Cyber SDC- Secure Design Pattern Analyst - Staff 2 - Consulting - Location OPEN
Cyber Security Analyst job in Urban Honolulu, HI
At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.
In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Secure Design Pattern team, you will play a vital role in achieving this objective by empowering clients to comprehend, navigate, and secure all applicable layers of business applications. This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity.
**The opportunity**
We currently offer an exciting career opportunity for a Secure Design Pattern Analyst responsible for establishing blueprints to standardize implementation of security controls across layers of business applications and architectures.
At our core, our Secure Design Pattern services play a pivotal role in assisting our clients to implement business applications securely and in line with industry best practices and client policies and standards. The ideal candidate will be responsible for documenting secure design patterns, interfacing with application owners, architects, and subject matter resources, as well as discuss and apply secure patterns, guidelines, and principles.
**Your Key Responsibilities**
+ Create and maintain design patterns documentation and playbooks
+ Coordinate and streamline the processes to create, update, manage, and control design patterns. at clients.
+ Engage with security architects, product owners, engineers, and subject matter resources to support new design patterns and updates to design patterns.
+ Promote security best practices within discussions.
+ Review and process design pattern service requests, ensuring timely resolution.
+ Track and report the status of secure design pattern requests, provide regular updates on progress and outcomes.
**Skills and Attributes for Success**
+ Proven experience writing technical documentation, standard operating procedures, policies, standards supporting the implementation of security controls and architecture patterns.
+ Understanding and apply secure design concepts.
+ Strong communication skills, with the ability to convey technical information in discussions and documentation.
+ Knowledge of industry security frameworks and compliance standards and regulations (e.g., CMMC, NIST, ISO 27001, CIS, OWASP, TOGAF, SABSA, etc.)
+ Familiarity with cloud security platforms (e.g., AWS, Azure) and cloud-native security controls.
+ Basic understanding of authentication (OAuth, SAML, OpenID), authorization (RBAC, ABAC), and Zero Trust
+ Understanding of encryption algorithms, key management, digital signatures, and PKI.
+ Familiarity with SIEM, SOAR, XDR, log management, and anomaly detection.
+ Familiarity with secure coding practices, DevSecOps, SAST/DAST tools, and software security design.
+ Familiarity with firewalls, VPNs, TLS, micro-segmentation, and intrusion detection.
+ Excellent problem-solving skills and the ability to manage multiple tasks effectively.
+ Strong communication skills to collaborate with team members and stakeholders (e.g., business, information technology, product owners, cybersecurity.
+ A track record of delivering high-quality client services and work products within expected timeframes.
+ Ability to managing and maintain inventories of documentation
**To qualify for the role you must have**
+ Understanding of security principles
+ Bachelor's degree in computer science, information technology, cybersecurity, technical writing, or a related field
+ Proven experience in technical writing
+ Hands on experience managing or working on a security architecture and/or GRC team
+ Basic knowledge of cloud platforms (AWS, Azure) and their security features
+ Knowledge of common industry security frameworks and regulations (e.g., CMMC, NIST, ISO 27001, CIS, OWASP, etc.)
+ Knowledge of general security concepts and methods, such as security policy creation, enterprise security strategies, architectures, governance, vulnerability assessments, privacy assessments, intrusion detection, and incident response
+ Experience in leading process definition, workflow design, and process mapping
+ Experience in ServiceNow managing tickets and generating basic reports.
**Ideally, you'd also have**
+ Professional certifications in cybersecurity, such as CISSP, CISM, or specific vendor certifications like from AWS, Azure, and Google Cloud.
+ Hands on experience in cloud-based security solutions
+ Prior experience as a security architect
+ Experience in assessing compliance to regulations and standards
+ Strong interpersonal and communication skills, with the ability to collaborate effectively with clients and cross-functional teams to present solution designs, options, and innovations.
**What we look for**
We are interested in intellectually curious people with a genuine passion for cybersecurity. With your broad exposure across security architecture and enterprise applications, we will turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry at large. If you have the confidence in both your writing, presentation, and technical abilities to grow into a leading expert here, this is the role for you.
