systems that meet the needs of our clients
Maintain and troubleshoot computer systems to ensure they are secure, reliable, and efficient
Collaborate with other engineers and technical staff to ensure all systems are integrated and functioning properly
Provide technical support to clients as needed
Stay up-to-date with the latest trends and technologies in computer systems engineering
Skills:
As a Computer System Engineer, you will use your strong knowledge of computer hardware and software to design and implement computer systems that meet the needs of our clients. You will also use your problem-solving and analytical skills to troubleshoot and maintain these systems. Your ability to collaborate with other engineers and technical staff will be essential in ensuring that all systems are integrated and functioning properly. Additionally, your knowledge of network security and encryption will be beneficial in this role. Finally, your ability to stay up-to-date with the latest trends and technologies in computer systems engineering will ensure that you are able to provide the best possible solutions to our clients.
Information Security Analyst
Security engineer job in Riverside, MD
General information Requisition # R63174 Posting Date 09/10/2025 Security Clearance Required Secret Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH!
MANTECH seeks a motivated, career and customer-oriented Information Security Analyst to join our team in Belcamp, MD. This is an onsite position.
The Information Security Analyst will work in support of the Army for the Network Modernization & Mission Network Technical Service Support program (NetMod). NetMod sets forth the work efforts required to provide product technical support services for systems and equipment being produced, fielded, modified or supported by PdM Network Modernization (NetMod) and PdM Mission Network of the Project Manager (PM) Tactical Network (TN) of the Program Executive Office for Command Control and Communications-Tactical (PEO C3T). This support may also include future systems and equipment that is acquired for the Army to maintain its technological advantage.
Job responsibilities include but are not limited to:
* Providing network environment and advanced level computing environment support.
* Paying special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured.
* Collecting data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment.
* Applying analytical skills to this data and all compliance with relevant non-technical controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts.
* Conduct vulnerability assessments, risk analysis, and incident responses.
* Actively monitoring network traffic for suspicious activity and potential security breaches.
* Identify weaknesses in systems and applications to proactively address security risks.
Minimum Qualifications:
* Bachelor's degree in Science and 5+ years of relevant experience.
* 3+ years in the Department of Defense performing information management related duties.
* Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement.
* Possess an understanding of network protocols and security principles.
* Demonstrated experience in security tools and technologies (firewalls, intrusion detection/prevention systems, SIEM).
* Experience with vulnerability scanning and penetration testing.
* Possess analytical and problem-solving skills to identify and address security threats.
Preferred Qualifications:
* Basic understanding of programming
* Experience with participating in simulated cyberattacks to identify vulnerabilities in systems and applications.
* Experience updating and implementing complex security systems for an organization.
Clearance Requirements:
* Must be a US citizen and have a current/active Secret clearance.
Physical Requirements:
* Must be able to remain in a stationary position 50% of the time.
* Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
* Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
The projected compensation range for this position is $68,500.00-$114,100.00. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, MANTECH invests in its employees beyond just compensation. MANTECH's benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, short-term and long-term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
Auto-ApplyPrincipal Data Center Security Systems Engineer
Security engineer job in Middletown, DE
Insight Global is seeking an experienced, driven Principal Security Systems Engineer to join a growing AI and GPU infrastructure start-up based in SF, NYC, or Seattle. This is a full-time, permanent role with competitive salary, bonus, equity, and benefits.
In this role, the Principal Data Center Security Systems Engineer will lead and design the multi-layer physical security stack that protects this company's data. This engineer's work spans perimeter hardening to rack-level tamper detection, all integrated into a zero-trust monitoring framework.
Day-to-day responsibilities:
- Manage all aspects of the security system for data centers coordinating with all other discipline requirements
- Create strategy for data center security system design and deployment
- Develop security system standards in compliance with US - DoD and other international standards
- Develop and maintain the basis of design, master specification, master drawings
- Facilitate developing project specific drawings and documentation based on the master design with local adaptation working with external design consultants
- Engineer access-control, CCTV, intrusion-detection and biometric systems to meet SOC 2 & ISO 27001
- Create zoning and mantrap layouts, badge/biometric authentication flows and visitor-management SOPs
- Specify encryption and retention policies for video, logs and alarms
- Integrate security events into DCIM and corporate SIEM platforms
- Drive resiliency (dual-path comms, battery backup) and regular penetration-test programs
We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form (****************************************** Og4IQS1J6dRiMo) . The EEOC "Know Your Rights" Poster is available here (*********************************************************************************************** .
