OT Security Cyber Prevention Engineer
Security engineer job in Marysville, OH
What Makes a Honda, is Who makes a Honda Honda has a clear vision for the future, and it's a joyful one. We are looking for individuals with the skills, courage, persistence, and dreams that will help us reach our future-focused goals. At our core is innovation. Honda is constantly innovating and developing solutions to drive our business with record success. We strive to be a company that serves as a source of “power” that supports people around the world who are trying to do things based on their own initiative and that helps people expand their own potential. To this end, Honda strives to realize “the joy and freedom of mobility” by developing new technologies and an innovative approach to achieve a “zero environmental footprint.”
We are looking for qualified individuals with diverse backgrounds, experiences, continuous improvement values, and a strong work ethic to join our team.
If your goals and values align with Honda's, we want you to join our team to Bring the Future!
The Honda Development and Manufacturing Production Engineering team is responsible for the operational technology
security of the manufacturing environment. The OT Security Cyber Prevention Engineer works across multiple technical
and business areas to develop, implement, and maintain procedures, standards, and controls to prevent the risk or
impact of a cyber incident. The scope of this function covers manufacturing equipment hardware/firmware/ software, OT
enterprise systems, data analysis and reporting, and collaboration with IT/business users to ensure secure operation
across all HDMA locations and equipment.
New equipment introduction - set OT standards for new equipment, integrate equipment into the OT
network, confirm vulnerabilities, perform risk assessments, and visibility of equipment within the asset
management system.
Training - support the creation, administration and maintenance of OT specific training material.
Policies/procedures/auditing - create, issue, maintain, and audit OT specific policies and procedures.
Access control (physical + logical) - set and implement technical standards for equipment level physical
access and control access to OT related systems and equipment.
OT standard creation - support the development, implementation, and maintenance of technical
standards for the OT equipment and networks
Risk metric management/assessments - establish company OT risk metrics and corresponding
assessments to determine OT risk, perform risk assessments, and establish tools for visibility and
reporting.
Sensing/industry benchmarking - research technical and business OT security industry benchmarks and
generate recommendations for adjustments to internal tools or practices to stay in alignment.
What differentiates Honda and makes us an employer of choice?
Total Rewards:
Competitive Base Salary (pay will be based on several variables that include, but not limited to geographic location, work experience, etc.)
Regional Bonus (when applicable)
Manager Lease Car Program (No Cost - Car, Maintenance, and Insurance included)
Industry-leading Benefit Plans (Medical, Dental, Vision, Rx)
Paid time off, including vacation, holidays, shutdown
Company Paid Short-Term and Long-Term Disability
401K Plan with company match + additional contribution
Relocation assistance (if eligible)
Career Growth:
Advancement Opportunities
Career Mobility
Education Reimbursement for Continued learning
Training and Development Programs
Additional Offerings:
Lifestyle Account
Childcare Reimbursement Account
Elder Care Support
Tuition Assistance & Student Loan Repayment
Wellbeing Program
Community Service and Engagement Programs
Product Programs
Honda is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected factor.
OT Security Cyber Prevention Engineer
Security engineer job in Marysville, OH
What Makes a Honda, is Who makes a Honda Honda has a clear vision for the future, and it's a joyful one. We are looking for individuals with the skills, courage, persistence, and dreams that will help us reach our future-focused goals. At our core is innovation. Honda is constantly innovating and developing solutions to drive our business with record success. We strive to be a company that serves as a source of "power" that supports people around the world who are trying to do things based on their own initiative and that helps people expand their own potential. To this end, Honda strives to realize "the joy and freedom of mobility" by developing new technologies and an innovative approach to achieve a "zero environmental footprint."
We are looking for qualified individuals with diverse backgrounds, experiences, continuous improvement values, and a strong work ethic to join our team.
If your goals and values align with Honda's, we want you to join our team to Bring the Future!
The Honda Development and Manufacturing Production Engineering team is responsible for the operational technology
security of the manufacturing environment. The OT Security Cyber Prevention Engineer works across multiple technical
and business areas to develop, implement, and maintain procedures, standards, and controls to prevent the risk or
impact of a cyber incident. The scope of this function covers manufacturing equipment hardware/firmware/ software, OT
enterprise systems, data analysis and reporting, and collaboration with IT/business users to ensure secure operation
across all HDMA locations and equipment.
New equipment introduction - set OT standards for new equipment, integrate equipment into the OT
network, confirm vulnerabilities, perform risk assessments, and visibility of equipment within the asset
management system.
Training - support the creation, administration and maintenance of OT specific training material.
Policies/procedures/auditing - create, issue, maintain, and audit OT specific policies and procedures.
Access control (physical + logical) - set and implement technical standards for equipment level physical
access and control access to OT related systems and equipment.
OT standard creation - support the development, implementation, and maintenance of technical
standards for the OT equipment and networks
Risk metric management/assessments - establish company OT risk metrics and corresponding
assessments to determine OT risk, perform risk assessments, and establish tools for visibility and
reporting.
Sensing/industry benchmarking - research technical and business OT security industry benchmarks and
generate recommendations for adjustments to internal tools or practices to stay in alignment.
What differentiates Honda and makes us an employer of choice?
Total Rewards:
* Competitive Base Salary (pay will be based on several variables that include, but not limited to geographic location, work experience, etc.)
* Regional Bonus (when applicable)
* Manager Lease Car Program (No Cost - Car, Maintenance, and Insurance included)
* Industry-leading Benefit Plans (Medical, Dental, Vision, Rx)
* Paid time off, including vacation, holidays, shutdown
* Company Paid Short-Term and Long-Term Disability
* 401K Plan with company match + additional contribution
* Relocation assistance (if eligible)
Career Growth:
* Advancement Opportunities
* Career Mobility
* Education Reimbursement for Continued learning
* Training and Development Programs
Additional Offerings:
* Lifestyle Account
* Childcare Reimbursement Account
* Elder Care Support
* Tuition Assistance & Student Loan Repayment
* Wellbeing Program
* Community Service and Engagement Programs
* Product Programs
Honda is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, veteran status, or any other protected factor.
Entry Level Cyber Security Analyst
Security engineer job in Dayton, OH
":"As an Entry Level Cyber Security Analyst, you will become a part of an elite team of individuals committed to the security of Customer information and the Company's intellectual property. You will manage the various security tools to identify and evaluate complex business and technology risks.
You must also be able to communicate your findings and recommendations for management.
You will work with teams across the organization including partnering with IT and Software Development on security related matters.