**What we offer you**
At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
+ We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $61,200 to $100,500. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $73,100 to $113,500. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
+ Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
+ Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
SOC Cyber Analyst (Journeyman or Junior)
Cyber Security Analyst job in Urban Honolulu, HI
Job Description
Akira Technologies is seeking a Cyber Analyst team member who is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
This role supports a government client in the following locations five days a week: Port Hueneme, CA, Bremerton, WA, and Honolulu, HI. Active Secret clearance or higher is also required for this role.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines.
Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
Job Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
Job Qualifications
Active Secret security clearance or higher.
At least 3 years, (Journeyman), or applicable 1 to 2 years (Junior) of experience in security operations, demonstrating analytical duties and preforming host or network security analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
Preferred Skill Sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification
Salary Range: $80,000 to $100,000
Akira’s pay range for this position considers various factors including skills, years of experience, training, licenses, certifications, alignment with market data, and internal equity in the organization. This pay range estimate is a general guideline only and not a guarantee of compensation or salary, which Akira believes to be done in good faith in compliance with local laws. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.
General Description of Benefits
Akira offers its employees multiple options for medical plans (some with Health Savings Account), dental plans, and vision coverage, and a 401(k) plan with employer match. To promote work/life balance, Akira offers paid time off, including vacation and sick time, holidays, paid parental leave, military leave, bereavement leave, and jury duty leave. We also offer short and long-term disability benefits to protect employee income in the event of sickness or injury, life insurance, accidental death and dismemberment insurance, and critical illness insurance. Akira also offers tuition, training, and certification reimbursement for professional development and career advancement.
Akira regularly reviews our total rewards package to ensure our offerings remain competitive and reflect the values and needs expressed by our employees.
About Akira Technologies
Akira strives to meet and exceed the mission and objectives of US federal agencies. As a leading small business cloud modernization and data analytics services provider, we deliver trusted and highly differentiated solutions and technologies that serve the needs of our customers and citizens. Akira serves as a valued partner to essential government agencies across the intelligence, cyber, defense, civilian, and health markets. Every day, our employees deliver transformational outcomes, solving the most daunting challenges facing our customers.
Akira is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Integrated Air and Missile Defense (IAMD) Analyst
Cyber Security Analyst job in Urban Honolulu, HI
Amentum is seeking a versatile and dedicated **Integrated Air and Missile Defense (IAMD) Analyst** to provide research, planning, analytical, and training support to U.S. Indo-Pacific Command (USINDOPACOM), Camp H.M. Smith, HI, with duty at **U.S. Pacific Air Force Headquarters.**
You will provide analysis to support credible planning, development, synchronization, facilitation, evaluation, and integration of USINDOPACOM and component IAMD that focuses on existing and future IAMD capabilities to ensure adequate protection of defined critical assets in the USINDOPACOM AOR. This position also includes interagency partnering, international military exercises, and the defense of U.S. interests abroad to enhance regional peace, and will support new concepts of national strategic policy, emerging technologies, and evolving partner nation requirements.
USINDOPACOM conducts planning in support of the INDOPACOM Campaign Plan (IPCP) to shape the environment in the INDOPACOM Area of Operation (AOR) and success depends on the command's ability to understand the complex dynamics of the theater as a whole and the nuanced details of each sub-region. To that end, you would support the planning requirements with research, analysis, intelligence and threat assessments, complex data management and policy integration throughout the AOR. Your results and recommendations will further inform senior level staff at USINDOPACOM, the Service Components, Joint Staff and OSD.
**Essential Responsibilities:**
+ Be well versed in Joint data information integration systems and networks which enable IAMD defense design as well as be capable of recommending appropriate plans and TTPs that ensure the successful employment of limited, critical IAMD assets.
+ Responsible for researching and developing recommendations for next generation technological hardware and software, conduct mission capabilities evaluations, and provide the warfighter with analysis of current and future technologies.
+ Support the development of IAMD/Ballistic Missile Defense (BMD) Concepts of Operations (CONOPS) for USINDOPACOM and its components. The CONOPS will document how operators utilize IAMD/BMD systems and Command and control.
+ Provide assessments of the ability of adversary nations, in both the near and long term, to target the USINDOPACOM AOR and the U.S. homeland with ballistic missiles.
