Entry Level Cyber Security Analyst
Security engineer job in Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Information Security Engineer - Level 2 - Cloud
Security engineer job in Mason, OH
Cintas is currently looking for an IT Security Engineer-Level 2 for the IT Security Team within IT. This role researches, recommends and implements changes to enhance information systems security and monitoring capabilities. The Information Security Engineer-Level 2 is responsible for: engineering solutions (processes, technologies) to mitigate control gaps; presenting proposed solutions to IT management; coordinating with vendors for proof-of-concept, proof-of-value, and pilot exercises; reviewing information systems to identify potential security weaknesses, recommending improvements to reduce vulnerabilities; taking part of on-call rotation to triage any potential security incidents; participating in network and systems design to ensure implementation of appropriate systems security policies; maintaining and growing knowledge and understanding of information security, risk management and regulatory compliance topics, providing occasional after hours and weekend support for project efforts; acting as mentor for junior engineers; and working collaboratively with various Cintas partners to design, build, and deploy security frameworks.
**Skills/Qualifications**
REQUIRED:
+ High school diploma/GED required; Bachelor's degree in Computer Science or related IT area, preferred
+ Minimum 7 years of experience in Information Technology
+ Minimum 4 years of experience in Information Security
+ Strong knowledge of cyber security practices and procedures
+ Strong knowledge of networking and infrastructure best practices
+ Ability to act as the primary SME for Cloud Security
+ Strong working knowledge of the CSF Framework
+ Strong working knowledge of GCP, GCVE required; Azure preferred
Preferred:
+ Industry certifications (e.g., GCP, ACE)
Benefits
Cintas offers comprehensive and competitive medical, dental and vision benefits, with premiums below the national average. We offer flexibility with four different medical plan options; one plan is offered at zero cost.
Additionally, our employee-partners enjoy:
- Competitive Pay
- 401(k) with Company Match/Profit Sharing/Employee Stock Ownership Plan (ESOP)
- Disability, Life and AD&D Insurance, 100% Company Paid
- Paid Time Off and Holidays
- Skills Development, Training and Career Advancement Opportunities
Company Information
Cintas Corporation helps more than one million businesses of all types and sizes get Ready to open their doors with confidence every day by providing products and services that help keep their customers' facilities and employees clean, safe, and looking their best. With offerings including uniforms, mats, mops, towels, restroom supplies, workplace water services, first aid and safety products, eye-wash stations, safety training, fire extinguishers, sprinkler systems and alarm service, Cintas helps customers get Ready for the Workday . Headquartered in the U.S., Cincinnati, OH, Cintas is a publicly held Fortune 500 company traded over the Nasdaq Global Select Market under the symbol CTAS and is a component of both the Standard & Poor's 500 Index and Nasdaq-100 Index.
Cintas Corporation is proud to be an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), national origin, age, genetic information, disability, protected veteran status, or any other characteristic or category protected by local, state, or federal law.
This job posting will remain open for at least five (5) days.
**Job Category:** Information Technology
**Organization:**
**Employee Status:** Regular
**Schedule:** Full Time
**Shift:** 1st Shift
Cyber Security Analyst Job Details | Black & Veatch Family of Companies
Security engineer job in Blue Ash, OH
**Cyber Security Analyst** Company: Black & Veatch Family of Companies **Together, we own our company, our future, and our shared success.** As an employee-owned company, our people _are_ Black & Veatch. We put them at the center of everything we do and empower them to grow, explore new possibilities and use their diverse talents and perspectives to solve humanity's biggest challenges in an ever-evolving world. With over 100 years of innovation in sustainable infrastructure and our expertise in engineering, procurement, consulting and construction, together we are building a world of difference.
**Company :** Black & Veatch Corporation
**Req Id :** 112536
**Opportunity Type :** College full time
**Relocation eligible :** No
**Full time/Part time :** Full-Time
**Project Only Hire :** No
**Visa Sponsorship Available:** No
**Job Summary**
The Cybersecurity Analyst will serve as a key member of the security operations team, responsible for safeguarding the organization's digital assets and infrastructure. This entry-level role focuses on threat detection, incident response, alert triage, and automation to ensure timely identification and mitigation of security risks. The analyst will monitor network and system activity, investigate alerts, and collaborate with IT teams to maintain a secure environment.
**Key Responsibilities**
+ Alert Triage - perform analysis and prioritization of security alerts to identify real threats versus false positives
+ Alert Tuning - perform analysis on historic alerts and signatures to reduce false positives while maintaining detection coverage
+ Detection Engineering - design, implement, and optimize detection logic and use cases within SIEM and EDR platforms.
+ Automation & Scripting - develop scripts and automation workflows to streamline detection and response processes
**Management Responsibilities**
Individual Contributor
**Preferred Qualifications**
Training related to cybersecurity, information technology, and coding.
Preferred Skills:
+ Anticpated graduation May 2026 graduate.
+ Communication Skills - speaks effectively, fosters open communication, listens to others, delivers presentations, and prepares written communications
+ Interpersonal Skills - builds relationships, displays , leverages networks, values diversity, and resolves conflicts
+ Self-Management Skills - acts with integrity, demonstrates adaptability, multi-tasks and develops oneself
+ Thinking Skills - solves problems, analyzes issues, uses sound judgment, and innovates
+ Technical proficiency in specific programming languages and environment
**Minimum Qualifications**
Bachelors degree in computer science or related field OR equivalent work experience. In addition to the education requirements, zero to four years related experience. All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations.
**Work Environment/Physical Demands**
Hybrid or flexible work options may be offered after the first 90 days of employment based upon manager direction, job performance and work assignments.
**Salary Plan**
ITS: Information Technology Service
**Job Grade**
014
Black & Veatch endeavors to makeaccessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process because of a disability, please contact the Employee Relations Department at *************** orvia our. This contact information is for disability accommodation requests only; you may not use this contact information to inquire about the status of applications. General inquiries about the status of applications will not be returned. This job posting will remain open until a suitable candidate(s) has been identified.
Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy.
Our comprehensive benefits portfolio is a key component of this commitment and offers and array of health care benefits including but not limited to medical, dental and vision insurances along with disability and a robust wellness program.
To support a healthy work-life balance, we offer flexible work schedules, paid vacation and holiday time, sick time and dependent sick time.
A variety of additional benefits are available to our professionals, including a company matched 401k plan, adoption reimbursement, vendor discounts, an employment referral program, AD&D insurance, pre-taxed accounts, voluntary legal plan and the B&V Credit Union. Professionals may also be eligible for a performance-based bonus program.
