As a Lead Consultant in Capital One's Cyber Information Security Office (ISO), you will work closely with our cybersecurity team and with extended technical teams to manage and improve the cybersecurity posture specifically related to Card Servicing & Experiences Portfolio. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. Security is essential to what we do here, from protecting our customers to our associates .
Responsibilities:
Act as a central Information Security point of contact for a portfolio of voice and customer servicing technology assets.
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
About You:
Strong technical architecture background with the ability to proactively identify and mitigate technical risks throughout delivery life-cycle
Exceptional communication and collaboration skills
Excellent problem solving and influencing skills
Strong desire to continually learn and solve security problems involving new technologies
You are able to work well under minimal supervision
Ability to simplify the technically complex and drive well-educated decisions across product, engineering, design, and enterprise risk representatives
Exceptional cross-team collaboration; able to work across different functions, organizations, and reporting boundaries to get the job done.
Basic Qualifications :
High School Diploma, GED, or equivalent certification
At least 4 years of experience providing guidance and oversight of cyber security concepts
At least 3 years of experience performing cyber security risk assessments and cyber security architecture reviews
At least 3 years of experience with architecture, software design, networking or cloud infrastructure
Preferred Qualifications :
Bachelor's Degree
6+ years of experience with Architecture, software design, networking or Cloud infrastructure
4+ years of experience in securing a public cloud environment (AWS, GCP, or Azure)
2+ years of experience utilizing Agile methodologies
2+ years of experience in Enterprise Monitoring
2+ years of experience in web application security
AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP)
At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, or another type of work authorization).
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
McLean, VA: $197,300 - $225,100 for Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
$197.3k-225.1k yearly 7h ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Engineer
CSA Global LLC 4.3
Security engineer job in Fort Indiantown Gap, PA
Client Solution Architects (CSA) is currently seeking a Cyber SecurityEngineer to support our program at Fort Indiantown Gap, PA. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
This position is contingent on contract award.
How Role will make an impact:
* Maintains the appropriate operational security posture and documentation for MCTSP information systems
* Implementing DoD, Army, ARNG, and MCTSP information security policies
* Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections
* RMF document and artifact management
* Managing and tracking the IAVM system
* Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures.
Requirements
What you'll need to have to join our award-winning team:
* Clearance: Must possess and maintain an active Secret Clearance.
* Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience.
* IAT II Certification
* 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems.
* 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises;
* 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises
Why You'll Love this Job:
* Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission.
* You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge.
* Daily opportunities to develop new skills
* Team environment
What We Can Offer You:
* Compensation
* Health & Wellbeing
* We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
* Personal & Professional Development
* We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division.
* Diversity, Inclusion & Belonging
* We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
* Benefits
* Healthcare (medical, dental, vision, prescription drugs)
* Pet Insurance
* 401(k) savings plan
* Paid Time Off (PTO)
* Holiday pay opportunities
* Basic life insurance
* AD&D insurance
* Company-paid Short-Term and Long-Term Disability
* Employee Assistance Program
* Tuition Support Options
* Identity Theft Program
$92k-130k yearly est. 60d+ ago
Senior AI Security Researcher
Cmu
Security engineer job in Pittsburgh, PA
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research areas that will impact academia, industry, and national security? If so, we want you for our team, where you'll collaborate to deliver high-quality results in the emerging area of AI security.
The CERT Division of the Software Engineering Institute (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm - in 1988, CERT has remained a leader in cybersecurity research, improving the robustness of software systems, and in responding to sophisticated cybersecurity threats. Ensuring the robustness and security of AI systems is the next big challenge on the horizon, and we are seeking life-long learners in the fields of cybersecurity, AI/ML, or related areas, who are willing to cross-train to address AI Security.
As part of the Threat Analysis Directorate, you will join a group of security experts focused on advancing the state of the art in AI security at a national and global scale. Our tasks include vulnerability discovery and assessments for AI systems, evaluation of the effectiveness and robustness of defenses and mitigations for AI systems, reverse engineering AI systems and models, and identifying new areas where security research is needed. We participate in communities of network defenders, software developers and vendors, security researchers, AI practitioners, and policymakers. You'll get a chance to work with elite AI and cybersecurity professionals, university faculty, and government representatives to build new methodologies and technologies that will influence national AI security strategy for decades to come.
You will co-author research proposals, execute studies, and present findings and recommendations to our DoD sponsors, decision makers within government and industry, and at academic conferences. The SEI is a non-profit, federally funded research and development center (FFRDC) at Carnegie Mellon University.
What you'll do:
Develop state of the art approaches for analyzing robustness of AI systems.
Apply these approaches to understanding vulnerabilities in AI systems and how attackers adapt their tradecraft to exploit those vulnerabilities.
Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and complex threats to AI systems and effectively participate in the broader security community.
Study and influence the AI security and vulnerability disclosure ecosystems.
Evaluate the effectiveness of tools, techniques and processes developed by industry and the AI security research community.
Uncover and shape some of the fundamental assumptions underlying current best practice in AI security.
Develop thought models, tools and data sets that can be used to characterize the threats to, and vulnerabilities in, AI systems, and publish those results. You will also use these results to aid in the testing, evaluation and transition of technologies developed by government-funded research programs.
Identify opportunities to apply AI to improve existing cybersecurity research.
Who you are:
You have BS in machine learning, cybersecurity, statistics, or related discipline with ten (10) years of experience; OR MS in the same fields with eight (8) years of experience; OR PhD in the same fields with five (5) years of experience.
You have a deep interest in AI/ML and cybersecurity with a penchant for intellectual curiosity and a desire to make an impact beyond your organization.
You have practical experience with applying cybersecurity knowledge toward vulnerability research, analysis, disclosure, or mitigation.
You have experience with advising on a range of security topics based on research and expert opinion.
You have familiarity with implementing and applying AI/ML techniques to solving practical problems.
You have familiarity with common AI/ML software packages and tools (e.g., Numpy, Pytorch, Tensorflow, ART).
You have knowledge or familiarity with reverse engineering tools (e.g. NSA Ghidra, IDA Pro)
You have experience with Python, C/C++, or low-level programming.