If you are an innovative problem solver in technology who enjoys working in a team environment, this is the position for you! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Entry Level Cyber Security Analyst","date":"2025-11-22","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Bachelor's degree, certificate, or boot camp in CIS, IT, or Cyber Security related fields a plus~^~Linux and Windows operating systems experience and knowledge required~^~Excellent oral and written communication skills~^~Industry standard certifications a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Cyber Network Defense Analyst
Security engineer job in Wright-Patterson Air Force Base, OH
Bowhead seeks a Cybersecurity Network Defense Analyst to join our team in Dayton, OH. The Cybersecurity Network Defense Analyst uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers.
The Cybersecurity Network Defense Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cyber security state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
**Responsibilities**
- Receive and distribute AS&W information
- Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions, and maintain internal and external source location information)
- Coordinate AS&W information from other sources to aid in analysis of alerts
- Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity
- Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops
- Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN
- Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats
- Collect intrusion artifacts (e.g., source code, malware, and trojans)
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
- Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
- Provide a 24/7x365 event/incident handling and analysis capability
- Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents
- Analyze detected cyber events to identify incidents
- Categorize and characterize cyber incidents
- Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process
- Analyze cyber incidents to develop specific responses
- Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers
- Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence
- Mitigate operational and/or technical impact due to cyber incidents
- Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures
**Qualifications**
- Must possess Bachelor's degree or equivalent experience
- Must have at least 2 years intrusion detection experience
- Must have at least 2 years relevant IT and/or System administrator experience and 2 years relevant Information Security experience
- Must have the certifications for DOD 8570 IAT Level II minimally
- Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder
- Must have the ability to earn DoD 8570 computing environment certification within 6 months
- Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
- Ability to demonstrate strong knowledge of computer security concepts
- Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience
- Advanced knowledge of network technologies and protocols
- Advanced understanding of current threats and trends present in the Information Security and Technology field
- Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified
SECURITY CLEARANCE REQUIRED: Must currently hold a security clearance at the Secret level or be able to obtain and maintain a clearance at the Secret level. US Citizenship is a requirement for Secret clearance at this location.
Physical Demands:
- Must be able to lift up to 25 pounds
- Must be able to stand and walk for prolonged amounts of time
- Must be able to twist, bend and squat periodically
\#LI-MN1
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. Please view Equal Employment Opportunity Posters provided by OFCCPhere (******************************************* .
All candidates must apply online at ***************** , and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance *****************/careers/recruitment/ .
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs.
**Join our Talent Community!**
Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events.
**ID** _2025-24272_
**Category** _Information Technology_
**Location : Location** _US-OH-Wright-Patterson AFB_
**Clearance Level Must Be Able to Obtain** _Secret_
**Minimum Clearance Required** _N/A_
**Travel Requirement** _N/A_
Infrastructure Security Analyst
Security engineer job in Dayton, OH
Versiti is a fusion of donors, scientific curiosity, and precision medicine that recognize the gifts of blood and life are precious. We are home to the world-renowned Blood Research Institute, we enable life saving gifts from our donors, and provide the science behind the medicine through our diagnostic laboratories. Versiti brings together outstanding minds with unparalleled experience in transfusion medicine, transplantation, stem cells and cellular therapies, oncology and genomics, diagnostic lab services, and medical and scientific expertise. This combination of skill and knowledge results in improved patient outcomes, higher quality services and reduced cost of care for hospitals, blood centers, hospital systems, research and educational institutions, and other health care providers. At Versiti, we are passionate about improving the lives of patients and helping our healthcare partners thrive.
Position Summary
The Infrastructure Security Analyst will play a critical role in ensuring the security and integrity of our IT systems and networks. This position involves a balanced focus on IT Systems and Network Support and Cybersecurity with a concentration on Vulnerability Management. The ideal candidate will possess both technical expertise and strong analytical skills to identify, mitigate, and manage vulnerabilities while supporting the overall IT infrastructure. The candidate will thrive in a dynamic, team-oriented environment, where knowledge sharing, and continuous learning are encouraged. As an integral part of our collaborative team, the Infrastructure Security Analyst will work closely with various IT departments, including network operations, system administration, and application development. This role includes direct collaboration with the Senior Cybersecurity Engineer to ensure thorough analysis, identification, and mitigation of infrastructure vulnerabilities. Together, the team will address evolving cyber threats, communicate complex security concepts to stakeholders across all levels, and promote an organization-wide security culture while supporting Versiti's business and operational goals. This position values teamwork, encouraging information sharing and joint problem-solving to fortify the organization's defenses. This role is essential in building a resilient IT infrastructure that can adapt to evolving threats while supporting the organization's business objectives.
Total Rewards Package
Benefits
Versiti provides a comprehensive benefits package based on your job classification. Full-time regular employees are eligible for Medical, Dental, and Vision Plans, Paid Time Off (PTO) and Holidays, Short- and Long-term disability, life insurance, 7% match dollar for dollar 401(k), voluntary programs, discount programs, others.
Responsibilities
Provide technical support for IT infrastructure, including servers, networks, and cloud services.
Monitor system performance, troubleshoot issues, and perform regular maintenance on IT systems and document system configurations, changes, and procedures for future reference and compliance audits.
Collaborate with IT teams to implement and maintain secure network configurations and ensure compliance with organizational policies while assisting in the deployment and configuration of hardware and software as needed.
Respond to and resolve service requests and incidents in a timely manner.
Conduct regular vulnerability assessments and penetration testing to identify security weaknesses within IT systems and networks and collaborate with IT teams to develop and implement mitigation strategies for identified vulnerabilities.
Analyze vulnerability scan reports and prioritize remediation efforts based on risk assessment and monitor security alerts and incidents, responding to security breaches or threats as necessary.
Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and trends. Utilize threat intelligence feeds and monitoring tools to proactively identify and mitigate potential security threats. Provide recommendations for security improvements and help implement new security controls.
Performs other duties as required or assigned which are reasonably within the scope of the duties in this job classification
Understands and performs in accordance with all applicable regulatory and compliance requirements
Complies with all standard operating policies and procedures
Qualifications
Education
Bachelor's Degree Computer Science, Information Technology, Cybersecurity, or a related field preferred
Experience
4-6 years Demonstrated experience installing, managing and troubleshooting Linux and/or Microsoft Server environments. required
4-6 years Experience with Enterprise Data Center Server and Network environments. required
4-6 years Experience in conducting vulnerability assessments and penetration testing. required
Demonstrated experience with VMware Server and storage management. preferred
Knowledge, Skills and Abilities
Understanding of patch management processes and tools required
Knowledge of common security frameworks (e.g., NIST, ISO 27001, CIS Controls) required
Strong analytical and problem-solving skills. required
Excellent communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders. required
Strong attention to detail and ability to work independently as well as part of a team. required
Experience with ticketing systems and IT service management processes. required
Familiarity with scripting languages (e.g., PowerShell, Python). preferred
Licenses and Certifications
Certified Ethical Hacker (CEH) desired
CISSP Certified Information Systems Security Professional desired
Microsoft Certified Systems Engineer (MCSE) preferred
Microsoft Certified Systems Administrator (MCSA) preferred
CompTIA Network+ Certification preferred
CompTIA Security+ Certification preferred
Tools and Technology
Proficiency in network protocols, firewalls, VPNs, and security appliances. required
Knowledge of operating systems (Windows, Linux) and cloud environments (AWS, Azure). required
Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). preferred
Experience with container technologies (e.g., Docker, Kubernetes) preferred
Familiarity with threat intelligence and incident response processes. preferred
#LI-EH1
#LI-Hybrid
Not ready to apply? Connect with us for general consideration.
