The Cyber Information Assurance Analyst SME provides IT support services for the Marine Corps Logistics Base by independently conducting complex security analyses of classified and unclassified systems for compliance with security requirements. Performs Command Cyber Readiness Inspections, vulnerability evaluations, and utilizing various security technologies and tools to assess the security posture of intricate computer systems and networks. Responsibilities include conducting vulnerability and risk analyses, participation in penetration studies, and defining security requirements for a range of computing systems. Recommends solutions to enhance security, gathers technical information to align with organizational goals, and offers technical analysis and advice to client executive management on system improvements, focusing on areas like information systems architecture, networking, and communication protocols. This position is on-site in the Albany, GA area.
Chickasaw Nation Industries, Inc. serves as a holding company with multiple subsidiaries engaged in several lines of business (Technology, Infrastructure & Engineering, Health, Manufacturing, Public Safety, Consulting, and Transportation) for the federal government and commercial enterprises. A portion of our profits is used to support Chickasaw citizens. We are proud to support the economic development and long-term viability of the Chickasaw Nation and its people. CNI offers premium benefits eligible on the first day of hire to full time employees; (Medical - Dental - Vision), Company Life Insurance, Short-Term and Long-Term Disability Insurance, 401(K) Immediate Vesting, Professional Development Assistance, Legal Aid Assistance Program, Family Planning / Fertility Assistance, Personal Time Off, and Observance of Federal Holidays.
As a federal contractor, CNI is a drug-free workplace and adheres to the Federal Controlled Substance Act.
ESSENTIAL REQUIREMENTS
Secret Clearance is required and must be maintained for employment. Must be eligible for an IT-II upon assignment.
Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification.
IAM III and IAT II level certification is required.
Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
Seven (7) years IT experience
Five (5) years IA experience
Two (2) years of experience with DOD Vulnerability Management System
Command Cyber Readiness Inspection certification in at least one of the following areas:
Retina scan analysis o Operating Systems (Windows, Unix)
Boundary defense (network policy, router, firewall)
Internal defense (L2 switch, L3 switch)
DNS (policy, BIND/Windows)
HBSS (remote console, AV, ABM, PA, HIPS, ePO)
Traditional security (Common, Basic, NCV, SCV)
Wireless communications (BES, handhelds)
Strong analytical and problem solving skills for resolving security issues
Strong skills implementing and configuring networks and network components
Knowledge and understanding of DOD security regulations, DISA Security Technical Implementation Guides
Understanding of SCAP
Knowledge of and proficiency with: VULNERATOR; USCYBERCOM CTO Compliance Program; Wireless vulnerability assessment; Web Services (IIS, Apache, Proxy); Database (SQL Server, Oracle); Email Services (Exchange); Vulnerability Scans (NESSUS, SCCM); Knowledge of Phishing exercises; USB Detect; Physical Security.
Nice to have: DISA FSO certified CCRI Team Lead and have a certification in penetration testing, such as: Licensed Penetration Tester (LPT); Certified Expert Penetration Tester (CEPT); Certified Ethical Hacker (CEH); Global Information Assurance Certification Penetration Tester (GPEN); Familiarity with AUTOCHECKLIST Tool.
KEY DUTIES AND RESPONSIBILITIES
Essential Duties and responsibilities include the following. Other duties may be assigned.
Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements.
Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations.
Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks.
Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies.
Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers.
Recommends solutions to meet security requirements.
Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture.
Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves.
Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC. Competent to work at the highest level of all phases of information systems auditing.
EDUCATION AND EXPERIENCE
Seven (7) years of experience, or an equivalent combination of education/experience.
PHYSICAL DEMANDS
Work is primarily performed in an office environment. Regularly required to sit. Regularly required use hands to finger, handle, or feel, reach with hands and arms to handle objects and operate tools, computer, and/or controls. Required to speak and hear. Occasionally required to stand, walk and stoop, kneel, crouch, or crawl. Must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, depth perception, and ability to adjust focus. Exposed to general office noise with computers printers and light traffic.
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this job.
EOE including Disability/Vet
CNI offers a comprehensive benefits package that includes:
Medical
Dental
Vision
401(k)
Family Planning/Fertility Assistance
STD/LTD/Basic Life/AD&D
Legal-Aid Program
Employee Assistance Program (EAP)
Paid Time Off (PTO) - (11) Federal Holidays
Training and Development Opportunities
Your application submission will be considered for all potential employment opportunities with Chickasaw Nation Industries (CNI).
$48k-74k yearly est. Auto-Apply 9d ago
Looking for a job?
Let Zippia find it for you.
Security Engineer
State of Ohio 4.5
Columbus, OH jobs
Ohio is a Disability Inclusion State and strives to be a model employer of individuals with disabilities. The State of Ohio is committed to providing access and inclusion and reasonable accommodation in its services, activities, programs and employment opportunities in accordance with the Americans with Disabilities Act (ADA) and other applicable laws.
POSITION SUMMARY
The SecurityEngineer plays a critical role in safeguarding the Ohio Secretary of State's networks, systems, and data from cybersecurity threats and vulnerabilities. This position is responsible for implementing, administering, and continuously improving cyber defense technologies and security controls to protect enterprise technology assets and sensitive information.
Working on the Cyber Defense Team, the SecurityEngineer supports the detection, prevention, analysis, and response to cybersecurity incidents and contributes to the design and sustainment of a resilient cyber defense infrastructure.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Cyber Defense Systems Administration
• Administer specialized cyber defense systems and applications, including antivirus, intrusion detection and prevention systems (IDS/IPS), audit and remediation tools, and Virtual Private Network (VPN) devices.
• Perform installation, configuration, maintenance, backup, restoration, and testing of cyber defense platforms.
• Build, install, configure, and test dedicated cyber defense infrastructure and platforms.
• Administer test environments and evaluate applications, hardware, access controls, and configurations managed internally or by service providers.
Threat Detection, Prevention, and Optimization
• Coordinate with Cyber Defense Team analysts to manage and update security rules, signatures, and content blacklists for cyber defense tools.
• Create, edit, and manage network access control lists on firewalls, intrusion prevention systems, and related security devices.
• Identify potential conflicts or performance issues associated with cyber defense tools and perform tuning, testing, and optimization of sensors and signatures.
• Evaluate the impact of implementing and sustaining cyber defense technologies on enterprise systems and operations.
Incident Response and Technical Support
• Provide advanced technical support to enterprise-wide cyber defense personnel during cybersecurity incidents.
• Assist with troubleshooting, diagnosing, and resolving anomalies within cyber defense infrastructure.
• Apply incident handling methodologies to support containment, eradication, and recovery efforts.
Security Architecture and Risk Management
• Assist in assessing cybersecurity risks and recommending technical safeguards to mitigate vulnerabilities.
• Support the application of cybersecurity and privacy principles related to confidentiality, integrity, availability, authentication, and non-repudiation.
• Contribute to system, network, and operating system hardening efforts, including secure configuration, logging, segmentation, and least-privilege access.
Other Duties
• Perform related duties as assigned to support the mission and objectives of the Cyber Defense and Information Technology teams.
At the State of Ohio, we take care of the team that cares for Ohioans. We provide a variety of quality, competitive benefits to eligible full-time and part-time employees*. For a list of all the State of Ohio Benefits, visit our Total Rewards website! Our benefits package includes:
Medical Coverage
Free Dental, Vision and Basic Life Insurance premiums after completion of eligibility period
Paid time off, including vacation, personal, sick leave and 11 paid holidays per year
Childbirth, Adoption, and Foster Care leave
Education and Development Opportunities (Employee Development Funds, Public Service Loan Forgiveness, and more)
Public Retirement Systems (such as OPERS, STRS, SERS, and HPRS) & Optional Deferred Compensation (Ohio Deferred Compensation)
*Benefits eligibility is dependent on a number of factors. The Agency Contact listed above will be able to provide specific benefits information for this position.
SECURITYENGINEER
About Us:
As Ohio's Secretary of State, Frank LaRose is doing his part to deliver a thriving democracy and a prosperous economy for all Ohioans. In his role as the state's chief elections officer, he is working to ensure that Ohio's elections are both secure and accessible. And, as the first stop for new businesses in the Buckeye State, he is assisting entrepreneurs as they receive articles of incorporation for a new business.
MINIMUM QUALIFICATIONS
Education
• Required\: Associate or higher degree in computer science, information technology, cyber security, or related field
Certifications
• Required: One or more of the following (or equivalent) industry recognized certifications addressing system security, network infrastructure, access control, cryptography, assessments and audits, organizational security, information security, information systems, network security, information assurance, troubleshooting, and security operations\:
o ISC2 Certified Information Systems Security Professional (CISSP)
o ISC2 Certified Information Systems Auditor (CISA)
o SANS GIAC, GSEC, GCIH, GCIA, GPEN
o EC Council - Certified Ethical Hacker (CEH)
o CompTIA Security+
o Cisco Certified Network Associate (CCNA) - Security
• Preferred: System-specific administrative and/or security-related certifications in Microsoft, Cloud, SIEM, Vulnerability Scanning, and IDS/IPS devices.
