Post job

Security engineer jobs in Troy, OH

- 148 jobs
All
Security Engineer
Information Systems Engineer
Information Security Analyst
Securities Analyst
Security System Engineer
Information Systems Security Officer
Security Architect
Network Security Consultant
Cyber Security Analyst
  • OT Security Cyber Prevention Engineer

    Honda Dev. and Mfg. of Am., LLC

    Security engineer job in Marysville, OH

    What Makes a Honda, is Who makes a Honda Honda has a clear vision for the future, and it's a joyful one. We are looking for individuals with the skills, courage, persistence, and dreams that will help us reach our future-focused goals. At our core is innovation. Honda is constantly innovating and developing solutions to drive our business with record success. We strive to be a company that serves as a source of “power” that supports people around the world who are trying to do things based on their own initiative and that helps people expand their own potential. To this end, Honda strives to realize “the joy and freedom of mobility” by developing new technologies and an innovative approach to achieve a “zero environmental footprint.” We are looking for qualified individuals with diverse backgrounds, experiences, continuous improvement values, and a strong work ethic to join our team. If your goals and values align with Honda's, we want you to join our team to Bring the Future! The Honda Development and Manufacturing Production Engineering team is responsible for the operational technology security of the manufacturing environment. The OT Security Cyber Prevention Engineer works across multiple technical and business areas to develop, implement, and maintain procedures, standards, and controls to prevent the risk or impact of a cyber incident. The scope of this function covers manufacturing equipment hardware/firmware/ software, OT enterprise systems, data analysis and reporting, and collaboration with IT/business users to ensure secure operation across all HDMA locations and equipment. New equipment introduction - set OT standards for new equipment, integrate equipment into the OT network, confirm vulnerabilities, perform risk assessments, and visibility of equipment within the asset management system. Training - support the creation, administration and maintenance of OT specific training material. Policies/procedures/auditing - create, issue, maintain, and audit OT specific policies and procedures. Access control (physical + logical) - set and implement technical standards for equipment level physical access and control access to OT related systems and equipment. OT standard creation - support the development, implementation, and maintenance of technical standards for the OT equipment and networks Risk metric management/assessments - establish company OT risk metrics and corresponding assessments to determine OT risk, perform risk assessments, and establish tools for visibility and reporting. Sensing/industry benchmarking - research technical and business OT security industry benchmarks and generate recommendations for adjustments to internal tools or practices to stay in alignment. What differentiates Honda and makes us an employer of choice? Total Rewards: Competitive Base Salary (pay will be based on several variables that include, but not limited to geographic location, work experience, etc.) Regional Bonus (when applicable) Manager Lease Car Program (No Cost - Car, Maintenance, and Insurance included) Industry-leading Benefit Plans (Medical, Dental, Vision, Rx) Paid time off, including vacation, holidays, shutdown Company Paid Short-Term and Long-Term Disability 401K Plan with company match + additional contribution Relocation assistance (if eligible) Career Growth: Advancement Opportunities Career Mobility Education Reimbursement for Continued learning Training and Development Programs Additional Offerings: Lifestyle Account Childcare Reimbursement Account Elder Care Support Tuition Assistance & Student Loan Repayment Wellbeing Program Community Service and Engagement Programs Product Programs Honda is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected factor.
    $75k-104k yearly est. 7d ago
  • OT Security Cyber Prevention Engineer

    Honda 4.8company rating

    Security engineer job in Marysville, OH

    What Makes a Honda, is Who makes a Honda Honda has a clear vision for the future, and it's a joyful one. We are looking for individuals with the skills, courage, persistence, and dreams that will help us reach our future-focused goals. At our core is innovation. Honda is constantly innovating and developing solutions to drive our business with record success. We strive to be a company that serves as a source of "power" that supports people around the world who are trying to do things based on their own initiative and that helps people expand their own potential. To this end, Honda strives to realize "the joy and freedom of mobility" by developing new technologies and an innovative approach to achieve a "zero environmental footprint." We are looking for qualified individuals with diverse backgrounds, experiences, continuous improvement values, and a strong work ethic to join our team. If your goals and values align with Honda's, we want you to join our team to Bring the Future! The Honda Development and Manufacturing Production Engineering team is responsible for the operational technology security of the manufacturing environment. The OT Security Cyber Prevention Engineer works across multiple technical and business areas to develop, implement, and maintain procedures, standards, and controls to prevent the risk or impact of a cyber incident. The scope of this function covers manufacturing equipment hardware/firmware/ software, OT enterprise systems, data analysis and reporting, and collaboration with IT/business users to ensure secure operation across all HDMA locations and equipment. New equipment introduction - set OT standards for new equipment, integrate equipment into the OT network, confirm vulnerabilities, perform risk assessments, and visibility of equipment within the asset management system. Training - support the creation, administration and maintenance of OT specific training material. Policies/procedures/auditing - create, issue, maintain, and audit OT specific policies and procedures. Access control (physical + logical) - set and implement technical standards for equipment level physical access and control access to OT related systems and equipment. OT standard creation - support the development, implementation, and maintenance of technical standards for the OT equipment and networks Risk metric management/assessments - establish company OT risk metrics and corresponding assessments to determine OT risk, perform risk assessments, and establish tools for visibility and reporting. Sensing/industry benchmarking - research technical and business OT security industry benchmarks and generate recommendations for adjustments to internal tools or practices to stay in alignment. What differentiates Honda and makes us an employer of choice? Total Rewards: * Competitive Base Salary (pay will be based on several variables that include, but not limited to geographic location, work experience, etc.) * Regional Bonus (when applicable) * Manager Lease Car Program (No Cost - Car, Maintenance, and Insurance included) * Industry-leading Benefit Plans (Medical, Dental, Vision, Rx) * Paid time off, including vacation, holidays, shutdown * Company Paid Short-Term and Long-Term Disability * 401K Plan with company match + additional contribution * Relocation assistance (if eligible) Career Growth: * Advancement Opportunities * Career Mobility * Education Reimbursement for Continued learning * Training and Development Programs Additional Offerings: * Lifestyle Account * Childcare Reimbursement Account * Elder Care Support * Tuition Assistance & Student Loan Repayment * Wellbeing Program * Community Service and Engagement Programs * Product Programs Honda is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected factor.
    $87k-116k yearly est. 38d ago
  • Entry Level Cyber Security Analyst