We are proud to be a 100 percent ESOP-owned company. As employee-owners, our professionals are empowered to drive not only their personal growth, but the company's long-term achievements - and they share in the financial rewards of that success through stock ownership.
By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients.
BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law.
For our EEO Policy Statement, please click.
**Notice to External Search Firms** : Black & Veatch does not accept unsolicited resumes and will not be obligated to pay a placement fee for unsolicited resumes. Black & Veatch Talent Acquisition engages with search firms directly for hiring needs.
In accordance with local law, the following Annualcompensation range is applicable for the job and location associated with this requisition: $76,000.00- $89,115.00
**Job Segment:** Engineer, Engineering
Cybersecurity and Network Protection SME
Security engineer job in Dayton, OH
Cybersecurity and Network Protection SME Clearance Required: TS/SCI (active)
Inc.
At JMark Services Inc., we are committed to securing the mission. As a trusted partner to the Department of Defense and Intelligence Community, we specialize in cybersecurity, information assurance, and technical operations that protect critical systems and national interests. Our teams thrive at the intersection of innovation and accountability-where every decision matters.
Position Title: Cybersecurity and Network Protection SME
JMark is seeking a highly skilled Cybersecurity and Network Protection SME to support advanced cybersecurity assessment and compliance operations at Wright-Patterson AFB. In this role, you will lead risk evaluations, validate system security requirements, and play a critical part in maintaining secure, mission-ready environments across classified networks and platforms.
Working under minimal supervision, you'll bring deep technical experience and policy fluency to a dynamic, mission-driven team.
Key Responsibilities:
Plan and conduct compliance audits and vulnerability assessments of systems and networks.
Identify deviations from security standards and recommend corrective actions.
Support risk mitigation strategies and ensure compliance with certification and accreditation processes.
Assist in implementation of government policies such as NISPOM and DCID 6/3; recommend tailored improvements.
Provide process, analysis, coordination, and documentation support for secure system operations.
Conduct security certification test planning, participation, and reporting (ST&E).
Perform hardware/software security research and support secure tech integration and release.
Review system audits and track corrective actions through closure.
Collaborate with stakeholders across technical, policy, and leadership levels.
Required Qualifications:
Bachelor's degree in Engineering, Computer Science, Information Technology, or a related field.
Minimum of 10 years of relevant cybersecurity or information assurance experience.
Strong understanding of vulnerability assessments, ST&E, and certification/accreditation frameworks.
Experience applying federal security guidelines (NIST, STIGs, NISPOM, DCID 6/3, RMF).
Exceptional problem-solving, organizational, and technical writing skills.
Active TS/SCI clearance is required.
Why Join JMark?
Tackle real-world cybersecurity challenges that protect national defense systems
Collaborate with high-caliber experts in a mission-critical environment
Enjoy growth opportunities and technical leadership roles
Competitive compensation, full benefits, and a values-driven culture
Secure infrastructure. Reduce risk. Lead with integrity.
Apply now to become a Cybersecurity and Network Protection SME at JMark Services Inc. - Wright-Patterson AFB.
Information Systems Security Manager/Engineer
Security engineer job in Dayton, OH
Job Title: Cybersecurity Engineer
Labor Category: Exempt
Clearance Requirement: Secret - As required
Salary: $130,000-$175,000
Travel Requirement: 25%
At Tlingit Haida Tribal Business Corporation (THTBC), your work goes beyond the job description-it becomes part of a purpose-driven legacy. Our continuous commitment to growth directly contributes to the strength, resilience, and future of the communities we support. Our growth fuels programs, services, and lasting value for the Tribe, making every success a shared one.
For over 35 years THTBC and its subsidiaries has delivered essential services to federal clients across the globe. Whether supporting logistics, information technology, cyber security, or facilities operations, we are united by a shared mission: to create meaningful economic opportunity and growth of the Tlingit & Haida Tribes of Alaska.
Together We Grow - One Mission, One Team - With a Commitment to Serve
Scope of Work:
This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. The primary purpose of this position is to support the ETIMS mission by ensuring all systems, applications, and processes comply with Department of Defense (DoD), Air Force (AF), and federal cybersecurity requirements. The role ensures cybersecurity requirements are integrated into information systems and components through deliberate security design, development, and configuration, in alignment with frameworks such as the Risk Management Framework (RMF) and NIST standards.
Responsibilities:
Serving as a subject matter expert in security architecture to include providing advice to Program Managers, Customer technical experts, and internal program teams.
Ensure all products, deliverables, and activities align with Federal, CNSS, DoD, and AF cybersecurity policies, including:
NIST SP 800-37, 800-53, 800-171
CNSSI 1253
DoD 8500-series and DoDI 8510.01 (RMF for DoD IT)
AFI 17-series publications and DoD 8140 workforce requirements
Integrate cybersecurity considerations into Continuous Integration/Continuous Deployment (CI/CD) methodologies and program management schedules.
Identify, manage, verify, and trace security controls across the entire system lifecycle, ensuring alignment with Test & Evaluation (T&E) and overall risk management processes.
Implement and document comprehensive cybersecurity assurance measures across all layers of the TCP/IP model (network, transport, application, data link, and physical).
Develop and maintain RMF documentation and artifacts, including Security Plans, Vulnerability Assessments, and Test Results, to support system authorization.
Ensure compliance with DoDI 8520.02 (PKI and PK Enabling) and DoDI 8520.03 (Identity Authentication), maintaining standardized encryption, digital signature, and authentication mechanisms.
Deliver secure applications compliant with DISA STIGs and Cloud One cybersecurity requirements.
Conduct static application security testing (SAST) using PMO-approved tools and maintain a Software Bill of Materials (SBOM) for each release (e.g., SPDX, CycloneDX, SWID).
Apply secure coding standards (e.g., OWASP Top Ten, CERT) and ensure prompt remediation of vulnerabilities.
Generate and provide cybersecurity testing reports, mapping findings to applicable STIG and Cloud One controls.
Use automated tools and processes wherever practical, seeking PMO approval for any deviations.
Perform other duties as assigned.
Minimum Requirements:
Seven (7) years of experience supporting DoD or Air Force cybersecurity programs.
Compliant with DoDI 8140 Intermediate Level Certifications (Security+, CySA, CAP, CASP CE, CISM, CISSP or Associate)
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or related field.
Strong knowledge of NIST RMF, DoD 8500-series, and DISA STIG compliance.
Experience with SAST, SBOM tools, and secure software development practices.
Experience supporting AF programs or Cloud One environments.
Familiarity with CI/CD security integration and automated compliance tools.
Advanced certification (e.g., CASP+, CCSP, or CISSP-ISSAP) preferred.