Auto-ApplyInformation Systems Security Manager/Engineer
Security engineer job in Dayton, OH
Subsidiary: KIRA Information Solutions
Job Title: Information System Security Engineer (ISSE)
working with Wright-Patterson Air Force Base, Dayton, OH
Labor Category: Exempt
Clearance Requirement: Secret Clearance, if required
In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer
Travel Requirement: Minimal, as needed
Salary: $615,000 to $210,000
Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide.
THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law.
Scope of Work:
This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision.
Essential duties
The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows.
The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Required qualifications:
Bachelor's degree in engineering, science, mathematics, or a related field.
Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises.
Five years' experience in information technology management.
Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II).
U.S. citizenship.
Preferred qualifications:
Bachelor's degree in Computer Science or Information Management.
Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices.
Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.).
Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth).
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability.
Auto-ApplyInformation Systems Security Officer (ISSO) III
Security engineer job in Dayton, OH
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description:
The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system.
This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Conduct continuous monitoring activities for authorization boundaries under your preview.
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts.
Experience:
5+ years related experience.
2+ years SAP experience required.
Prior performance in roles such as System, Network Administrator or ISSO.
Education:
Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire
Clearance Required to Start:
TS/SCI required
Must be able to Attain - TS/SCI with CI Polygraph
#AirforceSAPOpportunities
The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
10-25%
Telecommuting Options:
Onsite
Work Location:
USA OH Dayton
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyInformation Security Analyst I
Security engineer job in Hillsboro, OH
Oversee and validate the effectiveness of security controls and configuration baselines implemented by first line teams. Regularly review security documentation and operational practices to ensure alignment with regulatory requirements, industry standards, and organizational policies. Recommend improvements to control frameworks and support the development and maintenance of security policies, standards, and procedures.
Review and validate reports and metrics provided by first line teams to assess the effectiveness of security solutions and controls. Analyze trends and findings to identify systemic risks or gaps and collaborate with operational teams to ensure timely remediation and continuous improvement. Prepare independent summaries and recommendations for management based on oversight activities.
Maintain up-to-date detailed knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors. Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. Assist in the deployment, integration, and initial configuration of all new security solutions and any enhancements to existing security solutions in accordance with standard best operating procedures and the enterprise's security documents.
Assist in investigations of security incidents and problematic activities to help identify root causes and recommend corrective actions. Contribute to the development and delivery of information security awareness training programs for all organizational levels, including new hire orientation and ongoing awareness campaigns. Perform additional responsibilities as assigned to support the overall security objectives of the organization.
Participate in the planning and design of enterprise security architecture, under the direction of the Information Security Manager. Assist in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the CISO. Contribute to the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the CISO.
Minimum Qualifications:
Second year college student focusing on Information Technology or Information Security
Two to four years related experience or equivalent combination of education and experience
Security related certifications such as: Security +, CISA, CISSP, CRISC, CISM, GRCP, CCSP, CGEIT are strongly desired
Eligibility requirements may differ for each benefit or program.
National Cooperative Bank, N.A. is an Equal Employment Opportunity Employer (EOE/AA)
Information System Security Officer (ISSO)
Security engineer job in Dayton, OH
ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Why Work with us?â¯
âApplied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.â¯Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.â¯â¯
Responsibilities:
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM;
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package;
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard;
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS;
Report all security-related incidents to the ISSM
Conduct periodic reviews of information systems to ensure compliance with the security authorization package;
Serve as member of the CCB, if designated by the ISSM;
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change;
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization;
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly;
Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Responsibilities:
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard
5+ years related experience in SCI/SAP environments.
Bachelor's degree in computer science, Engineering, Finance, Business, or related
field
5-8 years demonstrated performance in related technology
Top Secret w/ SCI eligibility
Other duties as assigned
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Associate Security Systems Engineer - Access Control & CCTV
Security engineer job in Plain City, OH
Together, We Enhance Innovation and Growth
i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
We are looking for a motivated and knowledgeable Jr. Security Engineer to join our team. The ideal candidate will have an understanding of standard Low voltage systems ideally in the Electronic Security technology space, to include Access Control Systems (ACS), Intrusion Detection Systems (IDS), Closed-Circuit Television (CCTV), and supporting equipment such as computer software/hardware, and networking infrastructure. This candidate will excel in critical thinking, have the ambition to learn and grow, and possess a strong desire to perform at the top of their abilities.
Responsibilities
Review architectural, electrical, telecommunication, and security engineering floor plans, riser drawings, device schedules, and detail drawings.
Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
Review Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
Create solution design documentation, including drawings, Bills of Materials (BOMs), permitting packages and solution design summaries.
Learn and Maintain familiarity with current and emerging electronic security technologies, such as access control, video surveillance, intrusion detection, biometrics, and industry-leading vendors
On the job Training will be provided to increase skills in all key responsibilities listed above, including hands on field work with installation and integration teams to better understand design and implementation requirements.
Qualifications
Mechanical, Engineering, Plumbing Engineering degree or a minimum of 2 years of previous experience in the industry.
An associate or bachelor's degree in a relevant field if no previous experience, a comparable amount of experience in the appropriate field may be substituted.
Experience in the design and planning of MEP systems.
Ability to make load calculations associated with power, data, conduit fill ratios and/or HVAC systems.
Ability to manage time and multiple tasks without supervision.
Strong organizational skills and attention to detail.
Excellent analytical and problem-solving skills.
Exceptional presentation, writing, verbal, and written customer communication skills.
Experience with computer programs such as Microsoft Office, Excel, Adobe, etc. is preferred. Knowledge of Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus.