    Reynolds and Reynolds Company 4.3company rating

    Security engineer job in Dayton, OH

    ":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks. You must also be able to communicate your findings and recommendations for management. You will work with teams across the organization including partnering with IT and Software Development on security related matters. If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance. We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off. At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center. We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation. Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment. Reynolds and Reynolds is an equal opportunity employer. ","
    $85k-110k yearly est. 60d+ ago
  • Cybersecurity and Network Protection SME

    Jmark Services 4.1company rating

    Security engineer job in Dayton, OH

    Cybersecurity and Network Protection SME Clearance Required: TS/SCI (active) Inc. At JMark Services Inc., we are committed to securing the mission. As a trusted partner to the Department of Defense and Intelligence Community, we specialize in cybersecurity, information assurance, and technical operations that protect critical systems and national interests. Our teams thrive at the intersection of innovation and accountability-where every decision matters. Position Title: Cybersecurity and Network Protection SME JMark is seeking a highly skilled Cybersecurity and Network Protection SME to support advanced cybersecurity assessment and compliance operations at Wright-Patterson AFB. In this role, you will lead risk evaluations, validate system security requirements, and play a critical part in maintaining secure, mission-ready environments across classified networks and platforms. Working under minimal supervision, you'll bring deep technical experience and policy fluency to a dynamic, mission-driven team. Key Responsibilities: Plan and conduct compliance audits and vulnerability assessments of systems and networks. Identify deviations from security standards and recommend corrective actions. Support risk mitigation strategies and ensure compliance with certification and accreditation processes. Assist in implementation of government policies such as NISPOM and DCID 6/3; recommend tailored improvements. Provide process, analysis, coordination, and documentation support for secure system operations. Conduct security certification test planning, participation, and reporting (ST&E). Perform hardware/software security research and support secure tech integration and release. Review system audits and track corrective actions through closure. Collaborate with stakeholders across technical, policy, and leadership levels. Required Qualifications: Bachelor's degree in Engineering, Computer Science, Information Technology, or a related field. Minimum of 10 years of relevant cybersecurity or information assurance experience. Strong understanding of vulnerability assessments, ST&E, and certification/accreditation frameworks. Experience applying federal security guidelines (NIST, STIGs, NISPOM, DCID 6/3, RMF). Exceptional problem-solving, organizational, and technical writing skills. Active TS/SCI clearance is required. Why Join JMark? Tackle real-world cybersecurity challenges that protect national defense systems Collaborate with high-caliber experts in a mission-critical environment Enjoy growth opportunities and technical leadership roles Competitive compensation, full benefits, and a values-driven culture Secure infrastructure. Reduce risk. Lead with integrity. Apply now to become a Cybersecurity and Network Protection SME at JMark Services Inc. - Wright-Patterson AFB.
    $71k-96k yearly est. 60d+ ago
  • Infrastructure Security Analyst