To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: *************************************************** .
Skills and Requirements
- 10+ years designing hyperscale / enterprise or mission-critical physical-security systems.
- Deep knowledge of ONVIF, SIA DC-09, OSDP, Wiegand, BACnet.
- Experience with Genetec, LenelS2, Honeywell or Avigilon ecosystems.
- CISSP-ISSAP or PSP certification is desirable
Cybersecurity Information System Security Officer (ISSO)
Security engineer job in Aberdeen Proving Ground, MD
Link Solutions, Inc. delivers reliable and effective Information Technology services to government clients in support of critical mission needs. Delivering a broad range of Infrastructure Operations, Application Development, Cybersecurity, Virtualization, Cloud and Mobility services.
If you're looking for a technology company that values innovation, with a vision toward the future of the technology landscape, look no further than Link Solutions! Link is quality and compliance-focused, under our guiding philosophy, "Mission First, Customer Always".
We are ISO 9001:2015, ISO 20000-1:2018, ISO 27001:2022 certified and appraised for CMMI ML3 for Services and Development.
Link Solutions is seeking a Cybersecurity Information System Security Officer (ISSO) to join our team in Aberdeen Proving Ground, MD.
* Must be a U.S. Citizen
* DoD Secret Clearance required
* Non-remote (relocation incentive available)
The Cybersecurity Information System Security Officer (ISSO) will serve as front-line support for mission-critical personnel at the U.S. Army Combat Capabilities Development Command Chemical Biological Center (DEVCOM). The ISSO will be responsible for supporting the implementation of cybersecurity controls, risk assessments, and compliance activities for Army systems and cloud applications. Our ISSO will work collaboratively with Army stakeholders to strengthen governance, risk, and compliance efforts to ensure DoD compliance.
Join a team of dedicated professionals at an industry-leading organization, where you will work on innovative projects that contribute to national security. This position offers significant opportunities for career advancement and professional growth while supporting critical missions and operations.
Job Responsibilities:
* Develop and implement cybersecurity strategies and policies aligned with the organization's objectives.
* Create and maintain security artifacts such as System Security Plans (SSPs), Risk Assessments, POA&Ms, and Security Assessment Reports (SARs).
* Ensure systems comply with applicable cybersecurity policies, procedures, and standards, including continuous monitoring and vulnerability management.
* Conduct comprehensive risk and vulnerability assessments to identify and mitigate risks.
* Manage Plans of Action & Milestones (POA&Ms) to track and remediate identified vulnerabilities.
* Ensure continuous compliance with Government (e.g., NIST, DoD) and industry standards.
* Track and report cybersecurity events, coordinate incident response activities, and ensure timely remediation of identified risks.
* Assist in preparing systems for assessment and authorization.
Please note that this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job.
Qualifications
* Must be a U.S. Citizen.
* Must be able to obtain and maintain an active DoD Secret Clearance.
* IAT Level II Certification equivalent or higher per DoD 8570/DoD 8140 (CompTIA Security+ CE, CCNA Security, GICSP, GSEC, SSCP, etc.).
* Two (2+) years of relevant analysis experience within an ISSO role.
* Ability to produce clear, detailed security documentation and effectively communicate with technical and non-technical stakeholders.
* Hands-on experience with vulnerability scanners, SIEM tools, endpoint protection, and configuration management systems.
Preferred:
* DoD Secret Clearance
* BA/BS in Information Technology, Cybersecurity, or related field.
* Proficiency with Microsoft Office products.
* Experience creating and modifying documentation for technical processes and procedures.
* Experience working in a Department of Defense (DoD) environment.
* A problem solver and troubleshooter who thrives in resolving complex problems.
* Excellent communication skills (written and oral) and interpersonal skills.
* Excellent organizational skills, attention to detail, and ability to prioritize and manage multiple tasks.
Salary Range: $80,000 - $112,000
Several factors influence the final salary or hourly rate, including but not limited to contract wage determinations, relevant work experience, role-specific skills and competencies, geographic location, educational background, certifications, and federal government contract labor categories.
Additional Information
Link Solutions Inc. offers a competitive compensation and benefits package to include paid holidays, paid time off, medical, dental, vision, company-paid long and short-term disability, life insurance, referral bonuses, relocation incentive program, certification reimbursement program, retirement, and more.