You have experience developing frameworks, methodologies, or assessments to evaluate effectiveness and robustness of technologies.
You have excellent communication skills (oral and written), particularly regarding technical communications with non-experts.
You enjoy mentoring and cross-training others and sharing knowledge within the broader community.
Candidates with strong technical proficiency in either AI/ML or cybersecurity are welcome to apply, provided a demonstrated intellectual agility and commitment required for accelerated learning within the role.
You are able to:
Travel to various locations to support the SEI's overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion (5%).
You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.
Why work here?
Join a world-class organization that continues to have a significant impact on software.
Work with cutting-edge technologies and dedicated experts to solve tough problems for the government and the nation.
Be surrounded by friendly and knowledgeable staff with broad expertise across AI/ML, cybersecurity, software engineering, risk management, and policy creation.
Get 8% monthly contribution for your retirement, without having to contribute yourself.
Get tuition benefits to CMU and other institutions for you and your dependent children.
Enjoy a healthy work/life balance with flexible work arrangements and paid parental and military leave.
Enjoy annual professional development opportunities; attend conferences and training or obtain a certification and get reimbursed for membership in professional societies.
Qualify for relocation assistance and so much more.
Joining the CMU team opens the door to an array of exceptional benefits.
Benefits eligible employees enjoy a wide array of benefits including comprehensive medical, prescription, dental, and vision insurance as well as a generous retirement savings program with employer contributions. Unlock your potential with tuition benefits, take well-deserved breaks with ample paid time off and observed holidays, and rest easy with life and accidental death and disability insurance.
Additional perks include a free Pittsburgh Regional Transit bus pass, access to our Family Concierge Team to help navigate childcare needs, fitness center access, and much more!
For a comprehensive overview of the benefits available, explore our Benefits page.
At Carnegie Mellon, we value the whole package when extending offers of employment. Beyond credentials, we evaluate the role and responsibilities, your valuable work experience, and the knowledge gained through education and training. We appreciate your unique skills and the perspective you bring. Your journey with us is about more than just a job; it's about finding the perfect fit for your professional growth and personal aspirations.
Are you interested in an exciting opportunity with an exceptional organization?! Apply today!
Location
Pittsburgh, PA
Job Function
Software/Applications Development/Engineering
Position Type
Staff - Regular
Full Time/Part time
Full time
Pay Basis
Salary
More Information:
Please visit āWhy Carnegie Mellonā to learn more about becoming part of an institution inspiring innovations that change the world.
Click here to view a listing of employee benefits
Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.
Statement of Assurance
$81k-119k yearly est. Auto-Apply 60d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Security engineer job in Harrisburg, PA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 53d ago
Cyber Security Engineer
Microbac 4.0
Security engineer job in Cranberry, PA
Come join our family! Microbac Laboratories is an essential business offering competitive pay and benefits including medical, dental, vision, life insurance, disability, generous paid time off including vacation, holidays and flex-time, a wellness program, referral bonus, tuition reimbursement and more!
Whether you are just starting your career in science or looking to further it, Microbac will put you on the path of an exciting career with room to grow. Quality, safety, giving back to our communities, diversity and inclusion, customer success and employee wellbeing are part of our core culture. We are looking for motivated individuals to join our family as a Cybersecurity Engineer.
ABOUT MICROBAC
Microbac Laboratories, Inc. is a premier commercial laboratory testing firm that partners with clients worldwide, offering laboratory solutions to the life science, food and nutrition, and environmental industries and serves our clients with the utmost expertise and respect for their market requirements, constraints, and challenges. We embody a company-wide commitment to exceptional customer experience, which has been refined over nearly 50 years of trusted, analytical and measurement experience.
Through our network of laboratories, offices, and field services, we have the flexibility to meet the unique requirements for each client, project, and scope.
As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and nutrition and life science markets.
JOB SUMMARY
We are seeking a hands-on Cybersecurity Engineer to own day-to-day security operations and incident response across our network of 30+ laboratories. This role is execution-focused and ideal for a candidate who enjoys working in lean environments, partnering closely with Infrastructure and Quality teams, and directly configuring and operating security controls.
You will serve as the primary escalation point for security incidents while helping mature the organization's security posture as the business grows.
Essential Functions:
Own daily cybersecurity operations, monitoring alerts and responding to incidents
Act as the primary escalation point for security events
Lead incident response from detection through remediation and root cause analysis
Configure and maintain security controls across business platforms
Manage identity, access controls, MFA, Conditional Access, and privileged access models
Perform hands-on investigations
Develop, test, and maintain incident response playbooks and escalation paths
Create security policies and translate them into enforceable technical controls
Partner closely with Infrastructure on architecture, network changes, cloud services, and new tools
Continuously assess risk, identify gaps, and implement practical security improvements
Partner with Quality to ensure compliance with industry standard regulations
Set a positive example through high standards and professional conduct.
Continuously monitor emerging cybersecurity threats, regulatory changes, and industry best practices to keep organizational security strategies current and effective.
Other duties as assigned.
Minimum Requirements:
Bachelor's degree in Computer Science, Information Systems or related field.
3+ years of experience in cybersecurity related positions
Willingness to travel to lab locations as needed to provide on-site IT support.
Preferred Qualifications:
Certifications: CompTIA Security+, CompTIA CySA+, GSEC, CompTIA PenTest+, CCSP, CISSP, CISM
Knowledge of advanced persistent threats (APTs) and their tactics, techniques, and procedures (TTPs)
Fundamental understanding of Windows, Mac OSX, and Linux operating systems
Fundamental understanding of OSI model, basic networking and troubleshooting concepts
Experience with programming or scripting, including PowerShell, Bash, Python, Yara, and Perl
Experience in managing SSO/IAM, email security, phishing and user awareness training
Experience in EDR platforms
Experience with cloud deployments such as Azure, AWS or similar platforms
Experience working with distributed teams and other cross functional stakeholders
Familiarity with commercial solutions for logging and security event management, including SIEM or SOAR platforms
Familiarity with vulnerability management and IDS/IPS
Demonstrated intermediate experience with security incident detection, response frameworks, and established incident handling procedures Understanding and knowledge of various log formats from a variety of network and computer devices
Knowledge of Cyber risks and threats related to Cyber attackers
Knowledge of recent Cyber events and interpreting kill chain process and threat impacts
Presentation, analytical, and critical-thinking skills
Ability to manage competing priorities and workload
WORKING CONDITIONS AND PHYSICAL REQUIREMENTS
The physical demands and working conditions described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Physical Requirements:
While performing the duties of this job, the employee is regularly required to use hands to finger, handle, or feel objects, tools; talk or hear. The employee is occasionally required to stand, walk, and sit.