    Versiti 4.3company rating

    Security engineer job in Dayton, OH

    Versiti is a fusion of donors, scientific curiosity, and precision medicine that recognize the gifts of blood and life are precious. We are home to the world-renowned Blood Research Institute, we enable life saving gifts from our donors, and provide the science behind the medicine through our diagnostic laboratories. Versiti brings together outstanding minds with unparalleled experience in transfusion medicine, transplantation, stem cells and cellular therapies, oncology and genomics, diagnostic lab services, and medical and scientific expertise. This combination of skill and knowledge results in improved patient outcomes, higher quality services and reduced cost of care for hospitals, blood centers, hospital systems, research and educational institutions, and other health care providers. At Versiti, we are passionate about improving the lives of patients and helping our healthcare partners thrive. Position Summary The Infrastructure Security Analyst will play a critical role in ensuring the security and integrity of our IT systems and networks. This position involves a balanced focus on IT Systems and Network Support and Cybersecurity with a concentration on Vulnerability Management. The ideal candidate will possess both technical expertise and strong analytical skills to identify, mitigate, and manage vulnerabilities while supporting the overall IT infrastructure. The candidate will thrive in a dynamic, team-oriented environment, where knowledge sharing, and continuous learning are encouraged. As an integral part of our collaborative team, the Infrastructure Security Analyst will work closely with various IT departments, including network operations, system administration, and application development. This role includes direct collaboration with the Senior Cybersecurity Engineer to ensure thorough analysis, identification, and mitigation of infrastructure vulnerabilities. Together, the team will address evolving cyber threats, communicate complex security concepts to stakeholders across all levels, and promote an organization-wide security culture while supporting Versiti's business and operational goals. This position values teamwork, encouraging information sharing and joint problem-solving to fortify the organization's defenses. This role is essential in building a resilient IT infrastructure that can adapt to evolving threats while supporting the organization's business objectives. Total Rewards Package Benefits Versiti provides a comprehensive benefits package based on your job classification. Full-time regular employees are eligible for Medical, Dental, and Vision Plans, Paid Time Off (PTO) and Holidays, Short- and Long-term disability, life insurance, 7% match dollar for dollar 401(k), voluntary programs, discount programs, others. Responsibilities Provide technical support for IT infrastructure, including servers, networks, and cloud services. Monitor system performance, troubleshoot issues, and perform regular maintenance on IT systems and document system configurations, changes, and procedures for future reference and compliance audits. Collaborate with IT teams to implement and maintain secure network configurations and ensure compliance with organizational policies while assisting in the deployment and configuration of hardware and software as needed. Respond to and resolve service requests and incidents in a timely manner. Conduct regular vulnerability assessments and penetration testing to identify security weaknesses within IT systems and networks and collaborate with IT teams to develop and implement mitigation strategies for identified vulnerabilities. Analyze vulnerability scan reports and prioritize remediation efforts based on risk assessment and monitor security alerts and incidents, responding to security breaches or threats as necessary. Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and trends. Utilize threat intelligence feeds and monitoring tools to proactively identify and mitigate potential security threats. Provide recommendations for security improvements and help implement new security controls. Performs other duties as required or assigned which are reasonably within the scope of the duties in this job classification Understands and performs in accordance with all applicable regulatory and compliance requirements Complies with all standard operating policies and procedures Qualifications Education Bachelor's Degree Computer Science, Information Technology, Cybersecurity, or a related field preferred Experience 4-6 years Demonstrated experience installing, managing and troubleshooting Linux and/or Microsoft Server environments. required 4-6 years Experience with Enterprise Data Center Server and Network environments. required 4-6 years Experience in conducting vulnerability assessments and penetration testing. required Demonstrated experience with VMware Server and storage management. preferred Knowledge, Skills and Abilities Understanding of patch management processes and tools required Knowledge of common security frameworks (e.g., NIST, ISO 27001, CIS Controls) required Strong analytical and problem-solving skills. required Excellent communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders. required Strong attention to detail and ability to work independently as well as part of a team. required Experience with ticketing systems and IT service management processes. required Familiarity with scripting languages (e.g., PowerShell, Python). preferred Licenses and Certifications Certified Ethical Hacker (CEH) desired CISSP Certified Information Systems Security Professional desired Microsoft Certified Systems Engineer (MCSE) preferred Microsoft Certified Systems Administrator (MCSA) preferred CompTIA Network+ Certification preferred CompTIA Security+ Certification preferred Tools and Technology Proficiency in network protocols, firewalls, VPNs, and security appliances. required Knowledge of operating systems (Windows, Linux) and cloud environments (AWS, Azure). required Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). preferred Experience with container technologies (e.g., Docker, Kubernetes) preferred Familiarity with threat intelligence and incident response processes. preferred #LI-EH1 #LI-Hybrid Not ready to apply? Connect with us for general consideration.
    $66k-97k yearly est. Auto-Apply 6d ago
  • Information Systems Security Officer (ISSO) III

    GDIT

    Security engineer job in Dayton, OH

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: None Experience: 5 + years of related experience US Citizenship Required: Yes Job Description: The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities. Prepare, review, and update authorization packages. Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. Notify ISSM when changes occur that might affect the authorization determination of the information system(s). Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change. Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure all IS security-related documentation is current and accessible to properly authorized individuals. Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties. Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans. Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them. Prepare reports on the status of security safeguards applied to computer systems. Perform ISSO duties in support of in-house and external customers. Conduct continuous monitoring activities for authorization boundaries under your preview. Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts. Experience: 5+ years related experience. 2+ years SAP experience required. Prior performance in roles such as System, Network Administrator or ISSO. Education: Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years) Certifications: IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire Clearance Required to Start: TS/SCI required Must be able to Attain - TS/SCI with CI Polygraph #AirforceSAPOpportunities The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA OH Dayton Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $92.7k-125.5k yearly Auto-Apply 6d ago
  • Information Systems Security Engineer (ISSE)