Link Solutions, Inc. is an EOE. AA/M/F/D/V. We participate in the E-Verify Employment Verification Program. All your information will be kept confidential according to EEO guidelines.
Information Assurance Analyst
Security engineer job in Bel Air, MD
Job DescriptionDescription:
Information Assurance Analyst
Clearance Level: Secret Salary: $90,000 - $105,000
Areli is seeking a detail-oriented and knowledgeable Information Assurance Analyst to support the development, maintenance, and continuous improvement of IT system policies and Standard Operating Procedures (SOPs). This role is critical to ensuring compliance with federal cybersecurity standards and supporting the Risk Management Framework (RMF) lifecycle.
Duties and Responsibilities:
Develop, update, and maintain cybersecurity policies, SOPs, and related documentation for IT systems.
Ensure all documentation aligns with NIST SP 800-53 security controls and RMF requirements.
Collaborate with system owners, ISSOs, stakeholders and IT system support teams to gather technical and procedural information required for test results and documentation.
Input and manage control test results and system security documentation within the Enterprise Mission Assurance Support Service (eMASS) system.
Support the preparation of Assessment and Authorization (A&A) packages within eMASS.
Track and report on documentation status, updates, and compliance metrics.
Assist in internal audits and inspections to ensure documentation meets regulatory and operational standards.
Provide training and guidance on policy and SOP development to technical teams
Requirements:
Required Qualifications:
U.S. Citizenship
Active DoD Secret clearance
Bachelor's degree in Cybersecurity, Information Technology, or related field
DoD Cyber Workforce Foundational Qualification: CompTIA Security+ certification
DoD Manual 8140.03 approved Cybersecurity Certification such as ISC2 CC, ISC2 CGRC, CompTIA CASP+, CompTIA, or GAIC GSEC
3 years of experience in cybersecurity documentation, policy development, or RMF support.
Strong working knowledge of NIST SP 800-53, NIST SP 800-37, DoDI 8510.01 and the RMF process.
Hands-on experience with eMASS, including documentation, test result entry, package management and workflow management.
Excellent written and verbal communication skills.
Ability to work independently and collaboratively in a fast-paced, mission-driven environment.
Preferred Qualifications:
Familiarity with other NIST publications referenced in eMASS (e.g., SP 800-37, SP 800-30, and SP 800-47).
Experience supporting cloud-based Army IT systems.
Areli is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, veteran status, or on the basis of disability.
Network Engineer
Security engineer job in Dover, DE
We are seeking a highly skilled and proactive Network Engineer to join our dynamic IT team. In this role, you will be responsible for designing, implementing, maintaining, and supporting complex network infrastructure across diverse environments. Your expertise will ensure the stability, security, and scalability of our network systems, enabling seamless communication and data flow within the organization. The ideal candidate will possess comprehensive knowledge of computer networking principles, advanced experience with network security protocols, and a strong background in managing both on-premises and cloud-based network solutions.
Duties
Design, deploy, and optimize wide-area networks (WAN) and local-area networks (LAN), ensuring high performance and reliability.
Configure and manage Cisco networking equipment including routers, switches, ASA firewalls, Meraki devices, and Juniper systems.
Implement and maintain network security measures such as VPNs (Virtual Private Networks), IDS (Intrusion Detection Systems), IDS/IPS (Intrusion Prevention Systems), Cisco ISE for identity services, PKI (Public Key Infrastructure), LDAP authentication, SSL/TLS encryption, and firewall policies.
Support data center operations by managing SAN (Storage Area Network), VMware vSphere environments, high availability configurations, and server virtualization platforms.
Monitor network performance using tools like SolarWinds, PRTG Network Monitor, and Splunk; perform vulnerability assessments; conduct regular network security audits; and respond swiftly to incidents.
Manage network infrastructure components including DHCP, DNS, NFS (Network File System), GPO (Group Policy Objects), load balancing solutions, and SDLC (Software Development Life Cycle) processes.
Automate routine tasks using scripting languages such as Bash shell scripting, PowerShell, Python, and tools like Ansible.
Oversee remote access solutions including SSH, SFTP, remote desktop software, VPNs (IPsec/IPsec VPNs), and cloud security configurations on platforms such as AWS and Azure.
Collaborate with cross-functional teams to plan network installation projects; implement network architecture improvements; support telecommunication systems; and ensure compliance with ITIL best practices.