The employee must occassionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include color vision and depth perception.
Working Conditions:
Home internet acceptable for remote computer work.
The noise level in the work environment is usually moderate.
This job may require travel less than 20%
As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and life science markets.
OTHER:
This is not an exhaustive list of all duties an employee may be required to perform. Microbac reserves the right to revise the job description at any time.
Employment is at-will. Microbac, promotes a drug-free, alcohol-free workplace. Applicants considered for hire must pass a drug test before beginning work. Refusal to submit to testing will result in disqualification of further employment consideration.
Microbac is an Equal Opportunity Employer - We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. All qualified applicants will receive consideration for employment.
$81k-111k yearly est. 7d ago
Security Systems Engineer
Dagostino Electronic Services 4.1
Security engineer job in Pittsburgh, PA
The Systems Engineer position is responsible for providing full cycle implementation and support of customer systems, while working across multiple company departments to ensure full client satisfaction. Under the direction of a manager or dispatcher, coordinates the design and maintenance of all access control, intrusion, and video surveillance systems. Incumbent receives and evaluates work orders and requests, investigates requests and troubleshoots problems where appropriate, establishes priorities and coordinates with contractors, when required.
Requirements
Essential functions and responsibilities:
Assists with security systems integration, mapping and software updates and helps train personnel in the use of these systems.
Assists on new projects in both existing areas and new construction helping with security assessments, vendor selection, technology upgrades, product selections, testing, field verification of systems and inspection of work in progress for compliance with standards
Assess work sites, conditions, and logistics for each project; Develop Method of Procedure based on pre-project assessment.
Design, develop and provide documentation of systems, configurations, and other pertinent information for the customer.
Communicate with clients to resolve issues in a professional and confidential manner; Develop and execute client specific solutions.
Manage the allocation of project resources, including software, hardware, tools, and related items specific to each customer and/or project.
Direct the work responsibilities of union labor personnel based on specific project needs.
Design and oversee training programs for new and existing customers; Determine which customers receive training.
Collaborate with Customer Relationship Managers on demonstrations for new and potential clients.
Perform installation, configuration, programming, and final commissioning of customer systems.
Work collaboratively with installation, project management and engineering teams.
Perform infrastructure services, including pulling cables, installing wall, and ceiling cabling, and installing surface mounted devices, as required.
Perform system wiring and terminations services, as required.
Deliver on-going remote and on-site technical support for existing customers and systems.
Additional responsibilities may be required as necessary, including but not limited to: Provide internal support for basic trouble shooting.
Organizes and manage parts stock and tools.
Perform other duties as needed.
Success factors/job competencies:
Effectively communicate both in writing and verbally
Work independently and prioritize multiple tasks and adapt to needed change
Analysis
Mechanical aptitude
Comprehend technical language and read and interpret blueprints, wiring diagrams, and schematics
Safety orientation
Customer Focus
Attention to Detail
Teamwork/Collaboration
Stay abreast of changes in security technology
Physical demands and work environment:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Individual will be required to travel to customer sites as needed.
While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts.
The employee is occasionally exposed to outside weather conditions and risk of electrical shock.
Individual will regularly be required to lift, push, pull, and carry up to 50 pounds, and occasionally up to 75 pounds.
Incumbent will be required to use a computer with keyboard, telephone, or handheld mobile device for extended periods of time, and office machinery as needed.
Incumbent must be able to read, see, hear, and speak.
Workdays and Shifts:
Position works Monday-Friday, daylight hours, and additional time as needed to complete work.
Education/Certification(s)/License(s) required:
Bachelor's Degree in Electronics, Information Technology or related field, or equivalent experience.
May be required to participate in safety trainings and/or certifications provided by the Company or customers.
Valid driver's license, as employee will be required to travel to local and overnight client sites as needed.
Manufacturer specific certifications, as required.
Responsible to maintain active certifications and obtain new and updated certifications as required by the Company.
Experience/Other required:
Position requires two (2) to three (3) years of relevant experience in the electronic services.
Strong knowledge of Microsoft Office.
Strong computer skills with advanced software aptitude.
Security systems to include, service and maintenance across a broad spectrum of access control, intrusion and video surveillance systems such as, Genetec, Milestone, Bosch, and DMP.
Applicants must be currently authorized to work in the United States on a full-time basis.
Visa sponsorship is not available for this position.
This is a full-time, in-person position, and candidates must be able to work from our office located in Pittsburgh, Pennsylvania.
$90k-127k yearly est. 60d+ ago
Cyber Security Systems Engineer
Penn State University
Security engineer job in Parkesburg, PA
APPLICATION INSTRUCTIONS: * CURRENT PENN STATE EMPLOYEE (faculty, staff, technical service, or student), please login to Workday to complete the internal application process. Please do not apply here, apply internally through Workday. * CURRENT PENN STATE STUDENT (not employed previously at the university) and seeking employment with Penn State, please login to Workday to complete the student application process. Please do not apply here, apply internally through Workday.
* If you are NOT a current employee or student, please click "Apply" and complete the application process for external applicants.
Approval of remote and hybrid work is not guaranteed regardless of work location. For additional information on remote work at Penn State, see Notice to Out of State Applicants.
POSITION SPECIFICS
We are searching for a self-motivated Cyber Security Systems Engineer to join our Research Office Information Technology Division at the Applied Research Laboratory (ARL) at Penn State University. The Research Office Information Technology Division provides systems design, administration, and support services for the enablement of key research functions. This is a research support position where building sustained awareness of research activities, documenting emerging needs, and advocating effectively to ensure that critical dependencies are resourced and addressed is paramount. Ideal candidates will possess a broad scope of information technology (IT) skills, the ability to establish and grow partnerships, and adapt quickly to emerging and complex needs.
