CORPORATE SECURITY ANALYST III (Remote)
Remote job
Employer Industry: Industrial Technology Why consider this job opportunity: - Salary up to $132,400 - Opportunity for career advancement and growth within the organization - Comprehensive benefits package including health insurance, 401(k), and paid time off
- Flexibility to work outside of traditional hours to accommodate global teams
- Contribute to creating a safer, sustainable, and connected future
- Supportive and collaborative work environment within a diverse team
What to Expect (Job Responsibilities):
- Maintain and advance the employer's core crisis management and business continuity processes
- Support business units to ensure compliance with business continuity plans
- Develop and conduct annual tabletop crisis exercises
- Create and deliver training on crisis management and preparedness
- Conduct compliance and quality audits on business continuity and resilience programs
What is Required (Qualifications):
- Bachelor's degree preferred or 3+ years of relevant experience in the public or private sector
- Strong organizational, written, and verbal communication skills
- Proficiency in Microsoft Office 365 (Word, PowerPoint, Excel, Teams)
- Flexibility to work outside traditional hours for meetings or crisis support
- Experience with crisis management and business continuity training or certifications preferred
How to Stand Out (Preferred Qualifications):
- Certifications in crisis management and business continuity (e.g., CMCP/CMCS, S-CCMO, CCMC)
- Exposure to data visualization and metrics platforms
#IndustrialTechnology #CrisisManagement #BusinessContinuity #CareerOpportunity #DiversityAndInclusion
We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately.
We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer.
#J-18808-Ljbffr
Information Systems Security Officer - Clearance Required
Remote job
Description:What We're Doing: Lockheed Martin, Rotary Mission Systems Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. As a cyber security professional at Lockheed Martin, you'll protect the networks that our citizens and the world depend upon each minute: Financial assets. Healthcare information. Critical infrastructure. Hazardous materials. The uninterrupted flow of energy that keeps modern life moving. Here, you'll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep the threats at bay.
Cyber | Lockheed Martin
Who we are:
The program is on fire for cyber. In support of our customer, members of the team are responsible for providing full lifecycle support including analysis, design, development, integration, testing, procurement, deployment, security, training and sustainment for collection and antenna systems.
Why Join Us:
Your Health, Your Wealth, Your Life
Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work.
Learn more about Lockheed Martin's competitive and comprehensive benefits package.
We support our employees, so they can support our mission.
The Work:
In this important role, the Information Systems Security Engineer (ISSE) will:
• Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments
• Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components
• Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments
• Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments
• Interact with the customer and other project team members
• Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components
• Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures
• Support security planning, assessment, risk analysis, and risk management
• Identify overall security requirements for the proper handling of Government data
• Provide security planning, assessment, risk analysis, and risk management
• Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements
• Recommend system-level solutions to resolve security requirements
• Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures
This position is participating in our External Referral Program. If you know somebody who may be a fit, click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! Code extrefer
#extrefer
#RMSIL2025
#onelmjob
Basic Qualifications:
• Candidate must possess active security clearance with a polygraph
• Fourteen (14) years experience as an ISSE on programs and contracts of similar scope, type, and complexity is required
• Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. Four (4) years of ISSE experience may be substituted for a bachelor's degree
• DoD 8570.01-M compliance with IASAE Level 2 is required CISSP Certification is required
• Full understanding of the Risk Management Framework (RMF) process & procedures
• Experience with NIST 800-53 security control implementation and self-testing
• Experience reviewing vulnerability scans
Desired Skills:
Experience with:
• System Security Plans
• Information System Certification and Accreditation processes
• Risk management Frameworks
Clearance Level: TS/SCI w/Poly SP
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: 9x80 every other Friday off
Pay Rate: The annual base salary range for this position in California and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $139,600 - $246,100. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience and precision. They're dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about.
As a leading technology innovation company, Lockheed Martin's vast team works with partners around the world to bring proven performance to our customers' toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Information Security/Information Assurance
Type: Task Order/IDIQ
Shift: First
NCIS Cyber Security Analyst - Hybrid Role | TS clearance
Remote job
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret
Clearance Level Must Be Able to Obtain:
Top Secret/SCI
Public Trust/Other Required:
None
Job Family:
Cyber Security
Job Qualifications:
Skills:
Assured Compliance Assessment Solution (ACAS), Enterprise Mission Assurance Support Service (eMASS), Risk Management Framework
Certifications:
None
Experience:
7 + years of related experience
US Citizenship Required:
Yes
Job Description:
Transform technology into opportunity as a Cyber Security Analyst with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
Our work depends on Cyber Security Analyst joining our IT Technology Development division within the NCIS ITD organization in Quantico, VA.
The Naval Criminal Investigative Service (NCIS) is an organization of over 2,200 personnel of which 700 serve at HQ and the remaining staff serve at offices worldwide. NCIS is the Department of Navy (DON) component with primary responsibility for criminal investigation, law enforcement (LE), counter-terrorism (CT), counterintelligence (CI), and cyber matters. NCIS not only has primary responsibility for all criminal investigative, CI, CT, and cyber matters within the DON, but it also has exclusive investigative jurisdiction in non-combat matters involving actual, potential, or suspected criminal, terrorism, sabotage, espionage, and subversive activities.
HOW OUR CYBER SECURITY ANALYST WILL MAKE AN IMPACT:
Supports all authorization package ACAS related tasks assigned to ISSEs and NQVs. The goal is to provide the required artifacts IAW the Navy Testing Guidance and Risk Management Framework (RMF) Process Guide required for the submission of an RMF Authorization package.
Performs 90 Day Baseline Scans for each Authorization package in accordance with Navy requirements; provide Detailed Vulnerability List (DVL) Reports for use in the eMASS record; provide ACAS Summary Reports in accordance with the Navy Testing Guidance.
Conducts weekly and “As Needed” ACAS scans in support of RMF STEP 3/STEP 4 processes, vulnerability assessments and queries specifically targeting authorization package assets; support continuous monitoring for authorized packages and report vulnerability status of all active Enterprise Security packages; create asset lists using provided hardware lists.
Performs risk analyses of computer systems and applications during all phases of the system development life cycle using the Assured Compliance Assessment Solution (ACAS) tool.
Initiates Enterprise Mission Assurance Support Service (eMASS) registrations, prepares, processes, updates and monitors RMF Assessment and Authorization (A&A) packages; ensures A&A packages are evaluated and maintained in a compliant status; implements and validates A&A packages to ensure security controls and vulnerabilities meet DON RMF authorization compliance requirements.
WHAT YOU'LL NEED TO SUCCEED (Required):
Security Clearance Level: Active Top Secret clearance
Required Experience:
Minimum 7 years of experience working in the IT/Engineering field and must meet or exceed OPNAVINST 5239 requirements to be certified as a Navy Qualified Validator or must be certified within 6 months of start date.
Must meet or exceed OPNAVINST 5239 requirements to be certified as a Navy Qualified Validator or must be certified within 6 months of start date.
Experience in the development of RMF Assessment and Authorization (A&A) Security Plans (SP), System Level Continuous Monitoring (SLCM), Ports, Protocols and Services Management (PPSM), Host Based Security Systems (HBSS), Assured Compliance Assessment Solution (ACAS) vulnerability scanning.
Experience with Enterprise Mission Assurance Support Service (eMASS) tools.
Experience preparing, processing, assessing, validating, and maintaining RMF A&A packages using eMASS and XACTA tools.
Experience with using public key-based technologies for applications.
Required Certifications: Security+ CE
Degree -NOT REQUIRED
Location: Hybrid at Quantico, VA
WHAT WE'D LOVE FOR YOU TO HAVE:
Completed Navy RMF training
Formal ACAS training
Formal eMASS training
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
#NCIScareers
#GDITPriority
The likely salary range for this position is $79,747 - $105,800. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
None
Telecommuting Options:
Hybrid
Work Location:
USA VA Quantico
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Cyber Threat Fusion Analyst
Remote job
The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start.
Essential Job Functions
Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR).
Produce reporting for new or emerging threats and threat vectors.
Utilize SIEM technologies to correlate security events and logs and identify threats
Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections
Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR).
Produce reporting for new or emerging threats and threat vectors.
Utilize SIEM technologies to correlate security events and logs and identify threats.
Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections.
Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks.
Understand concepts of log and packet analysis
Navigate the command line using specific expressions to manipulate data
Handle and organize disparate data about detections, attacks, and attackers
Employ discovery techniques and vetting of new intelligence.
Create Situational Awareness Reports and Threat Briefs.
Minimum Required Qualifications
Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required.
Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree.
Computer defense technologies spanning endpoint, network, and open source.
Required Security Clearance: TS/SCI.
8570 IAT II certification is required prior to start.
It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
Shift5 is redefining the future of onboard operational technology (OT). As a fast-growing scale-up, we specialize in cutting-edge cybersecurity, predictive maintenance, and compliance for OT systems across defense, aerospace, and rail. We are a team of passionate, innovative professionals who thrive in a collaborative environment, driven by a shared mission to revolutionize how fleets operate. By unlocking and democratizing the vast potential of onboard OT data, we help our customers' fleets run smarter, safer, and more efficiently. Ready to be part of the next frontier in transportation and critical infrastructure? Come join us.
Our Values :
* Embrace Truth and Integrity: Base decisions on data, foster open dialogue, and uphold unwavering integrity.
* User-Centric Focus: Prioritize user needs to guide our actions and resource allocation.
* Collaborative & Adaptable: Collaborate for excellence, learning from failures and driving iterative improvements, recognizing every decision's significance.
Shift5 is seeking a seeking a full-time Cyber Analyst to join our growing team. The Cyber Analyst will leverage their expertise in data analysis techniques, cyber threats, and OT network traffic to enhance the security posture of military aircraft. This role demands a proactive approach to threat detection, in-depth analysis of complex data sets, and the ability to translate technical findings into actionable insights for both technical and non-technical audiences. This role will embed in a military customer's security operations center and will serve as a focal point to integrate weapons systems data into cyber threat detection and response. This role will operate in a team-based environment with Field Engineers, Data Engineers, Cyber Threat Engineers, Product Managers, Program Managers, Mission Success, and military cyber operators.
Responsibilities:
* Dive deep into the inner workings of weapon systems, mastering their architecture and communication pathways.
* Become fluent in the language of cyber threats, using frameworks like MITRE ATT&CK to identify and analyze vulnerabilities.
* Decipher complex technical documentation, extracting critical insights to fuel your data analysis.
* Leverage your expertise in real-time embedded systems to understand system behavior and predict potential attack vectors.
* Unlock the secrets of wireless communication protocols, including GPS, Link16, and SATCOM, to safeguard critical systems.
* Experience wrangling and interpreting RF and OT protocol datasets.
* Analyze aircraft data to identify patterns indicative of cyber threats.
* Develop and implement anomaly detection rules and signatures.
* Conduct root cause analysis of anomalous behavior, faults, and maintenance defects.
* Prepare comprehensive reports summarizing findings, methodologies, and recommendations.
* Share knowledge / document formal and informal training around expertise in cyberdata analysis and interpretation with military and civilian customer personnel.
Qualifications:
* Analytics: Demonstrated expertise in data analytics using tools similar to Databricks.
* Vulnerability Research: Familiarity with vulnerability research or reverse engineering of embedded systems, RF protocols, Operational Technology (OT) systems or weapons systems..
* Data Handling: Proficiency in working with and analyzing large data sets.
* Technical Acumen: Ability to develop technical processes and experience integrating API-based commercial software products
* Customer Engagement: Ability to engage with customers, understand their requirements, and tailor solutions (including building and offering formal and informal training) accordingly
* Communication: Astute written and verbal communication skills, with the ability to consistently and cogently address our customers' needs.
* Cyber Frameworks: Familiarity with common cyber, IT, and OT frameworks (e.g., MITRE ATTACK, Perdue Model, OSI Model) and adaptability to new use cases.
* Pattern Recognition: Capability to capture and translate patterns into alerts and detection methodologies.
* Executive Briefings: Experience in creating and delivering executive briefings and updates.
* Shift5 Culture: Ability to thrive in a team-oriented culture, delivering a significant individual contribution while collaborating with and strengthening teammates
* Travel: Must be able to work with remotely distributed teams and should expect up to 30% travel to attend customer on-site visits, internal team travel, and one-off events.
* Citizenship and Clearance: US Citizenship with an active (or ability to hold/obtain) US Government Top Secret security clearance
Compensation & Benefits:
* Base Salary: $120,000-$160,000
* Bonus program and equity in a fast-growing startup
* Competitive medical, dental, and vision coverage for employees and their families
* Health Savings Account with annual employer contributions
* Employer-paid Life and Disability Insurance
* Uncapped paid time off policy
* Flexible work & remote work policy
* Tax-deferred public transit benefits with Metro SmartBenefits (DC/MD/VA)
We are committed to building an inclusive culture of belonging that embraces the diversity of our people and represents the communities in which we work and the customers we serve. We know the happiest and highest performing teams include people with diverse perspectives and ways of solving problems. We strive to attract and retain talent from all backgrounds and create workplaces where everyone feels empowered to bring their full, authentic selves to work.
Shift5 is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sexual orientation, gender identify, national origin, disability, age, marital status, ancestry, projected veteran status, or any other protected group or class.
Privacy Policy and Notice for Shift5, Inc. Job Applicants, Employees & Contractors
Shift5 is redefining the future of onboard operational technology (OT). As a fast-growing scale-up, we specialize in cutting-edge cybersecurity, predictive maintenance, and compliance for OT systems across defense, aerospace, and rail. We are a team of passionate, innovative professionals who thrive in a collaborative environment, driven by a shared mission to revolutionize how fleets operate. By unlocking and democratizing the vast potential of onboard OT data, we help our customers' fleets run smarter, safer, and more efficiently. Ready to be part of the next frontier in transportation and critical infrastructure? Come join us.
Our Values :
Embrace Truth and Integrity: Base decisions on data, foster open dialogue, and uphold unwavering integrity.
User-Centric Focus: Prioritize user needs to guide our actions and resource allocation.
Collaborative & Adaptable: Collaborate for excellence, learning from failures and driving iterative improvements, recognizing every decision's significance.
Shift5 is seeking a seeking a full-time Cyber Analyst to join our growing team. The Cyber Analyst will leverage their expertise in data analysis techniques, cyber threats, and OT network traffic to enhance the security posture of military aircraft. This role demands a proactive approach to threat detection, in-depth analysis of complex data sets, and the ability to translate technical findings into actionable insights for both technical and non-technical audiences. This role will embed in a military customer's security operations center and will serve as a focal point to integrate weapons systems data into cyber threat detection and response. This role will operate in a team-based environment with Field Engineers, Data Engineers, Cyber Threat Engineers, Product Managers, Program Managers, Mission Success, and military cyber operators.
Responsibilities:
Dive deep into the inner workings of weapon systems, mastering their architecture and communication pathways.
Become fluent in the language of cyber threats, using frameworks like MITRE ATT&CK to identify and analyze vulnerabilities.
Decipher complex technical documentation, extracting critical insights to fuel your data analysis.
Leverage your expertise in real-time embedded systems to understand system behavior and predict potential attack vectors.
Unlock the secrets of wireless communication protocols, including GPS, Link16, and SATCOM, to safeguard critical systems.
Experience wrangling and interpreting RF and OT protocol datasets.
Analyze aircraft data to identify patterns indicative of cyber threats.
Develop and implement anomaly detection rules and signatures.
Conduct root cause analysis of anomalous behavior, faults, and maintenance defects.
Prepare comprehensive reports summarizing findings, methodologies, and recommendations.
Share knowledge / document formal and informal training around expertise in cyberdata analysis and interpretation with military and civilian customer personnel.
Qualifications:
Analytics: Demonstrated expertise in data analytics using tools similar to Databricks.
Vulnerability Research: Familiarity with vulnerability research or reverse engineering of embedded systems, RF protocols, Operational Technology (OT) systems or weapons systems..
Data Handling: Proficiency in working with and analyzing large data sets.
Technical Acumen: Ability to develop technical processes and experience integrating API-based commercial software products
Customer Engagement: Ability to engage with customers, understand their requirements, and tailor solutions (including building and offering formal and informal training) accordingly
Communication: Astute written and verbal communication skills, with the ability to consistently and cogently address our customers' needs.
Cyber Frameworks: Familiarity with common cyber, IT, and OT frameworks (e.g., MITRE ATTACK, Perdue Model, OSI Model) and adaptability to new use cases.
Pattern Recognition: Capability to capture and translate patterns into alerts and detection methodologies.
Executive Briefings: Experience in creating and delivering executive briefings and updates.
Shift5 Culture: Ability to thrive in a team-oriented culture, delivering a significant individual contribution while collaborating with and strengthening teammates
Travel: Must be able to work with remotely distributed teams and should expect up to 30% travel to attend customer on-site visits, internal team travel, and one-off events.
