Post job

Information Systems Security Officer jobs at The Johns Hopkins University Applied Physics Laboratory - 39 jobs

  • Information System Security Officer (ISSO)

    Johns Hopkins Applied Physics Laboratory 4.6company rating

    Information systems security officer job at The Johns Hopkins University Applied Physics Laboratory

    Do you love to be on a team of highly skilled, motivated and dedicated professionals charged with protecting sensitive data while administering enterprise Information Systems (IS) that support the Johns Hopkins University Applied Physic Lab (JHUAPL) mission? Do you want to integrate system administration with Information Security (IS) across Highly Classified networks? Are you passionate about protecting our Nation's most sensitive information? If so, we're looking for someone like you to join our team at APL. We are seeking a dedicated Information System Security Officer (ISSO) to help us protect APL's Sponsor classified enterprise information technology infrastructure. As a member of our team, you'll contribute to IS Security Management and oversight of our classified information systems in support of Sponsor/Program needs. You'll join an impressive team of technical specialists motivated by the common goal of supporting APL's operational security posture across a complex classified infrastructure. You will independently identify and solve technical issues relating to Information Assurance system hardening (ensuring system availability, integrity, authentication and confidentiality). As an ISSO... * Your primary responsibilities are aligned to supporting requirements found in the Defense Counterintelligence and Security Agency Assessment and Authorization Process Manual (DAAPM) version 2.2 and future updates to include: security relevant documentation such as security CONOPS, Security Controls Traceability Matrix's, System Security Plans, Risk Assessment Reports, Contingency Plans. * Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security plan. * Ensure all proper account management documentation is completed prior to adding and deleting system accounts. * Verify all system security documentation is current and accessible to properly authorized individuals. * Conduct periodic assessments of authorized systems and providing the ISSM with corrective actions for all identified findings and vulnerabilities. * Ensure audit records are collected and analyzed in accordance with the security plan. * Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. * Serve as a member of the Configuration Control Board (CCB). * Possess sufficient experience and technical competence commensurate with the complexity of the systems. * Ensure user activity monitoring data is analyzed, stored, and protected in accordance with the ITPSO policies and procedures. * Execute the continuous monitoring strategy. * Perform and analyze weekly security audits for nonstandard events. Implement backup solution and ensure a cohesive disaster recovery plan. * Utilize the Enterprise Mission Assurance Support Services (eMASS) accreditation workflow platform. * Assist in preparations for and participate in system inspections and take timely action to correct and document any issues or findings and train IS users on items required to eliminate security incidents. Qualifications You meet our minimum qualifications for the job if you * A minimum of 6 years' experience implementing cybersecurity policy and security controls for classified enterprise information technology systems and have a worked with a Restricted Area, SCIF, or SAPF. * Possess a Bachelor's degree in Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering from an ABET accredited or NCAE-C-designated institution. * Meet and demonstrate intermediate DoD 8140.03 Cyberspace Workforce Qualification and Management Program requirements through training and/or certifications (Security+, equivalent, or higher). * Have a strong working knowledge with the DCSA DAAPM or JSIG, NISPOM, and DISA cybersecurity policy to support risk-based decisions and ensure compliance across the enterprise. * Managed, trained, and led System Administrators (SAs), Information System Owners (ISOs), Information System Security Officers (ISSOs), and other stakeholders to prepare for and meet DCSA DAAPM standards and Defense Information System Agency (DISA) Command Cyber Readiness Inspection (CCRI) or Cyber Operational Readiness Assessment (CORA) standards. * Managed, documented, and assisted with implementing DISA Security Technical Implementation Guides (STIGs) for operating systems and applications across the enterprise enclave for a minimum of 1 year. * Have a deep understanding of government cybersecurity compliance standards, regulations, and policies with the ability to communicate requirements to all stakeholders, needed to support the enterprise system to include: configuration changes, application patching, incident response, vulnerability mitigation, and risk management. * Developed, managed, or had direct implementation responsibility for continuous monitoring programs at the enterprise level. * Have a working knowledge of Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), DISA STIG Viewer, Splunk or other cybersecurity relevant tools. * Experience with developing and implementing cybersecurity training for SAs, ISOs, ISSOs, and privileged/general users. * Experience and technical understanding of high to low / low to high data transfer process * The ability to support enterprise level compliance requirements with minimal and timely manner to include providing clear and concise rational for decisions to all stakeholders. * Excellent organizational and communication skills and the ability to effectively interact with managers and technical staff. * Hold an active Secret security clearance and ability to obtain and maintain a Top Secret. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information. Eligibility requirements include U.S. citizenship. You'll go above and beyond our minimum requirements if you... * Have more than 10 years' experience implementing cybersecurity policy and security controls for classified enterprise information technology systems and have a worked with a Restricted Area, SCIF, or SAPF. * Hold a Master's degree in Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering from an ABET accredited or NCAE-C-designated institution. * Meet and demonstrate advanced DoD 8140.03 Cyberspace Workforce Qualification and Management Program requirements through training and/or certifications (CISSP, equivalent, or higher). * Have cybersecurity compliance experience supporting Collateral, SCI, or SAP Top Secret enterprise information systems. * Have experience in cybersecurity supporting domains such as intelligence analysis, Security Operations Center (SOC) support, governance and/or risk management, Development, Security, Operations (DevSecOps), computer forensics, policy creation, technical writing, incident response, disaster recover, etc. * Have working familiarity with Director of Central Intelligence Directives (DCID) or Intelligence Community Directives (ICD) security requirements. * Have direct experience working for a University Affiliated Research Center (UARC), Department of Defense (DoD) or Department of Energy (DOE) or similar research facilities. #LI-AG1 About Us Why Work at APL? The Johns Hopkins University Applied Physics Laboratory (APL) brings world-class expertise to our nation's most critical defense, security, space and science challenges. While we are dedicated to solving complex challenges and pioneering new technologies, what makes us truly outstanding is our culture. We offer a vibrant, welcoming atmosphere where you can bring your authentic self to work, continue to grow, and build strong connections with inspiring teammates. At APL, we celebrate our differences of perspectives and encourage creativity and bold, new ideas. Our employees enjoy generous benefits, including a robust education assistance program, unparalleled retirement contributions, and a healthy work/life balance. APL's campus is located in the Baltimore-Washington metro area. Learn more about our career opportunities at ****************************** All qualified applicants will receive consideration for employment without regard to race, creed, color, religion, sex, gender identity or expression, sexual orientation, national origin, age, physical or mental disability, genetic information, veteran status, occupation, marital or familial status, political opinion, personal appearance, or any other characteristic protected by applicable law. APL is committed to providing reasonable accommodation to individuals of all abilities, including those with disabilities. If you require a reasonable accommodation to participate in any part of the hiring process, please contact Accommodations@jhuapl.edu. The referenced pay range is based on JHU APL's good faith belief at the time of posting. Actual compensation may vary based on factors such as geographic location, work experience, market conditions, education/training and skill level with consideration for internal parity. For salaried employees scheduled to work less than 40 hours per week, annual salary will be prorated based on the number of hours worked. APL may offer bonuses or other forms of compensation per internal policy and/or contractual designation. Additional compensation may be provided in the form of a sign-on bonus, relocation benefits, locality allowance or discretionary payments for exceptional performance. APL provides eligible staff with a comprehensive benefits package including retirement plans, paid time off, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, education assistance, and training and development. Applications are accepted on a rolling basis. Minimum Rate $100,000 Annually Maximum Rate $245,000 Annually
    $58k-76k yearly est. Auto-Apply 6d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information System Security Manager (ISSM)

    Johns Hopkins Applied Physics Laboratory 4.6company rating

    Information systems security officer job at The Johns Hopkins University Applied Physics Laboratory

    Do you love solving problems while enabling impactful research to operate securely? Are you passionate about making meaningful contributions to national security cyber missions? Do you like collaborating with a team with varied strengths to tackle complex problems which enable research across space exploration, cybersecurity, national defense, and cutting edge technologies? If so, we're looking for someone like you to join our team at APL. We are ranked as one of Computerworld 's Top Places to Work in IT for 6 years running and seeking motivated cybersecurity professionals to help us develop system security plans, handle cyber risk decisions, and enable our mission partners to innovate in a secure environment. As a member of our team, you'll contribute to the security and oversight of our classified information systems in support of real world, mission focused tasks. Our team of hardworking technical specialists are motivated by one common goal - securing our systems to enable national security missions. We strive to foster an environment of collaboration where the best idea prevails. As an Information System Security Manager... * Your primary responsibility will be to ensure classified systems follow government and APL regulations while still meeting program demands and operating in an accredited state. * You will lead all aspects of SSP development, maintenance, accreditation/re-accreditation, and oversight, including conducting periodic reviews to ensure compliance. * You will function as lead contact for IS security inspections, tests, and reviews by oversight authorities. * You will support the Chief Information Security Officer (CISO) and the Chief of Classified IT Compliance in carrying out the Laboratory's Classified Information Security Program. Qualifications You meet our minimum qualifications for the job if you... * Have acquired a BS in Computer Science, Cyber Security, or a related field, 8+years of relevant cybersecurity experience, and a current DoD 8140 Level III certification. * Have 5+ years working with the RMF, DAAPM, NISPOM, JSIG or other equivalent security frameworks. * Are an outstanding communicator in both written and verbal forms. * Hold an active Top Secret security clearance with a current SSBI. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information. Eligibility requirements include U.S. citizenship. You'll go above and beyond our minimum requirements if you... * Have worked as an Auditor, ISSO, ISSM, ISSE, Security Architect or Cyber Risk Manager for 5+ years. * Held cybersecurity positions in classified DoD or IC environment for 8+ years. * Currently have active TS/SCI, or TS/SCI+poly security clearance #LI-AG1 About Us Why Work at APL? The Johns Hopkins University Applied Physics Laboratory (APL) brings world-class expertise to our nation's most critical defense, security, space and science challenges. While we are dedicated to solving complex challenges and pioneering new technologies, what makes us truly outstanding is our culture. We offer a vibrant, welcoming atmosphere where you can bring your authentic self to work, continue to grow, and build strong connections with inspiring teammates. At APL, we celebrate our differences of perspectives and encourage creativity and bold, new ideas. Our employees enjoy generous benefits, including a robust education assistance program, unparalleled retirement contributions, and a healthy work/life balance. APL's campus is located in the Baltimore-Washington metro area. Learn more about our career opportunities at ****************************** All qualified applicants will receive consideration for employment without regard to race, creed, color, religion, sex, gender identity or expression, sexual orientation, national origin, age, physical or mental disability, genetic information, veteran status, occupation, marital or familial status, political opinion, personal appearance, or any other characteristic protected by applicable law. APL is committed to providing reasonable accommodation to individuals of all abilities, including those with disabilities. If you require a reasonable accommodation to participate in any part of the hiring process, please contact Accommodations@jhuapl.edu. The referenced pay range is based on JHU APL's good faith belief at the time of posting. Actual compensation may vary based on factors such as geographic location, work experience, market conditions, education/training and skill level with consideration for internal parity. For salaried employees scheduled to work less than 40 hours per week, annual salary will be prorated based on the number of hours worked. APL may offer bonuses or other forms of compensation per internal policy and/or contractual designation. Additional compensation may be provided in the form of a sign-on bonus, relocation benefits, locality allowance or discretionary payments for exceptional performance. APL provides eligible staff with a comprehensive benefits package including retirement plans, paid time off, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, education assistance, and training and development. Applications are accepted on a rolling basis. Minimum Rate $105,000 Annually Maximum Rate $290,000 Annually
    $86k-111k yearly est. Auto-Apply 6d ago
  • Cyber Security Engineer - TS/SCI

