NAESOC/Industrial Security Analyst - Top Secret
Remote
NAESOC Analyst
Xcelerate Solutions is seeking a National Access Elsewhere Security Oversight Center (NAESOC) Analyst to support the Defense Counterintelligence and Security Agency's NAESOC in applying risk-based industrial security operations to protect the defense industrial base. In this role, you will be responsible for identifying risk to cleared facilities and supporting personnel in mitigating security threats, through coordination with industrial security representatives, continuous monitoring, and execution of research and analysis on cleared companies and key management personnel. Come join our award-winning organization and work with some of the most talented and brightest minds in the GovCon industry.
Location:
Hanover, MD/Hybrid
Security Clearance:
Secret or Top Secret (Preferred)
Responsibilities:
Apply knowledge of the NISPOM and DCSA data systems to support data analytics and threat identification and monitoring
Provide knowledge and expertise in identification of risk to cleared facilities and personnel
Support development of tailored risk mitigation strategies
Execute continuous monitoring to assess effectiveness of security programs at cleared facilities
Perform facility baselining and monitoring as part of a broader risk-based oversight model; to include research/analysis of business operations and key management personnel
Perform security violation processing as a result of reported and unreported security violations
Conduct outreach to targeted cleared facilities to support identification of risk and aid in enhancement of risk mitigation strategies
Minimum Requirements:
3+ years' experience with security-related data systems such as NISS (prior ISFD and eFCL) and DISS
1+ years' experience supporting or executing Facility Security Officer (FSO) duties
1+ years' experience with risk mitigation methodology
1+ years' experience developing risk mitigation strategies
3+ years' experience identifying risk to industrial security and responding to risk in executing the NISPOM
3+ years' experience planning, organizing, monitoring, and coordinating courses of action
3+ years' experience gathering metrics and analyzing data for trends and resource allocation
3+ years' experience reviewing and providing educational instruction on industrial security topics
About Xcelerate Solutions:Founded in 2009 and headquartered in McLean, VA, Xcelerate Solutions (*************************** is one of America's fastest-growing companies. Xcelerate's culture is defined by our diversified workforce of dynamic and versatile professionals, supported with growth and development opportunities that contribute to individual and company growth. This strong commitment to our employees has been recognized by our inclusion on the Washington Business Journal's “50 Best Places to Work” list as well as being a “Great Place to Work” certified company with a 4.6 star, and a 99% CEO approval Glassdoor rating. Come find out why Xcelerate Solutions is one of the DC Metro top employers!
Xcelerate Solutions is an Equal Employment Opportunity/Affirmative Action Employer. We evaluate qualified applicants without regard to race, color, national origin, religion, age, equal pay, disability, veteran status, sex, sexual orientation, gender identity, genetic information, or expression of another protected characteristic. As part of this commitment to the full inclusion of all qualified individuals, Xcelerate provides reasonable accommodations if needed because of an applicant's or an employee's disability.
Pay Transparency Notice: Xcelerate Solutions will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.
Auto-ApplyInformation Assurance (IA) Security Specialist (Contingent II Position)
Remote
Job Posting:
) (Open)
Department:
Technology Security, JM Non-Regular Fixed Term (Fixed Term) Responsible for providing security and risk analysis of engineering solutions, to include technical solution development, testing, implementation, and integration.
Responsibilities:
Performs technical security assessments of computing environments to
identify points of vulnerability, non-compliance with established IA
standards and regulations and recommends mitigation strategies.
Assists in the development, implementation, updating of security
policies and monitoring of IT security procedures; validates and verifies
system security requirement definitions and analysis.
Coordinates Enterprise Application Security with Functional Data
Stewards to ensure access verification and authorization requirements
are monitored and approved.
Maintains Enterprise Application Security Business processes and works
with Senior IA staff in workflow management of security and access
requests and approval.
Integrates IA, security systems and system components including those
for networking, computing, and enclave environments.
Ensures IA best practices are integrated into systems and operational
environments; assists in the identification and implementation of
appropriate information security functionality.
Interfaces with IT and non-IT personnel to resolve security related
issues; assesses and mitigates system security threats/risks throughout
the program life cycle.