Citizenship and Clearance: US Citizenship with an active (or ability to hold/obtain) US Government Top Secret security clearance
Compensation & Benefits:
Base Salary: $120,000-$160,000
Bonus program and equity in a fast-growing startup
Competitive medical, dental, and vision coverage for employees and their families
Health Savings Account with annual employer contributions
Employer-paid Life and Disability Insurance
Uncapped paid time off policy
Flexible work & remote work policy
Tax-deferred public transit benefits with Metro SmartBenefits (DC/MD/VA)
We are committed to building an inclusive culture of belonging that embraces the diversity of our people and represents the communities in which we work and the customers we serve. We know the happiest and highest performing teams include people with diverse perspectives and ways of solving problems. We strive to attract and retain talent from all backgrounds and create workplaces where everyone feels empowered to bring their full, authentic selves to work.
Shift5 is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sexual orientation, gender identify, national origin, disability, age, marital status, ancestry, projected veteran status, or any other protected group or class.
Privacy Policy and Notice for Shift5, Inc. Job Applicants, Employees & Contractors
Cyber Security Analyst
Remote job
CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team!
CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.
Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory.
Job Overview
The Cyber Security Analyst will support proactive monitoring of client's environments to detect, analyze, track, and mitigate external threats utilizing a multi-tenant security information and event management system (SIEM) and other tools used to provide managed security services. The successful candidate is well versed in numerous security technologies, understands the motivations and capabilities of Advanced Persistent Threat actors, and can communicate risks and make recommendations associated with specific network threats. This role will support the IT and Security Managed Services teams and as well as being a point of contact for security matters.
Essential Responsibilities (include but are not limited to):
Analyze, respond, document and report on potential security incidents identified in customer environments
Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
Serve as an incident coordinator for security events that require urgent response, containment, and remediation
Develop and maintain Security tooling playbooks/runbooks
Continuously review and optimize existing technical processes, configurations, rulesets, technologies.
Provide analysis on various security enforcement technologies, including, but not limited to, SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners, etc.
Actively research current threats and attack vectors being exploited in the wild
Actively work with associate analysts and perform investigations on escalations
Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach
Required Education, Experience, & Skills
Minimum of 3 years' experience in Threat Analysis and Threat Intelligence.
At least 2 years' experience working in a SOC
First-hand working experience with industry-leading SIEM/SOAR tooling/providers
Prior experience with Sumo Logic, Google Chronicle, and Azure Sentinel is a strong plus.
Advanced understanding of query languages
Working Kusto (KQL) knowledge is a plus.
Networking experience (TCP/IP, Routing, RFC 1918, VPN/Zero-Trust Networking)
Strong experience with Office 365 / Entra ID Ecosystems.
GCC-High Experience is a plus.
Possesses strong troubleshooting, problem-solving, and verbal/written communication skills
Excellent communication skills to communicate with support personnel, customers, and managers
Demonstrated ability to work in a team environment
Must be a U.S. Citizen and reside within the United States or its Territories
Preferred Education, Experience, & Skills
Microsoft Cloud and Security Certifications (i.e., AZ900, AZ104, SC200, SC300)
Industry Security Certifications (CISM, CISSP, CEH, Sec+)
Experience working in a fast-paced managed services environment (MSSP)
Great organizational skills to balance and prioritize work and multitask
Great analytical and problem-solving skills to troubleshoot system problems
Ability to work independently and remotely as part of a team
Work Environment
CyberSheath is a fully remote organization, and this will be a work-from-home position.
Travel requirements: 0-5% yearly.
Please note that this role is slated to work overnights:
Week 1 - Monday - Thursday 8pm-8am local time
Week 2 - Tuesday - Thursday 8pm-8am local time
CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability.
Budgeted Pay Range
$70,000 - $85,000 USD
Cyber Security Analyst
Remote job
Responsibilities:
Investigate security incidents and escalate when necessary
Work Incident Response and Administrative tickets
Perform and develop data mining queries using Splunk/Splunk ES
Communicate in a clear and concise manner with Leadership, Customers and Peers
Monitor and respond to multiple shared Mailbox inquiries
Provide vulnerability, threat, and risk mitigation support
Monitor Security Operations Dashboards for alerts
Support daily Operations briefings
Monitor and answer the SOC phone hotline
Support customer defined metrics reports
Support government data calls
This opportunity offers remote work!
Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills
Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting)
Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
Senior Cyber Security Ops Analyst | Remote | Contract
Remote job
Senior Cyber Security Ops Analyst
Applicants Need To Know
6+ Month Contract
Work Status: USC, GC
Sponsorship: No, Sponsorship provided.
Office Type: Remote
Hourly Rate: $75 to $85 W2 Only
No Corp-to-Corp
Please note that only candidates who are authorized to work in the United States without sponsorship will be considered for this position.
We seek a Senior Cyber Security Ops Analyst for our client. This is a contract position lasting 6+ months. The role is remote and requires availability in the Eastern or Central time zones.
As a Sr Cyber Security Ops Analyst, you will be responsible for security monitoring and incident response for both internal and external threats. You will collaborate with internal IT teams and MSSP to ensure effective security monitoring and response. Additionally, you will implement advanced security monitoring techniques to identify malicious behavior and develop automation response scripts to remediate commodity threats. Your role will also involve performing threat analysis utilizing industry standard frameworks and conducting threat research to improve detection and response capabilities. You will have the opportunity to propose and review security plans and policies to enhance the overall security environment.
The Work:
Conduct investigations and respond to internal and external security threats.
Oversee, respond to, and remediate DLP (data loss prevention) and SIEM events from on-premise and cloud systems.
Implement advanced security monitoring techniques to identify malicious behavior on SaaS, cloud systems, network, servers, and endpoints.
Manage, administer, and improve security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry-standard security technologies.
Develop automation response scripts to remediate commodity threats.
Perform threat hunting activities to identify compromised resources.
Understand and perform threat analysis utilizing industry-standard frameworks (kill chain and diamond model).
Perform threat research and intelligence gathering to improve detection and response capabilities.
Propose and review security plans and policies to improve the security environment.
Maintain operational playbooks, process diagrams, and documentation for security monitoring and response.
Review proposed Security deployments to ensure security monitoring requirements are met.
Provide off-hour support as needed for security monitoring and response activities.
Work closely with MSSP services, external forensic providers, and in-house IT teams to respond to and remediate security incidents both internal and external.
Review compromised systems to identify the root cause of security incidents.
Qualifications:
Minimum of 5 years of experience in security monitoring and incident response
Strong knowledge of DLP (data loss prevention) and SIEM events
Experience with advanced security monitoring techniques on SaaS, cloud systems, network, servers, and endpoints
Proficiency in managing and administering security monitoring products for DLP, SIEM, EDR, AV, Cloud Security products, IDS, and other industry standard security technologies
Ability to develop automation response scripts for commodity threats
Familiarity with threat hunting activities to identify compromised resources
Understanding of threat analysis utilizing industry standard frameworks (kill chain and diamond model)
Experience in threat research and intelligence gathering to improve detection and response capabilities
Knowledge of reviewing security plans and policies to enhance the security environment
Strong documentation skills for operational playbooks, process diagrams, and security monitoring/response documentation
Ability to review proposed Security deployments to ensure compliance with security monitoring requirements
Willingness to provide off-hour support for security monitoring and response activities
Nice to Have:
Experience with cloud security technologies such as CASB, Cloud Access Security Brokers
Knowledge of scripting languages such as Python or PowerShell
Familiarity with industry compliance standards (e.g., PCI DSS, HIPAA, GDPR)
Certifications in relevant areas such as CISSP, CISM, or CEH
Experience working with incident response tools and processes
#CyberSecurity #SecurityOps #IncidentResponse #ThreatAnalysis #SecurityMonitoring #DataLossPrevention #SIEMEvents #CloudSecurity #EndpointSecurity #ITSecurity
Systems Security Analyst 1 (REMOTE)
Remote job
Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. KDS Job ID 2425245
KGS is seeking qualified candidates for our open positions, but we will only extend an offer of employment after a candidate applies through the link in our job posting. If you receive a job offer via email only and have not been interviewed by the KGS hiring manager, feel free to contact
***************************
to verify its validity.
Koniag Data Solutions LLC, a Koniag Government Services company, is seeking a Systems Security Analyst 1 with a Top- Secret clearance to support a KDS and our government customer. This is a Remote opportunity.
We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks of paid time off, and more.
Essential Functions, Responsibilities & Duties may include, but are not limited to:
Provide security remediation support to address systems that are not compliant with security best practices, policies, and standards.