ARL is an authorized DoD SkillBridge partner and welcomes all transitioning military members to apply.
You will:
* Lead ITS's engagement with the Research Office to:
* Bridge communication between researchers and ITS; translating complex research requirements into actionable, prioritized IT strategies
* Surface IT needs proactively and co-create solutions
* Develop a robust understanding of sponsor and research objectives to anticipate IT dependencies and construct/align technical solutions with sponsor goals
* Demonstrate understanding of research needs and priorities by acting as a partner in problem solving to identify solutions
* Develop and maintain documentation of current and emerging IT needs and priorities
* Advocate for research needs within ITS while providing information to support prioritization at the Lab leadership level
* Provide a broad scope of technical support for research related operations
* Ensure IT hardware and software follow proper system design, operations, configurations, and maintenance
* Generate and maintain system and process documentation
* Provide general consultative services to researchers on a broad scope of technology
* Provide field testing support at off-site locations
Required skills/experience areas include:
* Advanced Linux administration and support
* Broad scope of IT hardware (server, workstation, networking, peripherals, etc.)
* General scripting languages (Bash, PowerShell, Python, etc.)
* Containerization technologies (Docker, Podman, Kubernetes, Rancher, etc.)
* Ability to communicate clearly with technical and non-technical audiences in written and verbal form
* Exceptional ability to translate complex research objectives and technical requirements to both technical and non-technical audiences
* Exceptional problem-solving skills and the ability to leverage them to resolve technical and procedural issues
* Networking concepts and technologies
* Demonstrated ability to problem solve collaboratively, build relationships, and foster cohesion
* Current eligibility for access to classified information at the TS/SCI level or higher and may be subject to a government background investigation to upgrade clearance eligibility, if required
Preferred skills/experience areas include:
* Familiarity with DCSA, DoD, and/or IC Authorization to operate processes, procedures and framework
* Support of CI/CD pipelines (Bamboo, Jenkins, GitLab, etc.)
* Automation and management of Linux and Windows system configurations with scripting, policy, and management tools (shell scripting, Satellite, Puppet, Ansible, MCM, system and group policy, etc.)
* Vulnerability and security scanning tools (ACAS, Nessus, SCC, Trivy, Grype, SCAP, OpenSCAP, Evaluate STIG, etc.)
* Commercial, government, and DoD cloud computing environments
* Support of research computing environments and projects
Your working location can be hybrid on-site/work from home located in State College, PA. This position may require periodic travel to remote locations in support of testing. Questions related to flexible work should be directed to the hiring manager during the interview process.
MINIMUM EDUCATION, WORK EXPERIENCE & REQUIRED CERTIFICATIONS
If filled as Cyber Security Systems Engineer - Principal Professional, this position requires:
Master's Degree
8+ years of relevant experience; or an equivalent combination of education and experience accepted
Required Certifications:
None
If filled as Cyber Security Systems Engineer - Senior Professional, this position requires:
Bachelor's Degree
6+ years of relevant experience; or an equivalent combination of education and experience accepted
Required Certifications:
None
ARL's purpose is to research and develop innovative solutions to challenging scientific, engineering, and technology problems in support of the Navy, the Department of Defense (DoD), and the Intel Community (IC).
FOR FURTHER INFORMATION on ARL, visit our web site at ****************
BACKGROUND CHECKS/CLEARANCES
Employment with the University will require successful completion of background check(s) in accordance with University policies.
All positions at ARL require candidates to possess the ability to obtain a government security clearance; you will be notified during the interview process if this position is subject to a government background investigation. You must be a U.S. citizen to apply. Employment with the ARL will require successful completion of a pre-employment drug screen.
SALARY & BENEFITS
The salary range for this position, including all possible grades, is $86,300.00 - $164,000.00.THE PROPOSED SALARY RANGE MAY BE IMPACTED BY GEOGRAPHIC DIFFERENTIAL
Salary Structure - Information on Penn State's salary structure
Penn State provides a competitive benefits package for full-time employees designed to support both personal and professional well-being. In addition to comprehensive medical, dental, and vision coverage, employees enjoy robust retirement plans and substantial paid time off which includes holidays, vacation and sick time. One of the standout benefits is the generous 75% tuition discount, available to employees as well as eligible spouses and children. For more detailed information, please visit our Benefits Page.
CAMPUS SECURITY CRIME STATISTICS
Pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act and the Pennsylvania Act of 1988, Penn State publishes a combined Annual Security and Annual Fire Safety Report (ASR). The ASR includes crime statistics and institutional policies concerning campus security, such as those concerning alcohol and drug use, crime prevention, the reporting of crimes, sexual assault, and other matters. The ASR is available for review here.
EEO IS THE LAW
Penn State is an equal opportunity employer and is committed to providing employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. If you are unable to use our online application process due to an impairment or disability, please contact ************.
Federal Contractors Labor Law Poster
PA State Labor Law Poster
Penn State Policies
Copyright Information
Hotlines
$86.3k-164k yearly Auto-Apply 7d ago
Lead Info Security Engineer
Temple University Health System 4.2
Security engineer job in Philadelphia, PA
Your Tomorrow is Here!
Temple Health is committed to setting new standards for preventing, diagnosing and treating major diseases in our community and across the nation. Achieving that goal means investing in our employees' success through staff and leadership development. Our recruitment strategy is to attract and retain a diverse, high performing workforce that fosters a healthy, safe and productive environment for our patients and colleagues alike.
Your Tomorrow is Here!
Temple Health is a dynamic network of outstanding hospitals, specialty centers, and physician practices that is advancing the fight against disease, pushing the boundaries of medical science, and educating future healthcare professionals. Temple Health consists of Temple University Hospital (TUH), Fox Chase Cancer Center, TUH-Jeanes Campus, TUH-Episcopal Campus, TUH-Northeastern Campus, Temple Physicians, Inc., and Temple Transport Team. Temple Health is proudly affiliated with the Lewis Katz School of Medicine at Temple University.
To support this mission, Temple Health is continuously recruiting top talent to join its diverse, 10,000 strong workforce that fosters a healthy, safe and productive environment for its patients, visitors, students and colleagues alike. At Temple Health, your tomorrow is here!