Performs security, analyses and risk, vulnerability assessments; supports
the handling, reporting, recording, and resolution of campus-wide
security incidents.
Ensures security is embedded via processes and systems throughout the
university by working with various university departments; other duties
as assigned.
Minimum Qualifications:
Minimum two (2) years of experience in information security or other related
field.
Preferred Qualifications:
Bachelor's Degree in Information Technology, Information systems, or related
field preferred.
Conditions of Employment:
Potential on-call hours.
Potential remote work opportunities.
Non-Union Position.
Additional Job Information:
Bowie State University shall not discriminate against any individual on the basis of race, color, religion, age, ancestry or national origin, sex, sexual orientation, disability, marital status or veteran status. All policies, programs, and activities of Bowie State University are and shall be in conformity with all pertinent Federal and state laws of nondiscrimination including, but not limited to: Title VII of the Civil Rights Act of 1964, as amended, Title IX of the Education Amendments of 1972, the Equal Pay Act of 1963, the Age Discrimination Act, Sections 503 and 504 of the Rehabilitation Act of 1973, the Americans with Disabilities Act of 1990, Federal Executive Order No. 11375, and Article 49B of the Annotated Code of Maryland. This commitment applies in all areas and embraces faculty, staff, and students.
Equal opportunity of access to academic and related programs shall be extended to all persons. Bowie State University shall have as its firm objective equal opportunity in recruitment and hiring, rate of pay, all other promotions, training, retention and dismissals, for all employees and applicants for employment. The University will stress equal access for employees and applicants for employment to all programs and services provided by the University both on and off campus. The University will also provide equal opportunity and an atmosphere of nondiscrimination with respect to women and members of minority groups in all its operations. In addition, the University shall promote equal opportunity and equal treatment through a positive and continuing Affirmative Action Program.
The University makes, and will continue to make, reasonable accommodations to promote the employment of qualified individuals with disabilities and disabled veterans, unless such accommodations would impose an undue hardship on the University's business.
In addition, employees and applicants will not be subjected to harassment, intimidation, threats, coercion, or discrimination because they have engaged in, or may have engaged in, activities such as filing a complaint, assisting or participating in an investigation, compliance review or hearing, or opposing any act or practice made unlawful, or exercising any other right protected by Section 503 of the Rehabilitation Act of 1973, as amended or the Vietnam Era Veterans Readjustment Assistance Act of 1974, as amended.
Auto-ApplyCyber Security Engineer I
Westfield, WI jobs
Summary: The Cybersecurity Engineer configures and implements solutions to resolve technical and business issues related to endpoint security. The incumbent acts as a subject matter expert (SME) for one or more endpoint security platforms such as SIEM, hardening, EDR, and Vulnerability Management. A successful candidate will use strong technical analysis skills to study threat actor techniques, network with other researchers in the security community to share information about threats and develop new tools and detection capabilities to uncover threats in network traffic and endpoint systems. The job duties include strong research and analysis skills, including understanding of malware analysis, reverse-engineering, defense evasion techniques, and engineering of detection capabilities.
Essential Functions:
Maintain awareness of the latest critical information security vulnerabilities, threats, and exploits
Identify and address performance issues with SIEM and Log Management platforms
Perform care and tracking updates and maintenance of SIEM and Log Management tools
Assist with security incident and event response when needed.
Provide technical support and troubleshooting of SIEM and log architecture
Engineer security solutions to meet business and security requirements
Work with various IT teams to ensure secure configurations and engineering best practices
Analyzes penetration test results and engages with technology partners and business units to resolve identified vulnerabilities and identifies areas of improvement with existing processes, procedures, and documentation.
Responds immediately to security-related incidents. Perform investigative analysis of malicious artifacts, and provide thorough remedial solutions and analysis
Author, update, and maintain SOPs, playbooks, work instructions
Required Qualifications:
Bachelors' Degree and two years of Information Security experience or an Associate degree and four years of Information Security experience.
Security + or GSEC certification or similar certifications required or able to obtain within one year.
Preferred Qualifications:
Passion for cybersecurity.
Ability to work independently and function effectively as part of a team.
Experience working with SIEMs.
Ability to write scripts/code using Python, Perl, PowerShell, or an equivalent language.