Must be able to satisfactorily obtain and maintain a government security clearance as required by the contract.
Must be able to maintain ability to access government worksite.
Must possess and maintain a valid state driver's license and a safe driving record, in accordance with company policy, to operate vehicles or equipment as required for the position.
Physical Demands / Work Environment:
Ability to sit or stand for extended periods while working at a computer or desk.
Frequent use of hands for typing, data entry, and handling paperwork.
Must be able to work on-call, alternate, and extended shift schedules when necessary to meet the mission requirements, including weekends and holidays.
All candidates must successfully complete pre-employment screening, which may include but is not limited to a criminal background check, motor vehicle record review, and a 5-panel drug test, in accordance with company policy and applicable laws.
Benefits:
We offer a flexible benefits package including medical, dental, and vision plans, TRICARE Supplemental, critical illness coverage, employee discounts, wellness seminars, company-paid life and short-term disability insurance, optional long-term disability, paid leave, a 401(k) plan, and identity theft protection to support your health and financial well-being. For represented positions, the benefits and leave offered will be as defined under the applicable Collective Bargaining Agreement.
Equal Employment Opportunity:
We are proud to be an equal opportunity employer and comply with all applicable federal, state, and local employment laws. All applicants will be considered for employment without regard to race, color, religion, creed, national origin, gender, gender identity, age, marital status, sexual orientation, veteran status, disability, pregnancy, parental status, or any other characteristic protected by law.
Reasonable Accommodation:
If you have a disability or medical condition and need reasonable accommodation, please inform the designated recruiter during the hiring process.
Auto-ApplySecurity Systems Sales Engineer
Security engineer job in Dayton, OH
We are looking for a Security Systems Sales Engineer, who will join a strong sales team that values collaboration, communication and transparency. Sales Engineers will specialize in technologically and scientifically advanced products and services. They will use their technical skills to explain the benefits of our solutions to new and existing customers. This role reports to a Regional Sales Manager.
WHAT YOU WILL BE DOING
Prepare and deliver technical presentations explaining products or services to existing and prospective customers and contractors.
Design, propose, and sell integrated security and life-safety systems (access control, video surveillance, intrusion, and integration with fire alarm systems) to commercial, industrial, and institutional customers.
Serve as the technical sales lead, bridging between customer requirements, design teams, and operations, ensuring solution integrity, profitability, and customer satisfaction
Collaborate with sales team to understand customer and contractor requirements and provide sales support.
Help clients solve problems with installed equipment.
Recommend improved materials or machinery to customers, showing how changes will lower costs and increase production.
Understand how to interpret prints and drawings
Follow the established sales strategy, processes and programs to shift prospects into new customers within the CertaSite Customer Relationship Management (CRM) platform
Develop fire and life safety solutions that are a fit for each targeted prospect
Demonstrate efficient time management by spending time on activities that increase the chance of quota realization with a concern for EBITDA expansion, while also being value and mission driven
Maintain the pulse on competition, as well as understand how the buyers of CertaSite products and services make purchasing decisions
Drive revenue to CertaSite through prospects by establishing and selling solutions through the CertaSite platform of products and services
Establish scale and profitability by helping professionalize the Company s go-to-market strategy and sales function
Facilitate optimization of gross margin throughout the organization
Partner with marketing to ensure the CertaSite value proposition and selling story remains relevant
Gather all information needed to make informed recommendations
Persuasively sell ideas to gain support and buy-in
Use various communication techniques to gain cooperation in a negotiation
Demonstrate the ability to remain resolute and resilient under stress
Leverage contacts to stay informed of new company developments
Balance new requests with established priorities
QUALIFICATIONS
4+ years experience in low-voltage security systems (access control, video surveillance, intrusion)
Proven track record in technical sales or application engineering
Experience with Lenel / OnGuard / OnBoard preferred
Strong understanding of IP networking, PoE, switches, VLANs, and structured cabling
Ability to perform site surveys and read construction drawings
Technical degree or equivalent work experience; Bachelor s preferred
Valid driver s license and ability to travel locally within the state
IDEAL QUALITIES
NICET, NFPA, or other fire and life-safety certifications, Lenel / OnGuard / OnBoard certification (or willingness to obtain)
Manufacturer certifications (Bosch, Axis, Milestone, HID, etc.)
Experience with AutoCAD, Visio, or similar tools
Experience driving revenue and helping build strong GTM strategies
Demonstrated track record of uncovering opportunities and advancing prospect opportunities to close by following a prescribed selling campaign process
Strong orientation to delivering winning outcomes and possessing an emotional engine that is contagiously felt throughout the organization
Proficiency in identifying high value prospects, running a disciplined sales campaign and converting prospects into CertaSite customers
WORKING CONDITIONS & PHYSICAL REQUIREMENTS
Controlled climate, office environment
Local travel as needed; no overnight travel required
Visit customer locations and may have meetings in field settings
Required to sit for long periods of time, eight hours or more per day and being frequently required to use monitor, keyboard, and phone
COMPANY PERKS
Work at a mission-driven company, focused on people
Comprehensive medical plan options, including dental and vision
401K plan with company match
Generous paid time off, paid holidays, and paid parental leave
Education reimbursement program
Continued growth and expansion into new markets and products and services
This is a unique opportunity to join a great team at a company that is rapidly expanding and evolving, which may also bring significant potential for career growth.
Who are we?
CertaSite is a fast-growing fire protection and life safety company. Fire and life safety is our passion. It s all we think about. We leverage our hard-earned expertise to give people peace of mind, confidence, and more time to pursue their core businesses. Since 2018, we have grown from four to 18 markets while serving more than 30,000 customers throughout the Midwest.
As we grow and expand into new markets, we are building a team that loves what they do and has fun doing it. If you are looking to be challenged every day, for an opportunity to make a meaningful impact, and to grow with a mission- and people-driven company focused on the customer, we hope you will consider this amazing opportunity.
Our Mission: To provide a meaningful impact to as many lives as possible.
Our Vision: To be the most dependable and simplified life safety solution on the planet.
Our Values:
Passionate
We are on a relentless pursuit to be great, not just good enough. And we have fun doing it.
Impactful
Our work makes a real difference in the world. We literally save lives, but that s just the beginning.
Innovative
We believe there is always a better way. We don t stop until we find it.
Genuine
We do what we say, and we mean it. We are authentic and dependable.