Equal Opportunity Employer/Veterans/Disabled
An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
The Lead Information SecurityEngineer plays a crucial role in supervising the improvement, maintenance, and management of Temple Health's information security posture and related technologies. This position entails leading security projects, providing technical guidance and mentorship, overseeing blue team defensive operations and purple team exercises, coordinating vulnerability management, collaborating with business units and stakeholders, representing the security function, and managing vendor relationships including MSSPs, while working with cross functional IT and operational teams to ensure effective implementation and continuous enhancement of security controls and solutions
This role requires three days on-site (Tuesday, Wednesday and Thursday) at Temple Health Women's and Families Hospital.
Education
⢠Bachelor's Degree in Computer, Information Sciences or Business Administration (Required) or
⢠Combination of relevant education and experience may be considered in lieu of degree (Required)
Experience
⢠3 years experience in a Leading Information Security Programs including mentoring / managing junior securityengineers/analysts for organizations (Required)
⢠5 years experience leading Information security initiatives independently (Required)
⢠5 years experience with risk assessment tools, technologies, and methods (Required)
⢠7 years experience with anti-virus software, intrusion detection, firewalls, and content filtering (Required)
⢠General Experience with communicating network security issues to peers and management (Required)
⢠General Experience and knowledge with project management simultaneously leading and coordinating multiple projects (Required)
⢠General Experience leading and mentoring a team in a high performing collaborative team environment (Required)
⢠General Experience and knowledge with an in-depth understanding of hardware configurations, database management tools, query language, and application topologies (Required)
⢠General Experience and knowledge with analyzing, diagnosing, suggesting, and implementing process improvements (Required)
⢠General Experience in Healthcare IT (Preferred)
Licenses
⢠Cert Info Sys Security Prof (Required)
⢠GIAC Cert Incident Handler (Preferred)
⢠GIAC Penetration Tester (Preferred)
⢠GIAC Cert Forensic Examiner (Preferred)
$83k-107k yearly est. Auto-Apply 3d ago
Cyber Security
Forhyre
Security engineer job in Philadelphia, PA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
$73k-100k yearly est. 19d ago
Information Security Systems Engineer-Ss
McLaughlin Research Corporation 4.0
Security engineer job in Philadelphia, PA
McLaughlin Research has several openings (pending award) for Information Systems SecurityEngineers at the Naval Surface Warfare Center, Philadelphia Division.
The Information System SecurityEngineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying securityengineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments.
Requirements
Key Responsibilities
Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems.
Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series.
Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP.
Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals.
Cross-Functional Collaboration: Representing securityengineering on technical teams and interfacing with stakeholders to translate requirements.
Required Qualifications
Education: BS in Computer Science or relevant field.
Experience: 3-10 years in information securityengineering, with specific experience potentially needed for DoD or SAP environments.
Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP.
Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial.
Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance.
Equal Employment Opportunity Statement:
McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws.
EEO is the Law:
Applicants and employees are protected under Federal law from discrimination.
$74k-100k yearly est. 60d+ ago
Information Systems Security Engineer III (ISSE III)
Dynamic Solutions Technology LLC 4.0
Security engineer job in Philadelphia, PA
Job Description
Dynamic Solutions Technology, LLC, a premier strategic services firm that meets IT and Service needs for commercial and government clients, is seeking a full-time Information Systems SecurityEngineer III (ISSE III). This position is an exempt role that support will be provided on site in the government customer's area of operation in the Philadelphia, PA location.
----------------------------------------------------- Active Secret Clearance Required --------------------------------------
RESPONSIBILIES
Assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans, which include System Categorization Forms, Platform Information Technology (PIT) Determination
Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams,
Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M).
Execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO).
Identify and tailor IT and Cyber Security (CS) control baselines based on RMF guidelines and categorization of the RMF boundary.
Perform Ports, Protocols, and Services Management (PPSM).
Perform IT and CS vulnerability-level risk assessments.
Execute security control testing as required by a risk assessment or annual security review (ASR).
Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements.
Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS).
Develop and maintain system level IT and CS policies and procedures for respective RMF boundaries in accordance with guidance provided by the command ISSMs.
Implement and assess STIG and SRGs.
Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG.
Deploy security updates to Information System components.
Perform routine audits of IT system hardware and software components.
Maintain inventory of Information System components.
Participate in IT change control and configuration management processes.
Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Image or re-image assets that are part of the assigned RMF boundary.
Install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries' assets.
Assist with removal of Solid-State Drive (SSD), Hard Disk Drive (HDD) or other critical components of assets before destruction and removal from the RMF boundary.
Support configuration change documentation and control processes and maintaining DOD STIG Compliance.
Support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware; This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware.
Report compliance issues of network hardware to management to avoid operational loss of the network.
EXPERIENCE AND EDUCATION REQUIREMENTS:
Secret security clearance required
Bachelor's degree in computer science, information technology, or an equivalent STEM l degree from an accredited college or university.
Minimum five (5) years professional relevant experience:; or 7 years of professional experiance without bachalors degree
Must Meet DoD IAT-III level Certification Requirements: At a minimum 2-3 of one of the following certifications: CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP
Experience and Skills:
Excellent oral and written skills.
Excellent critical thinking skills.
Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook.
Ability to work independently and as a team member
Ability to learn and apply technical concepts to assigned duties
$79k-95k yearly est. 12d ago
3014 - Specialist, Information System Security III (SISS3)
AlakaʻI Services and Poe'Hana Group, Inc.
Security engineer job in Philadelphia, PA
Provide senior-level cybersecurity and information system security support for Navy systems by leading RMF activities, security authorization packages, continuous monitoring, and cybersecurity compliance in support of mission operations.
Key Responsibilities
Lead and support RMF Steps 1-6 for assigned Navy information systems
Develop and maintain SSPs, SAPs, SARs, POA&Ms, and security artifacts
Coordinate system authorization activities with Authorizing Officials (AOs)
Conduct risk assessments and vulnerability analysis
Support continuous monitoring, audits, and inspections
Advise leadership on cybersecurity risk and mitigation strategies
Qualifications (Citizenship, Education, Experience, Skills)
Citizenship: U.S. Citizenship required
Education: Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience)
Experience: Minimum 8 years cybersecurity / ISS experience; 5+ years RMF support
Skills: RMF; NIST 800-53; risk analysis; technical writing; coordination with government stakeholders
Required Systems, Tools, and Framework Experience
Frameworks: DoD RMF, NIST SP 800-53, 800-37, 800-30
Systems: eMASS, ACAS, HBSS, STIG Viewer
Tools: Nessus, SCAP, vulnerability scanning tools
Security Handling: CUI, controlled system documentation
We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.