Company Overview
This is a Low Voltage Security Estimator career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
#JuniorSecuritySystemsDesignEngineer #SecuritySystemDesign #AccessControlDesign #VideoSurveillanceDesign #IntrusionDetectionSystems #SecuritySystemsEngineering #SecuritySystemShopDrawings #SecuritySystemLayouts #SystemRiserDiagrams #EngineeringSpecifications #SecurityDesignDocumentation #SecurityProposalDesign #BidPreparation #SecuritySystemEstimation #SecuritySystemSubmittals #AutoCADSecurityDesign #RevitBIMSecurityDesign #SecuritySystemsIntegration #TechnicalSupportForSecurityDesign #SecuritySolutionsEngineering #PhysicalSecuritySystemDesign
Auto-ApplyCyber Security Specialist
Security engineer job in Kettering, OH
Kettering, OH/Remote
IPTA's Technology Solutions Team is passionate about providing our customers with technical solutions that satisfy their business needs. Through collaborative interactions with customers, team members, subject matter experts (SMEs), technical leaders, and partners we design practical solutions that solve real problems for major government and business organizations. As a member of our Technology Solutions group, you will work with a team of technologists focused on delivering innovative business solutions using emerging technologies through proven successful methods.
Our Team:
We are looking for talented people who are enthusiastic about applying technology to deliver innovative outcomes with "fierce determination, fearless integrity, and passionate service." Our belief is that our people are the key to success. By encouraging and enabling continued learning, our team members grow to achieve their personal career goals. We are looking for:
Smart people with a passion for technology
Ability to solve challenging business problems
Self-directed professionals
Hunger to continually learn and grow
Responsibilities:
Identifies and resolves highly complex issues to prevent cyber attacks on information systems and to keep computer information systems secure from interruption of service, intellectual property theft, network viruses, data mining, financial theft, and theft of sensitive customer data, allowing business to continue as normal.
Designs, installs, and manages security mechanisms that protect networks and information systems against hackers, breaches, viruses, and spyware.
Responds to incidents, investigates violations, and recommends enhancements to plug potential security gaps. Analyzes data to spot trends, and creates tools to support research efforts.
Mitigates threats by gathering information and developing plans, and monitors networks for security breaches.
Develops best practices and security standards, and trains users on security protocols.
Creates and tests disaster recovery procedures to keep IT running in the event of a security breach.
Researches data, learns about new technologies, and gathers information on the latest risks.
Utilizes specialized expertise, up-to-date knowledge, and proficiency in analysis, forensics, and reverse engineering to monitor and diagnose malware events and vulnerability issues resulting in web threats that facilitate cyber crime, including malware, phishing, viruses, denial-of-service attacks, information warfare, and hacking.
Makes recommendations for solutions, including hardware and software programs that can help mitigate risk.
Designs firewalls, monitors use of data files, and regulates access to safeguard information and protect the network.
Keeps up-to-date on current virus reports, and protects networks from these viruses.
Trains users, promotes security awareness, develops policies and procedures, and provides updates and reports to management and executive staff.
Requirements:
Bachelor's degree in a related field
Eight (8) years of prior experience in a similar role
DoD 8570 Level II/II certification required
Active Security Clearance Required
IPTA is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment opportunity to all qualified employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, religion, sex, sexual orientation, national origin, age, physical disability, mental disability, medical condition, status as a veteran or disabled veteran or any other characteristic protected by law. We base all employment decisions, including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, returns from lay-off, terminations, and social and recreational programs on the principles of equal employment opportunity. Our employees have diverse backgrounds, skills, and ideas that collectively contribute to a rich working environment and greater opportunity for innovation.
Manager, Information Security
Security engineer job in Beavercreek, OH
The Manager, Information Security is responsible for implementing and executing WPCU's Information Security program and strategies under the leadership of the VP, Information Security. This role will collaborate with all lines of business through projects, risk assessments, controls, and control effectiveness reviews. The manager will oversee tools utilized by the Information Security team to provide feedback on vendors and applications. Position will be responsible for collaboration with various business units during a data incident to ensure incidents are properly documented and evidence is captured. This role will be expected to provide thought leadership to ensure the efficiency and effectiveness of the Information Security team.
The major activities for this position include:
1) Information Security Operations (40%)
a) Develop and oversee control effectiveness reviews to ensure all activities align in scope and frequency with information security policies and approved information security frameworks.
b) Develop and oversee information security's involvement with vendor due diligence processes.
c) Develop and oversee Identity Access Governance processes to ensure alignment with the principle of least privilege access.
d) Develop and oversee information security related risk assessments. Develop and oversee processes to rate criticality of applications and controls to ensure risk assessments are aligned.
e) Ensure all assessments are completed in a timely manner including developing appropriate cross training plans to schedule impacts.
f) Develop and oversee reporting related to all assessments to ensure risk levels are appropriately assigned and management responses are captured.
g) Ensure identified gaps from information security assessments are appropriately tracked. Coordinate with various business units to collect timely updates.
2) Personnel Management & Procedures (20%)
a) Mentor assigned partners by administering individual development plans, making recommendations for promotions, or implementing coaching plans. This includes performing regular 1-on-1s with partners and completing annual reviews.
b) Ensure departmental procedures are effective, up-to-date, and follow company standards.
3) Project Management (20%)
a) Participate in project planning events to provide estimated work effort for projects including pro-active escalation of resources constraints to the VP of Information Security.
b) Assist in fostering an enterprise-wide security first culture by participating in project requirement gathering session. Inform project owners of applicable controls, audit findings, or control effectiveness gaps that are appropriate for the project.
c) Attend on-going project meetings to advise and ensure information security controls are addressed.
4) Incident Management (10%)
a) Role will be responsible for ensuring data incidents are tracked, properly documented, and evidence has been collected.
b) Provide regular status updates to the VP of Information Security on open data incidents.
5) Audit and Regulatory Exam Support (10%)
a) Assist the Vice President of Information Security with internal and external audits to ensure document collections are completed in a timely manner and properly vetted.
b) Serve as subject matter expert during internal and external audits related to activities completed by Information Security.
c) Ensure assigned business units are operating efficiently and reliably, are in compliance with applicable laws, regulations, and rules, have appropriate operating controls to mitigate risk, and are performing at a high level.
Required Skills
This leader in information security must be skilled at developing and leading strategic Information Security programs across the enterprise in a complex, multi-system and multi-vendor environment. Strong, practical knowledge of Information Security concepts and technical architecture are essential. Expert knowledge of risk and information security frameworks are essential.
1) A bachelor's degree is required, preferably in Information Technology, Information Security, or a related field. A master's degree in a related discipline is preferred.
2) At least 7+ years of experience in Information Technology or Information Security is required, with at least 3+ years of experience in a leadership role. Demonstrated experience with developing mapping controls to business processes, building control effectiveness reviews, or building risk ratings to allow business units to identify priorities is preferred.