Conduct capacity planning for future growth; implement network management strategies; optimize routing protocols like OSPF, EIGRP, BGP; and maintain documentation of network topology.
Qualifications
Bachelor's degree in Computer Science, Information Technology, or a related field.
Proven experience in computer networking with a focus on enterprise environments.
Extensive knowledge of TCP/IP protocols, routing protocols (OSPF, EIGRP, BGP), VLANs, VLAN routing (Inter-VLAN routing), MPLS networks.
Hands-on experience with Cisco IOS/IOS-XE operating systems; Cisco ASA firewalls; Meraki cloud-managed networking; Juniper devices; open SUSE/Linux distributions such as Debian/Ubuntu/CentOS/Red Hat for system administration.
Familiarity with cloud platforms including AWS and Azure for cloud security integration.
Strong understanding of network security principles including encryption methods, SSO (Single Sign-On), LDAP integration, vulnerability assessment techniques.
Experience with virtualization technologies like VMware vSphere/vCenter; Citrix solutions; SAN/NAS storage management.
Proficiency in scripting languages such as Bash or PowerShell for automation tasks.
Knowledge of DevOps practices related to network automation and configuration management tools like Ansible.
Ability to troubleshoot complex network issues efficiently across diverse hardware/software environments.
Excellent communication skills to convey technical information clearly to both technical teams and non-technical stakeholders.
Certifications such as CCNA/CCNP/CCIE or equivalent are highly desirable. If you are passionate about advancing your career in a challenging environment that values innovation and expertise in network engineering-apply today to become an integral part of our organization's technological foundation.
Security Engineer
Security engineer job in Dover, DE
Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page.
**Required Skills:**
Security Engineer Responsibilities:
1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices.
2. Build machine attestation and secure certificate storage solutions to enable strong client trust.
3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices.
4. Develop, validate, and enforce our client security policies.
5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services.
6. Advise and collaborate with other teams.
7. Telecommuting from anywhere in the U.S. allowed.
**Minimum Qualifications:**
Minimum Qualifications:
8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation
9. Requires 12 months of experience involving the following:
10. PHP, Golang, Python, C/C++, Rush, or Ruby
11. Designing and deploying security infrastructure such as PKI, key management, and certificate management
12. Endpoint Security & Management
13. Certificate Lifecycle
14. Devices & OS hardening and security policies
15. Identity & Access Management (Authentication & Authorization, SSO)
16. Network Security and
17. Programming and Code Review
**Public Compensation:**
$178,041/year to $200,200/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Engineer, Information Security and Risk
Security engineer job in Dover, DE
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Analyst
Security engineer job in Riverside, MD
**MANTECH** seeks a motivated, career and customer-oriented **Information Security Analyst** to join our team in **Belcamp, MD** . This is an onsite position. The Information Security Analyst will work in support of the Army for the Network Modernization & Mission Network Technical Service Support program (NetMod). NetMod sets forth the work efforts required to provide product technical support services for systems and equipment being produced, fielded, modified or supported by PdM Network Modernization (NetMod) and PdM Mission Network of the Project Manager (PM) Tactical Network (TN) of the Program Executive Office for Command Control and Communications-Tactical (PEO C3T). This support may also include future systems and equipment that is acquired for the Army to maintain its technological advantage.
**Job responsibilities include but are not limited to:**
+ Providing network environment and advanced level computing environment support.
+ Paying special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured.
+ Collecting data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment.
+ Applying analytical skills to this data and all compliance with relevant non-technical controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts.
+ Conduct vulnerability assessments, risk analysis, and incident responses.
+ Actively monitoring network traffic for suspicious activity and potential security breaches.
+ Identify weaknesses in systems and applications to proactively address security risks.
**Minimum Qualifications:**
+ Bachelor's degree in Science and 5+ years of relevant experience.
+ 3+ years in the Department of Defense performing information management related duties.
+ Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement.
+ Possess an understanding of network protocols and security principles.
+ Demonstrated experience in security tools and technologies (firewalls, intrusion detection/prevention systems, SIEM).
+ Experience with vulnerability scanning and penetration testing.
+ Possess analytical and problem-solving skills to identify and address security threats.
**Preferred** **Qualifications:**
+ Basic understanding of programming
+ Experience with participating in simulated cyberattacks to identify vulnerabilities in systems and applications.