Passion for learning about new information security related technologies, topics, hacker techniques, and overall security operations
Familiar with operation of both Windows and Linux based systems
Familiarity with Elastic Domain Specific Language (DSL) and/or Splunk Search Processing Language (SPL)
Advance knowledge and skills by attending training and conferences and sharing with other team members
Knowledge of kill-chain model, ATT&CK framework, and modern penetration testing techniques
Supervisory Responsibility: None
Work Environment: Office environment. Subject to extended periods of sitting, working on PC and talking on telephone. Possibility for remote work depends on candidate's skills.
Physical Demands: This position would be primarily sitting with little to no lifting or other physical demands.
Position Type: 1st Shift, Exempt, Potential on call.
Travel: Little to none except possibly for training.
Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
Successful completion of a pre-employment drug test and background check are required.
Brakebush provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. Applicants must have the legal authorization to work for any employer in the United States. We are currently unable to sponsor or assume sponsorship of employment visas.
Brakebush is committed to adhering to compliance and applicable pay transparency laws in all states where we operate and any other states where we have a legal obligation.
#LI-Hybrid
Chief Information Security Officer
Cedar Falls, IA jobs
If you are a current University of Northern Iowa employee and would like to apply for this position, login to UNI Works and type "Find Jobs" in the search bar to view and apply for open positions. Job Description: The Opportunity
UNI is seeking a Chief Information Security Officer (CISO) who wants to own and shape an ever evolving institutional information security program. The CISO provides institution-level leadership for this program, reports to the Chief Information Officer, and leads the information security office within the Information Technology (IT) department. This role is responsible for setting direction for information security, managing risk in a way that supports teaching, learning, research, and operations, and building a culture where security is understood as an enabler of the university mission. The CISO works closely with campus partners to balance security, usability, and budget in a regional comprehensive setting where collaboration is essential.
Key Responsibilities
The CISO will:
* Provide institution level leadership for UNI's information security and privacy program, including strategy, governance, and day to day operations of the information security office.
* Identify and assess information security, privacy, and technology risks and recommend and implement standards, control frameworks, and processes that support teaching, learning, research, and operations in a regional comprehensive university setting.
* Design and maintain a modern security architecture across networks, systems, applications, cloud services, and data platforms, aligned with university policies, Board of Regents expectations, and applicable regulatory and contractual requirements.
* Oversee identity and access management, including account lifecycle, multi factor authentication and authorization, privileged access, and related governance and controls.
* Lead incident monitoring, detection, investigation, and response, including post incident reviews that drive continuous improvement and realistic risk reduction. Significant incidents may occasionally require leadership and coordination outside standard business hours.
* Partner with IT units and campus leaders to embed security and privacy requirements into technology planning, solution design, procurement, and change management, including vendor and third-party technology risk, digital accessibility, and AI related initiatives.
* Develop and champion security awareness and education efforts for the university community and provide consulting support so departments and IT staff can implement secure, practical solutions.
* Lead, coach, and develop a collaborative, customer focused security team and build strong partnerships with IT units, colleges, divisions, and administrative offices.
* Participate in and help lead information security governance processes, manage designated budgets, recommend tools and services, and represent UNI with Regents partners, peer institutions, government entities, auditors, insurers, and relevant professional organizations.
About You
Required qualifications
* Bachelor's degree, preferably in information technology, computer science, information systems, cybersecurity, business, or a related field.
* At least seven years of progressive experience in information security, risk management, or closely related IT leadership roles, including experience leading or serving as a primary owner for one or more major components of an enterprise or institutional information security program.
* Demonstrated experience leading information security work that includes most of the following: security governance, risk assessment, incident response, identity and access management, vendor and third-party technology risk, security policy development, and security architecture or design.
* Strong interpersonal communication, relationship building, change leadership, and strategic planning skills.
* Experience working in a complex, decentralized organization and building strong relationships and influence across diverse stakeholders.
Preferred qualifications
* Master's degree in a related field.
* Professional security certifications such as CISSP, CISM, CRISC, or equivalent.
* Experience in higher education, public sector, or another complex non profit institution.
* Experience with cloud security, vendor and third-party risk management, and budget management.