3) A Certified Information System Security Professional (CISSP), Certified Information Security manager (CISM), or similar certification is required.
4) Demonstrate experience in evaluating vendor due diligence and vendor risk assessment processes.
5) Demonstrate experience in Identity Access Management including how to perform user access and rights reviews to align with least privilege access.
6) Demonstrate experience with developing and implementing a risk assessment process that is collaborative with business units and documents risk in accordance with board approved risk appetite.
7) Demonstrate strong leadership skills including the ability to work collaboratively and manage a remote workforce.
8) Demonstrate ability to drive and manage initiatives that increase operational efficiency, enhances quality, and improves/maintains service levels.
Security Analyst
Security engineer job in Marysville, OH
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
MUSTS:-
Bachelor's degree in Information Systems or equivalent work experience of a minimum of 3-5 years as an information security risk management practitioner, preferably in the financial, consulting, and/or global organizations.
Prior work experience of risk management disciplines, security policies and standards, technology risk assessment, and third party supplier risk process and requirements.
Current or previous experience with risk assessment methodologies and conducting risk analysis in a regulated environment or related IT audit background.
Knowledge of security and control frameworks, such as ISO 27002, NIST, CobiT, COSO and ITIL.
Experience with implementation of information security best practices for key areas such as access control, data protection, systems development life cycle, PCI DSS, and cloud services.
Professional certification in risk management, and/or audit is preferred (e.g., CISSP, CRISC, CISA, or CISM).
WANTS:-
Demonstrate broad competency and understanding in a variety of IT security areas.
Security Policy Development and Management.
Assist with documenting security policies, standards, and guidelines.
based on the organization's requirements, maturity level, and compliance objectives.
Facilitate, coordinate, and maintain project schedules, plans, and scope using standard project management methodologies.
BUSINESS EXPERIENCE:-
Proven ability to work with and across all levels of the organizations and navigate organizational boundaries.
Excellent organizational, interpersonal and communication skills with strong written, oral, and presentation skills; both delivery and creation of power points (must be able to distill complex topics into simple concepts).
Ability to effectively communicate with technical and executive audiences and develop and maintain strong peer/client/customer relationships underpinned by a service oriented approach to work.
Adept with time management, tasks and projects prioritization, and multi-tasking.
High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity.
High degree of initiative, attention to detail, follow-up skills, deliver on commitments, dependability and ability to work with little supervision.
Demonstrated problem-solving skills and capability to drive process improvements.
Proficient with Microsoft Office Suite especially Excel and Power point.
DESCRIPTION:-
Implement the overall risk management framework and processes, tools, and reporting methodologies on a continuous cycle.
Develop and standardize processes and procedures for ongoing risk identification, tracking, monitoring, and evaluating security measures and remediation efforts; communicate security control deficiencies and recommend mitigation plans, report status progress and with non-compliance issues; measure adherence to the security controls from a policy, governance and risk standpoint.
Perform third party supplier risk assessments by reviewing contracts for compliance with security policies, standards and practices; document security gaps and recommend appropriate remediation actions as necessary to minimize risks to the business.
Assist with documenting security policies, standards, and guidelines based on the organization's requirements, maturity level, and compliance objectives.
Qualifications
Planning, designing and implementing an overall risk management process for the organization.
Risk identification, analysis, tracking, monitoring, documenting exceptions, and communicating risks to owners.
Risk assessment, which involves analyzing risks as well as identifying, describing and estimating the risks affecting the business.
Risk evaluation, which involves comparing estimated risks with criteria established by the organization such as costs, legal requirements and environmental factors, and evaluating the organization's previous handling of risks.
Establishing and quantifying the organization's 'risk appetite', i.e. the level of risk they are prepared to accept.
Risk reporting in an appropriate way for different audiences, for example, to the board of directors so they understand the most significant risks, to business heads to ensure they are aware of risks
relevant to their parts of the business and to individuals to understand their accountability for individual risks.
Corporate governance involving external risk reporting to stakeholders.
Carrying out processes such as purchasing insurance, implementing health and safety measures and making business continuity plans to limit risks and prepare for if things go wrong.
Conducting audits of policy and compliance to standards, including liaison with internal and external auditors.
Providing support, education and training to staff to build risk awareness within the organization.
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
.
We are unable to sponsor at this time.
Note:-
This is a
Contract
job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD
,
H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your
Visa Status
in your
email
or
resume
.
Information Security Analyst (On-Site Position)
Security engineer job in Miamisburg, OH
IS ON-SITE AT OUR CINCINNATI, OHIO OFFICE **
At Danis, we don't just build projects-we build trust. Since 1916, our reputation has been defined by integrity, innovation, and a relentless commitment to delivering exceptional results. We approach every challenge with a problem-solving mindset, combining precision, creativity, and collaboration to bring our clients' visions to life.
We know that our people are the foundation of our success. That's why we invest heavily in their growth. Through Danis University, employees have access to more than 45 specialized training programs designed to support continuous learning and career advancement. Join us and become part of a team that values your expertise, supports work-life balance, and empowers you to thrive professionally.
One of the ways we protect that success is through a strong cybersecurity foundation-led by dedicated professionals who stay ahead of emerging threats. As an Information Security Analyst, you'll serve as a key defender of our digital environment. Your mission: safeguard sensitive data, neutralize threats, and ensure we stay a step ahead of cyber risks. You'll monitor, investigate, and respond to security events while shaping our company's cybersecurity roadmap. This is a collaborative role, working closely with IT and departments across the organization to elevate our security posture and build a culture of cyber resilience. This position reports to the CIO.
Why Join Danis?
Make an Impact: Lead healthcare projects that support medical professionals and improve patient care. Your work will have a lasting, positive effect on communities.
Competitive Compensation: Enjoy annual merit increases and bonuses.
Comprehensive Benefits: Health and dental insurance for you and your family, as well as life insurance, disability coverage, and supplemental insurance options.
Secure Your Future: 401K plan and profit-sharing opportunities.
Work-Life Balance: Generous PTO and vacation time, because we value your time outside of work.
Give Back: Participate in our “Constructing Hope” program to contribute to meaningful community outreach projects.
Career Development: Access 45+ training programs through Danis University to enhance your skills and grow your career.
What You'll Bring
Bachelor's degree in Cybersecurity, Information Technology, or a related field.
3+ years of hands-on experience in cybersecurity or a related discipline.
Working knowledge of security frameworks (e.g., NIST, ISO 27001).
Proficiency with security tools (e.g., SIEM, EDR, vulnerability scanners).