Collaborate with teammates to address security requirement gaps throughout the lifecycle of both non-compliant and new systems.
Advise application owners on mitigating security issues, document progress, and report on remediation activities.
Provide guidance on security for on-premises and cloud environments, including SaaS, PaaS, and IaaS, with a focus on compliance with FedRAMP and HHS security requirements.
Offer security guidance related to different architecture models: microservices, traditional applications, data lakes, data warehouses, and APIs.
Address security concerns related to insider threats and zero-trust architectures at the network, infrastructure, and application levels.
Advise on efficient security integration with various technologies and methodologies to accelerate project timelines.
Engage system owners and program managers to understand and address security gaps and needs.
Work Experience, Knowledge, Skills & Abilities:
Bachelor's degree (preferably in Information Technology, Cybersecurity, or a related field) (or equivalent experience).
Minimum 2 years of relevant experience.
Must possess a Security+ Certification.
Familiarity with federal laws, regulations, and policies, including:
FISMA (2002)
NIST Standards
HHS Information Security and Privacy Policies
Federal Information System Controls Audit Manual (FISCAM)
FedRAMP
Continuous Diagnostics and Mitigation (CDM)
HIPAA
Top Secret Security Clearance required
Working Environment & Conditions
This job operates in a professional office environment and has a noise level of mostly low to moderate. This role routinely uses standard office equipment such as computers, phones, photocopiers, filing cabinets and fax machines.
This position is primarily indoors, consistent with a standard office position and has a noise level of mostly low to moderate. The incumbent is required to stand, walk; sit; use hands to finger, handle, or feel objects, tools, or controls; reach with hands and arms; talk and hear. The workload may require the incumbent to sit for extended periods of time. The incumbent must be able to read, do simple math calculations and withstand moderate amounts of stress.
The incumbent must occasionally lift and/or move up to 25 lbs. Specific vision abilities required by the job include close vision, distance vision, color vision, depth perception, and the ability to adjust focus.
Our Equal Employment Opportunity Policy
The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, sex, sexual orientation, gender, or gender identity (except where gender is a bona fide occupational qualification), national origin, age, disability, military/veteran status, marital status, genetic information, or any other factor protected by law. We are committed to equal employment opportunity in all decisions related to employment, promotion, wages, benefits and all other privileges, terms, and conditions of employment.
The company is dedicated to seeking all qualified applicants. If you require accommodation to navigate or to apply for a position on our website, please contact Heaven Wood via e-mail at accommodations@koniag-gs.com or by calling ************ to request accommodation.
Koniag Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions, Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag, we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical, professional, and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers, employees, and native communities. For more information, please visit ******************
Equal Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352
Medical Insurance Vision Insurance Dental Insurance 401k Disability Maternity Tuition Assistance
Information Security GRC Analyst IV
Remote job
The Information Security GRC Analyst IV manages day to day, short and long term information security risk and compliance programs. They also ensure activities are within risk tolerance and in compliance with approved policies, procedures and standards.
Essential Functions:
Collaborate with key stakeholders and customers in the execution of the processes and controls related to information security risk and compliance to protect business interests and achieve business goals
Responsible for the measurement, monitoring, communicating, and reporting of cybersecurity risk, security metrics, risk mitigation plans, and status of execution of strategic and tactical plans
Regularly assess and report to management any exceptions to information risk management policies, procedures, and standards
Engage staff and/or vendors to develop information security risk mitigation plans to address risks identified
Design, review, mature, and manage a framework of internal IT controls sufficient to effectively protect the confidentiality, integrity, and availability of information assets critical to the business, maintaining robust evidence of controls and representing these records to internal and external auditors and regulators
Will serve as the primary point of contact and liaison between any internal or external auditors and regulators for the purpose of facilitating IT audits and assessments, minimizing the impact and disruption to IT personnel
Work with the department leadership in establishing security strategy, goals, and objectives
Facilitate overall analysis, design, artifacts, and technical requirements validation for strategic initiatives
Acts as an expert in functional domain
Build employee knowledge and skills in specific areas of expertise
Oversee and provide guidance of all aspects associated with enhancement or project work
Demonstrate business and technical acumen proficiency
Deliver engaging, informative, and well-organized presentations
Effectively execute and communicate change management
Perform any other job-related instructions as requested
Education and Experience:
Bachelor's degree or equivalent years of relevant work experience required
Master's degree is preferred
Minimum of ten (10) years of IT, IT Risk, or Security experience is required
Minimum of five (5) years of Security Risk or Program Management experience preferred
Competencies, Knowledge and Skills:
Ability to effectively prioritize and execute tasks while working both independently and in a team-oriented, collaborative environment
Strong interpersonal skills including excellent written and verbal communication skills; listening and critical thinking; presentation skills, facilitation skills
Strong organizational skills to help prioritize and manage workload
Ability to establish effective working relationships with stakeholders at all different levels
Flexibility during organizational and/or business changes
Ability to manage multiple projects while demonstrating a sense of urgency
Effective problem-solving skills with attention to detail
Effectively disseminates information to appropriate audiences verbally and in writing
Ability to actively foster appropriate level of participation within teams and gather essential input to enable decision-making
Working technical knowledge/experience of the following:
IT Audit/Compliance/Risk
Security Management
Project/Program Management
Licensure and Certification:
Certifications in Information Security, such as CISSP, CRISC, SSCP, CISA, CISM preferred
Project Management Professional (PMP) preferred
Working Conditions:
General office environment; may be required to sit or stand for extended periods of time
Compensation Range:
$110,800.00 - $193,800.00
CareSource takes into consideration a combination of a candidate's education, training, and experience as well as the position's scope and complexity, the discretion and latitude required for the role, and other external and internal data when establishing a salary level. In addition to base compensation, you may qualify for a bonus tied to company and individual performance. We are highly invested in every employee's total well-being and offer a substantial and comprehensive total rewards package.
Compensation Type (hourly/salary):
Salary
Organization Level Competencies
Create an Inclusive Environment
Cultivate Partnerships
Develop Self and Others
Drive Execution
Influence Others
Pursue Personal Excellence
Understand the Business
This is not all inclusive. CareSource reserves the right to amend this job description at any time. CareSource is an Equal Opportunity Employer. We are dedicated to fostering an inclusive environment that welcomes and supports individuals of all backgrounds.#LI-GB1
Systems Security Analyst
Remote job
RDTS is seeking a Cleared Systems Security Analyst to support the Bureau of Overseas Building Operations (OBO) at the U.S. Dept of State in Washington, D.C. We are seeking a technically adept and detail-oriented Systems Security Analyst to support the OBO in managing communication security and infrastructure protection initiatives. This role provides direct support to the Department's Cryptographic Services and Information Assurance missions, ensuring that sensitive communication systems and equipment meet the highest standards for security, accountability, and compliance.
This is a primarily remote position; however, candidates must reside in the Washington, DC metro area and be prepared to work onsite full-time if requested under evolving Return-to-Office policies. All classified activities will be conducted onsite in secure government facilities.
The Systems Security Analyst will conduct risk and compliance reviews, manage cryptographic inventories, respond to security anomalies, and maintain accurate documentation for inspections and audits. This role supports both daily operational security and long-term systems assurance activities.
KEY RESPONSIBILITIES:
System and Communications Security Monitoring: Monitor the performance and security of COMSEC systems and communication equipment. Identify and resolve anomalies using system logs, audit trails, and incident response procedures.
COMSEC Inventory and Accountability: Maintain accurate records of all cryptographic devices, keys, and secure communications equipment using platforms such as iApp. Conduct daily device inspections and participate in semi-annual inventory processes in accordance with DOS CSB guidelines.
Policy Compliance and Auditing: Ensure compliance with Department of State regulations including 5 FAH-6 and 12 FAM by performing internal reviews and assisting with third-party audits. Prepare documentation and artifacts for CSB's annual compliance assessments and maintain 99.9% accountability standards.
Security Configuration and Engineering Support: Evaluate the security posture of existing systems and recommend configuration changes to mitigate risk. Assist in planning for firmware and software updates on secure telephones, INEs, and related infrastructure.
Training and User Support: Provide briefings, policy updates, and technical support for users across domestic and international OBO locations. Assist in the development of user-friendly procedures for the secure handling of cryptographic materials and secure devices.
Operational Coordination: Work closely with ISSOs, engineers, and program managers to ensure security alignment across OBO's infrastructure and operations. Support incident response efforts involving cryptographic components or systems under compliance oversight.