Experience
• Required: A minimum of three years of experience in real-world security challenges including network security vulnerability, advanced network analysis, basic cyber analysis/operations, network traffic analysis, Intermediate cyber, and hunt
Knowledge, Skills & Abilities
Knowledge
• Cybersecurity principles related to confidentiality, integrity, availability, authentication, and non-repudiation.
• Cyber threats, vulnerabilities, and common attack vectors.
• Network security architecture, protocols, and methodologies (e.g., TCP/IP, DNS, DHCP, OSI model).
• Intrusion Detection and Prevention Systems (IDS/IPS), firewalls, and web filtering technologies.
• Risk management processes, including vulnerability assessment and mitigation strategies.
• Laws, regulations, policies, and ethical standards related to cybersecurity and privacy.
• Data backup, recovery, and continuity concepts.
Skills
• Strong technical skills in network security, operating systems, and cybersecurity tools.
• Proficiency in automation and scripting using languages such as Python, PowerShell, Kusto Query Language (KQL), Shell, or similar.
• Skill in tuning sensors, managing access controls, and securing network communications.
• Skill in protecting networks against malware using preventive and detective controls (e.g., NIPS, anti-malware, spam filtering, device restrictions).
• Skill in network traffic analysis using appropriate tools and methodologies.
Abilities
• Ability to troubleshoot and resolve complex cyber defense infrastructure issues.
• Ability to analyze security data and translate findings into actionable recommendations.
• Ability to work collaboratively with cybersecurity analysts, engineers, and leadership.
• Ability to manage multiple priorities and respond effectively during cybersecurity incidents.
• Ability to maintain accuracy, confidentiality, and professionalism when handling sensitive security information.
This position is Unclassified per ORC 124.11 (A) (30)
Background check and drug screening required prior to employment
$43k-62k yearly est. Auto-Apply 6d ago
Security Engineer
State of Ohio 4.5
Columbus, OH jobs
The SecurityEngineer plays a critical role in safeguarding the Ohio Secretary of State's networks, systems, and data from cybersecurity threats and vulnerabilities. This position is responsible for implementing, administering, and continuously improving cyber defense technologies and security controls to protect enterprise technology assets and sensitive information.
Working on the Cyber Defense Team, the SecurityEngineer supports the detection, prevention, analysis, and response to cybersecurity incidents and contributes to the design and sustainment of a resilient cyber defense infrastructure.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Cyber Defense Systems Administration
* Administer specialized cyber defense systems and applications, including antivirus, intrusion detection and prevention systems (IDS/IPS), audit and remediation tools, and Virtual Private Network (VPN) devices.
* Perform installation, configuration, maintenance, backup, restoration, and testing of cyber defense platforms.
* Build, install, configure, and test dedicated cyber defense infrastructure and platforms.
* Administer test environments and evaluate applications, hardware, access controls, and configurations managed internally or by service providers.
Threat Detection, Prevention, and Optimization
* Coordinate with Cyber Defense Team analysts to manage and update security rules, signatures, and content blacklists for cyber defense tools.
* Create, edit, and manage network access control lists on firewalls, intrusion prevention systems, and related security devices.
* Identify potential conflicts or performance issues associated with cyber defense tools and perform tuning, testing, and optimization of sensors and signatures.
* Evaluate the impact of implementing and sustaining cyber defense technologies on enterprise systems and operations.
Incident Response and Technical Support
* Provide advanced technical support to enterprise-wide cyber defense personnel during cybersecurity incidents.
* Assist with troubleshooting, diagnosing, and resolving anomalies within cyber defense infrastructure.
* Apply incident handling methodologies to support containment, eradication, and recovery efforts.
Security Architecture and Risk Management
* Assist in assessing cybersecurity risks and recommending technical safeguards to mitigate vulnerabilities.
* Support the application of cybersecurity and privacy principles related to confidentiality, integrity, availability, authentication, and non-repudiation.
* Contribute to system, network, and operating system hardening efforts, including secure configuration, logging, segmentation, and least-privilege access.
Other Duties
* Perform related duties as assigned to support the mission and objectives of the Cyber Defense and Information Technology teams.
MINIMUM QUALIFICATIONS
Education
* Required: Associate or higher degree in computer science, information technology, cyber security, or related field
Certifications
* Required: One or more of the following (or equivalent) industry recognized certifications addressing system security, network infrastructure, access control, cryptography, assessments and audits, organizational security, information security, information systems, network security, information assurance, troubleshooting, and security operations:
o ISC2 Certified Information Systems Security Professional (CISSP)
o ISC2 Certified Information Systems Auditor (CISA)
o SANS GIAC, GSEC, GCIH, GCIA, GPEN
o EC Council - Certified Ethical Hacker (CEH)
o CompTIA Security
o Cisco Certified Network Associate (CCNA) - Security
* Preferred: System-specific administrative and/or security-related certifications in Microsoft, Cloud, SIEM, Vulnerability Scanning, and IDS/IPS devices.
Experience
* Required: A minimum of three years of experience in real-world security challenges including network security vulnerability, advanced network analysis, basic cyber analysis/operations, network traffic analysis, Intermediate cyber, and hunt
Knowledge, Skills & Abilities
Knowledge
* Cybersecurity principles related to confidentiality, integrity, availability, authentication, and non-repudiation.
* Cyber threats, vulnerabilities, and common attack vectors.
* Network security architecture, protocols, and methodologies (e.g., TCP/IP, DNS, DHCP, OSI model).
* Intrusion Detection and Prevention Systems (IDS/IPS), firewalls, and web filtering technologies.
* Risk management processes, including vulnerability assessment and mitigation strategies.
* Laws, regulations, policies, and ethical standards related to cybersecurity and privacy.
* Data backup, recovery, and continuity concepts.
Skills
* Strong technical skills in network security, operating systems, and cybersecurity tools.
* Proficiency in automation and scripting using languages such as Python, PowerShell, Kusto Query Language (KQL), Shell, or similar.
* Skill in tuning sensors, managing access controls, and securing network communications.
* Skill in protecting networks against malware using preventive and detective controls (e.g., NIPS, anti-malware, spam filtering, device restrictions).
* Skill in network traffic analysis using appropriate tools and methodologies.
Abilities
* Ability to troubleshoot and resolve complex cyber defense infrastructure issues.
* Ability to analyze security data and translate findings into actionable recommendations.
* Ability to work collaboratively with cybersecurity analysts, engineers, and leadership.
* Ability to manage multiple priorities and respond effectively during cybersecurity incidents.
* Ability to maintain accuracy, confidentiality, and professionalism when handling sensitive security information.
$43k-62k yearly est. 5d ago
Security Engineer
Orange 4.4
Atlanta, GA jobs
Orange Business is here! About us
Join us at Orange Business! We are a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business.
Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
About the role
INTRO
Orange Cyber defense is seeking a highly motivated, customer-oriented, Mid-Level Network SecurityEngineer to join our team. The engineer will act as a subject matter expert for the customer's firewall/VPN/loadbalancer and other network related technologies
The Securityengineer will be part of AME security operations team under the Cyber Support Unit (dedicated to OCD related activities)
The Mid-Level SOC securityengineer is a supportive role for the SOC team leader and GOPS co-workers and remains heavily involved in service delivery tasks and activities. The role of the Mid-level SOC network securityengineer is among other things to be responsible to detect, prevent and resolve security threats to our Customers IT environments from network security perspective.
Reporting to the Country SOC Manager or Team lead in the respective countries and working closely with GOPS colleagues and customers to ensure the delivery of SOC services.
Main Accountabilities
• Creation of technically detailed reports on firewall block lists, device status, change management, hardware/software upgrades, and other areas
• Analyze and evaluate anomalous network and system activity
• Assist in troubleshooting and problem solving a wide variety of client network related issues
• Continuously work proactively to identify and make improvements to the Customers security posture and enhance the services accordingly by improving technology, processes, instructions, and guidelines.
• Follow up on improvements and technologies.
• Closely adhere to mandated business plans, results, annual goals and authorization rules. (SOPs) Main activities
The person will follow up delivery accordingly and make sure that the technical services and products/configurations deliver high quality and a continuous proactive work to enhance the Customers security posture.
Some of the responsibilities are:
• Provide recommendation and advice to other SOC members if needed.
• Continuously look for optimal ways of dealing with customer and services to deliver quality and value.
• Act in a professional manner and lead as a role model both with external and internal customers.
• Troubleshoot, diagnose and resolve network related technical incidents.
• Advise and recommend on security related managed services technologies.