Strong analytical and investigative mindset.
Clear, confident communication and collaboration skills.
Experience managing cross-functional projects and navigating complex security challenges.
Responsibilities
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Your Impact:
Strategic Leadership
Help shape and enforce cybersecurity policies, procedures, and standards grounded in industry best practices.
Lead the development and execution of our cybersecurity roadmap-including threat detection, incident response, and endpoint security initiatives.
Governance, Risk, & Compliance
Conduct routine risk assessments and internal audits to identify vulnerabilities and gaps.
Ensure regulatory compliance (e.g., NIST, Ohio Data Protection Act).
Maintain and test incident response plans; brief leadership on cybersecurity risks and metrics.
Training & Awareness
Drive cybersecurity awareness through engaging education initiatives.
Oversee new hire onboarding for required cyber training.
Facilitate tabletop exercises to simulate and prepare for real-world scenarios.
Threat Detection & Response
Continuously monitor systems for suspicious activity or breaches.
Respond swiftly to security incidents and ensure thorough documentation.
Engage in proactive threat hunting and analysis to detect emerging risks.
Vulnerability & Risk Management
Lead regular system assessments and vulnerability scans.
Ensure robust network segmentation, firewall health, and secure backups.
Security Architecture & Tools
Oversee the deployment and management of critical security tools.
Integrate cybersecurity solutions into enterprise infrastructure in collaboration with IT.
Evaluate and enhance our security technology stack.
Collaboration & Communication
Build trusted partnerships across IT and the broader organization to strengthen security culture.
Support business continuity and disaster recovery planning with department leads.
Manage vendor risk and ensure third-party compliance with internal standards.
Preferred Skills
Familiarity with enterprise systems and platforms (e.g., ERP, CRM).
Deep expertise in endpoint protection, network monitoring, and DLP tools.
Calm, strategic approach to crisis management.
Qualifications Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
Working Environment:
Onsite Role: This position is based fully onsite, allowing for close collaboration with IT peers and business units. Being embedded within the organization supports real-time incident response and hands-on access to systems and infrastructure.
Team-Oriented Culture: You'll be part of a collaborative and supportive IT team that values knowledge sharing, proactive problem-solving, and continuous improvement.
Security-First Mindset: You'll work in an environment where cybersecurity is a top priority, supported by leadership and embraced across departments.
Dynamic and Evolving: The role operates in a fast-paced environment where adaptability is essential. You'll encounter evolving threats, shifting technologies, and the need to respond quickly and effectively.
Professional Development: Ongoing learning is encouraged through access to training, certifications, and internal resources that support your growth in cybersecurity.
Modern Tools & Infrastructure: You'll work with enterprise-grade security tools and platforms and have opportunities to recommend and implement improvements to our technology stack.
EEO Statement
Danis is an Equal Opportunity Employer. Danis does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, merit and business need.
Please, no agency calls. Unsolicited resumes from agencies will be considered property of Danis, with no obligation for fees.
#LI-ONSITE
Auto-ApplyInformation System Security Engineer (ISSE)
Security engineer job in Dayton, OH
Information System Security Engineer Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Information System Security Engineer onsite in Dayton, OH with a Secret Clearance or Higher.
Responsibilities:
Design, test, and implement secure operating systems, networks, security monitoring, and tuning.
Responsible for the management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls.
Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with program security strategy.
Identify and mitigate potential security threats and vulnerabilities.
Perform regular security audits and recommend enhancement to improve overall security posture.
Qualifications:
Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 5+ years of relevant experience
Relevant experience may be considered in lieu of required education.
Relevant certifications (e.g. CISSP, CISM, CEH, Security +)
Why Join Cyber Defense Technologies?
At CDT, we offer a collaborative and inclusive work environment where your expertise can help shape the future of cybersecurity and engineering solutions.
Compensation and Benefits:
Competitive salary based on experience.
Comprehensive benefits package, including health, dental, and retirement plans.
Opportunities for professional development and career advancement.
CDT is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity employer making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class.
Apply Now:
If you are a proactive ISSE and thrive in dynamic environments, we encourage you to apply and join the CDT team!
Information Security Compliance Analyst
Security engineer job in Dayton, OH
":"As an Information Security Compliance Analyst, you will learn about the regulatory, contractual, and legislative requirements that affect technology used by our Company . You will be responsible for coordinating with internal and external parties to complete a variety of cyber security assessments, help raise security awareness of associates, provide guidance on industry standard cyber security requirements, and track on-going activities that help meet our security and compliance goals.
If you thrive on solving complex problems, embrace continuous learning, and approach challenges with curiosity and critical thinking, apply today! #LI-DNI","job_category":"Information Technology","job_state":"OH","job_title":"Information Security Compliance Analyst","date":"2025-12-04","zip":"45430","position_type":"Full-Time","salary_max":"0","salary_min":"0","requirements":"Strong critical thinking skills required~^~Basic computer skills required~^~Strong written and verbal communication~^~Strong ability to drive task and organizing\/maintaining records~^~Ability to think creatively and strategically~^~Passion for learning new and emerging technology~^~Technology education or certifications, experience with enterprise IT environments, experience working with security regulatory requirements, and knowledge of security frameworks such as NIST CFS, NIST 800-53, ISO, PCI-DSS a plus","training":"","benefits":"Our associates receive medical, dental, vision, and life insurance.
We also offer company contributions to your HSA, 6% match on 401(k), and a work\/life balance with paid time off.
At our Dayton office, you can take advantage of our great training programs and facility amenities, including an onsite dining facility offering complimentary breakfast and lunch, a fitness center, and an onsite medical center.
We also offer a wide variety of sports and social leagues to participate in after work, along with volunteering initiatives through our Associate Foundation.
Reynolds and Reynolds promotes a healthy lifestyle by providing a non-smoking environment.
Reynolds and Reynolds is an equal opportunity employer.
","
Information Systems Security Engineer (ISSE)
Security engineer job in Dayton, OH
Subsidiary: KIRA Information Solutions
Job Title: Information System Security Engineer (ISSE)
Job Location: Hybrid-Position working with Wright-Patterson Air Force Base, Dayton, OH Labor Category: Exempt
Clearance Requirement: Secret Clearance, if required
In-person Requirement: As needed, meet in Dayton OH w/ key personnel or Customer
Travel Requirement: Minimal, as needed
Salary: $120,000- $180,000
Tlingit Haida Tribal Business Corporation (THTBC) is a family of 8(a), HUBZone, SDB, and other companies wholly- owned by the largest tribe in Alaska. Each of its wholly- owned 30+ subsidiaries are uniquely qualified to deliver value to its customers and teaming partners. For over 30 years, THTBC has operated as a trusted US Federal contractor throughout the US and worldwide. As a Native Alaskan, Tribally- Owned business, THTBC has a competitive edge unique in the US Federal Government contracting space, including access to US Government directed sole source contracts. THTBC delivers outstanding service with innovative, low-cost contract solutions to all its public and private sector customers worldwide.