Requirements
Active Security Clearance
Bachelor's degree in Information Security, Systems Administration, or a related field (or equivalent experience).
Minimum of 4 years of experience in system security, communication security (COMSEC), or IT operations.
Familiarity with NIST 800-53 controls, auditing practices, and federal security standards.
Strong attention to detail in system monitoring, inventory management, and documentation practices.
Excellent written and verbal communication skills for both technical and non-technical audiences.
Preferred Qualifications:
Experience supporting Department of State or other federal civilian COMSEC programs.
Familiarity with iApp or similar inventory and accountability systems.
Working knowledge of secure communications infrastructure and cryptographic equipment.
Certifications such as Security+, CAP, or relevant DoD 8570 compliant credentials.
Experience participating in federal audits and inspections for classified systems.
All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, age, marital status, pregnancy, genetic information, or other legally protected status.
Senior Security Governance Risk & Compliance (GRC) Analyst
Remote job
Alma is on a mission to simplify access to high-quality, affordable mental health care. We do this by making it easy and financially rewarding for therapists to accept insurance and offer in-network care. When a provider joins Alma, they gain access to a suite of tools that not only help them better run their business, but also grow it sustainably and develop as a provider. Alma is available in all 50 states, with over 20,000 therapists in our growing network. Anyone looking for a therapist can browse Alma's free directory. Alma has raised $220.5M in funding from Insight Partners, Optum Ventures, Tusk Venture Partners, Primary Venture Partners, First Round Capital, Sound Ventures, BoxGroup, Cigna Ventures, and Rainfall Ventures. Alma was also named one of Inc's Best Workplaces in 2022 and 2023.
Website Job Board Values Candidate Interview GuideSenior Security Governance Risk & Compliance (GRC) Analyst
Alma is seeking a mission-driven Senior Security Governance Risk and Compliance (GRC) Analyst to join our team. We are dedicated to building secure and compliant tools and services that help providers more easily manage and grow their practice.
Acting as a principal aide to the VP of Security and IT, this role will play a critical role in enabling a culture of security at Alma, making security a product differentiator that builds confidence and trust with our providers, and preparing Alma for annual audits and certifications (such as SOC 2 and HITRUST). In this role you will perform risk assessments, create and maintain our security policies, educate our staff by developing a security awareness program, respond to security assessments, and review our vendor's security.
What you'll do:
Perform risk assessments and reports on Alma's risk management program
Collaborate with stakeholders to identify and facilitate the implementation of mitigating controls
Streamline and maintain Alma's security policies and standards
Prepare the organization and facilitate annual audits and certifications (SOC 2, PCI)
Educate Alma's staff by creating and managing an effective security awareness program
Develop our vendor risk program, ensuring our vendors meet Alma security standards
Develop Alma's Trust program, preparing materials and responses to security assessments, and making security a product differentiator that builds confidence and instills trust in our providers
Develop and measure key metrics, and coordinate activities in support of cybersecurity priorities
Who you are:
You have 5+ years of work experience in Information Security, especially in a GRC analysis role
You have experience working in health tech or other highly regulated industries (banking, insurance, etc)
You have experience leading SOC 2 audits and/or HITRUST certifications with minimal findings
You have experience deploying GRC solutions (Drata or equivalent), putting in place a unified control framework enabling evidence collection automation and continuous compliance
You strongly understand security best practices and controls frameworks (NIST CSF, NIST 800-53, AICPA Trust Services Criteria, HITRUST CSF, PCI DSS, HIPAA Security Rule, and Breach Notification)
You have experience implementing security controls and policies that align with AWS security best practices
You have experience driving security awareness programs, including phishing simulation tools (KnowBe4 or equivalent)
You have experience performing risk assessments, with an understanding of quantitative risk analysis frameworks (FAIR)
You have experience writing customer-facing materials in partnership with with product and marketing teams
You have strong written and verbal communication skills and can convey complex technical topics to non-technical stakeholders clearly and concisely
You feel a passion for Alma's mission - to improve the experience of therapy for providers and their clients and simplify access to care
Benefits:
We're a remote-first company
Health insurance plans through Aetna (medical and dental) and MetLife (vision), including FSA and HSA plans
401K plan (ADP)
Monthly therapy and wellness stipends
Monthly co-working space membership stipend
Monthly work-from-home stipend
Financial wellness benefits through Northstar
Pet discount program through United Pet Care
Financial perks and rewards through BenefitHub
EAP access through Aetna
One-time home office stipend to set up your home office
Comprehensive parental leave plans
11 paid holidays, 1 Alma Mental Health Day, and 1 Alma Volunteering Day
Flexible PTO
Salary Band: $145,000 - $174,000
Alma's compensation philosophy is driven by our company value of building equity. To best ensure pay equity, we typically bring in new hires near the middle of our listed salary bands and we do not negotiate our compensation (i.e. all people hired at the same level & role are brought in at the same salary, equity, and benefits). The recruiter you work with can provide more details on our philosophy.
All Alma jobs are listed on our careers page. We do not use outside applications or automated text messaging in our recruiting process. We will not ask for any sensitive financial or identification information throughout the recruiting process. Any communication during the recruitment process, including interview requests or job offers, will come directly from a recruiting team member with a helloalma.com email address.
Learn more about how Alma handles applicant data by reading Alma's Applicant Privacy Notice.
Network Security Analyst Consultant for Texas Workforce Commission, Austin, Tx
Remote job
Title: Network Security Analyst Solicitation: 5112425NSA2 Duration: On-going, no ending date Visa: Must be US Citizen, Green Card, EAD. No H1B Telework Policy: The primary work location(s) will be at 100% Remote
Required/Preferred Skills:
4 years, Required -Bachelor's degree in computer-related field and four years' experience as a systems administrator or eight years' experience as a systems administrator.
4 years, Required -Supporting patching and configuring Windows and Linux operating systems and third-party applications
4 years, Required -Advanced system administration skills in Linux/UNIX Servers.
4 years, Required -Microsoft Windows server implementation and administration to include Active Directory
4 years, Required -Network firewall, wireless network, routing, and switch network design, implementation, and administration.
4 years, Required -Evaluating and interpreting NESSUS vulnerability reports, building deployment packages using Microsoft Endpoint Configuration Manager, Microsoft Intune, Microsoft System Center Configuration Manager, and Windows server and workstation administration.
4 years, Required -Microsoft Windows Certifications including MCSA Windows Server
4 years, Required -Microsoft Windows Exams related to Windows Server, Security, and Networking
4 years, Required -Microsoft O365 Tenant level administration and security
4 years, Required -Strong written and verbal communication skills to serve as a technical consultant to peers, clearly and accurately document relevant issues, and prepare accurate, concise, reliable reports.
4 years, Required -Advanced skill in solving problems; in scheduling, testing, installing, and implementing programs; and in trouble shooting computer software systems
4 years, Required -Ability to handle multiple priorities while meeting strict deadlines.
Scope/Description of Services
The Worker(s) will provide the following services:
Perform Network Security Analyst work as a member of the Infrastructure Services team, participate in one or more projects concurrently.
Ensure that information systems and computer networks are secure.
Protect against hackers and cyber‐attacks, as well as monitoring network traffic and server logs for activity that seems unusual.
Responsible for finding vulnerabilities in the computer networks and creating recommendations for how to minimize these vulnerabilities.
Investigates security breaches, develops strategies for any security issues that arise and utilizes the help of firewalls and antivirus software to maintain security.
Perform other duties as assigned to maintain operations.
Work Hours and Location
Services shall be provided during normal business hours unless otherwise coordinated through TWC. Normal business hours are Monday through Friday from 8:00 AM to 5:00 PM, excluding State holidays when the agency is closed. If the Vendor is headquartered in Texas, this position is eligible for telecommuting from within the Continental United States. Conversely, if the Vendor is not headquartered in Texas, this position is eligible for telecommuting from within Texas only. Vendor employees must obtain approval in writing from their TWC supervisor to take TWC issued equipment to another continental State. Vendor employees are prohibited from taking TWC issued equipment outside of the continental United States. Such action may lead to immediate release from TWC employment.
Any and all travel, per diem, parking, and/or living expenses shall be at the Worker's expense.
The Worker(s) may be required to work outside the normal business hours on weekends, evenings, and holidays, as requested. Payment for overtime work (required work hours exceeding the standard forty (40) hours per Business Week) will be at the quoted hourly rate and must be coordinated and pre-approved through TWC.
This is a remote position.