* Experience partnering on or supporting technology aspects of digital accessibility and responsible AI use, or a clear interest in learning and leading in these areas.
* Experience with network and systems security architecture and analysis and familiarity with regulatory and compliance frameworks such as FERPA, GLBA, HIPAA, PCI DSS, CMMC, or similar standards.
Position Details:
Job Category: Professional and Scientific
Type of Position: Annual
Service Schedule: Calendar Year
This position is eligible for a hybrid schedule. Remote work must be performed within the state of Iowa. Employees who elect remote work must comply with the requirements of our remote work policy and agreement.
Application Instructions:
All application materials received by December 10, 2025, will be given full consideration. To apply for this position, please click on "Apply" and complete the Employment Application. The following materials must be attached when applying:
1) Resume
2) Cover Letter
You will be presented with the opportunity to attach multiple documents when completing the application. Before submitting your online job application, ensure that ALL required materials listed above have been uploaded. Once your job application has been submitted, you cannot make changes. If you have questions regarding this application process, please email *********************** or call ************.
Compensation:
$130,000 to Commensurate
Pay Grade: 124
Pay Basis: Salary
Iowa enjoys a lower cost of living than many other states. See how the Waterloo-Cedar Falls area compares by utilizing the cost of living calculator. Our overall compensation package is enhanced by excellent benefits for eligible non-temporary positions. To learn more about the vibrant Cedar Valley community, visit ***************************
If you would like general assistance with the application process or an accommodation due to a disability, please contact Human Resource Services at ********************** or call **************.
All offers of employment are contingent upon a background check that includes a review of conviction history. A conviction does not automatically preclude University employment. Rather, the University considers conviction information on a case-by-case basis and assesses the nature of the offense, the circumstances surrounding it, the proximity in time of the conviction, and its relevance to the position.
UNI is an Equal Opportunity/Affirmative Action employer. The University encourages applications from persons of color, women, individuals living with disabilities, and protected veterans. All qualified applicants will receive consideration for employment without regard to age, color, creed, disability, ethnicity, genetic information, marital status, national origin, political affiliation, pregnancy, race, religion, sex, sexual orientation, veteran or military status, or any other basis protected by federal and/or state law.
Campus Security & Crime Statistics, in compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, information on crime statistics for recent years, Public Safety personnel and programs, building access, reporting crimes, safety suggestions, and policies, programs, and services regarding alcohol, drugs, and sexual abuse, is available in the UNI Annual Security and Fire Report. A paper copy is available from the Department of Public Safety, 030 Gilchrist Hall, University of Northern Iowa, Cedar Falls, IA 50614. Department of Public Safety, 030 Gilchrist Hall, University of Northern Iowa, Cedar Falls, IA 50614.
Privacy Statement | Equal Opportunity and Non-Discrimination Statement | Federal EEO Rights | E-Verify | Policies and Procedures | Tobacco Free Campus
Auto-ApplyInformation Security Specialist: Governance & Compliance Engineer
Cincinnati, OH jobs
The Information Security Specialist works with the IT security team to ensure the security of court systems and serve as a security resource to courts within the Sixth Circuit for their governance and compliance program. The major responsibilities and duties include the following:
In coordination with the Circuit IT Security Officer (ITSO), respond to emergent threats, assist court units in the circuit, and track and report progress. Assist in identifying, prioritizing, and coordinating the protection of critical cyber infrastructure and key resources.
Provide guidance and assistance in implementing and maintaining business objectives (i.e. security scorecard, CIS controls, assessments, internal audit controls, security data calls).
Manage information security projects (or security-related aspects of other IT projects). Coordinate and lead IT staff and court users to identify, plan, and implement initiatives and projects. Prepare and present reports and training.
Develop and maintain a documentation template repository; modernize and maintain the circuit's data repository. Review and advise courts on documentation requirements.
Assist the Circuit ITSO in performing, analyzing, and archiving SWOT and other gap analyses to ensure compliance with required frameworks, controls, and assessment.
Manage CIS controls self-assessment too; provide guidance and assistance to courts on documentation, program management, etc.