WORKING CONDITIONS & PHYSICAL REQUIREMENTS:
Overtime may be required, and the number of hours may vary based on work location. May be exposed to all kinds of work environments. Varying work environments from hot to cold temperatures and exposure to dust. Occasionally asked to travel overnight to a customer location. Must be able to successfully lift up to 50 pounds occasionally. Frequent lifting and carrying of toolboxes, equipment, parts, tools, equipment, cabling, and/or wiring. Frequent ladder climbing and checking, pulling wire, etc. Walking, stooping, bending, crouching, kneeling, and raising hands overhead. Driving is required and the amount of time driving may vary. Required to wear Personal Protective Equipment (PPE) for this position in accordance with safety standards
Equal Employment Opportunity/M/F/disability/protected veteran status
Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time.
Cyber Security Engineer
Security engineer job in Dayton, OH
Direct and recent experience coding in C, C++, Python. Solid understanding of computer architecture, operating systems, and software development principles. Comfort working with assembly language, machine code, hexadecimal, and binary representations.
Experience with reverse engineering tools such as IDA Pro, Ghidra, or GDB.
Knowledge of network protocols (TCP/UDP) and basic cryptography functions.
Hacker mindset with a demonstrated interest in analyzing software/firmware for weaknesses.
1-4 years of demonstrated experience in reverse engineering or related security disciplines.
Experience developing user-mode applications for traditional platforms (Windows, Linux, mac OS, Android, iOS) or user/kernel-mode capabilities for non-traditional platforms (embedded/proprietary/custom firmware or operating systems).
Experience analyzing and manipulating network protocols.
Interest in the architecture and internals of proprietary operating systems.
Participation or interest in Capture the Flag (CTF)/hacking competitions Experience with hardware reverse engineering tools and techniques.
Knowledge of embedded systems and firmware analysis.
Demonstrated ability to learn new technologies quickly and adapt to a fast-paced environment.
Relevant certifications such as Offensive Security Certified Professional (OSCP), eLearnSecurity Junior Penetration Tester (eJPT), GIAC Reverse Engineering Malware (GREM), GIAC Certified Reverse Engineer (GCRE), or other reverse engineering, malware analysis, or security-related certifications.
Bachelor's degree in Computer Science, Cyber Security, Computer Engineering, Electrical Engineering, or a related field strongly preferred.
Ability to obtain and maintain a U.
S.
Security Clearance is required.
Ability to obtain TS/SCI.
Reverse Engineers use decompiling, disassembling, and de-obfuscating to gain a deeper understanding of how and what a malicious software operates.
They identify, examine, and understand various forms of malicious software, such as adware, bots, rootkits, spyware, ransomware, Trojan horses, viruses, and worms.
LI-BG1
Auto-ApplyComputer Network Defense Analyst
Security engineer job in Dayton, OH
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. Computer Network Defense AnalystWe are actively searching for Computer Network Defense Analysts (CNDAs), located in Ohio, to support our team. We have varying levels of CNDAs, depending on years of experience and education.Duties
Conduct computer network defense.
Conduct target development for use or decision by Government personnel.
Analyze and produce intelligence information.
Conduct computer/network security to provide advice to the Government.
Create and maintain documentation of their analysis.
Ensure to routinely follow oversight and compliance
Acquire/share job knowledge/skill
Partner with team members on the contract, including government personnel and other partner companies
Qualifications
Degree in Computer Science or equivalent technical field
Level 1 - 6 years of experience can replace 2 years of experience with AA degree
Level 2 - 9 years of experience can replace 4 years of experience with BS degree
Level 3 - 12 years of experience can replace up to 6 years of experience with MS degree
Level 4 - 15 years of experience can replace up to 9 years with Doctorate degree
Strong communication skills
Works well in a team and alone
Working knowledge of Microsoft Office Suite
Company Perks
At PTC, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
Robust health plan including medical, dental, and vision
Health Savings Account with company contribution
Annual Paid Time Off and Paid Holidays
Paid Parental Leave
401k with generous company match
Training and Development Opportunities
Award Programs
Variety of Company Sponsored Events
Prime Time Consulting, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability. Anyone requiring reasonable accommodations should email [email protected] with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyInfrastructure Security Analyst
Security engineer job in Dayton, OH
Versiti is a fusion of donors, scientific curiosity, and precision medicine that recognize the gifts of blood and life are precious. We are home to the world-renowned Blood Research Institute, we enable life saving gifts from our donors, and provide the science behind the medicine through our diagnostic laboratories. Versiti brings together outstanding minds with unparalleled experience in transfusion medicine, transplantation, stem cells and cellular therapies, oncology and genomics, diagnostic lab services, and medical and scientific expertise. This combination of skill and knowledge results in improved patient outcomes, higher quality services and reduced cost of care for hospitals, blood centers, hospital systems, research and educational institutions, and other health care providers. At Versiti, we are passionate about improving the lives of patients and helping our healthcare partners thrive.
Position Summary
The Infrastructure Security Analyst will play a critical role in ensuring the security and integrity of our IT systems and networks. This position involves a balanced focus on IT Systems and Network Support and Cybersecurity with a concentration on Vulnerability Management. The ideal candidate will possess both technical expertise and strong analytical skills to identify, mitigate, and manage vulnerabilities while supporting the overall IT infrastructure. The candidate will thrive in a dynamic, team-oriented environment, where knowledge sharing, and continuous learning are encouraged. As an integral part of our collaborative team, the Infrastructure Security Analyst will work closely with various IT departments, including network operations, system administration, and application development. This role includes direct collaboration with the Senior Cybersecurity Engineer to ensure thorough analysis, identification, and mitigation of infrastructure vulnerabilities. Together, the team will address evolving cyber threats, communicate complex security concepts to stakeholders across all levels, and promote an organization-wide security culture while supporting Versiti's business and operational goals. This position values teamwork, encouraging information sharing and joint problem-solving to fortify the organization's defenses. This role is essential in building a resilient IT infrastructure that can adapt to evolving threats while supporting the organization's business objectives.
Total Rewards Package
Benefits
Versiti provides a comprehensive benefits package based on your job classification. Full-time regular employees are eligible for Medical, Dental, and Vision Plans, Paid Time Off (PTO) and Holidays, Short- and Long-term disability, life insurance, 7% match dollar for dollar 401(k), voluntary programs, discount programs, others.
Responsibilities
Provide technical support for IT infrastructure, including servers, networks, and cloud services.
Monitor system performance, troubleshoot issues, and perform regular maintenance on IT systems and document system configurations, changes, and procedures for future reference and compliance audits.
Collaborate with IT teams to implement and maintain secure network configurations and ensure compliance with organizational policies while assisting in the deployment and configuration of hardware and software as needed.
Respond to and resolve service requests and incidents in a timely manner.