+ Services to be performed under this task consist of the functional areas of IAMD operations, exercise planning and participation, integration, interoperability, resources, policy, strategy, cyber, threat analysis, C2, logistics, and exercises/war games.
+ Identify high-value gaps and develop innovative solutions, must have unique insights to both intelligence analysis processes and theater engagement.
+ Provide in-depth analysis based on data collected and provide recommendations in support of USINDOPACOM J36 initiatives. This analysis will be applied to support, streamline, and enable the USINDOPACOM engagement strategy.
+ Aid senior-level strategic planning and briefings, including preparing formal papers and background information for USINDOPACOM.
**Minimum Requirements:**
+ Bachelor's degree or 10 years of IAMD experience in lieu of degree.
+ At least 5 years of experience supporting the DoD, including:
+ At least 3 years of experience in Ballistic Missile Defense (BMD) and/or Integrated Air and Missile Defense (IAMD) operations.
+ Familiarity with strategic and campaign plan documents, the USINDOPACOM Theater Engagement Plan and other Combatant Command OPLANS.
+ Well versed in joint doctrine, contingency, and crisis action planning procedures.
+ Ability to communicate effectively verbally and in writing to provide information, articles, written reports, and presentations to include delivering executive summaries to flag and general officers (FO/GO) and Senior Executive Service (SES) level officials.
+ Experience providing regularly scheduled project plans and status reports.
+ Must have demonstrated skill in using integrated software (e.g., MS Office suite).
+ Previous experience working TS/SCI level projects.
+ Must have an active Secret security clearance with the eligibility to obtain a Top-Secret clearance with SCI eligibility after your start date. Note: US Citizenship is required to obtain a Secret Clearance.
**Preferred Qualifications:**
+ Experience in the Air Force or Navy preferred.
+ At least 3 years' experience working in USINDOPACOM specific topics and/or engagement activities.
+ At least 2 years of experience in joint or senior command organizations, including USINDOPACOM and/or components.
+ Understanding of the Joint Training Information Management System (JTIMS).
+ Understanding of the Joint Theater Air and Missile Defense process (JTAMD),
+ Graduate of Service or Joint Planner Course.
+ Graduate of an advanced integrated air defense or equivalent service school.
The salary range for this position is $135K to $160K. (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, and alignment with market data.) This position includes a competitive benefits package. For more detailed information on our Benefits and what it is like to work for Amentum: please visit our careers site: ********************** .
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters (********************************* SkbztPuAwwxfs) .
Information Assurance Analyst
Cyber Security Analyst job in Urban Honolulu, HI
Information Assurance AnalystLOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a detail-oriented and proactive Information Assurance Analyst to join our team and safeguard critical information systems. In this role, you will play a key part in identifying, assessing, and mitigating security risks to ensure compliance with organizational policies and industry standards. Collaborating with technical teams, you will implement best practices, monitor systems for vulnerabilities, and provide solutions to enhance security. If you are passionate about protecting sensitive data and thrive in a dynamic, fast-paced environment, we encourage you to apply!
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Security Analyst, Information Security Specialist, Risk Management Analyst, Compliance Analyst, IT Security Analyst, Security Operations Analyst, Network Security Analyst, Vulnerability Analyst, Data Protection Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Information Assurance, Computer Science, Information Technology, Systems Engineering, Network Security, Information Systems, Data Science, Risk Management, Software Engineering, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Identify and mitigate security risks
Conduct system vulnerability assessments
Monitor compliance with security policies
Implement security best practices
Document security incidents and resolutions
Collaborate with IT and security teams
REQUIRED SKILLS
Knowledge of security frameworks
Risk assessment and analysis
Incident response techniques
Proficiency in security tools
Understanding of access control
Strong analytical thinking
DESIRED SKILLS
Familiarity with SIEM platforms
Experience with penetration testing
Knowledge of cloud security
Understanding of compliance standards (e.g., NIST, ISO)
Familiarity with encryption protocols
Proficiency in security automation tools
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
**TS/SCI w/ POLY** Computer Network Defense Analyst
Cyber Security Analyst job in Urban Honolulu, HI
Job description
TS SCI with POLY REQUIRED
As a CDNA, you will:
Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
Gain work experience spanning the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
Have the opportunity to advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security
Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
Distill, document, contextualize and share your findings (including any new tradecraft that you develop) with teammates, stakeholders, and intelligence consumers
Required Qualifications
Relevant experience must be in some or all of the following:
Computer or information systems design/development, programming
Information/cyber/network security
Vulnerability analysis, penetration testing
Computer forensics
Information assurance
Systems engineering
Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area will be considered towards relevant experience requirement (i.e., 20- to 24-week courses will count as six months of experience; 10-14 weeks will count as three months of experience). Such training includes:
JCAC (Joint Cyber Analysis Course)
Undergraduate Cyber Training (UCT)
Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT)
Cyber Defense Operations
In some cases, foreign language proficiency may also be used to satisfy experience requirements; recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level. The total of all experience equivalencies is capped at half of the required years of experience.