    Xcelerate Media 3.9company rating

    Bethesda, MD jobs

    Cyber Security Engineer - TS/SCI Xcelerate Solutions is seeking a Cyber Security Engineer working across several Task Orders under the DOMEX Technology Platform (DTP) contract supporting NMEC. Have impact as part of a mission focused, solutions oriented, and adaptive team that values innovation, collaboration, and professional development. As a Cyber Security Engineer, your job will be to design, develop, and implement secure systems in on-premises infrastructure. You will leverage on your experience with security technologies and industry best practices to ensure that security is integrated into system design, development, testing, and deployment and that all security requirements are compliant with the DoD Risk Management Framework. This exciting and challenging work will help you expand your capabilities in security and will provide you with the skills and experience you need to achieve additional levels of the DoD 8570 IAT and IASAE Certifications. While most work is conducted on-site at our client location in Bethesda, MD, we offer a flexible schedule and, occasionally, some tasks may be performed remotely. Percentage of remote work will vary based on client requirements/deliverables. Come join our award-winning organization and work with some of the most talented and brightest minds in the GovCon industry. Location: Bethesda, MD Security Clearance: Active TS/SCI Responsibilities: Support the secure architecture, design, and implementation of DoD systems in accordance with DoDI 8510.01, NIST SP 800-53, and other DoD security guidance. Lead the integration of RMF activities into the system development lifecycle (SDLC), including selecting, implementing, and validating security controls. Develop and maintain key security documentation such as System Security Plans (SSPs), Security Assessment Reports (SARs), Risk Assessments, and Plan of Action and Milestones (POA&Ms). Collaborate with ISSOs, ISSMs, developers, and system owners to ensure systems are developed and maintained with approved security configurations. Apply Security Technical Implementation Guides (STIGs) to systems and validate compliance using tools such as SCAP, STIG Viewer, and ACAS. Maintain application, network, and database scanning infrastructure (application/product updates, database maintenance, benchmark/audit files, application/server builds, rule pack/content updates, scanner, or agent deployment etc.) Analyze vulnerability scans and ensure timely mitigation or acceptance of risks based on DoD policies. Provide technical input to support and maintain system authorization. Participate in system reviews, architecture assessments, and engineering design reviews to embed cybersecurity from the outset. Develop and implement automation or security tools to improve the compliance and monitoring of systems. Support security incident response and forensics analysis in coordination with ISSMs and Security points of contact. Minimum Requirements: BS degree and 8+ years of experience in cybersecurity. Additional relevant years of experience in lieu of degree is accepted. An active TS/SCI clearance with ability to obtain a Poly Have at least one of the following DoD 8570.01-M IASAE Level II certifications: CISSP, CISSP-ISSAP, CISSP-ISSEP, CSSLP, or CASP+ CE. NOTE: the CISSP Associate is not acceptable Developer experience is preferred in a least one scripting / programming language. Experience with reviewing cybersecurity vulnerabilities for risk and relevance as well as in vulnerability mitigations/remediation planning, for identified systems, network, application and database vulnerabilities Ability to architect, design, troubleshoot, maintain, and deploy vulnerability scanning solutions such as (OWASP, Fortify, Sonarqube, Tenable, etc.) Experience with XACTA, EMass, or similar tool Strong in-depth understanding of including Microsoft Windows and Linux/UNIX operating systems Experience with middleware / web technologies (Apache, tomcat, IIS, etc.) Experience with Databases (Postgres, MS SQL, MySQL, ElasticSearch, etc.) Understanding of TCP/IP networking. Experience with Continuous Integration and Continuous Delivery Platforms (Jenkins, Bamboo, GitlabCI TFS, etc.) Familiar with NIST 800-171, 800-172, NIST SSDF, and CMMC requirements. Experience with NIST Special Publications e.g. NIST SP 800-27, 30, 37, 53, 60, 171, NIST SSDF, CMMC requirements, and CNSS publication CNSSI 1253 Experience supporting DoD/IC systems through the entire Risk Management Framework Plus (RMF) process Experience establishing a System Security Engineering management process to integrate security and privacy controls into complex hardware and software systems Experience developing and reviewing security concept of operations, systems security plans, security risk assessments, contingency plans, configuration management plans Experience with incident response plans, plan of actions and milestones, risk management plans, and vulnerability management plans Strong communication skills; able to successfully communicate with management personnel, technical personnel and third parties. Preferred Qualifications: Software development/coding experience with programming languages such as Python, Java, and React Successfully achieved ATO under RMF+ Experience with big data applications Experience with tools for ticketing and documentation (e.g., Gitlab, Jira, Confluence). Experience working in an Agile environment Experience with OIDC or Oauth2 Experience with any of the following technologies: Kubernetes, Rancher, Strimzi, or Cloudera Active Directory Scripting languages like bash, python, or PowerShell About Xcelerate Solutions: Founded in 2009 and headquartered in McLean, VA, Xcelerate Solutions (*************************** is one of America's fastest-growing companies. Xcelerate's culture is defined by our diversified workforce of dynamic and versatile professionals, supported with growth and development opportunities that contribute to individual and company growth. This strong commitment to our employees has been recognized by our inclusion on the Washington Business Journal's “50 Best Places to Work” list as well as being a “Great Place to Work” certified company with a 4.6 star, and a 99% CEO approval Glassdoor rating. Come find out why Xcelerate Solutions is one of the DC Metro top employers! Xcelerate Solutions is an Equal Employment Opportunity/Affirmative Action Employer. We evaluate qualified applicants without regard to race, color, national origin, religion, age, equal pay, disability, veteran status, sex, sexual orientation, gender identity, genetic information, or expression of another protected characteristic. As part of this commitment to the full inclusion of all qualified individuals, Xcelerate provides reasonable accommodations if needed because of an applicant's or an employee's disability. Pay Transparency Notice: Xcelerate Solutions will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.
    $81k-113k yearly est. Auto-Apply 8h ago
  • Information System Security Officer, (ISSO) IT Security Services Manager, (Clearance TS SCI w/Poly) Annapolis Junction, MD

    Hewlett Packard Enterprise 4.7company rating

    Annapolis, MD jobs

    This role has been designed as ''Onsite' with an expectation that you will primarily work from an HPE office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today's complex world. Our culture thrives on finding new and better ways to accelerate what's next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: Hewlett Packard Enterprise (HPE) seeks an experienced Information System Security Officer (ISSO) to support classified systems in a mission-driven environment. The ISSO will be responsible for implementing, maintaining, and monitoring the security posture of accredited information systems, ensuring compliance with DoD/IC security policies and procedures, and supporting continuous authorization and risk management activities. This position requires an active TS/SCI clearance with polygraph and hands-on experience supporting the Risk Management Framework (RMF) process and the DoD Information Assurance Certification and Accreditation Process (DIACAP). US Citizenship required Clearance Required: TS/SCI with Poly You are required to be onsite as necessary by the contract/customer at the Annapolis Junction, MD facility. Key Responsibilities: * Serve as the designated ISSO and primary point of contact for assigned IC/DoD mission systems, owning system security posture, assignment of security technical implementation guides (STIGs), RMF/accreditation activities, and coordination with Government stakeholders (Authorizing Officials, Security Control Assessors, ISSMs, and external auditors). * Manage configuration management processes to ensure integrity, traceability, and secure state of system baselines and authorized changes throughout the system lifecycle. * Develop, maintain, and manage RMF accreditation documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), Risk Assessment Reports (RARs), Plans of Action & Milestones (POA&Ms), and Interconnection Security Agreements (ISAs). * Execute continuous monitoring activities-vulnerability scanning, patch/configuration management, baseline assurance, and log/telemetry analysis-and coordinate remediation to mitigate risk. * Plan and coordinate security control assessments, compliance inspections, and audits; manage remediation tracking, risk acceptance, and engagement with Authorizing Officials to achieve and maintain Authority to Operate (ATO). * Develop, implement, and exercise Incident Response Plans (IRPs); lead incident triage, containment, recovery, reporting, and root‑cause analysis in accordance with IC and DoD policy. * Provide technical guidance on secure system design, hardening, boundary protections, data handling, and cryptographic/COMSEC considerations. * Advise leadership and stakeholders on system risk posture, emerging threats, and recommended mitigation strategies; prepare concise security briefings and reports. * Develop and deliver security training and awareness materials for system users, administrators, and engineering teams. * Maintain currency on evolving IC and DoD cyber security standards, threats, and best practices. Required: * Active TS/SCI with Polygraph (current and adjudicated) * DoD 8570 IAT Level II certification: Security+ CE or higher (SSCP, GSEC, CCNA Security, etc.) * 5+ years of experience administering classified information systems * 3+ years as a named ISSO supporting IC systems * Expertise with RMF (NIST SP 800‑37/800‑53) and IC/DoD security directives, DIACAP processes * Experience with vulnerability assessment tools, SIEM/log analysis, patch management, configuration hardening, and CM tools/processes * Strong communication skills with experience briefing technical and non‑technical stakeholders * U.S. Citizenship required Preferred: * CISSP, CAP, CISSP‑ISSMP, or equivalent advanced certifications * Prior IC program support within classified environments * Experience securing classified cloud environments, cross‑domain solutions, PKI, and cryptographic handling policies * Familiarity with DevSecOps practices in classified enclaves Education: Bachelor's degree in Cybersecurity, Computer Science, Information Assurance, or related field preferred; equivalent education or related experience acceptable. Physical / Other Requirements * Ability to work onsite within secure facilities as required * Ability to pass facility-specific checks * Occasional travel to customer/program sites may be required #federalcleared #unitedstates Additional Skills: Accountability, Accountability, Action Planning, Active Learning, Active Listening, Bias, Business, Coaching, Communication, Computer Literacy, Creativity, Critical Thinking, Cross-Functional Teamwork, Data Analysis Management, Data Collection Management (Inactive), Design Thinking, Empathy, Follow-Through, Growth Mindset, Intellectual Curiosity (Inactive), Long Term Planning, Managing Ambiguity, Personal Initiative, Policy and procedures, Process Improvements {+ 5 more} What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. #unitedstates #cybersecurity Job: Corporate Administration Job Level: Master "The expected salary/wage range for this position is provided below. Actual offer may vary from this range based upon geographic location, work experience, education/training, and/or skill level. - United States of America: Annual Salary USD 105,500 - 243,000 in Maryland The listed salary range reflects base salary. Variable incentives may also be offered." Information about employee benefits offered in the US can be found at ****************************************************** HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories. No Fees Notice & Recruitment Fraud Disclaimer It has come to HPE's attention that there has been an increase in recruitment fraud whereby scammer impersonate HPE or HPE-authorized recruiting agencies and offer fake employment opportunities to candidates. These scammers often seek to obtain personal information or money from candidates. Please note that Hewlett Packard Enterprise (HPE), its direct and indirect subsidiaries and affiliated companies, and its authorized recruitment agencies/vendors will never charge any candidate a registration fee, hiring fee, or any other fee in connection with its recruitment and hiring process. The credentials of any hiring agency that claims to be working with HPE for recruitment of talent should be verified by candidates and candidates shall be solely responsible to conduct such verification. Any candidate/individual who relies on the erroneous representations made by fraudulent employment agencies does so at their own risk, and HPE disclaims liability for any damages or claims that may result from any such communication.
    $65k-88k yearly est. Auto-Apply 14d ago
  • Information System Security Officer, (ISSO) IT Security Services Manager, (Clearance TS SCI w/Poly) Annapolis Junction, MD