    Tlingit Haida Tribal Business Corporation

    Security engineer job in Dayton, OH

    Subsidiary: KIRA Information Solutions Job Title: Information System Security Engineer (ISSE) Job Location: Hybrid-Position working with Wright-Patterson Air Force Base, Dayton, OH Labor Category: Exempt Clearance Requirement: Secret Clearance, if required In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer Travel Requirement: Minimal, as needed Salary: $120,000- $180,000 Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide. THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Scope of Work: This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision. Essential duties : The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE [RD2] [KG3] assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows. The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. Required qualifications: Bachelor's degree in engineering, science, mathematics, or a related field. Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises. Five years' experience in information technology management. Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II). U.S. citizenship. Preferred qualifications: Bachelor's degree in Computer Science or Information Management. Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices. Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.). Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities. Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth). Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability. To perform this job successfully, an individual must be able to perform all the essential duties of the position satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions. May be required to obtain and maintain a security clearance, including successfully completing a thorough background investigation. If you need reasonable accommodations for any part of the employment process, please contact us and let us know the nature of your request. Requests for accommodation will be considered on a case-by-case basis. Program Details: This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. ETIMS is the Air Force System of Record for Technical Order (TO) management and is the Air Force's Enterprise Defense Business System (DBS) for managing TOs. TOs are military orders containing the authoritative procedures and instructions for operating and maintaining all U.S. Department of the Air Force equipment and systems. ETIMS supports ~178,000 users at ~385 sites worldwide. It also supports ~60,000 eTOs, 54,000 ETIMS eTools, 14,000 paper TOs, and more than 13,000 TO libraries across the Air Force Enterprise. Agencies that rely on ETIMS for Air Force-related TOs and Computer Program Identification Numbers (CPINs) include the Army, Navy, Marines, Coast Guard, Foreign Military Sales (FMS), the National Aeronautics and Space Administration (NASA), The White House, and numerous Military Industrial Complex partners. ETIMS provides access to the official TO cataloging, managing, storing, distributing, and viewing capabilities needed by the operators and maintainers to support all Air Force weapon systems and equipment items. ETIMS is a cloud-based enterprise system hosting Java and Windows applications accessing Oracle database in the AWS environment. The ETIMS migration to the Amazon Web Services (AWS) Air Force Cloud 1 environment and leveraging Agile Principles allows for processes to mature across the user community and enables streamlining and process improvement realized by the rapid delivery of follow-on capabilities. ETIMS has been modernized over the years to provide a fully capable Air Force enterprise TO Management system. The Government Program Office is located at Wright Patterson Air Force Base in Dayton, Ohio. The development and support team are geographically dispersed and teleworking our daily working protocol.
    $120k-180k yearly Auto-Apply 17d ago
  • Information System Security Officer (ISSO)

    Applied Research Solutions 3.4company rating

    Security engineer job in Dayton, OH

    ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact. Why Work with us?  ​Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.   Responsibilities: Maintain the operational security posture of systems. Monitor systems and environments for security compliance. Develop and update System Security Plans (SSPs). Manage and control system changes and assess their security impact. Handle physical, personnel, and environmental security. Conduct incident response and security awareness training. Assist the ISSM and assume ISSM duties when necessary. Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM; Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package; Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard; Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS; Report all security-related incidents to the ISSM Conduct periodic reviews of information systems to ensure compliance with the security authorization package; Serve as member of the CCB, if designated by the ISSM; Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change; Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization; Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly; Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and Ensure audit records are collected, reviewed, and documented (to include any anomalies). Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval. Other duties as assigned Requirements: Must be a US citizen Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics. Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard 5+ years related experience in SCI/SAP environments. Bachelor's degree in computer science, Engineering, Finance, Business, or related field 5-8 years demonstrated performance in related technology Top Secret w/ SCI eligibility All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
    $70k-94k yearly est. 4d ago
  • Security Analyst - Indefinite US Work Authorization Required

    Crown Equipment Corporation 4.8company rating

    Security engineer job in New Bremen, OH

    : Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership. Job Posting External Primary Responsibilities: * Lead the design and implementation of SIEM correlation rules and alert logic to detect advanced threats and suspicious behaviors. * Build and optimize SOAR playbooks to automate multi-step incident response actions. * Continuously tune alert thresholds and logic to reduce false positives and improve detection accuracy. * Integrate threat intelligence feeds into SIEM and SOAR platforms to enhance alert context and prioritization. * Investigate and respond to alerts, coordinating with IT, MDR, and security teams to validate and remediate incidents. * Maintain documentation for alert logic, playbook workflows, and incident handling procedures. * Mentor junior analysts on alert development, tuning, and automation best practices. * Participate in an on-call rotation to support timely response to critical alerts and incidents. Minimum Qualifications: * High school diploma or equivalent is required. * Familiarity with SIEM platforms and basic alert logic. * Experience with scripting languages such as PowerShell or Python. * Understanding of cybersecurity fundamentals, including threat types and detection techniques. * 1+ years of experience in cybersecurity or a related field. * Strong analytical and problem-solving skills. * Willingness to participate in an on-call rotation. Preferred Qualifications: * Bachelor's degree in cybersecurity, computer science, information technology, or a related field. * Exposure to SOAR platforms and basic playbook development. * Experience working with third-party MDR or managed security service providers. * Certification such as Security+, GSEC, or CEH. * Familiarity with threat intelligence sources and enrichment techniques. * Understanding of compliance frameworks such as NIST CSF or ISO 27001. Work Authorization: Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire. No agency calls please. Compensation and Benefits: Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more. EOE Veterans/Disabilities Nearest Major Market: Lima Nearest Secondary Market: Findlay Job Segment: Computer Science, Warehouse, Forklift, Technology, Manufacturing
    $80k-101k yearly est. 60d+ ago
  • Associate Security Systems Engineer - Access Control & CCTV