$80k-114k yearly est. 6d ago
Information Security Analyst
Vurke
Security engineer job in Philadelphia, PA
About the Role: The Network SecurityEngineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations.
Responsibilities:
Configure and maintain firewalls, VPNs, and IDS/IPS systems.
Perform network security monitoring and incident response.
Conduct penetration testing and simulate attacks to identify weaknesses.
Harden routers, switches, and network devices.
Optimize performance without compromising security.
Requirements:
3+ years experience in network engineering/security.
Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls.
Experience with network protocols (TCP/IP, DNS, SSL, VPN).
CCNA Security, CCNP Security, or equivalent certifications.
Required Skills:
Information SecuritySecurity
$80k-114k yearly est. 60d+ ago
Specialist, Information System Security III (SISS3)
Armada Ltd. 3.9
Security engineer job in Philadelphia, PA
Job Description
Type: Full Time
Overtime Exempt: Exempt
Reports To: ARMADA HQ
Travel Required: Yes
Security Clearance Required: Active Secret Security Clearance
************CONTINGENT UPON AWARD***************
Duties & Responsibilities:
Specialist, Information System Security III (SISS3) will conduct risk and vulnerability assessments of planned and installed systems to identify vulnerabilities, risks and protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on package content and assessment results and documenting for the Security Controls Assessor's (SCA) and higher level review.
Execute Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Specialist, Information System Security III (SISS3) will conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate and represent the current risk posture of the system.
Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, Security Information and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS).
Specialist, Information System Security III (SISS3) will assess impacts from observed risks and report via the Cybersecurity Program chain of command.
Executing Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Perform the evaluation of system administrator, securityengineer, and/or system owner proposed corrections to ensure compliance and best-fit solution.
Specialist, Information System Security III (SISS3) will present and submit data to management, develop reports, and produce procedural documentation in a comprehensive and cohesive manner.
Perform risk management and securityengineering for Research, Development, Testing, and Evaluation (RDT&E) RMF Afloat systems include Information Assurance Vulnerability Management (IAVM) support, remediation, patching, scanning and associated boundary maintenance.
Specialist, Information System Security III (SISS3) will document residual risks in a plan of actions and milestones formatted in compliance with the current package system, currently eMASS.
Specialist, Information System Security III (SISS3) will maintain current vulnerability scan data and residual risk plan of actions and milestones in Vulnerability Remediation Asset Manager (VRAM).
Manage, attend, and support configuration control board practices.
Create and verify the accuracy of POA&Ms/RARs as identified by vulnerability actual test results.
Specialist, Information System Security III (SISS3) shall write technical documentation such as user manuals, reports, documentation, policies, presentations, Plan of Action and Milestones (POA&Ms), risk assessments, proposals, outlines, and summaries in support of both ashore and afloat systems across multiple platforms. Support developing of technical documents across multiple platforms including conļ¬guration management, milestone, issue tracking, web site content management and RMF documentation.
Specialist, Information System Security III (SISS3) may be required to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). The estimated number of trips is 14 per year (estimated 25%-30% travel).
Other duties as assigned.
Knowledge, Skills, and Abilities (KSAs):
Ability to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe).
Proficient in Microsoft Windows Operating System Administration, including Windows 11, Windows 10, Windows 7, and Windows XP (at a minimum).
Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance.
Possess excellent organizational and file management skills and the ability to plan and execute administrative work with little supervision.
Possess excellent oral and written communication skills.
Required Certifications:
Minimum of one (1) IAT Level II listed certificate required:
CompTIA Security+ (CE)
CompTIA CySA+
GIAC Security Essentials (GSEC)
ISC² SSCP (Systems Security Certified Practitioner)
Minimum/General Experience:
Five (5) years of experience in the following:
Cybersecurity, Engineering, Test and Evaluation (T&E) or Authorization and Assessment (A&A) (formerly C&A) related field.
Information Assurance tools such as Defense Information Systems Agency (DISA) Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS).
Command line interface, PowerShell, and performing automated tasking through use of code.
Minimum Education:
College degree in any technical discipline from an accredited college or university.
Disclaimer:
The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ******************
Special Notes: Relocation is not available for these jobs
ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
$84k-127k yearly est. 24d ago
Senior Manager, Information Security Office (ISO) Consultant
Capital One 4.7
Security engineer job in York, PA
Senior Manager, Information Security Office (ISO) Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
Responsibilities:
The Senior Lead ISO Consultant will provide cyber security architecture advisory support needed to build the Technology & Business capabilities on a novel Modern platform, that will enable customer set-up, use, and management of a Capital One Credit Card, including Data Product. In this role, the responsibilities will include:
Act as a central Information Security point of contact for the Global Payment Networks line of business
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Collaborating with enterprise cyber teams and tech architects in defining and driving the cyber architecture strategy and guiding principles for the architecting and designing of the modern platforms.
Support security architecture and implementation needs for technology modernization efforts
Overseeing all cyber related dependencies across the multiple components being built for the modernization effort.
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad-hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Support the team on collectively mapping technologies to a standardized framework in order to identify and execute on best practices in risk reduction through the configuration of cybersecurity tools and platforms.
Support the development, modification, and use of capability, risk, or threat classification frameworks and standardization methodologies to facilitate the conduct of correlative capability, maturity, and effectiveness evaluations.
Support data validation and communications on the impact of identified operational, compliance, process, control, and tooling gaps and potential remediation courses of action to multiple audiences, including leadership, to support the enhancement of their cybersecurity postures.