    Hewlett Packard Enterprise 4.7company rating

    Annapolis, MD jobs

    Information System Security Officer, (ISSO) IT Security Services Manager, (Clearance TS SCI w/Poly) Annapolis Junction, MDThis role has been designed as ‘'Onsite' with an expectation that you will primarily work from an HPE office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today's complex world. Our culture thrives on finding new and better ways to accelerate what's next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: Hewlett Packard Enterprise (HPE) seeks an experienced Information System Security Officer (ISSO) to support classified systems in a mission-driven environment. The ISSO will be responsible for implementing, maintaining, and monitoring the security posture of accredited information systems, ensuring compliance with DoD/IC security policies and procedures, and supporting continuous authorization and risk management activities. This position requires an active TS/SCI clearance with polygraph and hands-on experience supporting the Risk Management Framework (RMF) process and the DoD Information Assurance Certification and Accreditation Process (DIACAP). US Citizenship required Clearance Required: TS/SCI with Poly You are required to be onsite as necessary by the contract/customer at the Annapolis Junction, MD facility. Key Responsibilities: Serve as the designated ISSO and primary point of contact for assigned IC/DoD mission systems, owning system security posture, assignment of security technical implementation guides (STIGs), RMF/accreditation activities, and coordination with Government stakeholders (Authorizing Officials, Security Control Assessors, ISSMs, and external auditors). Manage configuration management processes to ensure integrity, traceability, and secure state of system baselines and authorized changes throughout the system lifecycle. Develop, maintain, and manage RMF accreditation documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), Risk Assessment Reports (RARs), Plans of Action & Milestones (POA&Ms), and Interconnection Security Agreements (ISAs). Execute continuous monitoring activities-vulnerability scanning, patch/configuration management, baseline assurance, and log/telemetry analysis-and coordinate remediation to mitigate risk. Plan and coordinate security control assessments, compliance inspections, and audits; manage remediation tracking, risk acceptance, and engagement with Authorizing Officials to achieve and maintain Authority to Operate (ATO). Develop, implement, and exercise Incident Response Plans (IRPs); lead incident triage, containment, recovery, reporting, and root‑cause analysis in accordance with IC and DoD policy. Provide technical guidance on secure system design, hardening, boundary protections, data handling, and cryptographic/COMSEC considerations. Advise leadership and stakeholders on system risk posture, emerging threats, and recommended mitigation strategies; prepare concise security briefings and reports. Develop and deliver security training and awareness materials for system users, administrators, and engineering teams. Maintain currency on evolving IC and DoD cyber security standards, threats, and best practices. Required: Active TS/SCI with Polygraph (current and adjudicated) DoD 8570 IAT Level II certification: Security+ CE or higher (SSCP, GSEC, CCNA Security, etc.) 5+ years of experience administering classified information systems 3+ years as a named ISSO supporting IC systems Expertise with RMF (NIST SP 800‑37/800‑53) and IC/DoD security directives, DIACAP processes Experience with vulnerability assessment tools, SIEM/log analysis, patch management, configuration hardening, and CM tools/processes Strong communication skills with experience briefing technical and non‑technical stakeholders U.S. Citizenship required Preferred: CISSP, CAP, CISSP‑ISSMP, or equivalent advanced certifications Prior IC program support within classified environments Experience securing classified cloud environments, cross‑domain solutions, PKI, and cryptographic handling policies Familiarity with DevSecOps practices in classified enclaves Education: Bachelor's degree in Cybersecurity, Computer Science, Information Assurance, or related field preferred; equivalent education or related experience acceptable. Physical / Other Requirements Ability to work onsite within secure facilities as required Ability to pass facility-specific checks Occasional travel to customer/program sites may be required #federalcleared #unitedstates Additional Skills: Accountability, Accountability, Action Planning, Active Learning, Active Listening, Bias, Business, Coaching, Communication, Computer Literacy, Creativity, Critical Thinking, Cross-Functional Teamwork, Data Analysis Management, Data Collection Management (Inactive), Design Thinking, Empathy, Follow-Through, Growth Mindset, Intellectual Curiosity (Inactive), Long Term Planning, Managing Ambiguity, Personal Initiative, Policy and procedures, Process Improvements {+ 5 more} What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. #unitedstates#cybersecurity Job: Corporate Administration Job Level: Master"The expected salary/wage range for this position is provided below. Actual offer may vary from this range based upon geographic location, work experience, education/training, and/or skill level. - United States of America: Annual Salary USD 105,500 - 243,000 in Maryland The listed salary range reflects base salary. Variable incentives may also be offered." Information about employee benefits offered in the US can be found at ****************************************************** HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories. No Fees Notice & Recruitment Fraud Disclaimer It has come to HPE's attention that there has been an increase in recruitment fraud whereby scammer impersonate HPE or HPE-authorized recruiting agencies and offer fake employment opportunities to candidates. These scammers often seek to obtain personal information or money from candidates. Please note that Hewlett Packard Enterprise (HPE), its direct and indirect subsidiaries and affiliated companies, and its authorized recruitment agencies/vendors will never charge any candidate a registration fee, hiring fee, or any other fee in connection with its recruitment and hiring process. The credentials of any hiring agency that claims to be working with HPE for recruitment of talent should be verified by candidates and candidates shall be solely responsible to conduct such verification. Any candidate/individual who relies on the erroneous representations made by fraudulent employment agencies does so at their own risk, and HPE disclaims liability for any damages or claims that may result from any such communication.
    $65k-88k yearly est. Auto-Apply 11d ago
  • Information Systems Security Officer (ISSO)/Security Control & Compliance Assessor

    University of Maryland 4.4company rating

    Maryland jobs

    Physical Demands Ability to occasionally lift and install computers and networking equipment in a variety of environments including secure offices, computer labs, and IT closets; this may involve work under the facility raised floor and/or ceilings or other constrained environments. Sitting or standing for long periods of time in a variety of environments while configuring, troubleshooting, and/or monitor systems and infrastructure. Some responsibilities (e.g. - incident response/spills) may involve high consequence decision making and operation under significant stress and time constraints. Minimum Qualifications Bachelor's degree in Cybersecurity, Computer Science, Computer Engineering/Electrical Engineering, Information Systems, or closely related field. Master's degree desired. Seven (7) - Nine (9) years hands-on experience in a technical engineering, operations, or cybersecurity role, with hands-on experience as an ISSE , ISSO / ISSM , cybersecurity controls assessor, cybersecurity auditor, pen-tester/cyber-operations operator or closely related cybersecurity role. Experience working with accrediting or authorizing national security systems through a DoD/IC RMF -based process (or equivalent DoE or DHS process). Must have at least a current DoD 8570 IAT / IAM -I/II professional cybersecurity credential ( IAT / IAM Level III certification preferred). Candidates that also possess a credential meeting the DoD CSSP Auditor category and have completed DoD training in the RMF strongly preferred. US CITIZENSHIP REQUIRED - Ability to obtain and maintain a US Government Security Clearance that may require SCI nomination, Special Access program nomination, and/or a government polygraph is REQUIRED .
    $61k-83k yearly est. 60d+ ago
  • 25-1079: Information Security Systems Officer (ISSO)

    Navitas 4.6company rating

    Maryland City, MD jobs

    Information Security Systems Officer (ISSO) Clearance: Top Secret (T5 Investigation) Who We Are: Since our inception back in 2006, Navitas has grown to be an industry leader in the digital transformation space, and we've served as trusted advisors supporting our client base within the commercial, federal, and state and local markets. What We Do: At our very core, we're a group of problem solvers providing our award-winning technology solutions to drive digital acceleration for our customers! With proven solutions, award-winning technologies, and a team of expert problem solvers, Navitas has consistently empowered customers to use technology as a competitive advantage and deliver cutting-edge transformative solutions. What You'll Do: As an Information System Security Officer (ISSO), you will provide security support for DOJ's external customers, ensuring an appropriate operational security posture for information systems. You will work closely with the Director of Information System Security to advise on cybersecurity policies, compliance, and risk management while supporting the ongoing security of DOJ/OIG systems. Responsibilities will include but are not limited to: Work with the System Owner and Director of IT Security to categorize systems, assess security controls, and document results. Assist in the annual re-assessment of Common Controls, ensuring compliance with DOJ policies. Ensure systems are accredited following the customer process to obtain Authority to Test (ATT), Authority to Operate (ATO), or Ongoing Authorization (OA). Develop and maintain security documentation, including System Security Plans (SSP), Security Assessment Plans/Reports (SAP/SAR), POA&Ms, and security authorization memorandums in CSAM. Conduct security control assessments, both manual and automated, and provide findings on control gaps, risk levels, and impacts. Establish and maintain audit trails, ensuring regular log reviews and compliance with DOJ/OIG policies. Monitor and execute operations and maintenance of information systems, including secure system disposal. Support the development of Privacy Impact Assessments (PIA), Interconnection Security Agreements, Risk Assessments, Configuration Management Plans, and Incident Response Plans. Conduct vulnerability scans, review security reports, and implement remediation strategies. Assist in continuous monitoring activities, aligning with DOJ's Ongoing Authorization (OA) process and using DOJ's GRC tools. Ensure all security assessment and audit reports are properly uploaded in CSAM. Participate in configuration management processes, policy audits, and system log reviews. Provide technical guidance and compliance oversight in alignment with FISMA, RMF, and NIST frameworks. What You'll Need: Minimum 5 years of experience as an ISSO. Bachelor's degree in Information Technology, Computer Science, Engineering, or a related field from a U.S. Department of Education-accredited university (or equivalent experience). Security+ or equivalent/higher-level certification (current). Strong understanding of Information Security Policies and Procedures. Expertise in Risk Management Framework (RMF), Security Controls, Incident Response, Security Auditing, and Regulatory Compliance. Familiarity with FISMA, NIST SP 800-53 controls, and DOJ security policies. Proficiency in security tools, risk assessments, and vulnerability management. Set Yourself Apart With: Knowledge of Security Incident Analysis and Forensics. Experience with Software Development Lifecycle (SDLC) security practices. Strong policy and memo writing skills. Effective problem-solving, time management, conflict resolution, and teamwork skills. Hands-on experience with CSAM, GRC tools, and automated security scanning tools. Ability to lead security compliance efforts across multiple systems. Equal Employer/Veterans/Disabled Navitas Business Consulting is an affirmative action and equal opportunity employer. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact Navitas Human Resources. Navitas is an equal opportunity employer. We provide employment and opportunities for advancement, compensation, training, and growth according to individual merit, without regard to race, color, religion, sex (including pregnancy), national origin, sexual orientation, gender identity or expression, marital status, age, genetic information, disability, veteran-status veteran or military status, or any other characteristic protected under applicable Federal, state, or local law. Our goal is for each staff member to have the opportunity to grow to the limits of their abilities and to achieve personal and organizational objectives. We will support positive programs for equal treatment of all staff and full utilization of all qualified employees at all levels within Navitas.
    $110k-157k yearly est. Auto-Apply 46d ago
  • Cyber Analyst