Security Engineer - Security Risk Management
Cyber Security Analyst job in Urban Honolulu, HI
The Meta Security team is responsible for improving the security posture of the software and services used throughout our company. Our work spans Facebook, Instagram, WhatsApp, Oculus, and all of the underlying systems and infrastructure that power these products behind the scenes.We are seeking a committed and experienced security engineer to join our Security Risk Management (SRM) team to help design and build solutions to:* Drive better understanding of security risk and enable investment decisions through automation, monitoring, and tracking of Meta's security tools, systems, and controls* Enable security and software engineers to seamlessly respond to requests to prove effective design and operation of security capabilities* Increase maturity of security capabilities through control improvements and redesign
**Required Skills:**
Security Engineer - Security Risk Management Responsibilities:
1. Work with a team of software, data, and security engineers that design, build, and own software solutions that scale high fidelity security risk contextualization, tracking, and reporting
2. Understand and influence evolution of security capabilities across various domains to scale and automate: a) monitoring the effectiveness, and b) increasing the maturity of those capabilities
3. Design and build solutions to scale managing and responding to risk management & compliance related requests
**Minimum Qualifications:**
Minimum Qualifications:
4. Bachelor's degree or equivalent experience in information security
5. 5+ years work experience securing enterprise-scale infrastructure software and services
6. 3-5+ years programming experience with at least one of the following languages: Python, PHP, Ruby, or similar scripting languages
7. Experience remediating infrastructure security gaps across broad corporate boundaries using influence and relationships
8. Experience with security control automation/monitoring or "compliance as code" implementations
9. Experience thinking critically and defending solutions with solid communications skills in a cross-functional setting to influence decision makers across all levels of technical background
**Preferred Qualifications:**
Preferred Qualifications:
10. Networking and system administration experience of server (Linux, Windows) and client (Windows, mac OS, Linux) operating systems
11. Experience influencing software engineers to build products meant to scale security solutions
12. Experience generating automated metrics to measure service and program effectiveness and consistency
13. Experience with common risk & compliance program activities (e.g., controls, risk, policy management)
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Information Systems Security Officer (ISSO) II - Hawaii
Cyber Security Analyst job in Urban Honolulu, HI
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Information Security
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description:
Information Systems Security Officer
Level II (2)
Honolulu, HI
Are you a System or Network Administrator that has also been performing some IT Security functions and have been seeking an opportunity to expand into a more security centric role?
TS/SCI Cleared and have been read into a SAP (Special Access Program) at some time during your career?
If so, then this may be the role for you.
Chosen individual for this role will be a level 2 ISSO responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.
Chosen person must demonstrate detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of an IT system(s).
Will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.
Will be responsible for assessing the security impact of those changes and making recommendation to the ISSM.
The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
5+ years related experience
TS/SCI Clearance and SAP experience required
Demonstrate prior performance in roles such as System, Network Administrator or ISSO/ISSM/ISSE etc.
Education:
Bachelor's degree or equivalent experience (4 years)
Certifications:
IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.)
Security Clearance:
TS/SCI required.
Must be able to attain CI Polygraph
Other Requirements:
Must be able to regularly lift up to 50 lbs.