• Implement specific network solutions to support server requirements to include load-balancing, VPN's, firewall contexts, Traffic Shaping, IP Security (IPSec), IP Encryption, and network address translation (NAT) where appropriate
• Build, configure and test new managed hardware/virtual devices.
• Co-ordinate the deployment of managed hardware/virtual devices with customers and internal stakeholders.
• Efficiently react to incidents, changes and problem handling with a professional and customer focused mindset.
• Constantly keep up to date about customers, technologies and processes.
• Understands the deliverables of the provided services for all customers.
• Can quickly and superiorly react when faced with unplanned situations.
• Possesses very good analytical abilities can find efficient strategies to solve challenges fast and efficient.
• Able to adhere to Key performance drivers: Overall solution efficiency for the teams, Solution rate, SLA breaches.
About you
Required Qualifications:
Minimum 5-7 years of experience in network security position giving support and/or performing installations of networking/security environments with proven working experience in networking security administration/support/configuration.
To include: Minimum of 3-5 years of experience with managing enterprise firewall and VPN solutions
Ability to communicate clearly in English, verbally and in writing at all levels.
Hold at least 1 current certificate in the following areas :
Cisco certified: CCNA (Security, Routing & Switching) or CCNP (Security, Routing & Switching)
Checkpoint, Palo Alto or Fortinet certified
Proven track record with any of the following, Cisco ASA, Fortinet, PaloAlto, Checkpoint, technologies.
F5 and Azure Certification is a plus
Experience using network troubleshooting tools such as Wireshark, Tcpdump, or NetFlow to analyze and optimize network traffic.
Solid experience in an IT service role, where you have been required to support and troubleshoot network security environments.
Ability to work as part of a team or independently with minimal supervision.
Be comfortable in collaborating with international customers and various internal, global teams.
Must have experience with change control policy and procedures
Business oriented mindset
Scripting knowledge is a plus
You bring a can-do attitude, tackle challenges head-on and challenge the status quo with new and innovative ideas.
What we offer
Ready to Grow with Orange?
We're looking for curious minds, passionate professionals, and change-makers who are ready to shape the digital future. If you want to be part of a company where your skills, contributions, and potential are celebrated - Orange Business is the place for you.
Join the Orange Business Team - Shape the Future with Us
At Orange Business, we're more than just a tech company - we're a global family driving innovation, embracing change, and co-creating a smarter, more connected world. When you join Orange, you step into a workplace that values your unique background, supports your ambitions, and empowers your personal and professional growth. At Orange Business we value being Caring, Bold and Responsible.
Global Opportunities Await
Collaborate with multinational teams and clients across the globe. Expand your international experience, build a diverse network, and be part of a company that spans cultures and continents.
Flexibility That Fits Your Life
We offer a hybrid work model that empowers you to find the right balance between work and your personal life. Your success starts with flexibility and trust.
Career Growth & Acceleration
From comprehensive training to continuous upskilling and reskilling programs, we invest in your growth at every stage.
Recognition & Rewards
Your contributions matter. Take part in our Employee Referral Program, earn recognition through our Awards Programs, and feel the impact of a company that celebrates excellence.
A Culture That Cares
Experience a workplace that prioritizes your well-being, fosters inclusion, and gives back through CSR initiatives and meaningful employee engagement events. We're proud to be GEEIS-certified (Gender Equality European & International Standard) and committed to creating an inclusive environment where all employees can thrive.
Award-Winning Employer
Orange Business is a proud recipient of the Cigna Silver Level Healthy Workforce Designation, recognizing our holistic approach to employee health and wellness.
Our Competitive Benefits Package Includes:
Comprehensive health coverage (medical, dental, vision) for you and your family
Financial protection: life, disability, AD&D, and business travel insurance
401(k) plan with company match
Pre-tax savings through HSA and FSA accounts
Employee assistance program, tuition reimbursement, and adoption support
Healthy living and wellness reimbursements
Group-rate insurance options: home, auto, pet, and more
Generous PTO and paid volunteer days
Legal assistance, critical illness, hospital indemnity, and ID theft protection plans
Only your skills matter Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neurotype, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
$68k-87k yearly est. Auto-Apply 21d ago
Security Engineer
Orange 4.4
Atlanta, GA jobs
Publication date : Jan 07, 2026, 12:00AM Orange Business is here! About us Join us at Orange Business! We are a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business.
Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
About the role
INTRO
Orange Cyber defenseis seeking a highly motivated, customer-oriented, Mid-Level Network SecurityEngineer to join our team. The engineer will act as a subject matter expert for the customer's firewall/VPN/loadbalancer and other network related technologies
The Securityengineer will be part of AME security operations team under the Cyber Support Unit (dedicated to OCD related activities)
The Mid-Level SOC securityengineer is a supportive role for the SOC team leader and GOPS co-workers and remains heavily involved in service delivery tasks and activities.The role of the Mid-level SOC network securityengineer is among other things to be responsibleto detect, prevent and resolve security threats to our Customers IT environments from network security perspective.
Reporting to the Country SOC Manager or Team lead in the respective countriesand working closely with GOPS colleagues and customers to ensure the delivery of SOC services.
Main Accountabilities
* Creation of technically detailed reports on firewall block lists, device status, change management, hardware/software upgrades, and other areas
* Analyze and evaluate anomalous network and system activity
* Assist in troubleshooting and problem solving a wide variety of client network related issues
* Continuously work proactively to identify and make improvements to the Customers security posture and enhance the services accordingly by improving technology, processes, instructions, and guidelines.
* Follow up on improvements and technologies.
* Closely adhere to mandated business plans, results, annual goals and authorization rules. (SOPs) Main activities
The person will follow up delivery accordingly and make sure that the technical services and products/configurations deliver high quality and a continuous proactive work to enhance the Customers security posture.
Some of the responsibilities are:
* Provide recommendation and advice to other SOC members if needed.
* Continuously look for optimal ways of dealing with customer and services to deliver quality and value.
* Act in a professional manner and lead as a role model both with external and internal customers.
* Troubleshoot, diagnose and resolve network related technical incidents.
* Advise and recommend on security related managed services technologies.
* Implement specific network solutions to support server requirements to include load-balancing, VPN's, firewall contexts, Traffic Shaping, IP Security (IPSec), IP Encryption, and network address translation (NAT) where appropriate
* Build, configure and test new managed hardware/virtual devices.
* Co-ordinate the deployment of managed hardware/virtual devices with customers and internal stakeholders.
* Efficiently react to incidents, changes and problem handling with a professional and customer focused mindset.
* Constantly keep up to date about customers, technologies and processes.
* Understands the deliverables of the provided services for all customers.
* Can quickly and superiorly react when faced with unplanned situations.
* Possesses very good analytical abilities can find efficient strategies to solve challenges fast and efficient.
* Able to adhere to Key performance drivers: Overall solution efficiency for the teams, Solution rate, SLA breaches.
About you
Required Qualifications:
Minimum 5-7 years of experience in network security position giving support and/or performing installations of networking/security environments with proven working experience in networking security administration/support/configuration.
To include:Minimum of 3-5 years of experience with managing enterprise firewall and VPN solutions
Ability to communicate clearly in English, verbally and in writing at all levels.
Hold at least 1 current certificate in the following areas :
Cisco certified: CCNA (Security, Routing & Switching) or CCNP (Security, Routing & Switching)
Checkpoint, Palo Alto or Fortinet certified
Proven track record with any of the following, Cisco ASA, Fortinet, PaloAlto, Checkpoint, technologies.
F5 and Azure Certification is a plus
Experience using network troubleshooting tools such as Wireshark, Tcpdump, or NetFlow to analyze and optimize network traffic.
Solid experience in an IT service role, where you have been required to support and troubleshoot network security environments.
Ability to work as part of a team or independently with minimal supervision.
Be comfortable in collaborating with international customers and various internal, global teams.
Must have experience with change control policy and procedures
Business oriented mindset
Scripting knowledge is a plus
You bring a can-do attitude, tackle challenges head-on and challenge the status quo with new and innovative ideas.
What we offer
Ready to Grow with Orange?
We're looking for curious minds, passionate professionals, and change-makers who are ready to shape the digital future. If you want to be part of a company where your skills, contributions, and potential are celebrated - Orange Business is the place for you.
Join the Orange Business Team - Shape the Future with Us
At Orange Business, we're more than just a tech company - we're a global family driving innovation, embracing change, and co-creating a smarter, more connected world. When you join Orange, you step into a workplace that values your unique background, supports your ambitions, and empowers your personal and professional growth. At Orange Business we value being Caring, Bold and Responsible.
Global Opportunities Await
Collaborate with multinational teams and clients across the globe. Expand your international experience, build a diverse network, and be part of a company that spans cultures and continents.
Flexibility That Fits Your Life
We offer a hybrid work model that empowers you to find the right balance between work and your personal life. Your success starts with flexibility and trust.