    The Lockwood Group 4.9company rating

    Aberdeen Proving Ground, MD jobs

    The Lockwood Group The Lockwood Group is a Global Professional Services Provider established with a purpose to deliver Mission Readiness service and solution to the Department of Defense and Federal Government. Our culture is built upon a Mission Readiness vision and our six core values. We believe in customer centric service delivery with intent to uncover, understand, and solve the underlying problems of the true end customers for our services - the military (the soldier, airman, seaman and Marine) and federal service professionals. Take the first step to "Mission Readiness" by viewing our Mission Readiness Capability video which articulates our Core Purpose: The Lockwood Group Launches Mission-Ready Capabilities Video Overview: The Lockwood Group is currently pending award on a contract providing tactical network support to the Project Manager Network Modernization program (PdM NetMod). We are seeking a Cyber Analyst to support the PdM NetMod program by assessing and enhancing the security posture of network and IT systems, identifying vulnerabilities, and ensuring compliance with DoD cybersecurity regulations. Responsibilities: Conduct security assessments, penetration testing, and vulnerability analysis. Monitor, detect, and respond to cyber threats and incidents. Implement security controls and policies in line with DoD cybersecurity frameworks. Perform risk assessments and ensure compliance with RMF and NIST standards. Develop security reports and recommendations for leadership. Qualifications: Bachelor's degree in Cybersecurity, Information Security, or related field. Experience in security operations, threat intelligence, and incident response. Proficiency in security tools such as SIEMs, IDS/IPS, and vulnerability scanners. Security+ or CISSP certification required. Active DoD Secret or higher clearance required. Salary: 90k to 120k The Lockwood Group offers a competitive benefits package, including Paid Time Off, medical, dental, and vision insurance, health and wellness, various optional add-on benefits, and a retirement 401(k) plan with Company match. Lockwood Credo, Core Values and Culture The Lockwood mission is to create an organization focused on service. We serve - each other, the soldier, our customers, our employees, our partners, our vendors, and our community. Service is at the center of our Core Values and Culture. Our customers come first. Being responsive, professional and reliable is why we are hired. We aim to deliver on all promises, exceeding customer expectations and making certain all business decisions are made with the customer in mind. Our employees are the face of our service. They are at the front lines working with our customers daily, and it is Lockwood's duty to serve our employees. This means designing a culture centered around core values that inspire, retain and grow the best talent. Our partners are fuel for our engine. Our great vendors, consultants and teaming partners combine to fuel Lockwood, ensuring we successfully deliver always. We work alongside our partners as one cohesive team. Service to the community is important to us. We seek to volunteer, engage and support our communities through investment of time and resources. This service mindset is what inspired company founders to embark on the journey to deliver on the promise to Lead the Way to Mission Readiness for all people we serve. The following 6 Core Values are the foundation by which we serve: •Ethics and Integrity •Customer Commitment •Team and Family Environment •Service •Leadership •Positivity If these Core Values resonate with you, we would love to have you join our team! The Lockwood Group is an Equal Opportunity Employer All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. The Lockwood Group will consider qualified applicants with criminal histories for employment in accordance with relevant laws.
    $75k-104k yearly est. 60d+ ago
  • Information Assurance Specialist - TS/SCI w/ CI Poly

    Xcelerate Media 3.9company rating

    Bethesda, MD jobs

    Description Information Assurance Specialist - TS/SCI with CI Poly Xcelerate Solutions is seeking an experienced SME Information Assurance Specialist to support a large customer organization in the fast-growing National Security Group. Provide expert guidance in all areas of information assurance, system integration, and program management in order to help the customer make high level decisions about the future of IT systems across the IC. Developing assessment criteria (metrics, measures, key performance indicators) for security requirements and implementation guidance Participating in external cybersecurity related governance, policy, and standards bodies Evaluating existing and emerging technologies and recommend strategies to support mission requirements Providing talking points at a Senior level for Leadership Act as a SME sounding board for discussions on future IT enhancements, developments and influence real decisions on future IT directions Provide input and guidance on current and future IC SoCCs Provide feedback on integration activities across the entire IT portfolio Provide cutting edge input on areas of future investment for the customer Minimum Requirements: TS/SCI with Poly Experience in cybersecurity responsibility areas listed above. Requires BS degree and 12-15 years of prior relevant experience. Excellent written and oral communication skills. Detail-oriented, ability to consistently provide high-quality products that are concise, thorough, and accurate. Requires extensive experience performing Assessment & Authorization with Greenlight Preferred Qualifications: Familiarity with SCOR/CIRT/SCEC waivers/ICSCC reporting/Jetstream/Xacta/Altitude About Xcelerate Solutions: Founded in 2009 and headquartered in McLean, VA, Xcelerate Solutions (*************************** is one of America's fastest-growing companies. Xcelerate's culture is defined by our diversified workforce of dynamic and versatile professionals, supported with growth and development opportunities that contribute to individual and company growth. This strong commitment to our employees has been recognized by our inclusion on the Washington Business Journal's “50 Best Places to Work” list as well as being a “Great Place to Work” certified company with a 4.6 star, and a 99% CEO approval Glassdoor rating. Come find out why Xcelerate Solutions is one of the DC Metro top employers! Xcelerate Solutions is an Equal Employment Opportunity/Affirmative Action Employer. We evaluate qualified applicants without regard to race, color, national origin, religion, age, equal pay, disability, veteran status, sex, sexual orientation, gender identity, genetic information, or expression of another protected characteristic. As part of this commitment to the full inclusion of all qualified individuals, Xcelerate provides reasonable accommodations if needed because of an applicant's or an employee's disability. Pay Transparency Notice: Xcelerate Solutions will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.
    $65k-86k yearly est. Auto-Apply 8h ago
  • Information Systems Security Officer (ISSO)

    The Aerospace 4.9company rating

    El Segundo, CA jobs

    The Aerospace Corporation is the trusted partner to the nation's space programs, solving the hardest problems and providing unmatched technical expertise. As the operator of a federally funded research and development center (FFRDC), we are broadly engaged across all aspects of space- delivering innovative solutions that span satellite, launch, ground, and cyber systems for defense, civil and commercial customers. When you join our team, you'll be part of a special collection of problem solvers, thought leaders, and innovators. Join us and take your place in space. Job Summary Aerospace's Security Operations, El Segundo Special Security Department, provides quality leadership, services, and solutions to safeguard people and the environment, secure and protect company information and assets as well as enhance operational efficiency for the Corporation. You will serve as the Information Assurance Specialist responsible for interpreting and applying government customer policies while displaying leadership competencies related to velocity as a part of our strategic imperatives. The selected candidate will be required to work full-time, on-site at our facility in El Segundo, CA. What You'll Be Doing As an Information Assurance Specialist, you will be expected to support the following areas: The establishment, monitoring, and maintenance of classified information systems security compliance posture under the Risk Management Framework from conception through decommission Assist the ISSM in meeting the organizations responsibilities related to classified information systems Ensure approved procedures are in place and executed for clearing, sanitizing, and destroying various types of hardware and media Develop policies and procedures regarding data handling, computers, and networks Coordinate any changes or modifications to hardware, software, or system configurations with the ISSM and Authorization Official The creation and maintenance of information system Assessment & Authorization packages utilizing customer specified tools The incident handling process of classified information system related incidents The transfers of data for users between systems of like and differing classification levels Conduct continuous monitoring of classified information system Ensure audit records are collected, reviewed, and documented Provide guidance and knowledge transfer to junior ISSO team members What You Need to be Successful Minimum Requirements for Information Assurance Specialist III: 5-8 years of relevant experience with High School Diploma Advanced understanding of the Risk Management Framework and Assessment & Authorization processes Experience implementing the following policies: NIST 800-53, JSIG, and related IA doctrine Must possess DoD 8570 Certification (Security+, CISSP, CISM) Current TS/SCI Clearance. U.S citizenship is required to obtain security clearance. In addition to the above, the minimum requirements for the Information Assurance Specialist IV include : 9+ years of relevant experience How You Can Stand Out It would be impressive if you have one or more of these: Bachelors or Master's degree from an accredited program in Cyber Security, Information Systems, Information Technology, or related field 9+ years of experience in the Risk Management Framework Project Management Skill Experience managing or achieving accreditation for enterprise wide area networks Special Access Programs (SAP) knowledge We offer a competitive compensation package where you'll be rewarded based on your performance and recognized for the value you bring to our business. The grade-based pay range for this job is listed below. Individual salaries within that range are determined through a wide variety of factors including but not limited to education, experience, knowledge and skills. (Min - Max) $45.68 - $84.00Pay Basis: Hourly Leadership Competencies Our leadership philosophy is simple: every employee, regardless of level and role, can demonstrate leadership. At Aerospace, our commitment is our people. To cultivate our talent and ensure that we have a strong pipeline of future leaders, we want individuals who: Operate Strategically Lead Change Engage with Impact Foster Innovation Deliver Results Ways We Reward Our Employees During your interview process, our team will provide details of our industry-leading benefits. Benefits vary and are applicable based on Job Type. A few highlights include: Comprehensive health care and wellness plans Paid holidays, sick time, and vacation Standard and alternate work schedules, including telework options 401(k) Plan - Employees receive a total company-paid benefit of 8%, 10%, or 12% of eligible compensation based on years of service and matching contributions; employees are immediately eligible and vested in the plan upon hire Flexible spending accounts Variable pay program for exceptional contributions Relocation assistance Professional growth and development programs to help advance your career Education assistance programs An inclusive work environment built on teamwork, flexibility, and respect We are all unique, from various backgrounds and all walks of life, yet one thing bonds all of us to each other-the belief that we can make a difference. This core belief empowers us to do our best work at The Aerospace Corporation. Equal Opportunity Commitment The Aerospace Corporation is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, age, sex (including pregnancy, childbirth, and related medical conditions), sexual orientation, gender, gender identity or expression, color, religion, genetic information, marital status, ancestry, national origin, protected veteran status, physical disability, medical condition, mental disability, or disability status and any other characteristic protected by state or federal law. If you're an individual with a disability or a disabled veteran who needs assistance using our online job search and application tools or need reasonable accommodation to complete the job application process, please contact us by phone at ************ or by email at ****************************** . You can also review Know Your Rights: Workplace Discrimination is Illegal.
    $45.7-84 hourly Auto-Apply 36d ago
  • Manager of Information Security