    Kastle Systems International 3.6company rating

    Security engineer job in Plain City, OH

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. We are looking for a motivated and knowledgeable Jr. Security Engineer to join our team. The ideal candidate will have an understanding of standard Low voltage systems ideally in the Electronic Security technology space, to include Access Control Systems (ACS), Intrusion Detection Systems (IDS), Closed-Circuit Television (CCTV), and supporting equipment such as computer software/hardware, and networking infrastructure. This candidate will excel in critical thinking, have the ambition to learn and grow, and possess a strong desire to perform at the top of their abilities. Responsibilities Review architectural, electrical, telecommunication, and security engineering floor plans, riser drawings, device schedules, and detail drawings. Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. Review Field Site Survey documentation and provide technical assistance with RFI/RFP responses. Create solution design documentation, including drawings, Bills of Materials (BOMs), permitting packages and solution design summaries. Learn and Maintain familiarity with current and emerging electronic security technologies, such as access control, video surveillance, intrusion detection, biometrics, and industry-leading vendors On the job Training will be provided to increase skills in all key responsibilities listed above, including hands on field work with installation and integration teams to better understand design and implementation requirements. Qualifications Mechanical, Engineering, Plumbing Engineering degree or a minimum of 2 years of previous experience in the industry. An associate or bachelor's degree in a relevant field if no previous experience, a comparable amount of experience in the appropriate field may be substituted. Experience in the design and planning of MEP systems. Ability to make load calculations associated with power, data, conduit fill ratios and/or HVAC systems. Ability to manage time and multiple tasks without supervision. Strong organizational skills and attention to detail. Excellent analytical and problem-solving skills. Exceptional presentation, writing, verbal, and written customer communication skills. Experience with computer programs such as Microsoft Office, Excel, Adobe, etc. is preferred. Knowledge of Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus. Company Overview This is a Low Voltage Security Estimator career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws. #JuniorSecuritySystemsDesignEngineer #SecuritySystemDesign #AccessControlDesign #VideoSurveillanceDesign #IntrusionDetectionSystems #SecuritySystemsEngineering #SecuritySystemShopDrawings #SecuritySystemLayouts #SystemRiserDiagrams #EngineeringSpecifications #SecurityDesignDocumentation #SecurityProposalDesign #BidPreparation #SecuritySystemEstimation #SecuritySystemSubmittals #AutoCADSecurityDesign #RevitBIMSecurityDesign #SecuritySystemsIntegration #TechnicalSupportForSecurityDesign #SecuritySolutionsEngineering #PhysicalSecuritySystemDesign
    $83k-112k yearly est. Auto-Apply 60d+ ago
  • Security Analyst

    Sonsoft 3.7company rating

    Security engineer job in Marysville, OH

    Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services. Job Description MUSTS:- Bachelor's degree in Information Systems or equivalent work experience of a minimum of 3-5 years as an information security risk management practitioner, preferably in the financial, consulting, and/or global organizations. Prior work experience of risk management disciplines, security policies and standards, technology risk assessment, and third party supplier risk process and requirements. Current or previous experience with risk assessment methodologies and conducting risk analysis in a regulated environment or related IT audit background. Knowledge of security and control frameworks, such as ISO 27002, NIST, CobiT, COSO and ITIL. Experience with implementation of information security best practices for key areas such as access control, data protection, systems development life cycle, PCI DSS, and cloud services. Professional certification in risk management, and/or audit is preferred (e.g., CISSP, CRISC, CISA, or CISM). WANTS:- Demonstrate broad competency and understanding in a variety of IT security areas. Security Policy Development and Management. Assist with documenting security policies, standards, and guidelines. based on the organization's requirements, maturity level, and compliance objectives. Facilitate, coordinate, and maintain project schedules, plans, and scope using standard project management methodologies. BUSINESS EXPERIENCE:- Proven ability to work with and across all levels of the organizations and navigate organizational boundaries. Excellent organizational, interpersonal and communication skills with strong written, oral, and presentation skills; both delivery and creation of power points (must be able to distill complex topics into simple concepts). Ability to effectively communicate with technical and executive audiences and develop and maintain strong peer/client/customer relationships underpinned by a service oriented approach to work. Adept with time management, tasks and projects prioritization, and multi-tasking. High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity. High degree of initiative, attention to detail, follow-up skills, deliver on commitments, dependability and ability to work with little supervision. Demonstrated problem-solving skills and capability to drive process improvements. Proficient with Microsoft Office Suite especially Excel and Power point. DESCRIPTION:- Implement the overall risk management framework and processes, tools, and reporting methodologies on a continuous cycle. Develop and standardize processes and procedures for ongoing risk identification, tracking, monitoring, and evaluating security measures and remediation efforts; communicate security control deficiencies and recommend mitigation plans, report status progress and with non-compliance issues; measure adherence to the security controls from a policy, governance and risk standpoint. Perform third party supplier risk assessments by reviewing contracts for compliance with security policies, standards and practices; document security gaps and recommend appropriate remediation actions as necessary to minimize risks to the business. Assist with documenting security policies, standards, and guidelines based on the organization's requirements, maturity level, and compliance objectives. Qualifications Planning, designing and implementing an overall risk management process for the organization. Risk identification, analysis, tracking, monitoring, documenting exceptions, and communicating risks to owners. Risk assessment, which involves analyzing risks as well as identifying, describing and estimating the risks affecting the business. Risk evaluation, which involves comparing estimated risks with criteria established by the organization such as costs, legal requirements and environmental factors, and evaluating the organization's previous handling of risks. Establishing and quantifying the organization's 'risk appetite', i.e. the level of risk they are prepared to accept. Risk reporting in an appropriate way for different audiences, for example, to the board of directors so they understand the most significant risks, to business heads to ensure they are aware of risks relevant to their parts of the business and to individuals to understand their accountability for individual risks. Corporate governance involving external risk reporting to stakeholders. Carrying out processes such as purchasing insurance, implementing health and safety measures and making business continuity plans to limit risks and prepare for if things go wrong. Conducting audits of policy and compliance to standards, including liaison with internal and external auditors. Providing support, education and training to staff to build risk awareness within the organization. Additional Information ** U.S. citizens and those authorized to work in the U.S. are encouraged to apply . We are unable to sponsor at this time. Note:- This is a Contract job opportunity for you. Only US Citizen, Green Card Holder, TN Visa, GC-EAD , H4-EAD & L2-EAD can apply. No OPT-EAD & H1B Consultants please. Please mention your Visa Status in your email or resume .
    $57k-71k yearly est. 14h ago
  • Information Security Analyst (On-Site Position)