About You:
You have a desire to work in a very fast moving, forward leaning, and modern computing environment
You have a deep passion for Securing modern computing platforms
You have a strong desire to continually learn about new technologies
You possess strong conceptual thinking and communication skills
You are able to work well under minimal supervision
You are a demonstrated leader with team-oriented interpersonal skills and the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors
You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality
You have a deep understanding of strategic business objectives and the ability to drive results toward those objectives
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 6 years of experience working in cybersecurity or information technology
At least 5 years of experience providing guidance and oversight of cyber security concepts
At least 5 years of experience performing cyber security risk assessments or cyber security architecture reviews
At least 4 years of experience with cloud security
Preferred Qualifications:
Bachelor's Degree
7+ years of experience in securing a public cloud environment (AWS, GCP, Azure)
6+ years of cyber security advisory and technology consulting experience
6+ years of experience in Cyber Risk Management
3+ years of experience on cryptography, HSMs and similar systems
Knowledge of HPNS, ATM, Mainframe technologies and other payment networks infrastructure technologies
Experience in security integration for Mergers and Acquisitions
Experience with PCI and Payment Network Compliance.
Professional certifications AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
At this time, Capital One will not sponsor a new applicant for employment authorization, or offer any immigration related support for this position (i.e. H1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN, E-2, E-3, L-1 and O-1, or any EADs or other forms of work authorization that require immigration support from an employer).
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
Chicago, IL: $209,000 - $238,500 for Sr Manager, Cyber Technical
McLean, VA: $229,900 - $262,400 for Sr Manager, Cyber Technical
New York, NY: $250,800 - $286,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI). Incentives could be discretionary or non discretionary depending on the plan. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website . Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer (EOE, including disability/vet) committed to non-discrimination in compliance with applicable federal, state, and local laws. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections ; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at 1- or via email at . All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
$83k-108k yearly est. 7h ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Security engineer job in Harrisburg, PA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 53d ago
Cyber Security Engineer
Microbac 4.0
Security engineer job in Cranberry, PA
Come join our family! Microbac Laboratories is an essential business offering competitive pay and benefits including medical, dental, vision, life insurance, disability, generous paid time off including vacation, holidays and flex-time, a wellness program, referral bonus, tuition reimbursement and more!
Whether you are just starting your career in science or looking to further it, Microbac will put you on the path of an exciting career with room to grow. Quality, safety, giving back to our communities, diversity and inclusion, customer success and employee wellbeing are part of our core culture. We are looking for motivated individuals to join our family as a Cybersecurity Engineer.
ABOUT MICROBAC
Microbac Laboratories, Inc. is a premier commercial laboratory testing firm that partners with clients worldwide, offering laboratory solutions to the life science, food and nutrition, and environmental industries and serves our clients with the utmost expertise and respect for their market requirements, constraints, and challenges. We embody a company-wide commitment to exceptional customer experience, which has been refined over nearly 50 years of trusted, analytical and measurement experience.
Through our network of laboratories, offices, and field services, we have the flexibility to meet the unique requirements for each client, project, and scope.
As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and nutrition and life science markets.
JOB SUMMARY
We are seeking a hands-on Cybersecurity Engineer to own day-to-day security operations and incident response across our network of 30+ laboratories. This role is execution-focused and ideal for a candidate who enjoys working in lean environments, partnering closely with Infrastructure and Quality teams, and directly configuring and operating security controls.
You will serve as the primary escalation point for security incidents while helping mature the organization's security posture as the business grows.
Essential Functions:
* Own daily cybersecurity operations, monitoring alerts and responding to incidents
* Act as the primary escalation point for security events
* Lead incident response from detection through remediation and root cause analysis
* Configure and maintain security controls across business platforms
* Manage identity, access controls, MFA, Conditional Access, and privileged access models
* Perform hands-on investigations
* Develop, test, and maintain incident response playbooks and escalation paths
* Create security policies and translate them into enforceable technical controls
* Partner closely with Infrastructure on architecture, network changes, cloud services, and new tools
* Continuously assess risk, identify gaps, and implement practical security improvements
* Partner with Quality to ensure compliance with industry standard regulations
* Set a positive example through high standards and professional conduct.
* Continuously monitor emerging cybersecurity threats, regulatory changes, and industry best practices to keep organizational security strategies current and effective.
* Other duties as assigned.
Minimum Requirements:
* Bachelor's degree in Computer Science, Information Systems or related field.
* 3+ years of experience in cybersecurity related positions
* Willingness to travel to lab locations as needed to provide on-site IT support.
Preferred Qualifications:
* Certifications: CompTIA Security+, CompTIA CySA+, GSEC, CompTIA PenTest+, CCSP, CISSP, CISM
* Knowledge of advanced persistent threats (APTs) and their tactics, techniques, and procedures (TTPs)
* Fundamental understanding of Windows, Mac OSX, and Linux operating systems
* Fundamental understanding of OSI model, basic networking and troubleshooting concepts
* Experience with programming or scripting, including PowerShell, Bash, Python, Yara, and Perl
* Experience in managing SSO/IAM, email security, phishing and user awareness training
* Experience in EDR platforms
* Experience with cloud deployments such as Azure, AWS or similar platforms
* Experience working with distributed teams and other cross functional stakeholders
* Familiarity with commercial solutions for logging and security event management, including SIEM or SOAR platforms
* Familiarity with vulnerability management and IDS/IPS
* Demonstrated intermediate experience with security incident detection, response frameworks, and established incident handling procedures Understanding and knowledge of various log formats from a variety of network and computer devices
* Knowledge of Cyber risks and threats related to Cyber attackers
* Knowledge of recent Cyber events and interpreting kill chain process and threat impacts
* Presentation, analytical, and critical-thinking skills
* Ability to manage competing priorities and workload
WORKING CONDITIONS AND PHYSICAL REQUIREMENTS
The physical demands and working conditions described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Physical Requirements:
* While performing the duties of this job, the employee is regularly required to use hands to finger, handle, or feel objects, tools; talk or hear. The employee is occasionally required to stand, walk, and sit.
* The employee must occassionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include color vision and depth perception.
Working Conditions:
* Home internet acceptable for remote computer work.
* The noise level in the work environment is usually moderate.
* This job may require travel less than 20%
As a privately held third-party testing company, Microbac operates with a commitment to safety, quality, and compliance. Our diverse work portfolio includes broad accreditation offerings and tested insights across the environmental, food and life science markets.