Assist the Circuit ITSO in creating, tracking, and maintaining KPIs. Prepare scheduled data points and KPIs for use in reports to circuit-wide executives and other Judiciary stakeholders.
Research custom solutions for courts as needed.
Qualifications
Required: Four years of experience in information security systems. Experience with cybersecurity compliance programs. Strong communication and interpersonal skills; excellent customer service skills. Detailed, organized, and self-driven. Ability to work under pressure and within the constraints of conflicting deadlines. Proactive, problem-solving approach. Ability to respond effectively in critical situations. Ability to work independently and in a team environment. Ability to travel (25% - 50%).
Preferred: Bachelor's degree in computer science or related field. Related cybersecurity or IT project management certifications. Related experience in a court, government agency, or equivalent environment.
Total Rewards & Work/Life Balance
Compensation*: $87,791 - $142,732 (CL 29) (*Salary commensurate with qualifications)
Benefits: Employer subsidized health and life insurance plans. Dental and vision insurance plans. Flexible spending accounts for health care, dependent care, and commuter expenses. Eligibility for Public Service Loan Forgiveness Program and mass transit subsidies. On-site fitness center. Federal retirement entails a pension plan (FERS-FRAE) and employer-matching Thrift Savings Plan (similar to a 401K). Retirees may carry insurance plans into retirement while paying the same premiums as employees. Visit ********************************* to learn more about the Judiciary's competitive benefits.
Work/Life: Annual time off - 13 vacation days, 13 sick leave days, and 11 paid holidays. Vacation days increase to 20 days after three years and to 26 days after fifteen years. Hybrid telework schedule may be available.
Conditions of Employment
Travel for this position is required. The selected candidate is provisionally hired pending results of background investigation/check and fingerprinting. This position is subject to updated background investigations every five years. Applicants selected for an interview must complete the Optional Background Information section on the Judiciary's application. Employees are required to adhere to the
Judicial Code of Conduct for Judicial Employees
.
Electronic Fund Transfer for payroll direct deposit is required. Positions with the U.S. Courts are at-will, excepted service appointments, and may be terminated with or without cause by the Court. For citizenship requirements and additional information about careers in the Judiciary, visit ************************* The Court reserves the right to modify the conditions of this announcement, or to withdraw the announcement for any reason without notice.
How To Apply
Please submit a single PDF application packet, including (1) a cover letter addressing your qualifications and experience in relation to the job duties and how you learned of the position, (2) a current resume, to the Director of Human Resources via the Resume button on our online application system. Position is open until filled; preference given to applications received by January 5, 2026. Virtual interviews available.
The United States Court of Appeals for the Sixth Circuit is an equal opportunity employer. For a reasonable accommodation during the recruitment process, contact Human Resources at **************.
Chief Information Security Officer - Information Technology
Ashland, OH jobs
The Chief Information Security Officer ( CISO ) would report to the CITO and is responsible for engineering activities and systems that monitor, detect and alert on potential security threats and vulnerabilities. Also identifying, developing, testing, implementing, and maintaining security compliance, risk and vulnerability management for Ashland University students, staff, and faculty. This position is critical to providing daily support, troubleshooting, and resolution of the Ashland University cyber security infrastructure. Works closely with network engineering and technical operations staff as security threats and vulnerabilities are detected and coordinates the response to contain and mitigate threats or breaches. Leads and coordinates the network penetration process for network security operations and communicate event status to leadership.
Physical Demands
Office environment with some lifting and hauling of equipment up to 60 lbs. Typical work week: 8AM - 5PM, however, some weekend and evening work hours required; remote hybrid work is negotiable Cellphone availability during normal and after work hours required Valid Driver's License and ability to drive to remote campus locations and attend training as assigned.