    Danis Construction

    Security engineer job in Miamisburg, OH

    IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE ** At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life. We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally. One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO. Why Join Danis? Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities. Competitive Compensation: Enjoy annual merit increases and bonuses. Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options. Secure Your Future: 401K plan and profit-sharing opportunities. Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work. Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects. Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career. What You'll Bring Bachelor's degree in Cybersecurity, Information Technology, or a related field. 3+ years of hands-on experience in cybersecurity or a related discipline. Working knowledge of security frameworks (e.g., NIST, ISO 27001). Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners). Strong analytical and investigative mindset. Clear, confident communication and collaboration skills. Experience managing cross-functional projects and navigating complex security challenges. Responsibilities Your Impact: Strategic Leadership Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices. Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives. Governance, Risk, & Compliance Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps. Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act). Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics. Training & Awareness Drive cybersecurity awareness through engaging education initiatives. Oversee new hire onboarding for required cyber training. Facilitate tabletop exercises to simulate and prepare for real-world scenarios. Threat Detection & Response Continuously monitor systems for suspicious activity or breaches. Respond swiftly to security incidents and ensure thorough documentation. Engage in proactive threat hunting and analysis to detect emerging risks. Vulnerability & Risk Management Lead regular system assessments and vulnerability scans. Ensure robust network segmentation, firewall health, and secure backups. Security Architecture & Tools Oversee the deployment and management of critical security tools. Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT. Evaluate and enhance our security technology stack. Collaboration & Communication Build trusted partnerships across IT and the broader organization to strengthen security culture. Support business continuity and disaster recovery planning with department leads. Manage vendor risk and ensure third-party compliance with internal standards. Preferred Skills Familiarity with enterprise systems and platforms (e.g., ERP, CRM). Deep expertise in endpoint protection, network monitoring, and DLP tools. Calm, strategic approach to crisis management. Your Impact: Strategic Leadership Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices. Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives. Governance, Risk, & Compliance Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps. Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act). Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics. Training & Awareness Drive cybersecurity awareness through engaging education initiatives. Oversee new hire onboarding for required cyber training. Facilitate tabletop exercises to simulate and prepare for real-world scenarios. Threat Detection & Response Continuously monitor systems for suspicious activity or breaches. Respond swiftly to security incidents and ensure thorough documentation. Engage in proactive threat hunting and analysis to detect emerging risks. Vulnerability & Risk Management Lead regular system assessments and vulnerability scans. Ensure robust network segmentation, firewall health, and secure backups. Security Architecture & Tools Oversee the deployment and management of critical security tools. Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT. Evaluate and enhance our security technology stack. Collaboration & Communication Build trusted partnerships across IT and the broader organization to strengthen security culture. Support business continuity and disaster recovery planning with department leads. Manage vendor risk and ensure third-party compliance with internal standards. Preferred Skills Familiarity with enterprise systems and platforms (e.g., ERP, CRM). Deep expertise in endpoint protection, network monitoring, and DLP tools. Calm, strategic approach to crisis management. Qualifications Working Environment: Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure. Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement. Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments. Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively. Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity. Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack. Working Environment: Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure. Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement. Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments. Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively. Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity. Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack. EEO Statement Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need. Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees. #LI-ONSITE
    $71k-100k yearly est. Auto-Apply 60d+ ago
  • Information Security Compliance Analyst

    Reynolds and Reynolds Company 4.3company rating

    Security engineer job in Dayton, OH

    ":"As an Information Security Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cyber security assessments, help raise security awareness of associates, provide guidance on industry standard cyber security requirements, and track on-going activities that help meet our security and compliance goals. If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Information Security Compliance Analyst","date":"2025-12-04","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance. We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off. At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center. We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation. Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment. Reynolds and Reynolds is an equal opportunity employer. ","
    $80k-108k yearly est. 60d+ ago
  • Information Systems Security Engineer (ISSE)