Career Growth & Acceleration
From comprehensive training to continuous upskilling and reskilling programs, we invest in your growth at every stage.
Recognition & Rewards
Your contributions matter. Take part in our Employee Referral Program, earn recognition through our Awards Programs, and feel the impact of a company that celebrates excellence.
A Culture That Cares
Experience a workplace that prioritizes your well-being, fosters inclusion, and gives back through CSR initiatives and meaningful employee engagement events. We're proud to be GEEIS-certified (Gender Equality European & International Standard) and committed to creating an inclusive environment where all employees can thrive.
Award-Winning Employer
Orange Business is a proud recipient of the Cigna Silver Level Healthy Workforce Designation, recognizing our holistic approach to employee health and wellness.
Our Competitive Benefits Package Includes:
* Comprehensive health coverage (medical, dental, vision) for you and your family
* Financial protection: life, disability, AD&D, and business travel insurance
* 401(k) plan with company match
* Pre-tax savings through HSA and FSA accounts
* Employee assistance program, tuition reimbursement, and adoption support
* Healthy living and wellness reimbursements
* Group-rate insurance options: home, auto, pet, and more
* Generous PTO and paid volunteer days
* Legal assistance, critical illness, hospital indemnity, and ID theft protection plans
Only your skills matter Regardless of your age, gender identity, race, ethnic origin, religion/belief, sexual orientation, marital status, neurotype, disability, veteran status or appearance, we encourage diversity within our teams because it is a strength for the collective and a vector of innovation. Orange Group is a disabled-friendly company and equal opportunity employer: don't hesitate to tell us about your specific needs.
Only your skills matter
Regardless of your age, gender, origin, religion, sexual orientation, neurodiversity, disability, or appearance, we actively encourage diversity within our teams, as it is both a collective strength and a driver of innovation. Orange is a disability-friendly company: please feel free to let us know about any specific needs you may have.
$68k-87k yearly est. 10d ago
ICAM and Cyber Security
Feditc 4.1
San Antonio, TX jobs
FEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services.
Overview of position:
FEDITC is seeking an ICAM and Cyber Security to work in the San Antonio TX Area.
Senior Identity & PKI Engineer to design, implement, and maintain enterprise-class identity, credential, and access management (ICAM) solutions. Deep expertise in directory services, PKI/PKE engineering, cryptographic key management, and privileged access solutions - with proven experience delivering secure, compliant, and forward-looking architectures in DoD environments.
A United States Citizenship and an active Secret DoD Security Clearance is required to be considered for this position.
This is an upcoming opportunity contingent on contract award.
Responsibilities
Engineer, design, update, and maintain Microsoft Active Directory Services (ADDS/ADLDS) and integrated secure DNS roles.
Ensure compliance with DISA STIGs, DoD ICAM Reference Design, and DoDI 8520.03.
Engineer solutions for identity automation, attribute aggregation, and policy-driven access control across cloud, SaaS, and enterprise systems.
Engineer and maintain implementation of DoD PKI and DHA PKI Internal Medium Assurance (IMA) infrastructures.
Provide technical documentation, engineering packages, and risk assessments for PKI modernization efforts.
Manage cryptographic key lifecycle processes, certificate validation suites, and cross-certifications.
Engineer and support Privileged Identity and Access Management (PIM/PAM) solutions, enforcing least privilege principles.
Expertise in DoD security directives, DISA STIGs, and DHA cybersecurity requirements.
Qualifications
Education:
A BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science OR
A BBA in the same technical fields is also acceptable, provided it is not pursued as a minor. The degree must include courses in applied and natural science, computing, engineering, and engineering technology.
Certifications:
Microsoft Certified: Azure Administrator Associate or Microsoft Certified: Windows Server Hybrid Administrator Associate OR
Microsoft Certified: Cyber Security Architect Expert or Microsoft Certified: Azure Solutions Architect Expert
Clearance:
Active Secret clearance is required.
Must be a United States Citizen and pass a background check.
Maintain applicable security clearance(s) at the level required by the client and/or applicable certification(s) as requested by FEDITC and/or required by FEDITC'S Client(s)/Customer(s)/Prime contractor(s).
FEDITC, LLC. is committed to fostering an inclusive workplace and provides equal employment opportunities (EEO) to all employees and applicants for employment. We do not employ AI tools in our decision-making processes. Regardless of race, color, religion, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran, FEDITC, LLC. ensures that all employment decisions are made in accordance with applicable federal, state, and local laws. Our commitment to non-discrimination in employment extends to every location in which our company operates.
$77k-107k yearly est. 18d ago
Cyber Security Analyst II - Alamo Regional Security Operations Center (ARSOC)
City of San Antonio 4.4
San Antonio, TX jobs
The City of San Antonio's mission is to deliver quality City services and commit to achieve San Antonio's vision of prosperity for our diverse, vibrant, and historic community. Our approximately 12,000 employees are critical in the delivery of quality services to the residents of the City of San Antonio. The commitment our employees demonstrate to their jobs and to the advancement of the City's goals is the key to our success in mission accomplishment.
The City of San Antonio has identified four core values - Teamwork, Professionalism, Integrity, and Innovation - to efficiently and effectively inspire, motivate, lead, develop and empower employees in order to serve the public economically, ethically, equitably, and continuously improve and promote the high performance of government.
To ensure commitment to these values and to further integrate them with our organizational mission and vision, it is imperative that we seek these behaviors in the people we hire.
Job Description
Under general direction, is responsible for leading the analysis and development of system security integration, testing, operations, and maintenance. Exercises functional supervision over assigned staff.
Work Location
Alamo Regional Security Operations Center (ARSOC) - 638 Davy Crockett, San Antonio, TX 78226
Work Schedule
7:45 a.m. - 4:30 p.m., Monday - Friday; includes shift work based on the business needs of the department
Essential Job Functions
Leads analysis and development of the integration, testing, operations, and maintenance of system security.
Leads assessments of systems and networks and identifies deviations.
Maintains access control and collection gaps.
Leads evaluations and analysis of IT projects, programs, and environments to determine compliance with published standards.
Prepares and executes system tests to evaluate optimization.
Forms, executes, and leads threat-hunting teams in response to cyber security events or an incident response.
Executes and manages a Security Awareness Training Program and provides data for reports.
Leads security "tiger team" in the prosecution of vectors, hackers, and various threats.
Assist superiors in the production of the Alamo Region Security Operation Center products.
Performs related duties and fulfills responsibilities as required.
Qualifications
Bachelor's degree from an accredited college or university.
Four (4) years of relevant technical, cyber security, and business work experience.
CompTIA Security+.
GIAC: GPEN or GWAPT.
Applicants for this position must pass a Criminal Justice Information Systems (CJIS) fingerprint-based background check and maintain CJIS eligibility. Due to CJIS requirements related to system access, the following will result in being disqualified for this position: Felony Convictions, Felony Deferred Adjudication, Class A & B Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor), and Family Violence Convictions.
Preferred Qualifications
Knowledge of CJIS, PCI and HIPAA GRC, SOC Operations.
Experience leading agile efforts.
Experience in coaching and mentoring team members.
Scrum Master, Agile Certifications.
Additional Information
For more information and to submit your application, visit the City of San Antonio's website at: ********************************************************************************
$59k-76k yearly est. 10h ago
Professional Services Security Architect
Tenable 4.3
Texas jobs
Who is Tenable?
Tenable is the Exposure Management company. 44,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. Our global employees support 65 percent of the Fortune 500, 45 percent of the Global 2000, and large government agencies. Come be part of our journey!
What makes Tenable such a great place to work?
Ask a member of our team and they'll answer, “Our people!” We work together to build and innovate best-in-class cybersecurity solutions for our customers; all while creating a culture of belonging, respect, and excellence where we can be our best selves. When you're part of our #OneTenable team, you can expect to partner with some of the most talented and passionate people in the industry, and have the support and resources you need to do work that truly matters. We deliver results that exceed expectations and we win together!
Your Role:
The Professional Services Security Architect is the premier technical and strategic authority within the Professional Services organization. This role is responsible for designing enterprise-scale security architectures and leading the delivery of complex Tenable One projects. As a PS leader, they bridge the gap between technical rigor and business growth, serving as a "Trusted Advisor" to C-suite clients while driving pre-sales activities and business development. Beyond client delivery, this role spearheads internal technical excellence by mentoring the delivery team and their involvement in the Professional Services Training Academy to ensure global consistency and quality.
Your Opportunity:
Pre-Sales Leadership: Partner with Sales and Services Account Management to validate technical discovery, perform needs analysis, and architect custom solutions for high-value enterprise accounts.
Scoping & Strategy: Validate the technical scope and effort of complex Statements of Work (SOWs), ensuring technical requirements align with the client's business objectives and Exposure Management maturity goals.