Ideal candidates must have a secure, dedicated workspace with Internet service, ability to maintain a reliable consistent work schedule, and be available for weekly meetings and group collaboration via Microsoft Teams and other applications during regular business hours.
Position may require team members to come into the office for scheduled meetings, and there may be unscheduled requests with seventy-two (72) hour notice for any TWC business need.
If applicable, the work location will be at 101 E. 15th Street, Austin, Texas 78778
Services are expected to start as soon as possible and are expected to be completed by August 31, 2025, or when 1040 total hours estimated on Purchase Order have been depleted, whichever occurs first.
Total estimated Worker hours for the services shall not exceed 2,000 hours per Worker per Term unless otherwise amended, renewed, and/or extended by TWC via Purchase Order Change Notice.
Unused hours may be rolled over from one fiscal year to the next, as necessary.
Rates are fixed throughout each Term of the Contract.
TWC anticipates that the Term of the Contract will be one (1) year with four (4) optional one-year renewals to be exercised by TWC at its sole discretion.
Debbie Pedigo
CEO / Senior Staffing Consultant
DebbieP@PedigoStaffing.com
830.433.4604
210.401.4501
Pedigo Staffing Services
PedigoStaffing.com
https://www.linkedin.com/company/2735943
Awarded Cooperative Contracts:
DIR ITSAC (Department of Information), IT Staffing #DIR-CPO-5738
TIPS (Texas Interlocal Purchasing System), Staffing #230703
TIPS (Texas Interlocal Purchasing System), Technology Services #240101
BuyBoard, Temporary Staffing #774-25
State of Louisiana, IT Staffing #4400029273CW8873
State of Oklahoma, IT Staffing #SW1025
State of Oklahoma, Staffing #0132
Cyber Information Assurance Analyst SME - Secret Clearance
Remote job
The Cyber Information Assurance Analyst SME provides IT support services for the Marine Corps Logistics Base by independently conducting complex security analyses of classified and unclassified systems for compliance with security requirements. Performs Command Cyber Readiness Inspections, vulnerability evaluations, and utilizing various security technologies and tools to assess the security posture of intricate computer systems and networks. Responsibilities include conducting vulnerability and risk analyses, participation in penetration studies, and defining security requirements for a range of computing systems. Recommends solutions to enhance security, gathers technical information to align with organizational goals, and offers technical analysis and advice to client executive management on system improvements, focusing on areas like information systems architecture, networking, and communication protocols. This position is on-site in the Albany, GA area.
Chickasaw Nation Industries, Inc. serves as a holding company with multiple subsidiaries engaged in several lines of business (Technology, Infrastructure & Engineering, Health, Manufacturing, Public Safety, Consulting, and Transportation) for the federal government and commercial enterprises. A portion of our profits is used to support Chickasaw citizens. We are proud to support the economic development and long-term viability of the Chickasaw Nation and its people. CNI offers premium benefits eligible on the first day of hire to full time employees; (Medical - Dental - Vision), Company Life Insurance, Short-Term and Long-Term Disability Insurance, 401(K) Immediate Vesting, Professional Development Assistance, Legal Aid Assistance Program, Family Planning / Fertility Assistance, Personal Time Off, and Observance of Federal Holidays.
As a federal contractor, CNI is a drug-free workplace and adheres to the Federal Controlled Substance Act.
ESSENTIAL REQUIREMENTS
Secret Clearance is required and must be maintained for employment. Must be eligible for an IT-II upon assignment.
Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification.
IAM III and IAT II level certification is required.
Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
Seven (7) years IT experience
Five (5) years IA experience
Two (2) years of experience with DOD Vulnerability Management System
Command Cyber Readiness Inspection certification in at least one of the following areas:
Retina scan analysis o Operating Systems (Windows, Unix)
Boundary defense (network policy, router, firewall)
Internal defense (L2 switch, L3 switch)
DNS (policy, BIND/Windows)
HBSS (remote console, AV, ABM, PA, HIPS, ePO)
Traditional security (Common, Basic, NCV, SCV)
Wireless communications (BES, handhelds)
Strong analytical and problem solving skills for resolving security issues
Strong skills implementing and configuring networks and network components
Knowledge and understanding of DOD security regulations, DISA Security Technical Implementation Guides
Understanding of SCAP
Knowledge of and proficiency with: VULNERATOR; USCYBERCOM CTO Compliance Program; Wireless vulnerability assessment; Web Services (IIS, Apache, Proxy); Database (SQL Server, Oracle); Email Services (Exchange); Vulnerability Scans (NESSUS, SCCM); Knowledge of Phishing exercises; USB Detect; Physical Security.
Nice to have: DISA FSO certified CCRI Team Lead and have a certification in penetration testing, such as: Licensed Penetration Tester (LPT); Certified Expert Penetration Tester (CEPT); Certified Ethical Hacker (CEH); Global Information Assurance Certification Penetration Tester (GPEN); Familiarity with AUTOCHECKLIST Tool.
KEY DUTIES AND RESPONSIBILITIES
Essential Duties and responsibilities include the following. Other duties may be assigned.
Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements.
Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations.
Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks.
Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies.
Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers.
Recommends solutions to meet security requirements.
Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture.
Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves.
Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC. Competent to work at the highest level of all phases of information systems auditing.
EDUCATION AND EXPERIENCE
Seven (7) years of experience, or an equivalent combination of education/experience.
PHYSICAL DEMANDS
Work is primarily performed in an office environment. Regularly required to sit. Regularly required use hands to finger, handle, or feel, reach with hands and arms to handle objects and operate tools, computer, and/or controls. Required to speak and hear. Occasionally required to stand, walk and stoop, kneel, crouch, or crawl. Must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, depth perception, and ability to adjust focus. Exposed to general office noise with computers printers and light traffic.
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this job.
EOE including Disability/Vet
CNI offers a comprehensive benefits package that includes:
Medical
Dental
Vision
401(k)
Family Planning/Fertility Assistance
STD/LTD/Basic Life/AD&D
Legal-Aid Program
Employee Assistance Program (EAP)
Paid Time Off (PTO) - (11) Federal Holidays
Training and Development Opportunities
Your application submission will be considered for all potential employment opportunities with Chickasaw Nation Industries (CNI).
Information Security Analyst II (Remote, 4+ Years, 1st Shift)
Remote job
This is a full-time, direct hire position: Monday - Friday, 8:00 AM - 5:00 PM (ET) Accepting applicants in the following states: FL, GA, NC, NE, NH, PA, SC, TX, UT, VA Remote/WFH employees must have a reliable internet connection and must work in an environment free of noise and distraction.
The Company:
Make an Impact & Unleash Your Potential:
* We empower businesses to thrive in a connected world by providing innovative, secure, and reliable IT solutions and cyber security services. Immerse yourself in cutting-edge technologies, collaborate with highly talented individuals, and elevate your future.
We Live Up to Our Values:
* Take initiative, professional growth is what you make of it.
* Teamwork, collaboration, sharing of knowledge; it's what we do.
* Be heard, be respected, be supported; leadership is in it for you.
* We accomplish extraordinary results through determination and commitment.
* Customer satisfaction is at the center of what we do; we only succeed when our customers succeed.
Benefits for a Balanced You (US Employees):
* Insurance Coverage You Can Depend On (Health, Dental, Vision, Life/AD&D, Short-Term Disability, Long-Term Disability)
* Generous Time Off
* 401k Retirement Plan with Company Match
* Peer-to-Peer Recognition
* Learning and Development
* Pet Insurance
* Fun On and Off-Site Events
* Referral Bonus Program
* Employee Assistance Program
* Critical Illness Insurance
* Accident Insurance
* Hospital Indemnity Insurance
* Legal and Identity Protection Services
The Opportunity:
The Information Security Analyst will support day-to-day security operations, event/incident investigation, security control assessment, data analysis and reporting, and other infosec-related activities. The analyst will work with the Project team as well as Helpdesk Support team to communicate risks and vulnerabilities, recommended changes which will remediate issues and/or improve security and create documentation or reports regarding infosec activity and incidents.
Essential Duties and Responsibilities
* Create policies to ensure our customers' infrastructure and information assets are protected with BCS security offerings: including Sophos Anti-virus and Malware Protection, Sophos Intercept-X, and Encryption.
* Audit, analyze, plan, execute, and manage multi-faceted projects related to the BCS security offerings for our customers including onboarding.
* Review customers IT Systems platforms to determine the current role of the system and seek out vulnerabilities
* Responsible for ensuring BCS Security offering has the necessary monitoring of the computing environment required to alert Helpdesk Support through the ticketing system.