    Tlingit Haida Tribal Business Corporation

    Security engineer job in Dayton, OH

    Subsidiary: KIRA Information Solutions Job Title: Information System Security Engineer (ISSE) Job Location: Hybrid-Position working with Wright-Patterson Air Force Base, Dayton, OH Labor Category: Exempt Clearance Requirement: Secret Clearance, if required In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer Travel Requirement: Minimal, as needed Salary: $120,000- $180,000 Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide. THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Scope of Work: This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision. Essential duties: The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE [RD2] [KG3] assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows. The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. Required qualifications: * Bachelor's degree in engineering, science, mathematics, or a related field. * Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises. * Five years' experience in information technology management. * Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2. * Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II). * U.S. citizenship. Preferred qualifications: * Bachelor's degree in Computer Science or Information Management. * Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices. * Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.). * Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities. * Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth). * Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability. To perform this job successfully, an individual must be able to perform all the essential duties of the position satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions. May be required to obtain and maintain a security clearance, including successfully completing a thorough background investigation. If you need reasonable accommodations for any part of the employment process, please contact us and let us know the nature of your request. Requests for accommodation will be considered on a case-by-case basis. Program Details: This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. ETIMS is the Air Force System of Record for Technical Order (TO) management and is the Air Force's Enterprise Defense Business System (DBS) for managing TOs. TOs are military orders containing the authoritative procedures and instructions for operating and maintaining all U.S. Department of the Air Force equipment and systems. ETIMS supports ~178,000 users at ~385 sites worldwide. It also supports ~60,000 eTOs, 54,000 ETIMS eTools, 14,000 paper TOs, and more than 13,000 TO libraries across the Air Force Enterprise. Agencies that rely on ETIMS for Air Force-related TOs and Computer Program Identification Numbers (CPINs) include the Army, Navy, Marines, Coast Guard, Foreign Military Sales (FMS), the National Aeronautics and Space Administration (NASA), The White House, and numerous Military Industrial Complex partners. ETIMS provides access to the official TO cataloging, managing, storing, distributing, and viewing capabilities needed by the operators and maintainers to support all Air Force weapon systems and equipment items. ETIMS is a cloud-based enterprise system hosting Java and Windows applications accessing Oracle database in the AWS environment. The ETIMS migration to the Amazon Web Services (AWS) Air Force Cloud 1 environment and leveraging Agile Principles allows for processes to mature across the user community and enables streamlining and process improvement realized by the rapid delivery of follow-on capabilities. ETIMS has been modernized over the years to provide a fully capable Air Force enterprise TO Management system. The Government Program Office is located at Wright Patterson Air Force Base in Dayton, Ohio. The development and support team are geographically dispersed and teleworking our daily working protocol.
    $120k-180k yearly 16d ago
  • Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems International 3.6company rating

    Security engineer job in Plain City, OH

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. Create solution design documentation (drawings, BOMs, solution design summaries). Provide technical support for in-office and on-site team members. Support management in the process of creating documentation for implementing new technology with new and existing customers. Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications A minimum of 3-7 years previous experience in the industry. Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. Experience in the design and planning of access control and video systems. Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Other Eligibility Requirements Ability to manage time and multiple tasks without supervision. Organizational skills & detail oriented. Good analytical and problem-solving skills. Excellent presentation, writing skills, verbal, and written customer communication skills. Experience in computer programs such as Microsoft Office, Adobe, etc. preferred. Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: ***********************************************************************************************************************************************************************************
    $83k-112k yearly est. Auto-Apply 60d+ ago
  • Information System Security Engineer (ISSE)

    Applied Research Solutions 3.4company rating

    Security engineer job in Dayton, OH

    ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. **Why Work with us?** Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers. **Responsibilities:** + Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations. + Automate threat assessment and reporting activities. + Analyze and report system and organizational security posture trends to the ISSM/ISSO. + Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities. + Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. + Plan and recommend modifications or adjustments based on exercise results. + Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM + Audit support responsibilities + Analyze and report organizational security posture trends to the ISSM/ISSO + Analyze and report system security posture trends to the ISSM/ISSO + Apply security policies to meet security objectives of the system to the ISSM/ISSO + Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO + Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO + Assess the effectiveness of security controls and reports findings to the ISSM + Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements + Ensure all systems security operations and maintenance activities are properly documented and updated as necessary + Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM + Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed + Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation + Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM + Plan and recommend modifications or adjustments based on exercise results or system environment + Properly document all systems security implementation, operations and maintenance activities and updates necessary + Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities + Verify and update security documentation reflecting the application/system security design features + Verify minimum security requirements are in place for all applications + Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data + Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements + Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents + Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective + Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks + Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident + Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package + Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks. + Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system. + Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum + Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum + Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures + Monitors and investigates security breaches + Educates employees or clients about security procedures and programs + Other duties as assigned **Requirements:** + Must be a US citizen + Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics. + Security+ Certification + 5+ years related experience in SCI/SAP environments. + Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience. + 8-12 years demonstrated performance in related technology. Minimum Security Clearance Required + Top Secret w/ SCI eligibility Additional or Preferred Qualifications + 5+ years leadership experience in relevant area of business. + Technical certifications in Azure All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
    $72k-95k yearly est. 60d+ ago
  • Information Security Analyst 2