Conduct regular vulnerability assessments and penetration testing to identify security weaknesses within IT systems and networks and collaborate with IT teams to develop and implement mitigation strategies for identified vulnerabilities.
Analyze vulnerability scan reports and prioritize remediation efforts based on risk assessment and monitor security alerts and incidents, responding to security breaches or threats as necessary.
Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and trends. Utilize threat intelligence feeds and monitoring tools to proactively identify and mitigate potential security threats. Provide recommendations for security improvements and help implement new security controls.
Performs other duties as required or assigned which are reasonably within the scope of the duties in this job classification
Understands and performs in accordance with all applicable regulatory and compliance requirements
Complies with all standard operating policies and procedures
Qualifications
Education
Bachelor's Degree Computer Science, Information Technology, Cybersecurity, or a related field preferred
Experience
4-6 years Demonstrated experience installing, managing and troubleshooting Linux and/or Microsoft Server environments. required
4-6 years Experience with Enterprise Data Center Server and Network environments. required
4-6 years Experience in conducting vulnerability assessments and penetration testing. required
Demonstrated experience with VMware Server and storage management. preferred
Knowledge, Skills and Abilities
Understanding of patch management processes and tools required
Knowledge of common security frameworks (e.g., NIST, ISO 27001, CIS Controls) required
Strong analytical and problem-solving skills. required
Excellent communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders. required
Strong attention to detail and ability to work independently as well as part of a team. required
Experience with ticketing systems and IT service management processes. required
Familiarity with scripting languages (e.g., PowerShell, Python). preferred
Licenses and Certifications
Certified Ethical Hacker (CEH) desired
CISSP Certified Information Systems Security Professional desired
Microsoft Certified Systems Engineer (MCSE) preferred
Microsoft Certified Systems Administrator (MCSA) preferred
CompTIA Network+ Certification preferred
CompTIA Security+ Certification preferred
Tools and Technology
Proficiency in network protocols, firewalls, VPNs, and security appliances. required
Knowledge of operating systems (Windows, Linux) and cloud environments (AWS, Azure). required
Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). preferred
Experience with container technologies (e.g., Docker, Kubernetes) preferred
Familiarity with threat intelligence and incident response processes. preferred
#LI-EH1
#LI-Hybrid
Not ready to apply? Connect with us for general consideration.
Auto-ApplyInformation System Security Officer
Security engineer job in Dayton, OH
Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: None Type of Travel: None * * * **The Opportunity:** CACI is seeking a skilled and experienced **Information Systems Security Officer (ISSO)** to join our team at Wright Patterson Air Force Base in Ohio. This critical role will be responsible for implementing and maintaining robust cybersecurity measures to protect Air Force information systems. The ideal candidate will have a strong background in DoD cybersecurity protocols, risk management, and cloud-based security tools. As an ISSO, you will play a vital role in ensuring the integrity, confidentiality, and availability of sensitive information while supporting the mission-critical operations onsite at Wright Patterson AFB. If you are passionate about cybersecurity and ready to contribute to national defense in a dynamic environment, we encourage you to apply for this challenging and rewarding position.
**Responsibilities:**
+ Create and implement Air Force security policies, procedures, and controls to protect information systems.
+ Conduct risk assessments and develop risk management plans to identify and mitigate vulnerabilities.
+ Configure cloud-based security tools to monitor networks, systems, and user activity for security breaches, analyze threats, and review security and audit logs.
+ Develop and perform continuous monitoring techniques and procedures.
+ Review and evaluate STIG and static code analysis scans for compliance and vulnerabilities.
+ Provide security guidance to technical and software development teams throughout the software development lifecycle (SDLC).
+ Ensure software, hardware, and user access controls comply with security configuration guidelines.
+ Report incidents or vulnerabilities and initiate counter measures and actions to restore cybersecurity posture.
**Qualifications:**
_Required:_
+ Bachelor's degree in a related field or 6 years' experience.
+ Knowledgeable of DoDI 8500.01 (Cyber Security), 8510.01 (Risk Management Framework for Air Force Information Technology), AFI 17-101(Risk Management Framework for Air Force Information Technology), and NIST SP 800-53 Security and Privacy Controls.
+ Active DoD 8140 IAM Level II certification (CASP+, CCNP Security, CISA, CISSP (or Associate), CCSP, GCED, or GCIH).
+ Strong knowledge of IT security principles, network monitoring, operating systems, and security tools.
+ Strong customer service, interpersonal, and communication skills (written and verbal).
+ Good organizational, time management, analytical, and problem-solving skills.
+ Must be able to work as part of a team and individually, meeting tight deadlines.
+ Candidates must be U.S. Citizens and have the ability to obtain a secret clearance investigation in a timely manner.
_Desired:_
+ Knowledgeable with Enterprise Mission Assurance Support Service (eMASS) and associated artifacts and Plan of Actions & Milestone (POA&M) requirements.
+ Knowledgeable about ZeroTrust tools and techniques including Identity, Credential, and Access Management (ICAM) efforts.
+ Ability to review and analyze for consistency, congruency, and in-depth due diligence.
+ Experience with Cloud environments and Cloud security tools.
+ Experience in software development environments including DevSecOps and tools such as the Atlassian suite (Jira, Confluence, etc).
+ Experience with security control evidence development.
+ Familiarity with Configuration Management and Configuration Control Boards.
-
**________________________________________________________________________________________**
**What You Can Expect:**
**A culture of integrity.**
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
**An environment of trust.**
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
**A focus on continuous growth.**
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
**Your potential is limitless.** So is ours.
Learn more about CACI here. (************************************************
**________________________________________________________________________________________**
**Pay Range** : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here (***************************************************** .
The proposed salary range for this position is:
$75,200-$158,100
_CACI is_ _an Equal Opportunity Employer._ _All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any_ _other protected characteristic._
Information Systems Security Officer (ISSO) III
Security engineer job in Dayton, OH
**Req ID:** RQ211730 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret SCI + Polygraph **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Information Security,Information Security Management,Information System Security
**Certifications:**
GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC)
**Experience:**
5 + years of related experience
**US Citizenship Required:**
Yes
**Job Description:**
The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.
This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
**Performance shall include:**
+ Assist the ISSM in meeting their duties and responsibilities.
+ Prepare, review, and update authorization packages.
+ Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
+ Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
+ Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
+ Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
+ Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
+ Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
+ Ensure audit records are collected, reviewed, and documented (to include any anomalies)
+ Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
+ Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans.
+ Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
+ Prepare reports on the status of security safeguards applied to computer systems.
+ Perform ISSO duties in support of in-house and external customers.