    Suncoast Schools Federal Credit Union 4.2company rating

    Tampa, FL jobs

    Compensation: $110,000 - $150,000 based on experience and credentials Position Type: Full Time The IT Security Operations Manager oversees the operations of Suncoast Credit Union's security solutions. This individual establishes an enterprise security stance through policy implementation, architecture, and training processes. Key responsibilities include selecting appropriate security solutions and overseeing vulnerability audits and assessments. An ideal candidate is an ambassador who will interface with peers in the Systems and Network departments, along with other leaders, to share the organization's security vision and solicit involvement in achieving higher levels of enterprise security. Responsibilities * Create and maintain the security architecture design * Budget, evaluate, and recommend solutions to current or potential security threats related to the computing environment * Lead the design, implementation, operation, and maintenance of the Information Technology Security Framework based on the SANS Top 20 Critical Controls * Ensure the confidentiality, integrity, and availability of data residing on or transmitted through enterprise workstations, servers, databases, and other data repositories * Create and maintain the enterprise's security documents for standards, baselines, guidelines, and procedures * Ensure the enforcement of enterprise security documents * Collaborate with the Systems and Networking groups and other business units to ensure enterprise-wide understanding of security goals, solicit feedback, and foster cooperation * Assist with the security awareness training program * Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security within the enterprise's existing procurement processes * Oversee the deployment, integration, and initial configuration of new security solutions and enhancements to existing security solutions * Supervise the design and execution of vulnerability assessments, penetration tests, and security audits * Review and recommend new methods or procedures to make daily operations more efficient * Set goals and objectives for team members to achieve operational and strategic results * Direct and guide supervisors * Develop and mentor directly reporting staff and respond appropriately to feedback or concerns * Cultivate strong working relationships and build trust among team members * Interpret and implement management policies, utilizing short-term planning, scheduling, and coordinating for the department * Assist senior management with developing and implementing long-term and short-term business objectives * Develop, monitor, and maintain the department budget in cooperation with senior management * Assist the Vice President with regulatory compliance to ensure the department is in accordance with applicable laws and government regulations * Maintain knowledge and understanding of current trends, laws, and issues affecting the area of expertise Qualifications * Bachelor's degree in information technology, information security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements) * 7+ years of experience in enterprise security architecture design and enterprise security document creation, including management experience * Ability to temporarily relocate out of state to provide support for business continuity during major incidents such as weather events * Experience with designing and delivering employee security awareness training * Experience with developing Business Continuity Plans and Disaster Recovery Plans * Experience with various network protocols, firewalls, vulnerability assessment, penetration testing tools, remote access, network vulnerabilities, endpoint systems, vulnerabilities, and network management tools * Strong understanding of IP, TCP/IP, and other network administration protocols. * Proficient knowledge of security policies, standards, and procedures * Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines * Accurate, detail-oriented, and organized with task management * Ability to analyze and resolve complex problems * Strong written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators * Ability to influence others regarding policies, practices, and procedures Benefits * Financial Well-Being: Bonus Program up to 18%, 401K Matching up to 8%, Retirement Planning, Pay Increases based on Competency, Employee Loan Discounts, Flex Spending Accounts * Wellness: Medical Coverage, Dental and Vision Coverage, Access to 4,000+ Gyms, Mental Health Resources, PTO Wellness Days, Short Term and Long Term Disability Coverage * Work-Life Balance: 11 Paid Holidays, 3 weeks of Paid Time Off, 4 weeks of Paid Parental Leave, Birthday PTO * Community Involvement: Paid Volunteer Hours * Growth: Degree Assistance up to $5,000 per year For more information, including additional benefits, please visit our benefits website at ************************************************ Responsibilities * Create and maintain the security architecture design * Budget, evaluate, and recommend solutions to current or potential security threats related to the computing environment * Lead the design, implementation, operation, and maintenance of the Information Technology Security Framework based on the SANS Top 20 Critical Controls * Ensure the confidentiality, integrity, and availability of data residing on or transmitted through enterprise workstations, servers, databases, and other data repositories * Create and maintain the enterprise's security documents for standards, baselines, guidelines, and procedures * Ensure the enforcement of enterprise security documents * Collaborate with the Systems and Networking groups and other business units to ensure enterprise-wide understanding of security goals, solicit feedback, and foster cooperation * Assist with the security awareness training program * Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security within the enterprise's existing procurement processes * Oversee the deployment, integration, and initial configuration of new security solutions and enhancements to existing security solutions * Supervise the design and execution of vulnerability assessments, penetration tests, and security audits * Review and recommend new methods or procedures to make daily operations more efficient * Set goals and objectives for team members to achieve operational and strategic results * Direct and guide supervisors * Develop and mentor directly reporting staff and respond appropriately to feedback or concerns * Cultivate strong working relationships and build trust among team members * Interpret and implement management policies, utilizing short-term planning, scheduling, and coordinating for the department * Assist senior management with developing and implementing long-term and short-term business objectives * Develop, monitor, and maintain the department budget in cooperation with senior management * Assist the Vice President with regulatory compliance to ensure the department is in accordance with applicable laws and government regulations * Maintain knowledge and understanding of current trends, laws, and issues affecting the area of expertise Qualifications * Bachelor's degree in information technology, information security, or related field (A comparable combination of education, work experience, and training may be substituted for education requirements) * 7+ years of experience in enterprise security architecture design and enterprise security document creation, including management experience * Ability to temporarily relocate out of state to provide support for business continuity during major incidents such as weather events * Experience with designing and delivering employee security awareness training * Experience with developing Business Continuity Plans and Disaster Recovery Plans * Experience with various network protocols, firewalls, vulnerability assessment, penetration testing tools, remote access, network vulnerabilities, endpoint systems, vulnerabilities, and network management tools * Strong understanding of IP, TCP/IP, and other network administration protocols. * Proficient knowledge of security policies, standards, and procedures * Ability to prioritize tasks by effectively managing competing and changing priorities to meet deadlines * Accurate, detail-oriented, and organized with task management * Ability to analyze and resolve complex problems * Strong written, verbal, and interpersonal communication skills to interact effectively with members, staff, vendors, and government regulators * Ability to influence others regarding policies, practices, and procedures Benefits * Financial Well-Being: Bonus Program up to 18%, 401K Matching up to 8%, Retirement Planning, Pay Increases based on Competency, Employee Loan Discounts, Flex Spending Accounts * Wellness: Medical Coverage, Dental and Vision Coverage, Access to 4,000+ Gyms, Mental Health Resources, PTO Wellness Days, Short Term and Long Term Disability Coverage * Work-Life Balance: 11 Paid Holidays, 3 weeks of Paid Time Off, 4 weeks of Paid Parental Leave, Birthday PTO * Community Involvement: Paid Volunteer Hours * Growth: Degree Assistance up to $5,000 per year For more information, including additional benefits, please visit our benefits website at ************************************************
    $110k-150k yearly Auto-Apply 5d ago
  • Chief Information Security Officer

    California State University System 4.2company rating

    Los Angeles, CA jobs

    Responsibilities of the CISO: In collaboration with the university's executive leadership, the CISO plays a pivotal role in defining acceptable levels of information security risk, aligning cybersecurity strategies with institutional objectives, and ensuring the university's overall resilience against cyber threats and regulatory compliance requirements. Key responsibilities encompass: * Identify risks and IT security and compliance requirements and priorities: Collaborate with executive management to establish acceptable risk profiles, balance security measures with operational needs and business objectives, identify and remediate security-related compliance gaps, establish security and compliance governance processes to ensure security and compliance solutions are appropriate, and resources are allocated based on the priorities of the university business objectives. * Protect the information assets and reputation of the university from cyberattacks: Design, implement, and maintain a comprehensive campus-wide information security management program, encompassing policies, procedures, practices, and capabilities to safeguard sensitive data and critical infrastructure. Conduct security awareness program to educate Cal State LA user community to protect themselves from phishing and/or cyberattacks. * Detect cyber threats, attacks, system vulnerabilities, and security-related non-compliance issues: Enhance technical capabilities to improve cyber threat detection effectiveness. Develop IT security talents to identify symptoms of cyberattacks. Establish security threat detection processes to monitor cyber risks and vulnerabilities. Lead the assessments and security health check efforts on regulatory compliance mandates including FERPA, PII, GLBA, GDPR, PCI DSS, and HIPAA. * Respond to security incidents and cyberattacks: Maintain up-to-date Incident Response Management Plans and improve the university's incident response readiness via CSIRT training and tabletop exercises. Lead the incident response efforts, perform investigation, coordinate remediation activities, and ensure effective communication with stakeholders during and after security breaches or cyberattacks. Collect evidence for cyber incidents to enable post incident activities. * Restore disrupted systems and business capabilities after cyber incidents: Coordinate with Infrastructure Team to back up critical systems and sensitive data to enable quick and comprehensive restoration of systems after cyber-attacks or system disruption. * Strategic Planning and Prioritization: Actively participate in IT strategic planning initiatives, projects, and resource allocation decisions, prioritizing security investments and aligning cybersecurity strategies with the university's evolving needs. * IT Audit Oversight: Oversee IT-related audit responses, ensuring adherence to internal controls, regulatory compliance requirements, and industry best practices. Required Qualifications & Experience: * Bachelor's degree from an accredited four-year college or university in information security, computer science, or a related field. * Minimum of 8-10 years of progressive experience in information security, cybersecurity, or a related field. * Proven experience in a leadership role, overseeing comprehensive information security programs, and managing security initiatives in a complex organizational environment, preferably in higher education. Leadership and Communication: * Demonstrated ability to provide strategic vision and leadership in information security. * Strong communication skills with the ability to effectively convey complex security concepts to both technical and non-technical stakeholders. * Experience collaborating with executive management and presenting to governing boards. Technical Proficiency: * In-depth knowledge of information security principles, cybersecurity technologies, and risk management frameworks. * Experience with the implementation and management of security operations centers (SOCs) and security monitoring systems. * Familiarity with industry-accepted information security standards, frameworks, and best practices. Compliance and Governance: * Expertise in developing, implementing, and maintaining information security policies, procedures, and standards. * Experience with information security governance and ensuring compliance with applicable industry standards and governmental regulations. Incident Response and Risk Management: * Proven experience leading and managing incident response teams in. addressing security breaches and cyberattacks. * Strong background in conducting risk assessments and implementing risk management strategies. Vendor Management: * Experience managing relationships with security-related vendors and overseeing security services. * Knowledge of vetting and reviewing security practices and controls of third-party service providers. Data Governance and Compliance: * Familiarity with data governance frameworks and the ability to enforce data classification rules and procedures. * Experience with overseeing compliance efforts, including audits and assessments related to FERPA, GLBA, HIPAA, and other relevant regulations. Strategic Planning: * Track record of developing and implementing strategic plans for information security programs. * Ability to align information security initiatives with organizational goals. Continuous Learning and Industry Engagement: * Demonstrated commitment to staying abreast of the latest trends, emerging threats, and best practices in information security. * Participation in professional organizations, conferences, and networking events in the cybersecurity field. Team Management: * Experience in leading and developing a diverse team of information security professionals. * Ability to foster a collaborative and inclusive team culture. Legal and Regulatory Knowledge: * Understanding of legal and regulatory requirements related to information security, particularly in the context of higher education. Incumbent must demonstrate an interest or ability in working in a multicultural/multiethnic environment. A background check (including a criminal records check) must be completed satisfactorily before any candidate can be offered a position with the CSU. Failure to satisfactorily complete the background check may affect the application status of applicants or continued employment of current CSU employees who may apply for the position. California State University, Los Angeles, as part of the CSU system, is a State of California Employer. As such, the University requires all employees upon date of hire to reside in the State of California. As of January 1, 2022 the CSU Out-of-State Employment Policy prohibits the hiring of employees to perform CSU-related work outside the state of California. Desired Qualifications: * Five (5) or more years of experience in leading teams in a management or leadership role, particularly in a fast-paced, service-oriented environment. * Experience working in higher education information technology. * Familiar with CSU security and compliance policies and procedures. * Familiar with Agile Software Process and Management. * Understanding of Cal State LA's mission and values. * Commitment to diversity, equity, and inclusion. Compensation: Salary is commensurate with experience and qualifications. Salary range is $6,891 - $22,191/monthly. (Budgeted Hiring Salary Range $6,891-$15,000/Monthly). A comprehensive benefits package is provided. Appointment: The Administrator III appointment will be made under the guidelines for management and supervisory employees of the California State University. All rights and benefits associated with this appointment are governed by the Management Personnel Plan. This position is a "designated position" in the California State University's Conflict of Interest Code. The successful candidate accepting this position is required to file Conflict of Interest forms subject to the regulations of the Fair Political Practices Commission. Closing Date: Review of applications will begin on February 15, 2026, and will continue until the position is filled; however, the position may close when an adequate number of qualified applications are received. Please apply using the link below: Chief Information Security Officer Apply Here The person holding this position is considered a "mandated reporter" under the California Child Abuse and Neglect Reporting Act and is required to comply with the requirements set forth in CSU Executive Order 1083 revised July 21, 2017, as a condition of employment. In addition to meeting fully its obligations under federal and state law, California State University, Los Angeles is committed to creating a community in which a diverse population can live and work in an atmosphere of tolerance, civility and respect for the rights and sensibilities of each individual. To that end, all qualified individuals will receive equal consideration without regard to economic status, race, ethnicity, color, religion, disability, national origin or cultural background, political views, sex or sexual orientation, gender, or other personal characteristics or beliefs. Candidates must demonstrate ability and/or interest in working in a multicultural/multiethnic environment. Certain positions require fingerprinting. The University actively encourages qualified minorities, women and persons with a disability to apply. Upon request, reasonable accommodation will be provided to individuals with protected disabilities to (a) complete the employment process and (b) perform essential job functions when this does not cause an undue hardship. We are an Equal Opportunity/Title IX Employer. To obtain employment information for the impaired call: TDD Line ************** 24-hour Dial-A-Job Line ************** Advertised: Jan 22 2026 Pacific Standard Time Applications close:
    $6.9k-22.2k monthly 4d ago
  • Information Security Officer (ITS)