#AirforceSAPOpportunities
#defensejobs
The likely salary range for this position is $105,622 - $126,385. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
None
Telecommuting Options:
Onsite
Work Location:
USA HI Honolulu - Customer Proprietary (HIC045)
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Security Analyst, 2nd Shift (Honolulu, Hawaii)
Cyber Security Analyst job in Urban Honolulu, HI
The Company
Every day, NuHarbor Security improves the cybersecurity of our clients by making it stronger and easier to understand. Our comprehensive suite of security services, from strategic advising to 24-hour monitoring and management, provide an organizational view of security that is focused on results and recommendations that are valuable for both business and technical leaders. We're growing quickly because our clients, and the general market, are looking for these outcomes and for the data it gives them to explain, promote, and justify, their security investment and mission.
The Role
NuHarbor Security is expanding operations to Honolulu, Hawaii. We are hiring 2 Security Analysts for 2
nd
shift. As part of our Managed Security Services team, Security Analysts are responsible for ensuring that client environments are monitored for security incidents and escalating notable events to clients and/or internal crew members.
What you'll do
Live by the NuHarbor Corporate Values: Help Clients Win, Always Improve, Protect the House.
Responsible and accountable for analyzing security alerts, events, and trends in order to effectively communicate the value of NuHarbor services.
Independently and autonomously conducts investigations to provide actionable, context relevant, escalations to clients.
Provide analysis and interpretation of vulnerability scans and assessments.
Ensure client facing and internal escalations are serviced in a timely fashion.
Leverage their understanding of client environments to identify and communicate security gaps and potential mitigations.
Identify and scope opportunities for improvements in efficiency, quality, maturity, and capabilities.
Maintain current certifications and training relevant to their role as defined in the NuHarbor Career Course Toolkit.
Develop, implement, and improve documentation and operational processes.
Use an advanced understanding of, and ability to communicate, security technologies to mitigate cyber risks.
Be responsible for ensuring reports are generated to standard and on-schedule.
Maintain the NuHarbor Security threat intelligence platform.
Perform threat hunting in client environments.
Proactively identifies and communicates internal and client risks.
Perform intelligence gathering and analysis to influence technical control development, client security program maturity, and client attack surface defense.
Continually researches the cyber industry to stay up to date on current threats, threat actor's tactics and techniques, and emerging vulnerabilities.
Your foundation. The requirements for this role:
Bachelor's Degree and two (2) years of experience. Experience should be in a cybersecurity field and should include relevant industry certifications.
In lieu of a degree, two (2) years of experience in a related technology field and relevant industry certifications are required.
Demonstrated experience with SOC operations, executing security event triaging and tuning.
Strong understanding of Incident Response phases and demonstrated experience responding to security incidents.
Demonstrated experience with security event triaging and threat hunting executed through both a SIEM and EDR toolset.
Two (2) years' experience with Splunk Enterprise Security, CrowdStrike Falcon, and Microsoft Sentinel or Defender.
Demonstrated experience with Endpoint Detection and Response (EDR) or Security Orchestration Automation and Response solutions.
Demonstrated experience with scripting in industry standard languages in a manner that supports automation solutions.
Must be a citizen of the United States.
Additional capabilities that will differentiate you for this role:
Bachelor's Degree and Five (5) or more years in the Information Technology field.
Holds at least two relevant industry certifications (GCFA, GCIH, CEH, CISSP, etc.)
Demonstrated experience writing runbooks and support procedures.
Excellent written and verbal communication, and collaboration skills.
Experience executing initial triaging and response through a SOAR platform.
Experience with multiple operating systems (Linux, MacOS, Windows), their command lines, processes, and file systems.
Experience with memory and storage forensics.
Experience with static and dynamic malware analysis.
Experience providing recommendations to harden existing security controls.
Experience identifying gaps within security control architecture.
General systems administrator experience.
Experience working in multiple cybersecurity disciplines (i.e. RedSec, Threat, Information Assurance, Engineering, etc.)
Base Salary for this role is targeted at $94,000 - $115,000 annually.
*Salary based on Burlington, VT salary data. Offer is based on candidate geography. Additionally, this role is eligible for the company bonus plan at a 10% target.