    Crown Equipment Corporation 4.8company rating

    Security engineer job in New Bremen, OH

    : Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership. **Information Security Analyst 2** **Job Duties** + Governance, Risk, & Compliance (GRC) Application Subject Matter Expert - Operate and maintain Company's Governance, Risk and Compliance (GRC) platform, its libraries, reports, portals, and data integrations to effectively support operations, data accuracy and user processes. Serve as the primary liaison for GRC software vendors, by maintaining contact with vendor representatives, submitting troubleshooting tickets and software feedback to improve the user experience. Support Company's Enterprise Risk Management, Compliance, Vendor Management, Business Continuity Planning, Information Technology and Security, Project Management and Audit Programs with data entry, maintenance, and configuration. Develop, maintain, and distribute custom and ad hoc reporting of risk data including taxonomy analytics and Key Risk Indicators (KRI's). + Security Architecture & Control Design - Develop/integrate cybersecurity designs for systems and networks for the processing of company data. Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements. Ensure that acquired or developed systems and architectures are consistent with company's cybersecurity architecture guidelines. + Risk Assessment - Coordinate external risk assessments including audits, gap assessments, and penetration testing to evaluate security architectures and designs to determine the adequacy of security design and architecture. Determine protection needs (i.e., security controls) for company's information processing and document appropriately. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. + Incident Response Communication- Coordinate communication and information sharing aspects of incident response. Draft messages and updates to internal and external audiences for Incident Response Team (IRT) review, such as employees, customers, partners, media, or public. Handle crisis management issues and provides guidance and education on incident prevention and response best practices. Perform other duties as assigned. **Minimum Qualifications** + 2-4 years related experience + Associate's degree (Information Technology, Cyber Security, Computer Science) + Non-degree considered if 6+ years of related experience along with a high school diploma (GED) **Preferred Qualifications** Intermediate knowledge of various Information Security & Privacy Frameworks such as the Secure Controls Framework, NIST CSF, NIST 800-171, NIST 800-53, NIST Privacy Framework, ISO-27001, ISO-27701, GDPR, US & other global privacy regulations. Work experience in other Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CASP+, CISSP Associate, or AWS Associate Level Certifications. Intermediate level of knowledge in at least one scripting or software development language such as PowerShell, Bash, Java, or Python. Good written and oral communication skills, deductive reasoning, and analytical investigative skills. Good interpersonal skills to facilitate positive relations between business groups. Requires excellent verbal and written communication skills, as well as a knowledge of company's culture and values. **Work Authorization:** Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire. No agency calls please. **Compensation and Benefits:** Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more. EOE Veterans/Disabilities
    $80k-102k yearly est. 60d+ ago
  • Information Security Analyst (On-Site Position)

    Danis Construction

    Security engineer job in Miamisburg, OH

    IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life. We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally. One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO. Why Join Danis? * Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities. * Competitive Compensation: Enjoy annual merit increases and bonuses. * Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options. * Secure Your Future: 401K plan and profit-sharing opportunities. * Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work. * Give Back: Participate in our "Constructing Hope" program to contribute to meaningful community outreach projects. * Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career. What You'll Bring * Bachelor's degree in Cybersecurity, Information Technology, or a related field. * 3+ years of hands-on experience in cybersecurity or a related discipline. * Working knowledge of security frameworks (e.g., NIST, ISO 27001). * Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners). * Strong analytical and investigative mindset. * Clear, confident communication and collaboration skills. * Experience managing cross-functional projects and navigating complex security challenges. Responsibilities Your Impact: Strategic Leadership * Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices. * Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives. Governance, Risk, & Compliance * Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps. * Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act). * Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics. Training & Awareness * Drive cybersecurity awareness through engaging education initiatives. * Oversee new hire onboarding for required cyber training. * Facilitate tabletop exercises to simulate and prepare for real-world scenarios. Threat Detection & Response * Continuously monitor systems for suspicious activity or breaches. * Respond swiftly to security incidents and ensure thorough documentation. * Engage in proactive threat hunting and analysis to detect emerging risks. Vulnerability & Risk Management * Lead regular system assessments and vulnerability scans. * Ensure robust network segmentation, firewall health, and secure backups. Security Architecture & Tools * Oversee the deployment and management of critical security tools. * Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT. * Evaluate and enhance our security technology stack. Collaboration & Communication * Build trusted partnerships across IT and the broader organization to strengthen security culture. * Support business continuity and disaster recovery planning with department leads. * Manage vendor risk and ensure third-party compliance with internal standards. Preferred Skills * Familiarity with enterprise systems and platforms (e.g., ERP, CRM). * Deep expertise in endpoint protection, network monitoring, and DLP tools. * Calm, strategic approach to crisis management. Qualifications Working Environment: * Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure. * Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement. * Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments. * Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively. * Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity. * Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack. EEO Statement Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need. Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees. #LI-ONSITE
    $71k-100k yearly est. Auto-Apply 60d+ ago
  • Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Security engineer job in Plain City, OH

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: ***********************************************************************************************************************************************************************************
    $83k-112k yearly est. Auto-Apply 60d+ ago
  • Information System Security Engineer (ISSE)

    Applied Research Solutions 3.4company rating

    Security engineer job in Dayton, OH

    ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Why Work with us?  ​Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.   Responsibilities: Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations. Automate threat assessment and reporting activities. Analyze and report system and organizational security posture trends to the ISSM/ISSO. Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities. Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. Plan and recommend modifications or adjustments based on exercise results. Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM Audit support responsibilities Analyze and report organizational security posture trends to the ISSM/ISSO Analyze and report system security posture trends to the ISSM/ISSO Apply security policies to meet security objectives of the system to the ISSM/ISSO Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO Assess the effectiveness of security controls and reports findings to the ISSM Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements Ensure all systems security operations and maintenance activities are properly documented and updated as necessary Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM Plan and recommend modifications or adjustments based on exercise results or system environment Properly document all systems security implementation, operations and maintenance activities and updates necessary Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities Verify and update security documentation reflecting the application/system security design features Verify minimum security requirements are in place for all applications Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks. Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system. Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures Monitors and investigates security breaches Educates employees or clients about security procedures and programs Other duties as assigned Requirements: Must be a US citizen Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics. Security+ Certification 5+ years related experience in SCI/SAP environments. Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience. 8-12 years demonstrated performance in related technology. Minimum Security Clearance Required Top Secret w/ SCI eligibility Additional or Preferred Qualifications 5+ years leadership experience in relevant area of business. Technical certifications in Azure All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
    $72k-95k yearly est. 60d+ ago

Learn more about security engineer jobs

How much does a security engineer earn in Troy, OH?

The average security engineer in Troy, OH earns between $65,000 and $119,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Troy, OH

$88,000
Job type you want
Full Time
Part Time
Internship
Temporary