    University of Southern California 4.1company rating

    Los Angeles, CA jobs

    ABOUT THE DEPARTMENT The University of Southern California (USC) is advancing its cybersecurity posture with a renewed focus on resilience, cyber risk management, and threat-informed defense. As a world-class research institution, USC is building a culture of security that supports its academic and research mission in a rapidly evolving threat landscape. This role sits within a newly restructured cybersecurity organization that's leading this transformation. You'll join a team focused on scalable, proactive defense strategies, incident preparedness, and operational excellence-working alongside experts who are deeply committed to service, innovation, and impact. If you're driven by purpose, thrive in complexity, and want to help shape the future of cybersecurity at a leading university, we invite you to bring your leadership to the table. POSITION SUMMARY As the Information Security Officer (ITS) you will be an integral member of the cybersecurity department while also collaborating with stakeholders across the university ecosystem, and reporting to the ISO Manager. This is a full-time exempt position, eligible for all of USC's fantastic Benefits + Perks. This opportunity is remote The Information Security Officer (ITS) coordinates with university department, schools/units to capture and enforce cybersecurity requirements and support resiliency efforts. Facilitates a unified approach to cybersecurity safety and compliance. Participates in the development and delivery of training programs. Maintains relationships between department, schools and units and central cybersecurity leadership. Ensures leading data security practices are implemented across the university, driving awareness and completion of cyber initiatives. The Information Security Officer (ITS) will: * Assists in the development, implementation and maintenance of the department, school and/or unit cybersecurity standards and procedures. Supports resiliency efforts in collaboration with university departments, schools and units to support response and recovery from cyber-related events. * Participates in the setup and hardening of departmental information systems to protect against unauthorized access or attacks. Responsible for reviews of control effectiveness. Performs regular risk assessments. * Assists in emergency procedures, in conjunction with relevant partners and existing cyber emergency plans, for handling security incidents, data breaches, and other critical situations. Assists in responding to security events, supporting incident response and contributing to investigations as required. * Contributes to training and awareness programs for department, school/unit staff to foster understanding and adherence to cybersecurity protocols. Maintains professional currency (e.g., all relevant cybersecurity laws, regulations, policies). * Encourages a workplace culture where all employees are valued, value others and have the opportunity to contribute through their ideas, words and actions, in accordance with the USC Code of Ethics. MINIMUM QUALIFICATIONS Great candidates for the position of Information Security Officer (ITS) will meet the following qualifications: * 4 years of experience in IT, cybersecurity and leadership roles. * A bachelor's degree or combined experience and education as substitute for minimum education. * Comprehensive understanding of the cybersecurity landscape (e.g., trends, risks, best practices for risk management). * Proficiency in information technology infrastructure and various cybersecurity tools and programs. * Demonstrated capacity to communicate security matters to different audiences. * Sound analytical and problem-solving skills with an ability to make quick decisions in emergency situations. * Experience with operational technology environments and security requirements to secure OT environments. * Experience with security audits and compliance with industry security standards and regulations. * Strong ethical standards and a solid understanding of privacy laws, confirming confidential information will be handled with integrity. * Relevant professional certifications or working towards attainment (e.g., GCIH/GSEC, CISM, CISA, CISSP, CRISC). PREFERRED QUALIFICATIONS Exceptional candidates for the position of Information Security Officer (ITS) will also bring the following qualifications or more: * 7 years in IT, cybersecurity and management * Leadership experience * Project management skills, with experience in planning, implementing, and overseeing security-related projects. * Bachelor's degree (or equivalent combination of education and experience) * Demonstrated ability to lead or coordinate cybersecurity policy implementation * Familiarity with audit processes and regulatory frameworks (e.g., NIST, HIPAA, FERPA) In addition, the successful candidate must also demonstrate, through ideas, words and actions, a strong commitment to USC's Unifying Values of integrity, excellence, community, well-being, open communication, and accountability. SALARY AND BENEFITS The annual base salary range for this position is $142,601.35 to $177,947.60. When extending an offer of employment, the University of Southern California considers factors such as (but not limited to) the scope and responsibilities of the position, the candidate's work experience, education/training, key skills, internal peer alignment, federal, state, and local laws, contractual stipulations, grant funding, as well as external market and organizational considerations. To support the well-being of our faculty and staff, USC provides benefits-eligible employees with a broad range of perks to help protect their and their dependents' health, wealth, and future. These benefits are available as part of the overall compensation and total rewards package. You can learn more about USC's comprehensive benefits here. Join the USC cybersecurity team within an environment of innovation and excellence. Minimum Education: Bachelor's degree Minimum Certifications: Relevant professional certifications or working towards attainment (e.g., GCIH/GSEC, CISM, CISA, CISSP, CRISC). Addtional Education Requirements Combined experience/education as substitute for minimum education Minimum Experience: 4 years in IT, cybersecurity and management. Minimum Skills: Comprehensive understanding of the cybersecurity landscape (e.g., trends, risks, best practices for risk management). Proficiency in information technology infrastructure and various cybersecurity tools and programs. Demonstrated capacity to communicate security matters to different audiences. Sound analytical and problem-solving skills with an ability to make quick decisions in emergency situations. Experience with operational technology environments and security requirements to secure OT environments. Experience with security audits and compliance with industry security standards and regulations. Strong ethical standards and a solid understanding of privacy laws, confirming confidential information will be handled with integrity. Preferred Education: Bachelor's degree Preferred Experience: 7 years in IT, cybersecurity and management. Preferred Skills: Leadership experience. Project management skills, with experience in planning, implementing, and overseeing security-related projects. USC is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or any other characteristic protected by law or USC policy. USC observes affirmative action obligations consistent with state and federal law. USC will consider for employment all qualified applicants with criminal records in a manner consistent with applicable laws and regulations, including the Los Angeles County Fair Chance Ordinance for employers and the Fair Chance Initiative for Hiring Ordinance, and with due consideration for patient and student safety. Please refer to the Background Screening Policy Appendix D for specific employment screen implications for the position for which you are applying. We provide reasonable accommodations to applicants and employees with disabilities. Applicants with questions about access or requiring a reasonable accommodation for any part of the application or hiring process should contact USC Human Resources by phone at **************, or by email at *************. Inquiries will be treated as confidential to the extent permitted by law. * Notice of Non-discrimination * Employment Equity * Read USC's Clery Act Annual Security Report * USC is a smoke-free environment * Digital Accessibility If you are a current USC employee, please apply to this USC job posting in Workday by copying and pasting this link into your browser: *************************************************************
    $142.6k-177.9k yearly Auto-Apply 14d ago
  • Manager, Information Security

    Universal Technical Institute 4.6company rating

    Phoenix, AZ jobs

    Overview Security Operations Manager leads our internal security operations team and oversee critical functions that protect our organization from cyber threats. This role is pivotal in ensuring operational excellence, managing vendor relationships, and driving continuous improvement in security posture. What We Offer: • $120,000 - $140,000 • Weekends OFF • Paid Training • FREE UTI or Concorde Tuition for you AND your Immediate Family • Medical/Dental/Vision/Life Ins/STD & LTD Ins • 401K, Paid Holidays, Paid Time Off • Paid Parental Leave Responsibilities Principal Accountabilities & Deliverables Team Leadership: Lead and mentor a small internal security operations team, fostering a culture of collaboration and continuous learning. Managed Detection & Response (MDR): Oversee and manage the MDR vendor relationship, ensuring effective threat detection and response. Incident Response: Direct and coordinate incident response activities, including investigations, containment, eradication, and recovery. Metrics & Reporting: Define, track, and report on security operations metrics, including response time SLAs and operational KPIs. On-Call Support: Participate in and support a 24/7/365 on-call rotation for critical security incidents. Threat Intelligence: Integrate threat intelligence into operational processes to proactively identify and mitigate risks. Process Improvement: Develop and maintain playbooks, workflows, and standard operating procedures for security operations. Tool Management: Oversee security monitoring tools (SIEM, EDR, etc.), ensuring proper configuration, tuning, and optimization. Compliance & Audit Support: Ensure adherence to regulatory requirements and assist with audits related to security operations. Cross-Functional Collaboration: Work closely with IT, infrastructure, and application teams to ensure security is embedded across the organization. Qualifications Education / Experience Bachelor's degree in computer science, or related field and seven (7) years' experience in hardware/software, network engineering, administration and customer service in complex multi-platform WAN environment or equivalent (required) Minimum two (2) years of IT managerial experience including managing teams and processes responsible for network architecture and engineering, system and application support and desktop services (required) Minimum five (5) years of IT/Information Security and Compliance experience (required) Proven experience in security operations, incident response, and team leadership. Strong understanding of MDR services, SIEM platforms, and endpoint detection technologies. Familiarity with frameworks such as NIST and MITRE ATT&CK Excellent analytical, communication, and problem-solving skills. Ability to thrive in a fast-paced environment and manage multiple priorities. Skills Expert knowledge of networking technologies and concepts Expert knowledge of security in a Windows environment (Active Directory, Azure AD, Windows Servers/Workstations) Strong knowledge of cloud-based security tools and controls (e.g. Azure, O365, AWS) Strong knowledge of server hardware, maintenance, procedures, and Change Control processes Strong knowledge of standards such as systems monitoring, and Intrusion Detection/Intrusion Prevention Systems (IDS/IPS) in a production environment Knowledge of compliance frameworks (NIST, ISO 27002, ISO 17799, CobiT, ITIL) Work Environment This position is designated as remote. Overnight travel required less than 15%
    $120k-140k yearly Auto-Apply 40d ago
  • Manager, Information Security