This role is based in Honolulu, Hawaii.
The Rewards
What you can expect:
The engagement and support of company leadership who recognize the challenge of marketing a complex cybersecurity service in a chaotic market.
An organization that recognizes and rewards employee commitment and contribution to our customers' satisfaction and success
Growth in your career and capabilities as you help to chart a path to improving customer interactivity and service adoption.
A collaborative and driven working environment in a rapidly growing company and market
A fun and social working environment where you are encouraged to be your true self.
You can also expect competitive salary and benefits, including paid time to give back in your community and generous PTO.
We are purpose driven. We, as an organization, above anything else protect the house first and then help our customers win. If this sounds like the kind of organization you'd like to be a part of, we‘d like to hear from you.
AAP/EEO Statement
The Equal Employment Opportunity Policy of NuHarbor Security is to provide a fair and equal employment opportunity for all associates and job applicants regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status or disability. NuHarbor Security hires and promotes individuals solely based on their qualifications for the job to be filled.
NuHarbor Security believes that employees should be provided with a working environment which enables each associate to be productive and to work to the best of his or her ability. We do not condone or tolerate an atmosphere of intimidation or harassment based on race, color, religion, national origin, gender, sexual orientation, age, marital status, or disability. We expect and require the cooperation of all employees in maintaining a discrimination and harassment-free atmosphere.
Information System Security Officer
Cyber Security Analyst job in Kaneohe, HI
General information Requisition # R61238 Posting Date 06/16/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with ManTech! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with ManTech!
ManTech seeks a motivated, career and customer-oriented Information Systems Security Officer (ISSO) to join our team at Marine Corps Base Hawaii/Kaneohe.
This position will assist Marine Corps Warfighting Laboratory (MCWL) Program and Site Security Managers (SSMs) plan, design, install, and maintain networks across multiple security domains for ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Program Facilities (SAPFs).
Responsibilities include but are not limited to:
* Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and receiving unit Information Systems Security Manager (ISSM) oversee the installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
* Establish and satisfy complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands; supports Marine Corps receiving units and their ISSMs in the development and implementation of doctrine and policies.
* Provides subject-matter-expertise to integrate special purpose systems requiring specialized security features and procedures.
* Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives; coordinates tests, firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools with appropriate system/capability program offices.
* Applies knowledge of current IA policies, directives, best practices, and guidance to facilitate reporting requirements and structure.
* Oversee collateral, SCI, and SAP networks - both "inside plant" and "outside plant."
Minimum Qualifications:
* Bachelor's degree in related field and at least 10+ years' experience operating within or constructing ICD 705 facilities.
* DoD 8570 IAT II (Security +) Certification.
* Experience with MS Word, MS Excel.
* Ability to draft network diagrams and IT rack elevations.
Preferred Qualifications:
* Masters degree in Information Systems
* Experience with ICD 705 SCIF/SAPF systems and network requirements
Clearance Requirements:
* Candidate must hold a current/active TS/SCI security clearance.
Physical Requirements:
* Ability to initially augment construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure, as well as observe/lead network infrastructure installation and activation. Environment will transition to a structure under construction and then an environmentally controlled facility.
The projected compensation range for this position is $112,400.00-$186,500.00. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, ManTech invests in its employees beyond just compensation. ManTech's benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, short-term and long-term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections.
ManTech International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with ManTech, please email us at ******************* and provide your name and contact information.
Information Security Specialist
Cyber Security Analyst job in Urban Honolulu, HI
Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S. + Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better.
+ Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.
+ Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.
The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!
**_________________________________________________________**
**About the Role:**
The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.
**What You'll Do:**
+ **Alert Management:** Detect and respond to security alerts from both TDR and third-party tooling.
+ **Incident Handling:** Coordinate a well-structured response to cybersecurity incidents to minimize their impact.
+ **Expertise Provision:** Serve as a subject matter expert in information security within the organization.
+ **Mentorship:** Provide guidance and help develop training plans for junior team members.
+ **Tool Optimization:** Oversee the review and tuning of rules for all TDR tools.
+ **SIEM Enhancement:** Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.
+ **Playbook Development:** Create incident response playbooks based on SOC escalation metrics.