Required Qualifications
Conduct periodic senior level needs analyses as directed Analyze patterns of non-compliance and take appropriate administrative or programmatic actions to minimize security risks and insider threats. Manage accounts, network rights, and access to systems and equipment. Analyze potential security violations to determine if the network environment has been breached, assess the impact, and preserve evidence. Support, monitor, test, implement, document, and troubleshoot hardware and software problems pertaining to the cyber security infrastructure. Analyze systems and network for potential security problems and recommend resolutions or remediate when necessary. Review access control lists on routers, firewalls, and other network devices. Lead and perform system audits to assess security related factors within the network. environment and recommend or implement improvements to security systems. Evaluate potential security risks and take appropriate corrective and recovery action. Monitor/Manage clients' endpoint security and SIEM . Design, implement, and conduct internal and third-party Security Test and Evaluations Serve as an information security resource on projects. Develop and lead formal and informal education and training for Ashland University Develop and utilize “Case Management” processes for incident and resolution tracking. The processes should also be used for historic recording of all anomalous or suspicious activity. Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary. Provides advanced technical expertise, consulting, and support to staff members with security tasks. Recommends appropriate actions to improve project security and designs new monitoring strategies for complex securing systems. Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management. Ensure changes are made using an approval process agreed to in advance.
Preferred Qualifications
Experience: Bachelor's degree in IT Security or closely related field from an accredited college or university with a minimum of three (3) years' experience in high-level technology computing or related technology areas, or a bachelor's degree and other relevant education and training from an accredited college or university with a minimum of five(5) years in high-level technology computing or related technology areas. Must possess professional security management certification such as a Certified Information Systems Security Professional ( CISSP ), Certified Information Security Manager ( CISM ), Certified Information Systems Auditor ( CISA ), or other similar credentials. Must demonstrate knowledge of common information security management frameworks such as ISO / IEC 27001 and ITIL , COBIT and NIST , and an understanding of relevant legal and regulatory requirements such as Payment Card Industry/Data Security. Experience with network, application, and security awareness security concepts, methodologies, processes, & tools. Experience with information risk assessment and mitigation concepts, methodologies, processes, and tools. Experience with forensics concepts, methodologies, processes, and tools. Skills: Expert knowledge of application, network, and system security vulnerabilities and exploits. Ability to adapt to a fast-moving IT landscape and keep pace with latest thinking and new security technologies Forms business partnerships that help drive the IT security strategy forward Can make decisions that are well informed and timely Must have organizational skills and can make sound decisions independently. Must possess excellent interpersonal, communications and collaborative skills and have experience working in a service capacity with direct customer interaction. Must be able to build team support as well as can work cooperatively with all levels of the university community.
Information Security Analyst 1, Digital Technology Solutions
Cincinnati, OH jobs
Current UC employees must apply internally via SuccessFactors Next Lives at the University of Cincinnati Founded in 1819, the University of Cincinnati ranks among the nation's best urban public research universities. Home to more than 53,600 students, 12,000 faculty and staff, and over 360,000 living alumni, UC, a Carnegie 1 institution, combines research prowess with a physical setting The New York Times has called "the most ambitious campus design program in the country." UC's momentum has never been stronger as the anchor of the Cincinnati Innovation District, the oldest cooperative education (co-op) program in the country with students earning $94 million annually through paid experiences, an academic health system, and as a member of the Big 12 Conference. The university contributes $10.6 billion in economic impact to the city and $22.7 billion to the state of Ohio. At UC, next is all of us. Learn more at uc.edu.
UC is a mission-driven organization where we are committed to student success and positively transforming the community through scholarship and service. We thrive on innovation, making an impact, and fostering an environment where staff and faculty are key contributors to UC's success.
Job Overview
Assist in performing procedures and provide technical solutions that serve to provide appropriate access to and protect systems from unauthorized users.
Essential Functions
* Participate in peer knowledge sharing groups.
* Communicate security concepts effectively, with guidance.
* Assist with development of technical documentation (designs, specifications, processes, workflows) and communications.
* Document individual progress on assigned deliverables.
* Participate in gathering of metrics for area of responsibility.
* Carry out procedures to ensure that support departmental and university operations in the information security area.
* Maintain familiarity with information security trends and best practices.
* Participate in internal information security projects and initiatives.
* Participate in preparation and maintenance of functional documentation for assigned tasks.
* Participate in the research, design, implementation, and support of systems supporting information security tools and services.
* Participate in the development, maintenance, and utilization of standard operating procedures.
* Participate in conducting risk and vulnerability assessments of information systems to identity vulnerabilities, risks, and protection needs.
* Participate in troubleshooting processes during and outside of normal business hours.