Revenue Growth: Identify further revenue opportunities during engagements by identifying gaps in the client's security ecosystem and recommending high-value service enhancements.
Executive Influence: Act as a subject matter expert (SME) to client leadership, translating complex security data into strategic risk-reduction roadmaps.
Enterprise Design: Spearhead the design and implementation of robust security architectures for Tenable One projects, ensuring seamless integration with ITSM, CMDB, SIEM, and Cloud environments.
Strategic Delivery: Lead large-scale, strategic project delivery teams from initiation to completion, ensuring all billable results exceed client expectations, while maintaining balanced theater-wide coverage across pre-sales validation and internal mentoring.
Governance & Standards: Develop and maintain standards, architectural governance, and design patterns for the global Professional Services team.
Escalation Management: Independently handle high-level technical and client escalations, coordinating between the delivery team, Technical Support, and Engineering.
Training Academy Contribution: Act as a primary technical stakeholder for the Professional Services Training Academy; contribute to the curriculum, oversee the technical accuracy of training modules, and ensure the program reflects current field requirements.
Mentorship & Subject Matter Expertise: Serve as a technical mentor and "shadow-er" for P2-P4 consultants, providing the high-level guidance necessary for their progression through the Training Academy.
Technical Onboarding: Participate in the technical vetting and onboarding of new consultants and Sub-K partners, ensuring they meet the high standards of Tenable's architectural delivery.
Quality Assurance & Feedback: Conduct rigorous QA reviews of client deliverables, using these as "teachable moments" to improve the collective skillset of the delivery team.
Service Evolution: Collaborate with PS Portfolio and Domain Specialists to create new delivery methodologies, tools, and technical documentation.
Industry Expertise: Stay at the forefront of trends in Cloud Security (CSPM/CIEM), Active Directory, and OT/SCADA to ensure Tenable offerings remain market-leading.
Process Optimization: Research and implement automation (Python/PowerShell) to enhance the maturity and efficiency of Exposure Management programs.
What You'll Need:
12+ years of experience in the Information Technology and Cybersecurity fields, with a proven track record in professional services and consulting.
Bachelor's degree in a technical field (e.g., IT, Computer Science) or equivalent professional experience.
Certifications: CISSP, CISM, or CISA required. OSCP or equivalent technical certifications are highly preferred.
Expert-level proficiency in Exposure Management principles, including architectural design, attack path analysis, and risk prioritization across modern, hybrid-enterprise attack surfaces.
Experience defining and implementing exposure management programs, processes, and procedures.
Recent in-depth experience performing vulnerability scans, configuration audits, and security monitoring using core Tenable products or other industry-leading solutions.
Proficiency in identifying threats related to vulnerabilities and weaknesses in host or network configurations.
Deep experience in security architecture for hybrid-cloud infrastructure (AWS, Azure, GCP), including CSPM, CIEM, IaC, containerization, and associated risks.
Strong technical foundation in Linux/Unix and Windows administration, Microsoft Active Directory environments, virtualization, and system configuration.
Deep understanding of networking, wireless LAN protocols (WLAN), and common control systems such as firewalls, ACLs, and IDS/IPS.
Knowledge of scripting (Python/PowerShell) for API-driven automation to support security workflows.
Comprehensive understanding of Auditing and Configuration frameworks such as ISO 17799, CIS, PCI, GLBA, and HIPAA.
Broad knowledge of cybersecurity principles, including defense-in-depth, least-privilege, data protection, and common security controls.
Understanding of OWASP and common web application vulnerabilities, including security within CI/CD processes.
Familiarity with SCADA and OT systems is a plus for managing exposure in industrial environments.
Extensive knowledge of integrating security platforms with Patch Management, IPAM, ITSM, CMDB, and SIEM solutions to build a cohesive security ecosystem strategy.
Ability to advise and assist in developing effective security strategies through platform integration.
Elite written and verbal communication skills; must be comfortable leading 3+ hour technical workshops, executive presentations, and calls while ensuring all tasks and topics are addressed.
Proven consulting abilities with a focus on client management, requirements gathering, and delivering consultative advice to ensure successful outcomes.
Strong analytical and troubleshooting skills, with the ability to diagnose and resolve complex security issues.
Ability to work remotely in a self-directed manner.
Ability to sit and work at a computer for extended periods.
Physically able to participate in training sessions, presentations and meetings.
Client-facing travel may be required.
Some Tenable office travel may be required.
Applicants must be authorized to work for any employer in the U.S. We are unable to provide sponsorship for work visas of any kind at the time of hire, or at any point during employment.
#LI-Remote
#LI-MM1
This is the base pay range for this position. Compensation for the role will depend on a number of factors, including the candidate's qualifications, skills, competencies, location and experience, and may fall outside of the range shown. Employees are also eligible for variable compensation in addition to base pay (commission for sales roles, bonus for non-sales roles), depending on company and individual performance. Tenable also offers a variety of comprehensive and competitive benefits which include: medical, dental, vision, disability and life insurance; 401(k) retirement savings with company match; an employee stock purchase plan; an employee referral program; flexible spending accounts; an Employee Assistance Program (EAP); education assistance; parental leave; paid time off (PTO); company-paid holidays; health and wellness events; and community programs.
US Pay Range
$145,000 - $193,666.67 USD
We're committed to promoting Equal Employment Opportunity (EEO) at Tenable - through all equal employment opportunity laws and regulations at the international, federal, state and local levels. If you need a reasonable accommodation due to a disability during the application or recruiting process, please contact
**********************
for further assistance.
Tenable Data Consent Statement
Tenable is committed to protecting the privacy and security of your personal data. This Notice describes how we collect and use your personal data during and after your working relationship with us, in accordance with the General Data Protection Regulation (“GDPR”). Please click here to review.
For California Residents: The California Consumer Privacy Act (CCPA) requires that Tenable advise you of certain rights related to the collection of your private information. Please click here to review.
$145k-193.7k yearly Auto-Apply 7d ago
Data Security & Governance Analyst
City of Savannah (Ga 3.8
Savannah, GA jobs
The City of Savannah is seeking a highly skilled and forward-thinking Data Security and Governance Analyst to serve as a key architect of the City's data protection, compliance, and governance framework. This role is critical to safeguarding City data assets while enabling secure, compliant, and responsible use of emerging technologies.
The new Data Security and Governance Analyst will be a data security and management expert who will lead the implementation, configuration, and operational management of a governing solution such as Microsoft Purview, with a strong focus on establishing data access policies and safeguards to ensure secure and compliant use of AI-powered tools and other data archival technologies across the organization. This position will play a vital role in advancing the organizations cybersecurity efforts by implementing and managing policies, procedures and controls to protect data confidentiality, identity and availability and to ensure that security policies align with organizational goals to provide the ability for accurate data-driven decisions.
The ideal candidate will have deep expertise in Microsoft 365 compliance tools, data loss prevention (DLP), information protection, and role-based access control (RBAC). This role is critical to protecting City data as well as the vast digital City archives.
We offer great pay, excellent benefits to include medical, dental, and vision plans, life insurance,employee/spouse/child supplemental life insurance, short-term disability, tuition reimbursement,wellness programs, deferred compensation plan (457 B), pension plan, flexible spending account,home purchase assistance and 12 paid holidays!
Women, Minorities, and Veterans Are Encouraged to Apply
* Design and implement Microsoft Purview Information Protection policies to classify and label data (e.g., Public, Confidential, Restricted).
* Establish and maintain sensitivity labels, retention policies, and ata classification schemas for Copilot and broader M365 usage.
* Define Copilot guardrails, ensuring that AI-generated content does not expose unauthorized data.
* Monitor data access patterns and manage data access controls.
* Investigate anomalies using tools such as Purview Audit and Microsoft Defender for Cloud Apps.
* Implement Data Loss Prevention (DLP) policies to prevent oversharing of sensitive information internally and externally.
* Manage compliance portals, configure Microsoft Purview roles and permissions, and coordinate with security teams for ongoing audits.
* Provide documentation, training, and support to ensure department-wide adoption of best practices for AI governance.
* Stay current with Microsoft Purview roadmap and evolving features related to AI and data security.
* Identifies, assesses and mitigates risks relate to data security and governance and works with ITS Security Team to access and remediate potential data breaches and unauthorized access.
* Implement processes and controls to ensure data accuracy, completeness and consistency.
* Collaborates with stakeholders throughout the CoS to ensure effective data governance practices and enforcement
* Performs other related duties and responsibilities as required.
Bachelor's degree from an accredited college or university and/or four (5) years of professional Data Security and Governance experience; or any equivalent combination of education, training and experience provides the requisite knowledge, skills and abilities.
* 3-5 years of experience administering Microsoft 365 compliance and security tools.
* Proven experience with Microsoft Purview, Information Protection, and Data Loss Prevention.