OTHER:
This is not an exhaustive list of all duties an employee may be required to perform. Microbac reserves the right to revise the job description at any time.
Employment is at-will. Microbac, promotes a drug-free, alcohol-free workplace. Applicants considered for hire must pass a drug test before beginning work. Refusal to submit to testing will result in disqualification of further employment consideration.
Microbac is an Equal Opportunity Employer - We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. All qualified applicants will receive consideration for employment.
$81k-111k yearly est. 5d ago
Lead Info Security Engineer
Temple University Health System 4.2
Security engineer job in Philadelphia, PA
The Lead Information SecurityEngineer plays a crucial role in supervising the improvement, maintenance, and management of Temple Health's information security posture and related technologies. This position entails leading security projects, providing technical guidance and mentorship, overseeing blue team defensive operations and purple team exercises, coordinating vulnerability management, collaborating with business units and stakeholders, representing the security function, and managing vendor relationships including MSSPs, while working with cross functional IT and operational teams to ensure effective implementation and continuous enhancement of security controls and solutions
This role requires three days on-site (Tuesday, Wednesday and Thursday) at Temple Health Women's and Families Hospital.
Education
* Bachelor's Degree in Computer, Information Sciences or Business Administration (Required) or
* Combination of relevant education and experience may be considered in lieu of degree (Required)
Experience
* 3 years experience in a Leading Information Security Programs including mentoring / managing junior securityengineers/analysts for organizations (Required)
* 5 years experience leading Information security initiatives independently (Required)
* 5 years experience with risk assessment tools, technologies, and methods (Required)
* 7 years experience with anti-virus software, intrusion detection, firewalls, and content filtering (Required)
* General Experience with communicating network security issues to peers and management (Required)
* General Experience and knowledge with project management simultaneously leading and coordinating multiple projects (Required)
* General Experience leading and mentoring a team in a high performing collaborative team environment (Required)
* General Experience and knowledge with an in-depth understanding of hardware configurations, database management tools, query language, and application topologies (Required)
* General Experience and knowledge with analyzing, diagnosing, suggesting, and implementing process improvements (Required)
* General Experience in Healthcare IT (Preferred)
Licenses
* Cert Info Sys Security Prof (Required)
* GIAC Cert Incident Handler (Preferred)
* GIAC Penetration Tester (Preferred)
* GIAC Cert Forensic Examiner (Preferred)
'395778
$83k-107k yearly est. 2d ago
Information Systems Security Engineer III (ISSE III)
Dynamic Solutions Technology 4.0
Security engineer job in Philadelphia, PA
Dynamic Solutions Technology, LLC, a premier strategic services firm that meets IT and Service needs for commercial and government clients, is seeking a full-time Information Systems SecurityEngineer III (ISSE III). This position is an exempt role that support will be provided on site in the government customer's area of operation in the Philadelphia, PA location.
----------------------------------------------------- Active Secret Clearance Required --------------------------------------
RESPONSIBILIES
Assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans, which include System Categorization Forms, Platform Information Technology (PIT) Determination
Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams,
Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M).
Execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO).
Identify and tailor IT and Cyber Security (CS) control baselines based on RMF guidelines and categorization of the RMF boundary.
Perform Ports, Protocols, and Services Management (PPSM).
Perform IT and CS vulnerability-level risk assessments.
Execute security control testing as required by a risk assessment or annual security review (ASR).
Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements.
Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS).
Develop and maintain system level IT and CS policies and procedures for respective RMF boundaries in accordance with guidance provided by the command ISSMs.
Implement and assess STIG and SRGs.
Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG.
Deploy security updates to Information System components.
Perform routine audits of IT system hardware and software components.
Maintain inventory of Information System components.
Participate in IT change control and configuration management processes.
Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Image or re-image assets that are part of the assigned RMF boundary.
Install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries' assets.
Assist with removal of Solid-State Drive (SSD), Hard Disk Drive (HDD) or other critical components of assets before destruction and removal from the RMF boundary.
Support configuration change documentation and control processes and maintaining DOD STIG Compliance.
Support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware; This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware.
Report compliance issues of network hardware to management to avoid operational loss of the network.
EXPERIENCE AND EDUCATION REQUIREMENTS:
Secret security clearance required
Bachelor's degree in computer science, information technology, or an equivalent STEM l degree from an accredited college or university.
Minimum five (5) years professional relevant experience:; or 7 years of professional experiance without bachalors degree
Must Meet DoD IAT-III level Certification Requirements: At a minimum 2-3 of one of the following certifications: CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP
Experience and Skills:
Excellent oral and written skills.
Excellent critical thinking skills.
Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook.
Ability to work independently and as a team member
Ability to learn and apply technical concepts to assigned duties
$79k-95k yearly est. 60d+ ago
3014 - Specialist, Information System Security III (SISS3)
Alakai Services and Poe'Hana Group, Inc.
Security engineer job in Philadelphia, PA
Provide senior-level cybersecurity and information system security support for Navy systems by leading RMF activities, security authorization packages, continuous monitoring, and cybersecurity compliance in support of mission operations.
Key Responsibilities
Lead and support RMF Steps 16 for assigned Navy information systems
Develop and maintain SSPs, SAPs, SARs, POA&Ms, and security artifacts
Coordinate system authorization activities with Authorizing Officials (AOs)
Conduct risk assessments and vulnerability analysis
Support continuous monitoring, audits, and inspections
Advise leadership on cybersecurity risk and mitigation strategies
Qualifications (Citizenship, Education, Experience, Skills)
Citizenship: U.S. Citizenship required
Education: Bachelors degree in Cybersecurity, IT, or related field (or equivalent experience)
Experience: Minimum 8 years cybersecurity / ISS experience; 5+ years RMF support
Skills: RMF; NIST 800-53; risk analysis; technical writing; coordination with government stakeholders
Required Systems, Tools, and Framework Experience
Frameworks: DoD RMF, NIST SP 800-53, 800-37, 800-30
Systems: eMASS, ACAS, HBSS, STIG Viewer
Tools: Nessus, SCAP, vulnerability scanning tools
Security Handling: CUI, controlled system documentation
We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.