* Consistently conduct in-depth test of customer's systems of the current and newly implemented infrastructure for IT Security to ensure policies and settings are applied correctly.
* Analyze system generated information and trends in the data and develop improvements to increase a system's performance.
* Assess the customers IT system for perceived or actual threats and respond to any issues that are presented and/or escalate where necessary.
* Enforce security policies and procedures, they monitor data security profiles on all platforms by reviewing security violation reports and investigating security exceptions.
* Responsible for reviewing and improving/developing response plans to any potential threat opportunities until the problem is mitigated completely.
* Develops and generates reports for management, customers, and other departments around the managed BCS security service/tools offerings.
* This role will monitor compliance with security policies, standards, guidelines and procedures while ensuring security compliance with legal and regulatory standards.
* Follows up on deficiencies identified in monitoring reviews, self-assessments, automated assessments, and internal and external audits to ensure that appropriate remediation measures have been taken.
* Responds to security incidents (Helpdesk Support), conducts forensic investigations and targets reviews of suspect areas as well as develop action plans to address root causes of security-related problems.
* Collaborates on projects to ensure that security issues are addressed throughout the project life cycle.
* Reports to management concerning residual risk, vulnerabilities and other security exposures, including misuse of information assets and noncompliance.
* Provides responsive support for problems found during normal working hours as well as outside normal working hours as needed.
Competencies, Skills, and Qualifications
* 4-5 years of security experience working with Endpoint Security, Intrusion Prevention, and Firewall security
* Proven work experience as a system security engineer or information security engineer
* Experience in building and maintaining security systems
* Detailed technical knowledge of database and operating system security
* Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc
* Experience with network security and networking technologies and with system, security, and network monitoring tools
* Thorough understanding of the latest security principles, techniques, and protocols
* Problem solving skills and ability to work under pressure
Development Expectations
* Ethical Hacker - Preferred / Development Plan
* Associate of (ISC)² - Preferred / Development Plan
* CISSP (Certified Information Systems Security Professional) - Preferred / Development Plan
* CCNP Security - Preferred / Development Plan
BCS365 is an Equal Opportunity Employer. We consider applicants for all positions without discrimination based on race, color, religion, creed, gender, national origin, sexual orientation, age marital or veteran status, disability, or any other legally protected status.
Please Note: BCS365 participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S.
Remote Pre-Sales Security Systems Engineer - Access Control & CCTV
Remote job
Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
Responsibilities
* Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure.
* Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings.
* Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
* Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
* Create solution design documentation (drawings, BOMs, solution design summaries).
* Provide technical support for in-office and on-site team members.
* Support management in the process of creating documentation for implementing new technology with new and existing customers.
* Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors.
Qualifications
* A minimum of 3-7 years previous experience in the industry.
* Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background.
* Experience in the design and planning of access control and video systems.
* Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred.
Company Overview
This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
System Engineer III - Identity and Access Management/Information Solutions - Security (Remote)
Remote job
The System Engineer III, Identity & Access Management (IAM) reports to the Identity & Access Management Team Lead in support of MUSC's academic, research and healthcare missions. Under general supervision, the System Engineer III, IAM has a strong understanding of federated authentication, SSO, and SAML along with the ability to make recommendations, scope, and execute on opportunities for automation or improvement in identity system architecture. Evaluates and resolves complex technical issues and demonstrates strong analytical and communication skills to maximize the benefit of Information Solutions services. Generates appropriate documentation, communications, processes, and educational plans to identify and remove obstacles to, and mitigate the disruption of, change. Serves as the subject matter expert in all areas of identity and access management. Takes a lead role in projects, participates in team and project meetings, and provides input on intelligent solutions to maintain and improve MUSC's identity security posture. Coaches and transfers knowledge to peers and staff, maintains high professional standards, and exhibits excellent customer service skills while performing assigned tasks.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC002271 SYS - CISO Operations
Pay Rate Type
Salary
Pay Grade
Health-30
Scheduled Weekly Hours
40
Work Shift
The System Engineer III, Identity & Access Management (IAM) reports to the Identity & Access Management Team Lead in support of MUSC's academic, research and healthcare missions. Under general supervision, the System Engineer III, IAM has a strong understanding of federated authentication, SSO, and SAML along with the ability to make recommendations, scope, and execute on opportunities for automation or improvement in identity system architecture. Evaluates and resolves complex technical issues and demonstrates strong analytical and communication skills to maximize the benefit of Information Solutions services. Generates appropriate documentation, communications, processes, and educational plans to identify and remove obstacles to, and mitigate the disruption of, change. Serves as the subject matter expert in all areas of identity and access management. Takes a lead role in projects, participates in team and project meetings, and provides input on intelligent solutions to maintain and improve MUSC's identity security posture. Coaches and transfers knowledge to peers and staff, maintains high professional standards, and exhibits excellent customer service skills while performing assigned tasks.
Additional Job Description
Requirements (Education, Work Experience, Licensure, Registry &/or Certifications)
A bachelor's degree and five years directly related experience; or a high school diploma and seven years directly related experience or a Masters' degree and 3 years directly related experience required. Must possess strong interpersonal, project management, analytical and communication skills.
Identity & Access Management experience: 4+ years (preferred)
Experience with some/all the following technologies strongly preferred: Sailpoint IIQ, Active Directory, SSO (ADFS/Shibboleth), Privilege Account Management (Secret Server), SQL programming, Powershell Scripting, and Microsoft MFA
Physical Requirements:
Ability to perform job functions while standing. (Continuous) Ability to perform job functions while sitting. (Continuous) Ability to perform job functions while walking. (Continuous) Ability to climb stairs. (Infrequent) Ability to work indoors. (Continuous) Ability to work outside in temperature extremes. (Infrequent) Ability to work from elevated areas. (Frequent) Ability to work in confined/cramped spaces. (Frequent) Ability to perform job functions from kneeling positions. (Infrequent) Ability to bend at the waist. (Continuous) Ability to twist at the waist. (Frequent) Ability to squat and perform job functions. (Frequent) Ability to perform "pinching" operations. (Frequent) Ability to perform gross motor activities with fingers and hands. (Continuous) Ability to perform firm grasping with fingers and hands. (Continuous) Ability to perform fine manipulation with fingers and hands. (Continuous) Ability to reach overhead. (Frequent) Ability to perform repetitive motions with hands/wrists/elbows and shoulders. (Continuous) Ability to fully use both legs. (Continuous) Ability to use lower extremities for balance and coordination. (Frequent) Ability to reach in all directions. (Continuous) Ability to lift and carry 50 lbs. unassisted. (Infrequent) Ability to lift/lower objects 50 lbs. from/to floor from/to 36 inches unassisted. (Infrequent) Ability to lift from 36" to overhead 25 lbs. (Infrequent) Ability to exert up to 50 lbs. of force. (Frequent) Examples include: To transfer a 100 lb. patient that can not assist in the transfer requires 50 lbs. of force. For every 100 additional pounds, assistance will be required from another healthcare worker. 20 lbs. of force is needed to push a 400 lb. patient in a wheelchair on carpet. 25 lbs. of force is required to push a stretcher with a patient with one hand. Ability to maintain 20/40 vision, corrected, in one eye or with both eyes. (Continuous) Ability to see and recognize objects close at hand or at a distance. (Continuous) Ability to match or discriminate between colors. (Continuous) Ability to determine distance/relationship between objects; depth perception. (Continuous) Good peripheral vision capabilities. (Continuous) Ability to maintain hearing acuity, with correction. (Continuous) Ability to perform gross motor functions with frequent fine motor movements. (Continuous) Ability to deal effectively with stressful situations. (Continuous) Ability to work rotating shifts. (Frequent) Ability to work overtime as required. (Frequent) Ability to work in a latex safe environment. (Continuous) Ability to maintain tactile sensory functions. (Continuous) (Selected Positions) *Ability to maintain good olfactory sensory function. (Continuous) *(Selected Positions) *Ability to be qualified physically for respirator use, initially and as required. (Continuous) (Selected Positions)
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
System Engineer III - Identity and Access Management/Information Solutions - Security (Remote)
Remote job
The System Engineer III, Identity & Access Management (IAM) reports to the Identity & Access Management Team Lead in support of MUSC's academic, research and healthcare missions. Under general supervision, the System Engineer III, IAM has a strong understanding of federated authentication, SSO, and SAML along with the ability to make recommendations, scope, and execute on opportunities for automation or improvement in identity system architecture. Evaluates and resolves complex technical issues and demonstrates strong analytical and communication skills to maximize the benefit of Information Solutions services. Generates appropriate documentation, communications, processes, and educational plans to identify and remove obstacles to, and mitigate the disruption of, change. Serves as the subject matter expert in all areas of identity and access management. Takes a lead role in projects, participates in team and project meetings, and provides input on intelligent solutions to maintain and improve MUSC's identity security posture. Coaches and transfers knowledge to peers and staff, maintains high professional standards, and exhibits excellent customer service skills while performing assigned tasks.