* Familiarity with Microsoft Copilot, its data architecture, and how it interfaces with M365 workloads.
* Strong understanding of data governance frameworks, zero-trust security, and least-privilege access models.
* Experience with NIST, CJIS, and HIPAA data compliance standards.
* Knowledge of relevant regulations and industry standards.
* Strong understanding of data security and governance principles and practices.
* Good interpersonal skills with department office staff.
* Work management skills related to managing fast-paced working environments
PREFERRED QUALIFICATIONS:
* Microsoft Certified: Information Protection and Compliance Administrator Associate (SC-400)
* Microsoft Certified: Cybersecurity Architect Expert
* Experience with technology projects
* Demonstrably high standards in a fast-paced work environment
* Able to work with an appropriate sense of urgency
* Understanding the concepts of the PMI model for project management
Work Location: 1000 Business Center Drive, Suite 120 Work Hours: 8 am - 5 pm, Monday - Friday
Background investigation, including supervised drug screen, post offer/pre-employment medical screen; and verification of education, certifications, and licenses required prior to employment
* Excellent verbal and written communication skills
* Consistently strive to demonstrate the IT Values within various City departments.
* Strong understanding of Cybersecurity and data management principles.
$56k-71k yearly est. 33d ago
CO - P4267 - Information Security Analyst
DEQ
Richmond, VA jobs
To leverage knowledge and expertise in security to proactively identify and mitigate potential threats, vulnerabilities, and risks within the agency's digital infrastructure. The mission is to uphold the confidentiality, integrity, and availability of critical data, thereby contributing to the resilience and trustworthiness of the agency's ecosystem.
Responsibilities
The Information Security Analyst will:
Perform vulnerability identification, analysis, and remediation through the collaboration with internal stakeholders across the agency, network, and application infrastructure
Performs application security testing using automated tools and manual validation
Coordinates and oversees third-party application security testing, reviews results, and assists with developing remediation strategies
Evaluates, implements, and supports information security tools (OS, network, application)
Assists with the development of policies, standards, guidelines, and procedures. Identifies areas of improvement for the information security program
Qualifications
Demonstrated ability to understand and advise on network security architecture concepts, including protocols, components, and principles (e.g., application of Defense-in-Depth).
Demonstrated ability to understand and advise information security requirements for projects, become familiar with common security weaknesses and defense strategies for new technologies, and coordinate testing with third-party vendors
Demonstrated Knowledge of Ethernet Networking fundamentals, LAN\WAN technologies, network hardware and protocols, OSI stack, TCP/IP, wireless networks, secure communications methods, firewalls, IPS/IDS, privilege account management solutions, SIEM, WebFilters, Packet Capture Software, Forensic and Discovery Tools.
Effective verbal and written communication skills, both with cybersecurity and industry experts, and nontechnical employees who need to follow security protocols but may not understand them on a technical level.
Ability to effectively multi-task, work independently with minimal supervision, as well as within a team, in a fast-paced support environment
Comprehensive understanding of multi-tier application architectures (3-tier, 4-tier etc.) as it relates to IT Security is required.
Knowledge of securing operating systems, networking equipment, and applications
Knowledge of Incident Response Plans.
Familiarity with COV ITRM policies, standards, and guidelines
Minimum: Application security testing experience including the use of automated security testing and manual validation techniques involving applications coded in one or more of the following languages: C#, Java, Java Script
A combination of training, experience or coursework in Information Technology, Information Systems, a related field, or equivalent training and/or experience. Security +, PenTest +, CEH, GIAC, GPEN, GCIH, or other industry security certification.
Must complete an annual Statement of Economic Interest and Virginia State and Local Conflict of Interest Act Training (bi-annually).
$84k-119k yearly est. Auto-Apply 2d ago
Information Systems Security Analyst - SCSTC
Technology, Automation, and Management 3.6
Dahlgren, VA jobs
IS PENDING CONTRACT AWARD
Mission Objectives
The Information Systems Security Analyst advances the cybersecurity posture, compliance, and Authorization to Operate (ATO) status of complex DoD information systems within a dynamic mission environment. This position serves as a key technical lead for Risk Management Framework (RMF) Assessment & Authorization and enterprise cyber defense operations, ensuring all DoD networks, systems, and data are consistently protected in accordance with federal regulations and best practices.
Position Responsibility Summary
RMF Assessment & Authorization (A&A):
Advise and assist the ISSM/ISSO in executing all phases of the RMF process for command systems.
Develop Security Assessment Plans (SAP), conduct security categorization reviews, and maintain/update RMF artifacts (e.g., System Security Plans, Security Assessment Reports, Plan of Action & Milestones [POA&Ms], Risk Acceptance Recommendation Reports, Residual Risk Statements).
Prepare comprehensive Security Authorization Packages for Authorizing Officials.
Conduct security control assessments, vulnerability analyses, remediation reporting, and maintain accurate tracking of status and documentation.
Continuous Monitoring, Vulnerability & Compliance:
Execute recurring inspections, technical reviews, and audits of system/network controls.
Ensure compliance with DoD RMF, NIST SP 800-53, NIST SP 800-171, DISA STIGs, and DFARS ************.
Review, document, and enhance IA protective and corrective measures; maintain vulnerability remediation and asset management (VRAM) records.
Support and track site visits, inspections, system accreditations, and implement corrective actions based on network scan analysis.
Incident Response, Reporting, & Escalation:
Monitor network/system activity and logs for threats and anomalies.
Lead or support incident response: containment, remediation, analysis, and reporting/escalation to appropriate authorities.
Ensure reporting of cyber incidents and support compliance with DoD notification and investigative protocols.
Security Integration & Design:
Embed securityengineering principles into all network, system, and application design and configuration changes.
Provide technical recommendations for system hardening and mitigation of emerging threats.
Contribute to secure acquisitions, IT supply chain risk management, and assessments of new or emerging technologies for security impact.
Program Documentation & Communication:
Prepare and maintain technical documentation, status reports, executive briefings, and CDRL deliverables (SAP, SAR, POA&M, etc.).
Participate in cybersecurity meetings, provide technical consultation to leadership, and prepare minutes/trip reports when required.
Functional & Mission Support:
Translate business and operational requirements into actionable cybersecurity solutions.
Promote continuous process improvement, develop SOPs, and ensure security architecture aligns with mission objectives.
$76k-109k yearly est. 41d ago
Information Security Officer
State of Virginia 3.4
Richmond, VA jobs
Title: Information Security Officer State Role Title: Information Security Admin Hiring Range: Commensurate with Experience, Up to $120,000 Pay Band: UG
Recruitment Type: General Public - G
Job Duties
* Lead the development and implementation of information security policies, standards, and procedures for the Commonwealth
* Oversee security risk assessments, vulnerability management, and incident response activities
* Develop and manage the information security budget and resource allocation
* Coordinate with agency leadership to align security initiatives with organizational objectives
* Ensure compliance with relevant standards including NIST, FISMA, and VA-specific security requirements
* Provide security guidance and expertise to IT projects across state agencies
* Lead security awareness training programs for state employees
* Collaborate with federal, state, and local partners on cybersecurity initiatives
* Manage security operations including monitoring, detection, and response
* Report security metrics and program status to executive leadership
Minimum Qualifications
* Minimum 7 years of experience in information security, with at least 3 years in a leadership role
* Thorough knowledge of cybersecurity frameworks, standards, and best practices
* Experience implementing and managing enterprise security solutions
* Demonstrated ability to communicate complex security concepts to technical and non-technical audiences
* Knowledge of federal and state regulations related to information security
* Experience with security incident response and management
Additional Considerations
Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field
Special Instructions
Kindly utilize the Virginia Jobs website (****************************** to submit your application. Applications sent to the Recruitment email address will not be reviewed for the hiring process. We do not entertain phone calls or emails inquiring about application status; instead, please login to the PageUp/RMS system for updates on your application's status.
Contact Information
Name: OAG Recruitment
Phone: ************
Email: ***************************
In support of the Commonwealth's commitment to inclusion, we are encouraging individuals with disabilities to apply through the Commonwealth Alternative Hiring Process. To be considered for this opportunity, applicants will need to provide their AHP Letter (formerly COD) provided by the Department for Aging & Rehabilitative Services (DARS), or the Department for the Blind & Vision Impaired (DBVI). Service-Connected Veterans are encouraged to answer Veteran status questions and submit their disability documentation, if applicable, to DARS/DBVI to get their AHP Letter. Requesting an AHP Letter can be found at AHP Letter or by calling DARS at ************.
Note: Applicants who received a Certificate of Disability from DARS or DBVI dated between April 1, 2022- February 29, 2024, can still use that COD as applicable documentation for the Alternative Hiring Process.