+ **Automation and Streamlining:** Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.
+ **Threat Modeling:** Conduct threat modeling exercises to maintain robust security postures.
+ **Threat Hunting:** Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.
+ **Remediation Documentation:** Document remediation strategies to neutralize threats and secure the environment.
+ **Technical Escalation:** Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).
+ **Incident Response:** Manage the entire incident response process, from initial alert to recovery and post-incident analysis.
+ **Log Review and Engineering:** Conduct log reviews and engineer the integration of log sources with security tools.
+ **Policy and Documentation Maintenance:** Ensure the creation and updating of cybersecurity service standards, documentation, and processes.
+ **Incident Tracking:** Formally document and track incidents from detection to resolution.
+ **Performance Metrics:** Develop metrics for Incident Response to foster process improvements.
+ **Cyber Threat Intelligence:** Collect and utilize threat intelligence to bolster defenses against known attack vectors.
+ **Threat Classification:** Prioritize threats based on intelligence and system alerts.
+ **Compliance Assistance:** Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.
+ **Team Exercises:** Engage in Red/Blue team activities and participate in tabletop exercises.
+ **Shift Availability:** Availability to work on a 24x7 schedule to ensure continuous security coverage.
**Do You Have:**
+ Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.
+ Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.
+ Proven experience in incident response and remediation.
+ Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.
+ Understanding of IT Security principles, techniques, and technologies.
+ Capability to conduct host and network analysis, including packet capture analysis.
+ In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.
+ Strong grasp of malware analysis concepts and methodologies.
+ Ability to independently manage initiatives with minimal oversight.
+ Ownership of toolsets or processes within the security domain.
+ Expertise in managing Incidents, Service Requests, Change, and Problem management processes.
+ Experience with current cyber threats and their exploitation tactics.
+ Exceptional analytical and problem-solving skills.
+ Excellent time management and organizational skills.
+ Quick learner for new technologies and concepts.
**Must Haves:**
Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).
**Physical Tasks** - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%
**Audio Visual Needs** - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%
**Equipment Used in Job Performance** : Computer, Printer, Telephone, Basic Office Supplies, Copier
**_________________________________________________________**
**Our Benefits:**
+ Medical, Dental, Vision Insurance Plans
+ 401K Plan
+ Health & Flexible Savings Account
+ Life and AD&D, Spousal Life, Child Life Insurance Plans
+ Educational Assistance Plan
+ Identity Theft, Legal, Auto & Home and Pet Insurance
+ ******************************
Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.
Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.
**Notice to Non-U.S. Citizens:** Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream's network. _If you are not a U.S. citizen, please notify your recruiter or email *************************** as soon as possible for information on Windstream's foreign personnel disclosure and approval requirements._
**Job Details**
**Job Family** **IT**
**Job Function** **Information Security**
**Pay Type** **Salary**
LEAD INFORMATION SECURITY ENGINEER-FEDERAL MB
Cyber Security Analyst job in Urban Honolulu, HI
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Lead Information Security Engineer is a member of the Industrial Security team supporting Lumen Government Services and is responsible for performing cybersecurity compliance actives in support of government contracts as well as Lumen Product and Services targeting the Government market. The Lead Information Security Engineer must execute all six phases of the Risk Management Framework (RMF) process in accordance with FISMA, DoD, FIPS, and NIST requirements and policy. Responsibilities include developing RMF documentation (System Security Plan, Security Control Traceability Matrix, Plan of Action & Milestones, various Standard Operating Procedures, Continuous Monitoring Plan, etc), tracking/resolving vulnerabilities, performing continuous monitoring activities, developing security policies, and supporting cybersecurity guidance and compliance related activities. The Lead Information Security Engineer works closely with Lumen government customers (Federal and State), Lumen government program teams, Lumen operational teams, Lumen security teams, as well as Lumen Product and Services teams targeting our government customers.
A successful candidate will have excellent communications skills and experience presenting cybersecurity issues to a wide variety of audiences. The candidate must be able to work independently and as a team leader to develop and execute strategies. The candidate must possess and maintain a broad technical knowledge of current and emerging technologies used within corporate infrastructure and government customer infrastructure.