+ Conduct continuous monitoring activities for authorization boundaries under your preview.
+ Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts.
**Experience:**
+ 5+ years related experience.
+ 2+ years SAP experience **required.**
+ Prior performance in roles such as System, Network Administrator or ISSO.
**Education:**
+ Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
**Certifications:**
+ IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire
**Clearance Required to Start:**
+ TS/SCI required
+ Must be able to Attain - TS/SCI with CI Polygraph
\#AirforceSAPOpportunities
The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at ********************
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Information Systems Security Officer (ISSO) III
Security engineer job in Dayton, OH
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description:
The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.
This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Conduct continuous monitoring activities for authorization boundaries under your preview.
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts.
Experience:
5+ years related experience.
2+ years SAP experience required.
Prior performance in roles such as System, Network Administrator or ISSO.
Education:
Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire
Clearance Required to Start:
TS/SCI required
Must be able to Attain - TS/SCI with CI Polygraph
#AirforceSAPOpportunities
The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyInformation Security Analyst
Security engineer job in Miamisburg, OH
Job Description
ComResource is looking for an Information Security Analyst.
We need someone to assist in safeguarding sensitive data, neutralizing threats, and ensuring a strong cybersecurity posture through proactive monitoring, investigation, and governance.
Responsibilities:
Develop, implement, and enforce cybersecurity policies and procedures.
Conduct risk assessments, internal audits, and ensure compliance with frameworks like NIST and ISO 27001.
Lead threat detection, incident response, and vulnerability management initiatives.
Oversee security architecture, tools, and endpoint protection solutions.
Drive cybersecurity awareness and training across the organization.
Collaborate with IT, leadership, and cross-functional teams to improve the company's security posture.
Manage vendor and third-party security compliance.
Essentials:
Bachelor's degree in Cybersecurity, IT, or related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (NIST, ISO 27001).
Experience with SIEM, EDR, and vulnerability management tools.
Strong analytical, communication, and collaboration skills.
Experience supporting governance, risk, and compliance (GRC) functions.
Desired:
Experience with Artic Wolf, CMMC, and NIST compliance.
Familiarity with enterprise platforms such as ERP or CRM systems.
Calm, strategic approach to incident response and crisis management.
Req ID: RB8910701020
Senior Embedded Systems Security Engineer (Engineer Systems 4) - 26018
Security engineer job in Wright-Patterson Air Force Base, OH
Requisition Number: 26018 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $87,989. 00 - $125,000. 00 Security Clearance: Secret Level of Experience: Senior This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division.
Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems.
HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats.
Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.
S.
military and federal agency partners.
Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe.
Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers.
Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class.
Find the role that's right for you.
Apply today.
We look forward to meeting you.
To learn more about Mission Technologies, click here for a short video: **************
com/732533072 Job Description + Develop an in-depth technical understanding of assigned programs, including an awareness of all AT related technical issues, and be prepared to answer technical and risk based questions for our customer and senior DoD decision makers + Coordinate reviews, meetings and test activities for assigned programs and work to support program needs + Review engineering design documents for anti-tamper solutions (e.
g.
Anti-Tamper Plans) and conduct vulnerability analysis of system level anti-tamper architectures + Author technical reports to document vulnerabilities of proposed anti-tamper solutions and provide technical recommendations for key DoD acquisition decision makers + Support technical interchange meetings and program reviews with US Air Force and DoD program offices and weapon system and sensor developers, and provide real time feedback to help achieve acceptable anti-tamper implementations + Author written feedback for US Air Force and DoD program offices and weapon system and sensor developers to document identified weaknesses and vulnerabilities of anti-tamper solutions #LI-HB1 Essential Job Responsibilities Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems.
Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
Minimum Qualifications + 9 years relevant experience with Bachelors in related field; 7 years relevant experience with Masters in related field; 4 years relevant experience with PhD in related field; or High School Diploma or equivalent and 13 years relevant experience.
+ B.
S.
(M.
S.
preferred) in Electrical Engineering, Computer Engineering, Computer Science, Software Engineering or other related engineering disciplines + Minimum three (3) years experience with DoD Anti-Tamper engineering + 5-20 years of engineering experience, to include systems engineering, electronic design, software development, system integration and/or test and failure analysis + Working knowledge of modern electronic components, to include microprocessors, FPGAs, and ASIC technologies + Proficient technical writing skills to generate technical documents and presentations + Good verbal communication skills, comfortable interacting with technical peers and the ability to work as part of a team required + Good analytical, critical thinking and problem solving skills + Must be able to obtain and maintain a TS/SCI security clearance with advanced security checks + Secret clearance minimum to start Preferred Requirements + Experience with DoD sensor and weapon system engineering and devolvement desired + Hardware and/or software reverse engineering experience is a plus + Experience with Defensive Cyber technologies and techniques is a plus The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities.
When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills.
Together we are working to ensure a future where everyone can be free and thrive.
All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.
Do You Need Assistance? If you need a reasonable accommodation for any part of the employment process, please send an e-mail to buildyourcareer@hii-co.
com and let us know the nature of your request and your contact information.
Reasonable accommodations are considered on a case-by-case basis.
Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address.
Additionally, you may also call ************** for assistance.
Press #3 for HII Mission Technologies.
Information Systems Security Officer (ISSO)
Security engineer job in Beavercreek, OH
Title:
Information Systems Security Officer (ISSO)
Belong. Connect. Grow. with KBR!
KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country's most critical role - protecting our national security.
Why Join Us?
Innovative Projects: KBR's work is at the forefront of engineering, logistics, operations, science, program management, mission IT and cybersecurity solutions.
Collaborative Environment: Be part of a dynamic team that thrives on collaboration and innovation, fostering a supportive and intellectually stimulating workplace.
Impactful Work: Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense.
Position Summary:
The selected candidate will serve in a Senior ISSO role and perform tasks related to Assessment & Authorization (A&A) and cybersecurity under DHA to obtain and maintain Authorizations to Operate (ATOs) for assigned DoD medical systems (i.e., applications, networks, devices). This position serves in the Digital Infrastructure (DI) Program assisting the DI Network program.
Key Responsibilities:
Serve as an Information Systems Security Officer (ISSO) at our Beavercreek, OH Area location working with the Site IA in support of a KBR Information Systems. Candidate will perform extensive assessments of systems and networks within the networking environment or enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Candidate will achieve this through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). Position is a corporate position, and employment is not tied to a contract.
Candidate will perform Information Assurance and IT Security tasks to ensure the secure operation of the KBR information systems as a part of the KBR Information Assurance Operations team.
Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. This includes process support, analysis support, coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits.