$120k yearly Easy Apply 13d ago
Information Security Officer
State of Virginia 3.4
Richmond, VA jobs
Title: Information Security Officer State Role Title: Non-Classified Recruitment Type: General Public - G The Virginia State Bar (VSB), an agency of the Supreme Court of Virginia, is seeking an Information Security Officer (ISO) to serve as the lead for information security and privacy-by-design. This role combines governance, risk, and compliance functions with hands-on cloud securityengineering in a Microsoft-centric environment. The ISO will collaborate with VITA/Commonwealth of Virginia, the Supreme Court of Virginia, the VSB IT team, department leaders, and external partners to establish security policy in alignment with Commonwealth of Virginia standards; architect guardrails; monitor controls; and lead incident response. Key responsibilities include identifying and implementing comprehensive security measures; proactively assessing security risks; monitoring and notifying management of emerging threats; recommending security enhancements; educating users about security best practices; enforcing policy; developing incident response and recovery plans; and responding to security incidents. This position has a dotted-line relationship with the Executive Director and will integrate information security into all business processes and decision making. The ISO reports to the Director of Information Technology and will assist with other technical tasks and projects as assigned. The VSB operates an in-house IT team of five that directly supports 90 employees and indirectly serves Virginia's 50,000+ lawyers and the public with the reliable operation of digital platforms and services. This position is required to work in the Richmond office. Employees are eligible to telework one day per week after six months of employment.
Minimum Qualifications
The ideal candidate will have a bachelor's degree in information security, computer science, IT or equivalent experience; security certifications such as CISSP, CISM, and GIAC; and the following qualifications:
* comprehensive knowledge of relevant laws, regulations, best practices and principles governing information security
* experience developing, implementing, and enforcing IT security policies and best practices
* experience conducting risk assessments, performing audits, implementing security controls, monitoring security posture and compliance, and responding to security incidents
* hands-on expertise with Microsoft security technologies (Defender and Sentinel)
* experience administering identity and access management solutions in Microsoft Azure, including Microsoft Entra ID and Microsoft 365
* familiarity with Microsoft Purview
* proven ability to communicate complex technical concepts effectively with a wide variety of stakeholders, both verbally and in writing
* strong analytical and risk-based decision-making skills
* service oriented, strong interpersonal and customer service skills
* successful completion of criminal background check
Special Instructions
DO NOT COMPLETE A STATE APPLICATION. Please send resume and cover letter to **********.
Contact Information
Name: VSB HR office
Phone: ************
Email: **********
$68k-107k yearly est. Easy Apply 15d ago
Cyber Security Specialist
Exeter Government Servi 4.1
Newport News, VA jobs
Qualified candidates will assist JTF-CS to support proper implementation and sustainment of DOD cybersecurity and RMF requirements. The support services shall include support in the following areas: RMF and JTF-CS policy, guidance, procedure and templates; security control implementation and testing; security control assessments; and RMF training. This position is at Fort Eustis VA.
Each candidate will:
· Provide technical analysis of JTF-CS RMF artifacts/authorization documentation to inform authorization decisions for the JTF-CS domain enclave of the
NORTHCOM enterprise
· Support JTF-CS in monitoring and tracking execution of POA&M
· Perform all required cybersecurity analyst (CSA) RMF process steps for the JTF-CS domain enclave of the NORTHCOM enterprise, to include: Categorize
System, Select Security Controls, Implement Security Controls, and Assess Security Controls
· Ensure ECCSS RMF process steps are followed and adhered to by RMF stakeholders
Security Controls Support
· Assess approved technical and non-technical security features of JTF-CS domain enclave to address known threats and vulnerabilities; assessment must
consider and identify impacts as well as consideration of existing risk mitigation strategies
· Act as an independent and impartial assessor to determine and certify aggregate cybersecurity risk for recommendations for JTF-CS domain enclave
· Develop a Security Assessment Plan (SAP) for JTF-CS domain enclave of the NORTHCOM enterprise within Enterprise Mission Assurance Support Service
(eMASS), describing the objectives of the security control assessment and providing a detailed roadmap for performing the assessment, to include:
Security Plan (SP)
Security Assessment Report (SAR)
Risk Assessment Report (RAR)
Up-to-date POA&M
Updated accreditation artifacts
· Conduct Privacy Impact Assessment (PIA) for the JTF-CS domain enclave
· Provide approval recommendation of the SAR for the JTF-CS domain enclave
· Provide guidance to JTF-CS Stakeholders
· Implement Security Controls
· Assess Security Controls
· Monitor Security Controls
· Support Authorization of Information System Support
Plan of Action and Milestones
Assemble the security authorization package
Determine the risk to organizational operations to include delivering the Residual Risk Statement that will be included in the Risk Acceptance Recommendation Report, Briefing (slides and meeting support)
Determine if the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation is acceptable
Mandatory Requirements:
Clearance Level: Secret
Certifications: DODM 8570 IAM Level III: - REQUIRED
Preferred Skillsets
Proficiency with eMASS preferred
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#clearancejobs
$75k-103k yearly est. Auto-Apply 60d+ ago
Security Analyst I
Bear Technologies 3.4
Plano, TX jobs
We are seeking a highly skilled and motivated Security Analyst to join our team. The successful candidate will be responsible for incident response, threat and vulnerability management, and threat mitigation.
Minimum Qualifications:
Understanding of cybersecurity principles, including threat and vulnerability management, risk management, incident response, and identity and access management
Understanding of common industry tools and practices such as EDR, SIEM, Email Security, MFA, and SSO
Excellent analytical and problem-solving skills
Superb written and verbal communication skills
Ability to work collaboratively in a team environment with personal integrity and strong interpersonal skills
A dedicated work ethic, attention to detail, self-sufficiency, and time management skills
Ability to work under stress in emergencies with the flexibility to handle multiple high-pressure situations simultaneously
Desired Qualifications:
Bachelor's degree in Computer Science, Information Systems, or a related field.
Security+ Certification
1-5 years of IT support or security administration experience
Knowledge of network infrastructure, including routers, switches, firewalls, network protocols, and other related concepts
Experience in Azure Active Directory and Windows Defender is a plus
If you meet the minimum qualifications and possess some of the desired qualifications, please apply with your resume and cover letter. We offer a competitive salary and benefits package, and we are committed to providing a supportive and inclusive work environment.
$68k-100k yearly est. 60d+ ago
Security Analyst I
Bear Technologies 3.4
Plano, TX jobs
Job DescriptionSalary:
We are seeking a highly skilled and motivated Security Analyst to join our team. The successful candidate will be responsible for incident response, threat and vulnerability management, and threat mitigation.
Minimum Qualifications:
Understanding of cybersecurity principles, including threat and vulnerability management, risk management, incident response, and identity and access management
Understanding of common industry tools and practices such as EDR, SIEM, Email Security, MFA, and SSO
Excellent analytical and problem-solving skills
Superb written and verbal communication skills
Ability to work collaboratively in a team environment with personal integrity and strong interpersonal skills
A dedicated work ethic, attention to detail, self-sufficiency, and time management skills
Ability to work under stress in emergencies with the flexibility to handle multiple high-pressure situations simultaneously
Desired Qualifications:
Bachelors degree in Computer Science, Information Systems, or a related field.
Security+ Certification
1-5 years of IT support or security administration experience
Knowledge of network infrastructure, including routers, switches, firewalls, network protocols, and other related concepts
Experience in Azure Active Directory and Windows Defender is a plus
If you meet the minimum qualifications and possess some of the desired qualifications, please apply with your resume and cover letter. We offer a competitive salary and benefits package, and we are committed to providing a supportive and inclusive work environment.
$68k-100k yearly est. 16d ago
OERI - Critical Infrastructure and Data Transformation (CID) to Advance National Security (Research Faculty, Non Tenure Track )
State of Virginia 3.4
Suffolk, VA jobs
Title: OERI - Critical Infrastructure and Data Transformation (CID) to Advance National Security (Research Faculty, Non Tenure Track ) FLSA: Hiring Range: Full Time or Part Time: Additional Detail Job Description:
The Office of Enterprise Research and Innovation (OERI) at Old Dominion University invites applicants for an annual 10-month position at Non-Tenure Track Assistant/Associate/Full Research Professor rank as part of a multi-position hiring cluster aiming for the Critical Infrastructure and Data Transformation to Advance National Security to begin in Fall 2026. This is an annual 12-month appointment that will begin July 25, 2026. The cluster, with faculty hires in School of Data Science, Batten College of Engineering and Technology and Office of Enterprise Research and Innovation, integrates interdisciplinary research in resilient infrastructure, infrastructure data transformation, and secure smart systems to address national security challenges in coastal regions. It explicitly addresses the Old Dominion University's Strategic Plan in research areas including Coastal Resilience and National Security. The research in this cluster will be supported by five interrelated, cross-cutting research domains, including Artificial Intelligence & Machine Learning, Computational & Data Science, Cybersecurity & Network Security, and Modeling & Simulation.