    Universal Technical Institute, Inc. 4.6company rating

    Phoenix, AZ jobs

    Overview Security Operations Manager leads our internal security operations team and oversee critical functions that protect our organization from cyber threats. This role is pivotal in ensuring operational excellence, managing vendor relationships, and driving continuous improvement in security posture. What We Offer:• $120,000 - $140,000• Weekends OFF• Paid Training• FREE UTI or Concorde Tuition for you AND your Immediate Family• Medical/Dental/Vision/Life Ins/STD & LTD Ins• 401K, Paid Holidays, Paid Time Off• Paid Parental Leave Responsibilities Principal Accountabilities & Deliverables * Team Leadership: Lead and mentor a small internal security operations team, fostering a culture of collaboration and continuous learning. * Managed Detection & Response (MDR): Oversee and manage the MDR vendor relationship, ensuring effective threat detection and response. * Incident Response: Direct and coordinate incident response activities, including investigations, containment, eradication, and recovery. * Metrics & Reporting: Define, track, and report on security operations metrics, including response time SLAs and operational KPIs. * On-Call Support: Participate in and support a 24/7/365 on-call rotation for critical security incidents. * Threat Intelligence: Integrate threat intelligence into operational processes to proactively identify and mitigate risks. * Process Improvement: Develop and maintain playbooks, workflows, and standard operating procedures for security operations. * Tool Management: Oversee security monitoring tools (SIEM, EDR, etc.), ensuring proper configuration, tuning, and optimization. * Compliance & Audit Support: Ensure adherence to regulatory requirements and assist with audits related to security operations. * Cross-Functional Collaboration: Work closely with IT, infrastructure, and application teams to ensure security is embedded across the organization. Qualifications Education / Experience * Bachelor's degree in computer science, or related field and seven (7) years' experience in hardware/software, network engineering, administration and customer service in complex multi-platform WAN environment or equivalent (required) * Minimum two (2) years of IT managerial experience including managing teams and processes responsible for network architecture and engineering, system and application support and desktop services (required) * Minimum five (5) years of IT/Information Security and Compliance experience (required) * Proven experience in security operations, incident response, and team leadership. * Strong understanding of MDR services, SIEM platforms, and endpoint detection technologies. * Familiarity with frameworks such as NIST and MITRE ATT&CK * Excellent analytical, communication, and problem-solving skills. * Ability to thrive in a fast-paced environment and manage multiple priorities. Skills * Expert knowledge of networking technologies and concepts * Expert knowledge of security in a Windows environment (Active Directory, Azure AD, Windows Servers/Workstations) * Strong knowledge of cloud-based security tools and controls (e.g. Azure, O365, AWS) * Strong knowledge of server hardware, maintenance, procedures, and Change Control processes * Strong knowledge of standards such as systems monitoring, and Intrusion Detection/Intrusion Prevention Systems (IDS/IPS) in a production environment * Knowledge of compliance frameworks (NIST, ISO 27002, ISO 17799, CobiT, ITIL) Work Environment * This position is designated as remote. * Overnight travel required less than 15% Responsibilities Principal Accountabilities & Deliverables - Team Leadership: Lead and mentor a small internal security operations team, fostering a culture of collaboration and continuous learning. - Managed Detection & Response (MDR): Oversee and manage the MDR vendor relationship, ensuring effective threat detection and response. - Incident Response: Direct and coordinate incident response activities, including investigations, containment, eradication, and recovery. - Metrics & Reporting: Define, track, and report on security operations metrics, including response time SLAs and operational KPIs. - On-Call Support: Participate in and support a 24/7/365 on-call rotation for critical security incidents. - Threat Intelligence: Integrate threat intelligence into operational processes to proactively identify and mitigate risks. - Process Improvement: Develop and maintain playbooks, workflows, and standard operating procedures for security operations. - Tool Management: Oversee security monitoring tools (SIEM, EDR, etc.), ensuring proper configuration, tuning, and optimization. - Compliance & Audit Support: Ensure adherence to regulatory requirements and assist with audits related to security operations. - Cross-Functional Collaboration: Work closely with IT, infrastructure, and application teams to ensure security is embedded across the organization.
    $103k-124k yearly est. Auto-Apply 40d ago
  • IT Security Engineer (Johns Hopkins Public Safety) - #Staff

    Johns Hopkins University 4.4company rating

    Baltimore, MD jobs

    Johns Hopkins Public Safety is seeking an **_IT Security Engineer_** who will be responsible for log management, host security, cloud security, asset discovery, vulnerability management, incident response, threat intelligence, Security Orchestration and Automated Response (SOAR), Network Access Control, network security and oversight of either a Managed Security Service Provider (MSSP) or Security Incident and Event Management (SIEM) tool. Candidates must have a good understanding of firewall technologies, including next-generation firewall capabilities and be able to implement in an evolving network. Experience with multiple Firewall vendors is helpful. This position will work with the network team to assist managing firewall security and implementation. The Engineer will be responsible for running penetration and vulnerability scans externally, internally, and producing reports and providing support in resolving those issues to the technical team responsible for the health of those systems. Experience with SaaS based SIEM technologies and the ability to coordinate with the enterprise IT team on security concerns leading and resolve any issue is required. Position will also write and deliver department security documentation and processes, review with peers, and be responsible for coordinating internal reviews, reviews with enterprise security team and participate in audits. **Job Scope/Complexity** Security efforts at Johns Hopkins Public Safety are complex due to our Academic and Healthcare missions and the complexity of supporting security projects. Incidents and projects are complex and varied in nature and also require the ability to balance the demands of multiple projects. **Specific Duties & Responsibilities** + The responsibilities below illustrate work performed by this position + . Not all duties assigned to this position are included, nor is it expected that everyone in this position will be assigned every job responsibility. _Security Monitoring_ + Respond to all user, system, and network security incidents. + Troubleshoot problems associated with security tools. + Stay abreast of emerging security threats, vulnerabilities, and controls. + Filter and analyze large datasets from security logging and telemetry sources and build tools to integrate data into operational controls. + Automate security controls, data, and processes to provide improved metrics and operational support. + Filter and analyze large datasets from security logging and telemetry sources and build tools to integrate data into operational controls - SIEM, Log Aggregation Tools. + Apply adept understanding and experience with systems automation platforms and technologies. + Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. + Working knowledge of either Cisco or Palo Alto firewall technologies. Familiarity with firewall rules and advanced threat protection capabilities in next-generation firewall technologies is a plus. _Host and Cloud Security_ + Design, implement and administer automated security update technologies for client and server systems. + Design, implement and administer advanced endpoint protection technologies. + Test and identify network and system vulnerabilities and work to address them with the appropriate owners. + Help shape the organization's security policies and standards for use in on-premises and cloud environments. + Create technical documents on the use of security technologies. + Apply system security engineering principles to deliver real world solutions to enhance our organization security posture. + Familiarity with network scanners such as Nessus, Tenable or Qualys and ability to interpret reporting and communicate remediation steps to others in the department. _Data Security and Compliance_ + Direct and influence multi-disciplinary teams in implementing and operating information security controls. + Provide subject matter expertise on information security architecture and systems engineering to other IT and business teams. + Interpret security and technical requirements into business requirements and communicate security risks to relevant stakeholders. + Familiarity with NIST, CJIS or CIS frameworks and understanding of how to implement one or more of these standards in a working environment. + Perform other related duties as requested. **Minimum Qualifications** + Bachelor's Degree. + Six years of related work experience with computer systems, applications and cybersecurity technologies. + Additional education may substitute for required experience and additional related experience may substitute for required education beyond a high school diploma/graduation equivalent, to the extent permitted by the JHU equivalency formula. **Preferred Qualifications** + Knowledge in the assigned technical areas this position is responsible for. + A CISSP certification is desirable. Classified Title: IT Security Engineer Role/Level/Range: ATP/04/PF Starting Salary Range: $85,500 - $149,800 Annually (Commensurate w/exp.) Employee group: Full Time Schedule: M-F 8 am - 4 pm FLSA Status: Exempt Location: Hybrid/Eastern High Campus Department name: VP for Public Safety Office of Personnel area: University Administration Equal Opportunity Employer All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $85.5k-149.8k yearly 53d ago
  • Cyber Security Analyst

    Washington Elementary School District 6 4.6company rating

    Phoenix, AZ jobs

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Summary: Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. High School diploma or equivalent (G.E.D.) prior to being hired; Valid Arizona Department of Transportation Driver's License; Minimum of one year of experience in information security, network security, or a related technology field. Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. Experience working in an educational or public sector environment. Knowledge of emerging security technologies and trends. Experience administering a Cisco Local and Wide area networking environment; Experience with border network security devices such as Email filters and Firewalls; Experience administering Windows Server and Active Directory. Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: Ability to work independently and collaboratively in a team environment. Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Familiarity with scripting languages like Python or PowerShell for automating security tasks. Knowledge of common security frameworks, such as NIST. Understanding of networking concepts, firewalls, and data encryption techniques. Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 49d ago
  • Cyber Security Analyst

    Washington Elementary School District 4.6company rating

    Phoenix, AZ jobs

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: * Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. * Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. * Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. * User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. * Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. * Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. * High School diploma or equivalent (G.E.D.) prior to being hired; * Valid Arizona Department of Transportation Driver's License; * Minimum of one year of experience in information security, network security, or a related technology field. * Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. * Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. * Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. * Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. * Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. * Experience working in an educational or public sector environment. * Knowledge of emerging security technologies and trends. * Experience administering a Cisco Local and Wide area networking environment; * Experience with border network security devices such as Email filters and Firewalls; * Experience administering Windows Server and Active Directory. * Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: * Ability to work independently and collaboratively in a team environment. * Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. * Familiarity with scripting languages like Python or PowerShell for automating security tasks. * Knowledge of common security frameworks, such as NIST. * Understanding of networking concepts, firewalls, and data encryption techniques. * Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. * Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. * Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 50d ago
  • Senior Cloud Security Engineer