THTBC is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law.
Scope of Work:
This position is working with the government and may require secret clearance and/or security plus certification. The government program office is Wright Patterson AFB, Dayton, Ohio. The development and support team are geographically dispersed, and teleworking is our daily working protocol, however, on-site support for meetings may be required. The program requires highly qualified, self-motivated, proactive people who work well with others with limited supervision.
Essential duties :
The Information Systems Security Engineer (ISSE) will be responsible for the day-to-day security operations of all of the ETIMS systems. The ISSE will be responsible for ensuring the full compliance and appropriate operational security posture set to current Federal, CNSS, DoD, USAF, and NIST standard including but not limited to standards included in the programs Performance Work Statement. CyberSecurity for all information systems will be maintained and documented by the ISSE. The ISSE will run vulnerability scans, as required in systems such as Checkmarx and CAST, etc. In addition to implementing and maintaining the aforementioned policies, they shall support the creation and maintenance of Plans of Action and Milestones (POA&M) in response to vulnerabilities identified during scans, risk assessments, audits, and inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. The ISSE [RD2] [KG3] assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The ISSE shall ensure that all application deliverables comply with the hosting environment's Application Security & Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning, the Database STIG, and a Web Penetration Test to mitigate vulnerabilities associated with (Structured Query Language) SQL injections, cross-site scripting, and buffer overflows.
The appointed ISSE will work for and in close collaboration with the Government appointed ISSM/E. Our ISSE will perform duties in accordance with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Required qualifications:
Bachelor's degree in engineering, science, mathematics, or a related field.
Five years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of distributed exercises.
Five years' experience in information technology management.
Knowledge base with DoD Instruction 8510.01 and 8520.02, DoD Directive 8140.01, AFI 33-210, NIST Special Publication 800-37, and AR 25-2.
Meet DoD 8570.01-M, 8140.01 Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II).
U.S. citizenship.
Preferred qualifications:
Bachelor's degree in Computer Science or Information Management.
Possess an expert understanding of NIST, DoD, Air Force (AF) Cybersecurity Risk Management Framework policies, directives, instructions, manuals, and best business practices.
Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g., ACAS, MECM, ESS,etc.).
Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth).
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability.
To perform this job successfully, an individual must be able to perform all the essential duties of the position satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable qualified individuals with disabilities to perform the essential functions. May be required to obtain and maintain a security clearance, including successfully completing a thorough background investigation.
If you need reasonable accommodations for any part of the employment process, please contact us and let us know the nature of your request. Requests for accommodation will be considered on a case-by-case basis.
Program Details:
This position is in support of the sustainment and modification of the United States Air Force (USAF) Electronic Technical Information Management System (ETIMS) program. ETIMS is the Air Force System of Record for Technical Order (TO) management and is the Air Force's Enterprise Defense Business System (DBS) for managing TOs. TOs are military orders containing the authoritative procedures and instructions for operating and maintaining all U.S. Department of the Air Force equipment and systems.
ETIMS supports ~178,000 users at ~385 sites worldwide. It also supports ~60,000 eTOs, 54,000 ETIMS eTools, 14,000 paper TOs, and more than 13,000 TO libraries across the Air Force Enterprise. Agencies that rely on ETIMS for Air Force-related TOs and Computer Program Identification Numbers (CPINs) include the Army, Navy, Marines, Coast Guard, Foreign Military Sales (FMS), the National Aeronautics and Space Administration (NASA), The White House, and numerous Military Industrial Complex partners. ETIMS provides access to the official TO cataloging, managing, storing, distributing, and viewing capabilities needed by the operators and maintainers to support all Air Force weapon systems and equipment items.
ETIMS is a cloud-based enterprise system hosting Java and Windows applications accessing Oracle database in the AWS environment. The ETIMS migration to the Amazon Web Services (AWS) Air Force Cloud 1 environment and leveraging Agile Principles allows for processes to mature across the user community and enables streamlining and process improvement realized by the rapid delivery of follow-on capabilities. ETIMS has been modernized over the years to provide a fully capable Air Force enterprise TO Management system.
The Government Program Office is located at Wright Patterson Air Force Base in Dayton, Ohio. The development and support team are geographically dispersed and teleworking our daily working protocol.
Auto-ApplyPre-Sales Security Systems Engineer - Access Control & CCTV
Security engineer job in Plain City, OH
Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
* Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
* Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
* Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
* Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
* Create solution design documentation (drawings, BOMs, solution design summaries).
* Provide technical support for in-office and on-site team members.
* Support management in the process of creating documentation for implementing new technology with new and existing customers.
* Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
* A minimum of 3-7 years previous experience in the industry.
* Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
* Experience in the design and planning of access control and video systems.
* Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Auto-ApplySecurity Analyst (In-Persons Interview)
Security engineer job in Marysville, OH
SonSoft Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. SonSoft Inc is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
Implement the overall risk management framework and processes, tools, and reporting methodologies on a continuous cycle.
Develop and standardize processes and procedures for ongoing risk identification, tracking, monitoring, and evaluating security measures and remediation efforts; communicate security control deficiencies and recommend mitigation plans, report status progress and with non-compliance issues; measure adherence to the security controls from a policy, governance and risk standpoint.
Perform third party supplier risk assessments by reviewing contracts for compliance with security policies, standards and practices; document security gaps and recommend appropriate remediation actions as necessary to minimize risks to the business.
Assist with documenting security policies, standards, and guidelines based on the organization's requirements, maturity level, and compliance objectives.
Facilitate awareness communications to various audiences, coordinate, and maintain project schedules, plans, and scope using standard project management methodologies.