+ Experience updating and implementing complex security systems for an organization.
**Clearance Requirements:**
+ Must be a US citizen and have a current/active Secret clearance.
**Physical Requirements:**
+ Must be able to remain in a stationary position 50% of the time.
+ Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
+ Frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
Cybersecurity Information System Security Officer (ISSO)
Security engineer job in Aberdeen Proving Ground, MD
Link Solutions, Inc. delivers reliable and effective Information Technology services to government clients in support of critical mission needs. Delivering a broad range of Infrastructure Operations, Application Development, Cybersecurity, Virtualization, Cloud and Mobility services.
If you're looking for a technology company that values innovation, with a vision toward the future of the technology landscape, look no further than Link Solutions! Link is quality and compliance-focused, under our guiding philosophy, “Mission First, Customer Always".
We are ISO 9001:2015, ISO 20000-1:2018, ISO 27001:2022 certified and appraised for CMMI ML3 for Services and Development.
Link Solutions is seeking a Cybersecurity Information System Security Officer (ISSO) to join our team in Aberdeen Proving Ground, MD.
Must be a U.S. Citizen
DoD Secret Clearance required
Non-remote (relocation incentive available)
The Cybersecurity Information System Security Officer (ISSO) will serve as front-line support for mission-critical personnel at the U.S. Army Combat Capabilities Development Command Chemical Biological Center (DEVCOM)
.
The ISSO will be responsible for supporting the implementation of cybersecurity controls, risk assessments, and compliance activities for Army systems and cloud applications. Our ISSO will work collaboratively with Army stakeholders to strengthen governance, risk, and compliance efforts to ensure DoD compliance.
Join a team of dedicated professionals at an industry-leading organization, where you will work on innovative projects that contribute to national security. This position offers significant opportunities for career advancement and professional growth while supporting critical missions and operations.
Job Responsibilities:
Develop and implement cybersecurity strategies and policies aligned with the organization's objectives.
Create and maintain security artifacts such as System Security Plans (SSPs), Risk Assessments, POA&Ms, and Security Assessment Reports (SARs).
Ensure systems comply with applicable cybersecurity policies, procedures, and standards, including continuous monitoring and vulnerability management.
Conduct comprehensive risk and vulnerability assessments to identify and mitigate risks.
Manage Plans of Action & Milestones (POA&Ms) to track and remediate identified vulnerabilities.
Ensure continuous compliance with Government (e.g., NIST, DoD) and industry standards.
Track and report cybersecurity events, coordinate incident response activities, and ensure timely remediation of identified risks.
Assist in preparing systems for assessment and authorization.
Please note that this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job.
Qualifications
Must be a U.S. Citizen.
Must be able to obtain and maintain an active DoD Secret Clearance.
IAT Level II Certification equivalent or higher per DoD 8570/DoD 8140 (CompTIA Security+ CE, CCNA Security, GICSP, GSEC, SSCP, etc.).
Two (2+) years of relevant analysis experience within an ISSO role.
Ability to produce clear, detailed security documentation and effectively communicate with technical and non-technical stakeholders.
Hands-on experience with vulnerability scanners, SIEM tools, endpoint protection, and configuration management systems.
Preferred:
DoD Secret Clearance
BA/BS in Information Technology, Cybersecurity, or related field.
Proficiency with Microsoft Office products.
Experience creating and modifying documentation for technical processes and procedures.
Experience working in a Department of Defense (DoD) environment.
A problem solver and troubleshooter who thrives in resolving complex problems.
Excellent communication skills (written and oral) and interpersonal skills.
Excellent organizational skills, attention to detail, and ability to prioritize and manage multiple tasks.
Salary Range: $80,000 - $112,000
Several factors influence the final salary or hourly rate, including but not limited to contract wage determinations, relevant work experience, role-specific skills and competencies, geographic location, educational background, certifications, and federal government contract labor categories.
Additional Information
Link Solutions Inc. offers a competitive compensation and benefits package to include paid holidays, paid time off, medical, dental, vision, company-paid long and short-term disability, life insurance, referral bonuses, relocation incentive program, certification reimbursement program, retirement, and more.
Link Solutions, Inc. is an EOE. AA/M/F/D/V. We participate in the E-Verify Employment Verification Program. All your information will be kept confidential according to EEO guidelines.
Engineer, Information Security and Risk
Security engineer job in Dover, DE
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************