    Ridgeline 4.1company rating

    San Ramon, CA jobs

    Senior Cloud Security Engineer (L3) Are you passionate about building secure, scalable systems in the cloud? Do you enjoy collaborating across teams to embed security at every stage of development? Are you excited to contribute your cloud security expertise to an environment that values innovation, collaboration, and continuous improvement? If so, we invite you to be a part of our innovative team. As a Senior Cloud Security Engineer at Ridgeline, you'll take the lead in securing key components of our platform and cloud infrastructure. You will work closely with Engineering, DevOps, Product, and Compliance to embed cloud security practices, enable secure-by-design development, and implement scalable, resilient security guardrails. Your contributions will help ensure our AWS environments and services are safe, compliant, and efficient. You'll also explore and apply emerging AI tools like GitHub Copilot and ChatGPT to enhance our workflows and capabilities in innovative ways. At Ridgeline, how we work matters as much as what we build. Ridgeliners act like owners, choose growth over comfort, and communicate with transparency. We assume positive intent, bias toward action, and bring solutions-not just problems. We celebrate wins, learn from setbacks, and thrive in a resilient, collaborative, high-performing culture. If this excites you, we'd love to meet you. You must be work authorized in the United States without the need for employer sponsorship. The impact you will have: Perform security and architecture reviews of AWS infrastructure and third-party cloud services Develop scalable security tooling and automation, incorporating AI-augmented platforms where applicable Design and maintain security guardrails such as SCPs, IAM boundaries, and policy-as-code Integrate detection and alerting into observability systems to enhance runtime security monitoring Embed security into CI/CD pipelines, infrastructure automation, and internal tooling Establish frameworks for secure integration with third-party services and internal platforms Improve identity and access management, encryption, and least-privilege controls Collaborate with engineering, product, and compliance teams to align on security requirements Provide support and technical guidance through code reviews, pairing, and consultation Encourage a collaborative, solutions-focused approach to securing services at scale What we look for: 5+ years of experience in cloud security or platform engineering Bachelor's degree in Computer Science or equivalent practical experience Proficiency in a high-level language such as Python (preferred), Kotlin, or TypeScript Hands-on experience with AWS services including IAM, VPC, ECS/EKS, Lambda, S3, and CloudWatch Expertise in designing and applying IAM and SCP policies Knowledge of cloud workload protection, monitoring, and threat detection in AWS Experience using Terraform and infrastructure-as-code practices Clear and effective communication skills, especially around security tradeoffs and technical design Demonstrated ability to lead projects, work independently, and contribute cross-functionally Bonus: Familiarity with network security principles such as traffic segmentation, firewalls, IDS/IPS Contributions to open source security tooling or research Experience applying AI or LLM tools in security or engineering workflows About Ridgeline Ridgeline is the industry cloud platform for investment management. It was founded by visionary tech entrepreneur Dave Duffield (co-founder of both PeopleSoft and Workday) to apply his successful formula of solving operational business challenges with bold innovation and human connectivity to the unique needs of the investment management industry. Ridgeline started with a clean sheet of paper and a deep bench of experts bound by a set of core values and motivated to revolutionize an industry underserved by its current tech offerings. We are building a new, modern platform in the public cloud, purpose-built for the investment management industry and we are prioritizing security, agility, and usability to empower business like never before. With a growing campus in Reno and offices in New York, Lake Tahoe, and the Bay Area, Ridgeline is proud to have built a fast-growing, people-first company that has been recognized by Fast Company as a “Best Workplace for Innovators,” by The Software Report as a “Top 100 Software Company,” and by Forbes as one of “America's Best Startup Employers.” Ridgeline is proud to be a community-minded, discrimination-free equal opportunity workplace. Ridgeline processes the information you submit in connection with your application in accordance with the Ridgeline Applicant Privacy Statement (************************************************************** Compensation and Benefits The cash compensation amount for this role is targeted at $145,000-$167,500. Final compensation amounts are determined by multiple factors, including candidate experience and expertise, and may vary from the amount listed above. As an employee at Ridgeline, you'll have many opportunities for advancement in your career and can make a true impact on the product. In addition to the base salary, 100% of Ridgeline employees can participate in our Company Stock Plan subject to the applicable Stock Option Agreement. We also offer rich benefits that reflect the kind of organization we want to be: one in which our employees feel valued and are inspired to bring their best selves to work. These include unlimited vacation, educational and wellness reimbursements, and $0 cost employee insurance plans. Please check out our Careers page for a more comprehensive overview of our perks and benefits. #LI-Hybrid
    $145k-167.5k yearly Auto-Apply 13d ago
  • Senior Analyst, Department of Safety, Security, and Emergency Preparedness

    Broward College 3.7company rating

    Fort Lauderdale, FL jobs

    Under limited supervision, this position assists in managing all fiscal activities related to the Department of Safety, Security, and Emergency Preparedness. Responsibilities include assisting the Support Services Division Captain with capital and operational financial tasks, including budgeting and accounting activities; processing requisitions, PO's, invoices and payment packages; specialized recordkeeping, database management and/or specified information gathering projects and tasks, compliance assurance, ad-hoc reporting, and a wide range of highly complex associated administrative, fiscal, and planning activities. Coordinates assigned activities with other departmental areas, departments, campuses and district offices. Performs related work as directed. Minimum Education: * Bachelor's degree in accounting, or other business- related fields. Master's degree preferred. Minimum Experience/Training: * Six years of relevant experience. * An equivalent combination of experience and education may be considered where applicable. Essential Functions: * Daily 35%: Oversee the review, compilation, and payment submittal of payment requests, coordinating with Managers and Administrative Staff to ensure accurate and timely approvals of payments. * Daily 20%: Monitors the recording of the DSSEP financials. Determines and communicates the appropriate procedures for budget and accounting record preparation, research of transactions, and reporting. Reconciles and resolves problems related to operational, capital, and special project accounts. * Bi-Weekly 10%: Manages all project job revenue and cost reports, working with the Support Services Captain, Project Managers and Accounting/Finance to properly utilize all actual and forecasted information to create, maintain and update effective project revenue and expense reporting for all stakeholders. * Bi-Weekly 10%: Analyzes trends in key performance indicators impacting fund balances across all funding sources including all areas of revenue and expenses. Provides variance analysis of actual results as compared to budget, highlights key points within budget cycle to assist with operational changes and action. * Daily 10%: Develops a comprehensive understanding of the business with the ability to proactively provide and analyze data before it's requested and gather agreement with all partners on relevant issues. Effectively able to communicate project cost information to operations and field leadership, as well as develop executive level reports and presentations. * Daily 5%: Understands operational processes that impact the integrity of the controls and procedures related to all financial and project costing systems. Works with DSSEP Senior Management and department leaders to fix inefficient processes and improve the strength of all financial and project reporting. * Annual 5%: Coordinates with the Support Services Division Captain and the DSSEP AVP in the preparation of monthly and annual department level budgets and forecasts, with a strong focus on operational expenditure tracking, capital projects cost estimates, and personnel and related expenses. Provides financial modeling and reporting for the presentation to the Board of Trustees. * Other, as Needed 5%: Creates ad-hoc analysis and assists in special projects, tasks and other duties as assigned. Knowledge, Skills and Abilities: * In-depth functional knowledge and expertise in area of specialization and general knowledge of related areas in the College * Ability to perform complex administrative analysis with only general supervision * Strong diagnostic, analytical and problem-solving skills * Excellent coordination and communication skills used appropriately to influence the decision-making of individuals and groups at all levels in the College * Ability to plan and manage own workflow, priorities and results accomplishment * Requires the ability to present and disseminate data to various levels * Requires advanced knowledge of computerized systems and multiple operating environments i.e. Microsoft Office Products and specialized computer systems. * Ability to interact and effectively communicate with employees and student population Our Culture: * At Broward College, our leaders embody a culture of competence, care, character, composure, and courage. We prioritize serving each other and our students through high-quality guidance, mutual respect, resilience, and fair, thoughtful decision-making, all while upholding the values of integrity, transparency, and honesty. Broward College offers an exceptional benefits package, including, but not limited to: * Affordable High Quality Healthcare Insurance (Medical, Dental & Vision) * Retirement Options - Florida Retirement System (FRS) Pension Plan or the FRS Investment Plan * Wellness Program * Vacation/Paid Time Off * Winter and Spring Break Off * Paid Parental Leave * Tuition Assistance and Tuition Reimbursement are available to employees and family members Job Title Senior Analyst, Department of Safety, Security, and Emergency Preparedness Position Number P0091989 Job Status Full time Regular Department Safety, Security and Emergency Preparedness Location Cypress Creek Administrative Center Pay Grade 715 Salary $52,900 - $62,158 Salary commensurate with education and experience. Work Shift Work Schedule Monday - Friday/Weekends/Varies Hours Per Week 40 Posting End Date Open Until Filled Comments To be considered for this position, a completed online employment application along with a resume is required. Designated Essential Personnel No FLSA Status Exempt Position Classification Professional Technical Staff (PTS) Special Instructions to Applicant: For positions requiring a degree, the official transcripts are required upon hire. An unofficial copy of the degree/transcript is acceptable during the application process and must be attached to the online application. If unable to attach the documentation, please email document to **************** or fax to ************, stating clearly the position name(s) and position number(s) the transcript is to be attached to. Foreign Transcript: Transcripts issued outside of the United States require a equivalency statement from a certified transcript evaluation service verifying the degree equivalency to that of an accredited institution within the USA. This report must be attached with the application and submitted by the application deadline. All required documentation must be received on or before the job posting end date. Please note that multiple documents can be uploaded in the "Resume/CV/Transcript/License/Certification" section of the application Please refer to link with the instructions on how to submit an application with multiple documents. *********************************************************************************** Employment is contingent upon successful completion of the required background screening process. Broward College uses E-Verify to check employee eligibility to work in the United States. You will be required to complete an I-9 Form and provide documentation of your identity for employment purposes. Broward College is an equal opportunity employer and strongly encourages applications from eligible veterans and spouses of veterans, underrepresented groups, including minorities, women, and persons with disabilities. The College does not discriminate on the basis of age, color, disability, gender identity, genetic information, national origin, race, religion, sexual orientation or any other legally protected classification. For inquiries regarding Title IX and the college's non-discrimination policies, contact the Vice President for Talent and Culture at ************, Broward College, 6400 NW 6th Way, Fort Lauderdale, FL 33309. Applicants needing a reasonable accommodation with the application process, please contact the Talent and Culture Department at ********************. Disclaimer The intent of this description is to illustrate the types of duties and responsibilities that will be required of positions given this title and should not be interpreted of describe all the specific duties and responsibilities that may be required in any particular position. Directly related education/experience beyond the minimum stated may be substituted where appropriate at the discretion of the Appointing Authority. Broward College reserves the right to revise or change job duties, job hours, and responsibilities.
    $52.9k-62.2k yearly Easy Apply 52d ago

Learn more about The Johns Hopkins University Applied Physics Laboratory jobs

Most common jobs at The Johns Hopkins University Applied Physics Laboratory

View all jobs