Assists in the implementation of the required government policy (i.e., JSIG, NISPOM, SP-800-171, SP-800-53, RMF) for site-hosted information systems and makes recommendations on process tailoring.
Performs extensive analyses to validate established security requirements and to recommend additional security requirements and safeguards.
Periodically conducts of a review of each system's audits and monitors corrective actions until all actions are closed.
Work Environment:
Location: KBR Beavercreek Facility
Travel Requirements: 15%-35%
Working Hours: Standard
Qualifications:
Required:
Bachelor's degree in computer, information systems management or related field from an accredited college or university or equivalent experience.
4 years' experience as an ISSO.
Experience with DOD 8500.01, Risk Management Framework (RMF) requirements as well as experience in drafting, submitting, and maintaining RMF packages, Experience with Joint Special Access Program (SAP) Implementation Guide (JSIG) packages is required.
Experience in development and maintaining of RMF Documents including System Security Plans (SSP), System Security Checklists, Privacy Impact Assessments, and Authority to Operate (ATO) artifacts.
Experience in developing Plan of Action and Milestones (POA&M)
Knowledge of independent verification and validation techniques is required.
Experience working independently and as part of a team in researching data, developing analytical techniques and methodologies is required.
A current Information Assurance Manager (IAM) Level I (CAP, Security+ CE) or comparable certification in accordance with DoD 8570.01-M.
Applicant selected is subject to a United States Government security investigation and must meet eligibility requirements for access to classified information. A current Secret clearance with the eligibility to receive a TS/SCI, or have a Background Investigation completed within the last 6, is required.
Desired:
IAM Level II (CAP, CASP, CISM, CISSP) or comparable certification in accordance with DoD 8570.01-M.
Knowledge in monitoring and conducting Security Control Assessment to ensure all controls meet security requirements as stipulated in the SSP, NIST SP 800-53, JSIG.
Understanding of maintenance and inventory process for information Security Systems.
Experience in coordinating with Leadership across the organization to ensure timely compliance.
Experience in developing waivers and exceptions for information system vulnerabilities.
Knowledge of quality assurance, quality control, and independent verification and validation techniques.
Experience working in a corporate environment and working with a diverse user population and a global enterprise.
Ready to Make a Difference?
If you're excited about making a significant impact in the field of space defense and working on projects that matter, we encourage you to apply and join our team at KBR. Let's shape the future together.
KBR Benefits
KBR offers a selection of competitive lifestyle benefits which could include 401K plan with company match, medical, dental, vision, life insurance, AD&D, flexible spending account, disability, paid time off, or flexible work schedule. We support career advancement through professional training and development.
Belong, Connect and Grow at KBR
At KBR, we are passionate about our people and our Zero Harm culture. These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a People First company. That commitment is central to our team of team's philosophy and fosters an environment where everyone can Belong, Connect and Grow. We Deliver - Together.
KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
Auto-ApplyInformation System Security Officer (ISSO)
Security engineer job in Dayton, OH
ASRC Federal is a leading government contractor furthering missions in space, public health and defense. As an Alaska Native owned corporation, our work helps secure an enduring future for our shareholders. Join our team and discover why we are a top veteran employer and Certified Great Place to Work
ASRC Federal has an exciting opportunity for an Information System Security Officer (ISSO in) in Dayton, Ohio. Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
**Responsibilities:**
+ Maintain the operational security posture of systems.
+ Monitor systems and environments for security compliance.
+ Develop and update System Security Plans (SSPs).
+ Manage and control system changes and assess their security impact.
+ Handle physical, personnel, and environmental security.
+ Conduct incident response and security awareness training.
+ Assist the ISSM and assume ISSM duties when necessary.
+ Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
+ Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
+ Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
+ Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
+ Report all security-related incidents to the ISSM
+ Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
+ Serve as member of the CCB, if designated by the ISSM;
+ Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
+ Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
+ Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
+ Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
+ Ensure audit records are collected, reviewed, and documented (to include any anomalies).
+ Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
**Responsibilities:**
+ Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
+ Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
+ 5+ years related experience in SCI/SAP environments.
+ Bachelor's degree in computer science, Engineering, Finance, Business, or relatedfield
+ 5-8 years demonstrated performance in related technology
+ Top Secret w/ SCI eligibility
+ Other duties as assigned
We invest in the lives of our employees, both in and out of the workplace, by providing competitive pay and benefits packages. Benefits offered may include health care, dental, vision, life insurance; 401(k); education assistance; paid time off including PTO, holidays, and any other paid leave required by law.
**_EEO Statement_**
_ASRC Federal and its Subsidiaries are Equal Opportunity employers. All qualified applicants will receive consideration for employment without regard to race, gender, color, age, sexual orientation, gender identification, national origin, religion, marital status, ancestry, citizenship, disability, protected veteran status, or any other factor prohibited by applicable law._
**Job Details**
**Job Family** **Information Technology**
**Job Function** **Information Security**
**Pay Type** **Salary**
Information Systems Security Manager (ISSM)
Security engineer job in Fairborn, OH
Job Description
*This is a contingent opportunity
Information Systems Security Manager (ISSM)
K2 Group is searching for an ISSM to support the Air Force Research Laboratory Sensors Directorate (AFRL/RY) at Wright-Patterson Air Force Base, OH.
Duties:
Be the Directorate's Certification & Accreditation (C&A) process expert.
Perform C&A duties in compliance with the Risk Management Framework (RMF) structure at the SCI and below level in accordance with all applicable regulations.
Follow AFRL procedures to use the Enterprise Mission Assurance Support Service (eMASS), AFRL Enterprise Business System (EBS), Xacta or other workflow tools to obtain an Interim Approval to Operate IATO/ Approval to Operate (ATO).
Prepare, submit, and track all Directorate C&A packages of all Research, Development, Test, & Evaluation (RDT&E) computer information systems for base-level and higher headquarters approval, and ensure that all systems are following DoD Information Technology (IT) C&A guidance.
Submit a quarterly Plan of Action and Milestones (POA&Ms) to HQ AFRL and maintain 100% accountability for all accredited systems and RDT&E systems requiring POA&Ms.
Ensure the Directorate C&A community remains updated on eMASS; review eMASS registration workbooks, recommend changes/clarification and submit updated workbooks to HQ AFRL for registration of Point-to-Point, Standalone, Standalone Enclave systems having a Federal Information Security Management Act (FISMA) requirement.
Coordinate any changes or modifications to hardware, software, or firmware of a system directly with the Authorizing Official (AO)/ Delegated Authorizing Official (DAO) prior to the change.
Conduct routine maintenance, perform backups, and install upgrades and patches to the systems and networks.