Entity
Medical University Hospital Authority (MUHA)
Worker Type
Employee
Worker Sub-Type
Regular
Cost Center
CC002271 SYS - CISO Operations
Pay Rate Type
Salary
Pay Grade
Health-30
Scheduled Weekly Hours
40
Work Shift
The System Engineer III, Identity & Access Management (IAM) reports to the Identity & Access Management Team Lead in support of MUSC's academic, research and healthcare missions. Under general supervision, the System Engineer III, IAM has a strong understanding of federated authentication, SSO, and SAML along with the ability to make recommendations, scope, and execute on opportunities for automation or improvement in identity system architecture. Evaluates and resolves complex technical issues and demonstrates strong analytical and communication skills to maximize the benefit of Information Solutions services. Generates appropriate documentation, communications, processes, and educational plans to identify and remove obstacles to, and mitigate the disruption of, change. Serves as the subject matter expert in all areas of identity and access management. Takes a lead role in projects, participates in team and project meetings, and provides input on intelligent solutions to maintain and improve MUSC's identity security posture. Coaches and transfers knowledge to peers and staff, maintains high professional standards, and exhibits excellent customer service skills while performing assigned tasks.
Additional Job Description
Requirements (Education, Work Experience, Licensure, Registry &/or Certifications)
A bachelor's degree and five years directly related experience; or a high school diploma and seven years directly related experience or a Masters' degree and 3 years directly related experience required. Must possess strong interpersonal, project management, analytical and communication skills.
Identity & Access Management experience: 4+ years (preferred)
Experience with some/all the following technologies strongly preferred: Sailpoint IIQ, Active Directory, SSO (ADFS/Shibboleth), Privilege Account Management (Secret Server), SQL programming, Powershell Scripting, and Microsoft MFA
Physical Requirements:
Ability to perform job functions while standing. (Continuous) Ability to perform job functions while sitting. (Continuous) Ability to perform job functions while walking. (Continuous) Ability to climb stairs. (Infrequent) Ability to work indoors. (Continuous) Ability to work outside in temperature extremes. (Infrequent) Ability to work from elevated areas. (Frequent) Ability to work in confined/cramped spaces. (Frequent) Ability to perform job functions from kneeling positions. (Infrequent) Ability to bend at the waist. (Continuous) Ability to twist at the waist. (Frequent) Ability to squat and perform job functions. (Frequent) Ability to perform "pinching" operations. (Frequent) Ability to perform gross motor activities with fingers and hands. (Continuous) Ability to perform firm grasping with fingers and hands. (Continuous) Ability to perform fine manipulation with fingers and hands. (Continuous) Ability to reach overhead. (Frequent) Ability to perform repetitive motions with hands/wrists/elbows and shoulders. (Continuous) Ability to fully use both legs. (Continuous) Ability to use lower extremities for balance and coordination. (Frequent) Ability to reach in all directions. (Continuous) Ability to lift and carry 50 lbs. unassisted. (Infrequent) Ability to lift/lower objects 50 lbs. from/to floor from/to 36 inches unassisted. (Infrequent) Ability to lift from 36" to overhead 25 lbs. (Infrequent) Ability to exert up to 50 lbs. of force. (Frequent) Examples include: To transfer a 100 lb. patient that can not assist in the transfer requires 50 lbs. of force. For every 100 additional pounds, assistance will be required from another healthcare worker. 20 lbs. of force is needed to push a 400 lb. patient in a wheelchair on carpet. 25 lbs. of force is required to push a stretcher with a patient with one hand. Ability to maintain 20/40 vision, corrected, in one eye or with both eyes. (Continuous) Ability to see and recognize objects close at hand or at a distance. (Continuous) Ability to match or discriminate between colors. (Continuous) Ability to determine distance/relationship between objects; depth perception. (Continuous) Good peripheral vision capabilities. (Continuous) Ability to maintain hearing acuity, with correction. (Continuous) Ability to perform gross motor functions with frequent fine motor movements. (Continuous) Ability to deal effectively with stressful situations. (Continuous) Ability to work rotating shifts. (Frequent) Ability to work overtime as required. (Frequent) Ability to work in a latex safe environment. (Continuous) Ability to maintain tactile sensory functions. (Continuous) (Selected Positions) *Ability to maintain good olfactory sensory function. (Continuous) *(Selected Positions) *Ability to be qualified physically for respirator use, initially and as required. (Continuous) (Selected Positions)
If you like working with energetic enthusiastic individuals, you will enjoy your career with us!
The Medical University of South Carolina is an Equal Opportunity Employer. MUSC does not discriminate on the basis of race, color, religion or belief, age, sex, national origin, gender identity, sexual orientation, disability, protected veteran status, family or parental status, or any other status protected by state laws and/or federal regulations. All qualified applicants are encouraged to apply and will receive consideration for employment based upon applicable qualifications, merit and business need.
Medical University of South Carolina participates in the federal E-Verify program to confirm the identity and employment authorization of all newly hired employees. For further information about the E-Verify program, please click here: ***************************************
Information Security Analyst
Remote job
About the role
As a Information Security Analyst at VTEX you will partner with compliance, legal, customer experience and sales teams to meet and maintain InfoSec Compliance requirements for frameworks like SOC 2, SOX, PCI-DSS and ISO 27k. In this role, you will:
Research and evaluate emerging InfoSec Compliance automation tools, implement and manage them.
Define how to scale our ability to communicate our InfoSec posture to our current and potential customers.
Be responsible for creating and updating the InfoSec policies and procedures.
Research or conduct internal fact-finding of our current controls.
Assist with the creation, maintenance and delivery of InfoSec awareness training for colleagues
Generate reports for both technical and non-technical staff and stakeholders
Maintain an information security risk register and assist with internal and external audits relating to information security
This is also an excellent opportunity to help shape the future of Security and Privacy for enterprise digital commerce platforms.
About the team You will be part of our Security & Privacy organization, which provides expertise, tools, and frameworks that enable all teams at VTEX to build secure and reliable systems. You will work on engineering projects with high impact and measurable results that affect the whole company, preventing and eliminating whole classes of threats at once, as opposed to one at a time. Who you are
Have strong communication skills in English and Portuguese (Spanish would be a bonus) and can convey security and compliance topics to non-technical people unfamiliar with specifics of security.
Capable of summarizing and demonstrating security & compliance capabilities driving discussions with senior leaders in the industry regarding trade-offs, best practices, and risk mitigation.
Known for collaborating effectively and coordinating work across multiple organizations such as product, engineering, customer experience, and sales.
Familiar with at least two of the audit frameworks mentioned above.
Eager to understand at a high level how our enterprise digital commerce platform works.
#LI-Remote About VTEX
VTEX (NYSE: VTEX) is the composable and complete commerce platform that delivers more efficiency and less maintenance to organizations seeking to make smarter IT investments and modernize their tech stack. Through our pragmatic composability approach, we empower brands, distributors, and retailers with unparalleled flexibility and comprehensive solutions, enabling them to invest solely in what provides a clear business advantage and boosts profitability. VTEX is trusted by 2,400 global B2C and B2B customers, including Carrefour, Colgate, Motorola, Sony, Stanley Black & Decker, and Whirlpool, having 3,400 active online stores across 43 countries (as of FY ended on December 31, 2024).
Founded in the year 2000, VTEX has a history of being unstoppable. Completely against the odds, VTEX is leading a high-tech industry and positioned above market giants. We are building an extraordinary future with more than 1,300 employees scattered across 25 locations in 16 countries in Latin America, North America, Europe, and Asia. For more information, visit *************
At VTEX, you will work in a challenge-driven environment and collaborate with amazing peers. If you are powerful individually, join us, and we will be unstoppable together.
BENEFITS
Annual profit-sharing program and equity eligibility;
Health, dental, and life insurance with national coverage provided by VTEX;
Annual budget for professional development in Tech;
Language development incentive program (English, Spanish, Portuguese);
Flexible meal allowance;
Extended parental leaves;
Child-care assistance;
Flexible work schedule and remote-first culture;
Financial assistance to build your work-from-home setup;
Wellness program;
Free shipping on 1000+ VTEX stores