Daily Task Performed:-
Planning, designing and implementing an overall risk management process for the organization;
Risk identification, analysis, tracking, monitoring, documenting exceptions, and communicating risks to owners
risk assessment, which involves analyzing risks as well as identifying, describing and estimating the risks affecting the business;
risk evaluation, which involves comparing estimated risks with criteria established by the organization such as costs, legal requirements and environmental factors, and evaluating the organization's previous handling of risks;
establishing and quantifying the organization's 'risk appetite', i.e. the level of risk they are prepared to accept;
risk reporting in an appropriate way for different audiences, for example, to the board of directors so they understand the most significant risks, to business heads to ensure they are aware of risks relevant to their parts of the business and to individuals to understand their accountability for individual risks;
corporate governance involving external risk reporting to stakeholders;
carrying out processes such as purchasing insurance, implementing health and safety measures and making business continuity plans to limit risks and prepare for if things go wrong;
conducting audits of policy and compliance to standards, including liaison with internal and external auditors;
providing support, education, and training to staff to build risk awareness within the organization
maintaining current documentation of all related activities for GRC Unit
Musts
Bachelor degree in Information Systems or equivalent work experience of a minimum of 3-5 years as an information security risk management practitioner, preferably in the financial, consulting, and/or global organizations
Prior work experience of risk management disciplines, security policies and standards, technology risk assessment, and third party supplier risk process and requirements
Current or previous experience with risk assessment methodologies and conducting risk analysis in a regulated environment or related IT audit background
Knowledge of security and control frameworks, such as ISO 27002, NIST, CobiT, COSO and ITIL
Experience with implementation of information security best practices for key areas such as access control, data protection, systems development life cycle, PCI DSS, and cloud services
Professional certification in risk management, and/or audit is preferred (e.g., CISSP, CRISC, CISA, or CISM)
Qualifications
Business Experience:-
Proven ability to work with and across all levels of the organizations and navigate organizational boundaries
Excellent organizational, interpersonal and communication skills with strong written, oral, and presentation skills; both delivery and creation of power points (must be able to distil complex topics into simple concepts)
Ability to effectively communicate with technical and executive audiences and develop and maintain strong peer/client/customer relationships underpinned by a service oriented approach to work
Adept at time management, tasks and projects prioritization, and multi-tasking
High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
High degree of initiative, attention to detail, follow-up skills, deliver on commitments, dependability, and ability to work with little supervision
Demonstrated problem-solving skills and capability to drive process improvements
Highly proficient with Microsoft Office Suite especially Excel and PowerPoint; and SharePoint administration.
Wants:-
Demonstrate broad competency and understanding in a variety of IT security areas:
Security Policy Development and Management
Assist with documenting security policies, standards, standard operating procedures and guidelines based on the organization's requirements, maturity level, and compliance objectives.
· Risk Management
Perform risk assessments, generate risk reports/updates, tracking progress of remediation efforts.
Security Awareness
Facilitate and distribute communications to various audiences to promote about GRC Unit's objectives and goals.
Information security risk management, risk assessments, reporting, tracking and strong interpersonal and communication skills.
Additional Information
Connect with me at
*******************************************
(For Direct Clients Requirements)
** U.S. Citizens and those who are authorized to work independently in the United States are encouraged to apply. We are unable to sponsor at this time.
Note:-
This is a
Contract job opportunity
for you.
Only
US Citizen
,
Green Card Holder
,
GC-EAD
,
H4-EAD & L2-EAD
can apply.
No
OPT-EAD, H1B & TN
candidates,
please.
Please mention your
Visa Status
in your
email
or
resume
.
**
All your information will be kept confidential according to EEO guidelines.
Information System Security Engineer (ISSE)
Security engineer job in Dayton, OH
ARS is currently looking for an Information System Security Engineer (ISSE). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
**Why Work with us?**
Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.
**Responsibilities:**
+ Engineer unique solutions to support ongoing Cyber Threat and Cyber Defensive Operations.
+ Automate threat assessment and reporting activities.
+ Analyze and report system and organizational security posture trends to the ISSM/ISSO.
+ Provide cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities.
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.
+ Plan and recommend modifications or adjustments based on exercise results.
+ Mitigate or correct security deficiencies identified during security and certification testing and/or recommend risk acceptance to the ISSM
+ Audit support responsibilities
+ Analyze and report organizational security posture trends to the ISSM/ISSO
+ Analyze and report system security posture trends to the ISSM/ISSO
+ Apply security policies to meet security objectives of the system to the ISSM/ISSO
+ Assess adequate access controls based on principles of least privilege and need-to-know and reports findings to the ISSM/ISSO
+ Assess all the configuration management (change configuration/release management) processes and reports findings to the ISSM/ISSO
+ Assess the effectiveness of security controls and reports findings to the ISSM
+ Be able to develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements
+ Ensure all systems security operations and maintenance activities are properly documented and updated as necessary
+ Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level and reports findings to the ISSM
+ Implement security measures to resolve vulnerabilities, mitigate risks and recommend security changes to system or system components as needed
+ Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation
+ Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance to the ISSM
+ Plan and recommend modifications or adjustments based on exercise results or system environment
+ Properly document all systems security implementation, operations and maintenance activities and updates necessary
+ Provides cybersecurity recommendations to the ISSM based on significant threats and vulnerabilities
+ Verify and update security documentation reflecting the application/system security design features
+ Verify minimum security requirements are in place for all applications
+ Assists the ISSM/ISSO in identifying the security requirements for the system, including the confidentiality, integrity, and availability of data
+ Assists the ISSM/ISSO in describing and documenting the security controls that will be implemented to meet the security requirements
+ Assists the ISSM/ISSO in describing and documenting the procedures that will be used to manage security risks and incidents
+ Assists the ISSM/ISSO in describing and documenting how the security controls will be monitored and tested to ensure that they are effective
+ Assists the ISSM/ISSO in describing and documenting how changes to the system will be managed to minimize security risks
+ Assists the ISSM/ISSO in describing and documenting how the system will be recovered in the event of a security incident
+ Assists the ISSM/ISSO in the collection and organization of supporting documentation and diagrams needed for an Authority to Operate Package
+ Assists the ISSM/ISSO with conducting a security assessment of the system. This includes identifying the system's assets, threats, vulnerabilities, and risks.
+ Assists the ISSM/ISSO with developing a risk management plan. This plan identifies the security controls that will be implemented to mitigate the risks to the system.
+ Assists the ISSM/ISSO in writing the System Security Plan or updating a System Security Plan Addendum
+ Assists the ISSM/ISSO in reviewing and updating the System Security Plan or Addendum
+ Assists the ISSM/ISSO in ensuring that the SSP is compliant with applicable DoD security policies and procedures
+ Monitors and investigates security breaches
+ Educates employees or clients about security procedures and programs
+ Other duties as assigned
**Requirements:**
+ Must be a US citizen
+ Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
+ Security+ Certification
+ 5+ years related experience in SCI/SAP environments.
+ Bachelor's degree in computer science, Engineering, Finance, Business, or related field AND 3+ years leadership experience in relevant area of business OR equivalent experience.
+ 8-12 years demonstrated performance in related technology.
Minimum Security Clearance Required
+ Top Secret w/ SCI eligibility
Additional or Preferred Qualifications
+ 5+ years leadership experience in relevant area of business.
+ Technical certifications in Azure
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.