* Assist with mentoring non-security teams regarding risk management, information security controls, incident analysis, incident response, monitoring, and other operational tasks (tools, techniques, procedures) in support of technologies managed by the Office of Information Security (OIS).
* Assist with information security training and awareness programs.
* Perform related duties based on departmental need. This job description can be changed at any time.
Required Education
* Associate's Degree in Computer Science, Information Technology, Computer Engineering, or related field.
* Two (2) years of relevant work experience and/or other specialized training can be used in lieu of education requirement.
Required Experience
Possess working knowledge of commonly-used concepts, practices, and procedures and contributes through support, using established processes, methods, and systems.
Additional Qualifications Considered
This position will primarily work in the area of information security operations. The ideal candidate will have education or experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management, vulnerability management, privileged access management, password management, system/application administration for security related technologies, as well as departmental customer service via enterprise incident ticketing system and departmental mailboxes. CISSP, CISM, GISP, GSEC, SEC+ or similar information security certification(s) are ideal.
Physical Requirements/Work Environment
* Talking - Continuously
* Sitting - Continuously
* Hearing, listening - Continuously
* Repetitive hand motion (such as typing) - Continuously
* Bending - Seldom
* Climbing stairs/ladders - Seldom
* Crawling - Seldom
* Crouching - Seldom
* Kneeling, squatting - Seldom
* Lifting - over 50 pounds - Seldom
* Lifting - up to 20 pounds - Seldom
* Lifting - up to 50 pounds - Seldom
* Pulling, pushing - Seldom
* Reaching overhead - Seldom
* Standing - Seldom
* Stooping - Seldom
* Walking - Seldom
Compensation and Benefits
UC offers an exceptional benefits package designed to support your well-being, financial security, and work-life balance. (UC Benefits Link) Highlights include:
Comprehensive Tuition Remission
UC provides tuition remission for you and your eligible dependents, covering tuition costs for nearly all undergraduate and graduate programs offered by the university.
Robust Retirement Plans
As a UC employee, you won't contribute to Social Security (except Medicare). Instead, you'll choose between state pension plans (OPERS, STRS) or an Alternative Retirement Plan (ARP), with UC contributing 14-18% of your salary based on position.
Real Work-Life Balance
UC prioritizes work-life balance with a generous time-off policy, including:
Vacation and sick time
11 paid holidays and additional end-of-year paid time off (Winter Season Days)
6 weeks of paid parental leave for new parents
Additional Benefits Include:
* Competitive salary between $53,000 - $63,000 annually based on experience
* Comprehensive health coverage (medical, dental, vision, prescription)
* Flexible spending accounts & wellness programs
* Professional development & mentorship opportunities
To learn more about why UC is a great place to work, please visit our careers page at *******************************
UC is an E-Verify employer. If hired into this position, you will be required to provide satisfactory proof of employment eligibility by providing acceptable, original forms of identification for employment verification via the Federal I-9 employment verification process. A list of acceptable documents can be seen here: ***************************************************************
Important: To apply you must create a profile and submit a complete job application through the UC applicant portal. We are unable to consider "easy apply" applications submitted via other websites. For questions about the UC recruiting process or to request accommodations with the application, please contact Human Resources at ***********.
Equal Opportunity Employer. Building a workplace where all qualified applicants will receive consideration for employment, including Individuals with Disabilities and Protected Veterans.
REQ: 100400
SF:OMJ SF:RM SF:HEJ, SF:INS SF:HERC SF:DIV SF:LJN SF:IHE
Information Security Analyst 1, Digital Technology Solutions
Date: Dec 9, 2025
Location:
Cincinnati, OH, US
Facility: Main Campus
Information System Security Officer
Dayton, OH jobs
Secure Your Future with the University of Dayton Research Institute! The University of Dayton's Research Institute (UDRI) is seeking a highly motivated and experienced Information System Security Officer to join our dynamic Sensor & Software Systems division in Warner Robins, GA. This is an exceptional opportunity to be part of a renowned research institution committed to excellence, innovation, and community engagement.
The Information System Security Officer (ISSO) position is supporting the Air Force Rapid Sustainment Office (RSO). The RSO increases mission readiness by rapidly identifying, applying and scaling technology essential to the operation and sustainment of the U.S. Air Force. Success comes from our teamwork and mutual respect for each other's talents and unique perspectives.