The primary responsibilities for this position are as follows:
* Develop an interdisciplinary and externally funded research program in Critical Infrastructure and Data Transformation (CID) to Advance National Security.
* Collaborate with faculty hired in this cluster and other faculty at Old Dominion University.
Opportunities for teaching graduate courses in the candidate's area of expertise will also be available with other departments in the BCET college or School of Data Science.
Minimum Qualifications:
Additional Considerations:
Non-Tenure Track (Research Assistant/Associate Professor) Office of Enterprise Research and Innovation (OERI): is seeking for faculty with the expertise aligned with the Center for Secure and Intelligent Critical Systems Digital Twin for distributed energy resources, Modeling and Simulation for efficient data center infrastructure. Cyber Resilient data center.
* Skill in working both independently and as part of an interdisciplinary team.
* Ability to transfer existing projects and plans for acquiring and sustaining sponsored research.
* Previous development and/or leadership experience with interdisciplinary, administrative, and/or academic initiatives.
* Successful record of grant funding.
$40k-51k yearly est. 27d ago
Athens Community Food Security VISTA - UGA VISTA Network
Americorps 3.6
Athens, GA jobs
Up to two AmeriCorps VISTA members will be selected for March placements to collaboratively support organizations and initiatives fighting food insecurity and food waste in the Athens, GA community as part of the UGA VISTA Network. Hosted by the University of Georgia's Office of Service-Learning. VISTAs provide year-long, full-time, in-person, capacity-building support for local organizations that help meet food-security needs through a wide range of efforts that include food production and distribution. Applicants with interest and skills in areas such as volunteer recruitment and management, community needs assessment, partnership development, food production/distribution, and communication are encouraged to apply. Members work closely with UGA faculty, staff and students, and community members. VISTAs collaborate and communicate but each will have a primary placement at a local or campus organization, including UGArden (UGA's community-campus organic teaching farm). Depending on their site, VISTAs will help with activities such as social media, fundraising, evaluation, developing new partnerships, communicating about food distribution opportunities, recruiting and training volunteers for meal, grocery, or food distributions, enhancing/supporting and developing new programs, and enhancing local food production. Further help on this page can be found by clicking here.
Member Duties : Each VISTA will have site-specific VADs and slight differences in day-to-day activities but have aligned overall program objectives and performance measures. VISTA activities include to: Develop and implement site-specific plans to support recruitment, management, and supervision of volunteers to assist with site activities and programs (including food recovery, production, preparation, and distribution); Undertake development and fundraising activities to support their organization's work in combating food waste and food insecurity; Undertake needs assessments and improve data quality related to community food insecurity and food waste; Create new programming and partnerships across organizations in the food security/production/waste arena; Develop, enhance, and disseminate communications, including social media, in support of their organization and its activities as well as for the overall network of local food distributions and activities.
Program Benefits : Relocation Allowance , Choice of Education Award or End of Service Stipend , Health Coverage* , Childcare assistance if eligible , Living Allowance , Training .
Terms :
Car recommended .
Service Areas :
Community Outreach , Hunger .
Skills :
Community Organization , Food production / Gardening , Communications .
$71k-99k yearly est. 7d ago
Information Security Officer
State of Virginia 3.4
Virginia jobs
Title: Information Security Officer State Role Title: Non-Classified Recruitment Type: General Public - G The Virginia State Bar (VSB), an agency of the Supreme Court of Virginia, is seeking an Information Security Officer (ISO) to serve as the lead for information security and privacy-by-design. This role combines governance, risk, and compliance functions with hands-on cloud securityengineering in a Microsoft-centric environment. The ISO will collaborate with VITA/Commonwealth of Virginia, the Supreme Court of Virginia, the VSB IT team, department leaders, and external partners to establish security policy in alignment with Commonwealth of Virginia standards; architect guardrails; monitor controls; and lead incident response. Key responsibilities include identifying and implementing comprehensive security measures; proactively assessing security risks; monitoring and notifying management of emerging threats; recommending security enhancements; educating users about security best practices; enforcing policy; developing incident response and recovery plans; and responding to security incidents. This position has a dotted-line relationship with the Executive Director and will integrate information security into all business processes and decision making. The ISO reports to the Director of Information Technology and will assist with other technical tasks and projects as assigned. The VSB operates an in-house IT team of five that directly supports 90 employees and indirectly serves Virginia's 50,000+ lawyers and the public with the reliable operation of digital platforms and services. This position is required to work in the Richmond office. Employees are eligible to telework one day per week after six months of employment.
Minimum Qualifications
The ideal candidate will have a bachelor's degree in information security, computer science, IT or equivalent experience; security certifications such as CISSP, CISM, and GIAC; and the following qualifications:
* comprehensive knowledge of relevant laws, regulations, best practices and principles governing information security
* experience developing, implementing, and enforcing IT security policies and best practices
* experience conducting risk assessments, performing audits, implementing security controls, monitoring security posture and compliance, and responding to security incidents
* hands-on expertise with Microsoft security technologies (Defender and Sentinel)
* experience administering identity and access management solutions in Microsoft Azure, including Microsoft Entra ID and Microsoft 365
* familiarity with Microsoft Purview
* proven ability to communicate complex technical concepts effectively with a wide variety of stakeholders, both verbally and in writing
* strong analytical and risk-based decision-making skills
* service oriented, strong interpersonal and customer service skills
* successful completion of criminal background check
Special Instructions
DO NOT COMPLETE A STATE APPLICATION. Please send resume and cover letter to **********.
Contact Information
Name: VSB HR office
Phone: ************
Email: **********
$68k-106k yearly est. Easy Apply 15d ago
Information Systems Security Engineer (ISSE) - TS/SCI Required
Phoenix 3.6
Fort Belvoir, VA jobs
Phoenix Operations Group is on the hunt for a passionate and skilled Information Systems SecurityEngineer (ISSE) ready to make an impact. In this role, you'll architect and design cutting-edge system and network solutions that span multiple secure enclaves - including environments with complex data protection and classification needs.
You'll dive into exciting projects that leverage distributed architectures and cloud-based technologies tailored for big data applications. This is your chance to work on mission-critical systems that matter.
This is a hands-on, on-site role - five days a week - perfect for those who thrive in a fast-paced, collaborative, and innovation-driven environment.
Are you ready to be part of something bigger?
Essential Job Responsibilities:
Create, review and edit authorization documentation for completeness and accuracy in accordance with federal and DoD policy.
Thoroughly understand and be able to implement DoD RMF system accreditation processes.
Assess use case and operational risk of integrated open source, and GOTS/COTS software components.
Use vulnerability management systems, automated security scanning tools, and system accreditation record systems.
Ability to grasp new concepts, facilitate information exchanges for data gathering, and collaborate with diverse audiences.
Follow established processes where applicable, and establish and execute defensible processes where none are prescribed.
Provide security planning, assessment, risk analysis, and risk management support.
Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements.
Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures.
Apply existing knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments.
Must be able to interact well with others to complete work.
Required Skills:
Active TS/SCI level U.S. Government clearance is required
9+ years of experience as an ISSE with large multi-tiered programs and Bachelor's in related field; OR 7 years relevant experience with Master's in related field; OR High School Diploma or equivalent and 13 years relevant experience.
Experience implementing DoD system accreditation processes (DIACAP acceptable and RMF preferred).
A working knowledge of TCP/IP suite of protocols and services, computer architectures, and network topologies is required.
DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification)
Experience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools.
Ability to work independently and as part of a team is needed.
Flexibility is essential to adapt to schedule changes as needed.
Desired Skills:
CISSP-ISSEP is highly desired
Benefits Offered:
Medical, Dental, Vision Insurance - 100% Company Paid Premiums
STD, LTD, and Life Insurance - 100% Company paid
401K - Automatic 10% company contribution; no matching required
PTO - 4 weeks/year
Holidays - 11 paid/year
Birthdays off with pay
Referral Bonuses - Upfront AND Annually Recurring
Open Source Bonuses - Contribute to our Github projects
Professional Development - Paid training, Certifications, and Enrichment
ABOUT PHOENIX OPERATIONS GROUP:
Phoenix Operations Group is a high-end engineering services company dedicated to protecting and advancing our national cyber resources. As a small company, we rely on innovation to continually advance our employees' skills and provide game-changing solutions to our customers.
Our technical competencies include Big Data analytics (batch and streaming), Cloud Computing infrastructure, multi-INT visualization, and enterprise architectures. We support operational missions (All-Source, Financial, CND) and serve as Product Owners for our open-source research initiatives.
Please visit us at ******************************* for more information.
Phoenix Operations Group is an Equal Opportunity Employer. Phoenix Operations Group does not discriminate based on race, religion, color, sex, gender, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status, or any other basis covered by appropriate law. All employment is decided based on qualifications, merit, and business needs.
Salary Description $110,000 - $170,000