Produce artifacts that include but not limited to answers, implementation, documentation, and testing of applicable Information Assurance (IA) controls, topology diagrams, hardware lists, software lists, ports and protocols lists, and plan of action and milestones.
Complete or assist in the completion of vulnerability scans and DISA STIG reviews.
Research and propose solutions for identified risks to eliminate or mitigate adverse impact to an acceptable level.
Interact and coordinate with system program managers to create, update, and maintain system documentation and supporting artifacts related to the RMF process.
Requirements:
Five (5) years of relevant experience
Certifications:
SPēD Security Fundamentals Professional Certification (SFPC) - required at start
Microsoft SQL Server Management Studio (or Security+) - required at start
SPēD Security Asset Protection Professional Certification (SAPPC) - required within 6 months of entry on duty
Must hold a DoD 8140.03-compliant certification (at start):
Information Assurance Technical (IAT) Level II (required)
Information Assurance Technical (IAT) Level III (preferred)
Clearance:
Active Top Secret/SCI
Benefits: K2 Group's benefit offerings include: Medical/ Dental/ Vision Insurance; FSA Medical & FSA Dependent Care; Pre-tax 401(k) & ROTH 401(k) plans; Profit Sharing Plan; Life & Accidental Death Insurance; Short Term/ Long Term Disability; Voluntary Group Life Insurance option; Tuition Reimbursement; Job-related Course Reimbursement; Holiday Pay; and Paid Time-Off
Powered by JazzHR
Ijvr8jzcNQ
Information System Security Officer (ISSO)
Security engineer job in Dayton, OH
ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Why Work with us?â¯
âApplied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.â¯Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.â¯â¯
Responsibilities:
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
Report all security-related incidents to the ISSM
Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
Serve as member of the CCB, if designated by the ISSM;
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Responsibilities:
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or related
field
5-8 years demonstrated performance in related technology
Top Secret w/ SCI eligibility
Other duties as assigned
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Security Analyst - Indefinite US Work Authorization Required
Security engineer job in New Bremen, OH
: Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership.
**Job Posting External**
**Primary Responsibilities:**
+ Lead the design and implementation of SIEM correlation rules and alert logic to detect advanced threats and suspicious behaviors.
+ Build and optimize SOAR playbooks to automate multi-step incident response actions.
+ Continuously tune alert thresholds and logic to reduce false positives and improve detection accuracy.
+ Integrate threat intelligence feeds into SIEM and SOAR platforms to enhance alert context and prioritization.
+ Investigate and respond to alerts, coordinating with IT, MDR, and security teams to validate and remediate incidents.
+ Maintain documentation for alert logic, playbook workflows, and incident handling procedures.
+ Mentor junior analysts on alert development, tuning, and automation best practices.
+ Participate in an on-call rotation to support timely response to critical alerts and incidents.
**Minimum Qualifications:**
+ High school diploma or equivalent is required.
+ Familiarity with SIEM platforms and basic alert logic.
+ Experience with scripting languages such as PowerShell or Python.
+ Understanding of cybersecurity fundamentals, including threat types and detection techniques.
+ 1+ years of experience in cybersecurity or a related field.
+ Strong analytical and problem-solving skills.
+ Willingness to participate in an on-call rotation.
**Preferred Qualifications:**
+ Bachelor's degree in cybersecurity, computer science, information technology, or a related field.
+ Exposure to SOAR platforms and basic playbook development.
+ Experience working with third-party MDR or managed security service providers.
+ Certification such as Security+, GSEC, or CEH.
+ Familiarity with threat intelligence sources and enrichment techniques.
+ Understanding of compliance frameworks such as NIST CSF or ISO 27001.
**Work Authorization:**
Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire.
No agency calls please.
**Compensation and Benefits:**
Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more.
EOE Veterans/Disabilities
Cyber Security Specialist
Security engineer job in Kettering, OH
Kettering, OH/Remote
IPTA's Technology Solutions Team is passionate about providing our customers with technical solutions that satisfy their business needs. Through collaborative interactions with customers, team members, subject matter experts (SMEs), technical leaders, and partners we design practical solutions that solve real problems for major government and business organizations. As a member of our Technology Solutions group, you will work with a team of technologists focused on delivering innovative business solutions using emerging technologies through proven successful methods.
Our Team:
We are looking for talented people who are enthusiastic about applying technology to deliver innovative outcomes with "fierce determination, fearless integrity, and passionate service." Our belief is that our people are the key to success. By encouraging and enabling continued learning, our team members grow to achieve their personal career goals. We are looking for:
Smart people with a passion for technology
Ability to solve challenging business problems
Self-directed professionals
Hunger to continually learn and grow
Responsibilities:
Identifies and resolves highly complex issues to prevent cyber attacks on information systems and to keep computer information systems secure from interruption of service, intellectual property theft, network viruses, data mining, financial theft, and theft of sensitive customer data, allowing business to continue as normal.
Designs, installs, and manages security mechanisms that protect networks and information systems against hackers, breaches, viruses, and spyware.
Responds to incidents, investigates violations, and recommends enhancements to plug potential security gaps. Analyzes data to spot trends, and creates tools to support research efforts.
Mitigates threats by gathering information and developing plans, and monitors networks for security breaches.
Develops best practices and security standards, and trains users on security protocols.
Creates and tests disaster recovery procedures to keep IT running in the event of a security breach.
Researches data, learns about new technologies, and gathers information on the latest risks.
Utilizes specialized expertise, up-to-date knowledge, and proficiency in analysis, forensics, and reverse engineering to monitor and diagnose malware events and vulnerability issues resulting in web threats that facilitate cyber crime, including malware, phishing, viruses, denial-of-service attacks, information warfare, and hacking.
Makes recommendations for solutions, including hardware and software programs that can help mitigate risk.
Designs firewalls, monitors use of data files, and regulates access to safeguard information and protect the network.
Keeps up-to-date on current virus reports, and protects networks from these viruses.
Trains users, promotes security awareness, develops policies and procedures, and provides updates and reports to management and executive staff.
Requirements:
Bachelor's degree in a related field
Eight (8) years of prior experience in a similar role
DoD 8570 Level II/II certification required
Active Security Clearance Required
IPTA is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment opportunity to all qualified employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, religion, sex, sexual orientation, national origin, age, physical disability, mental disability, medical condition, status as a veteran or disabled veteran or any other characteristic protected by law. We base all employment decisions, including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, returns from lay-off, terminations, and social and recreational programs on the principles of equal employment opportunity. Our employees have diverse backgrounds, skills, and ideas that collectively contribute to a rich working environment and greater opportunity for innovation.