This role supports the government cyber lead and provides cybersecurity support for advanced software-intensive technologies to include agile manufacturing, conditioned-based maintenance, augmented reality/virtual reality, cloud-based infrastructure and services, and robotics.
Responsibilities:
• Serve as cybersecurity technical advisor, consultant, and primary point of contact to the Program Manager, Information System Owner, and other stakeholders for the Information systems
• Assessing systems for vulnerabilities and providing corrective recommendations.
• Supporting government Cyber lead in performing RMF activities leading to system RMF acceptance IAW DoDI 8510.01, NIST 800-series special publications, USAF policy and instructions, and guidance as applicable on RSO IT systems in networked, standalone, and cloud configurations.
• Support, coordinate, and continuously monitor system security posture and ensure adverse events are formally handled and reported
• Developing, reviewing, and updating necessary documentation associated with achieving RMF accreditation of each system.
• Applying currently accepted methods for documenting the RMF status of each RSO system within the DoD environment.
• Security Technical Implementation Guides (STIGs) for all systems
• Managing projects in compliance with DoD and AF RMF policies including but not limited to the following:
o DoDI 8500.01 - Cybersecurity Risk Management Framework for DoD Information Technology.
o DoD 8570.01 M - Information Assurance Training, Certification, and Workforce Management.
o CNSSI 1253 - Security Categorization and Control Selection for National Security Systems.
o NIST 800-series Special Publications (SP).
o Computer Security, including SP 800-53 - Security Controls and Assessment Procedures for Federal Information Systems and Organizations and Air Force Instruction Series 17.
Cyberspace:
Accomplishing system categorization, security control selection, security control implementation, security control assessment, and security control monitoring, including, but not limited to, accomplishing the RMF steps as outlined in DoDI 8510.01 on a system-by-system basis
• Providing system performance reporting.
• Support System Administrator for multiple cloud projects and implementations.
• Supporting Interim Authority to Test (IATT)/ Authority to Operate (ATO) planning and execution.
Minimum Qualifications:
• Associates Degree in Cybersecurity, Computer Science, or related field
• 3+ years relevant cybersecurity experience
• Experience with the NIST RMF process
• Security Technical Implementation Guides (STIGs) application experience
• The applicant must meet DoD 8570.01-M IAT Level II or higher certification requirements on hire date (Security+ CE)
• Familiarity with the DOD Information Assurance Vulnerability Management program
• Effective verbal and written communication skills
• Ability to obtain a Secret level security clearance
• Due to the requirements of our research contracts with the U.S. federal government, candidates for this position must be a U.S. citizen
Preferred Qualifications:
While not everyone may possess all of the preferred qualifications, the ideal candidate will bring many of the following:
• 5+ years' DoD cybersecurity experience
• IAT Level III or IAM Level I Certification
• Bachelor's Degree in Cybersecurity, Computer Science, or related field
• Additive Manufacturing experience
• Systems Administration experience
• Experience with Secure Development Operations Systems, as either a user, developer, or system administrator
• Experience with submission of system security package to DoD for ATO, IATO, etc
• Active Secret level security clearance.
• Familiarity with Enterprise Mission Assurance Support Service (eMASS).
• Experience with approved government cloud services such as Microsoft Azure, Amazon Web Services, Google Cloud.
• Relevant cloud infrastructure and security certifications (i.e. Office365, SharePoint, Amazon AWS)
• Cloud Application experience
• Experience managing various project activities ensuring accurate task completion
Special Instructions to Applicants:
To apply please submit a cover letter addressing each minimum qualification and any applicable preferred qualifications that you meet.
Closing Statement:
Informed by its Catholic and Marianist mission, the University is committed to the principles of diversity, equity, and inclusion. Informed by this commitment, we seek to increase diversity, achieve equitable outcomes, and model inclusion across our campus community. As an Affirmative Action and Equal Opportunity Employer, we will not discriminate against minorities, women, protected veterans, individuals with disabilities, or on the basis of age, race, color, national origin, religion, sex, sexual orientation or gender identity.