**The Main Responsibilities**
+ Perform as an Information Systems Security Officer (ISSO) for government system
+ Achieve and maintain ATO (Authority to Operate), as required.
+ Write System Security Plans (SSP), Plan of Actions & Milestones (POA&M), Continuous Monitoring Plan, Risk Assessments, Privacy Impact Analyses (PIA), and supporting documentation for systems subject to NIST SP 800-53
+ Lead Security Assessment and Authorization processes and procedures
+ Manage cybersecurity audits by federal departments/agencies, including third party auditors
+ Develop and complete continuous monitoring reports and briefings
+ Interface with appropriate government agencies, company management and employees, customers, vendors, and suppliers to ensure understanding of and compliance with security requirements
+ Review vulnerability and compliance scan results (Nessus, Qualys, etc), and work with the various team members to remediate vulnerabilities, and track ongoing vulnerability status and remediation activities
+ Conduct periodic reviews to ensure compliance with established policies and procedures
+ Investigate and document cybersecurity incidents, as well as provide protective and corrective measures in response to such incidents
+ Report all cybersecurity incidents to the program Information Systems Security Managers (ISSM) through reports and briefings
+ Participate in the change management process to ensure changes to software, hardware, and firmware do not adversely impact the security of an environment
+ Develop, facilitate, and present information security awareness and security training on various customer and corporate security policies
+ Coordinate and participate in business development opportunities related to cybersecurity compliance to include evaluating Requests for Information (RFI) and
+ Requests for Proposal (RFP) from government customers and documenting cybersecurity responses
+ Recommend security best practices and system configuration standards
**What We Look For in a Candidate**
+ 6+ years or experience performing cybersecurity, certification & accreditation (C&A), or assessment & authorization (A&A) related activities
+ Excellent oral and written communication skills, collaboration skills, and experience in presenting cybersecurity issues to all levels of management, as well as non-technical staff
+ Strong work ethic, demonstrated self-starter with the ability to work in a fast paced, team-oriented environment
+ Uses strong interpersonal skills to build partnerships with stakeholders and peers
+ Ability to successfully complete Government suitability and/or Government personnel security requirements is highly desired.
+ Education: Bachelors or equivalent years of experience.
+ Professional cybersecurity certification (CISSP, CISM, GSLC, CCISO)
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$103,711 - $138,281 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$108,896 - $145,195 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$114,082 - $152,109 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
\#GSS
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
**What to Expect Next**
\#LI-JS1
Requisition #: 338652
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
07/22/2025
Cloud Security Engineer
Cyber Security Analyst job in Urban Honolulu, HI
Datavant is a data platform company and the world's leader in health data exchange. Our vision is that every healthcare decision is powered by the right data, at the right time, in the right format. Our platform is powered by the largest, most diverse health data network in the U.S., enabling data to be secure, accessible and usable to inform better health decisions. Datavant is trusted by the world's leading life sciences companies, government agencies, and those who deliver and pay for care.
By joining Datavant today, you're stepping onto a high-performing, values-driven team. Together, we're rising to the challenge of tackling some of healthcare's most complex problems with technology-forward solutions. Datavanters bring a diversity of professional, educational and life experiences to realize our bold vision for healthcare.
**What We're Looking For**
As a Cloud Security Engineer in the Secure Product & Infrastructure program, you will be part of a highly technical team, actively working to build security into Datavant's infrastructure. You'll play a key role helping to build secure patterns, and enabling engineering teams to move fast, while being secure.
**What You Will Do**
+ Use your strong understanding of AWS security to help Datavant navigate all the traps of good AWS products vs. great AWS products and know when to be thoughtful on use.
+ Have strong experience and understanding of containerization, as well as operating and securing Kubernetes clusters.
+ Have a point of view on secure continuous development and represent it as Datavant continues to mature working collaboratively with other team members.
+ Have a point of view on secure network controls and the deep design paradigms of secure cloud networking, and overlay networks.
+ Have experience working with engineering teams, helping to tune WAF rules for applications.
+ Review components being built in our cloud infrastructure (via pull request reviews and contribution). During these reviews you'll be mentally present and use your ability to evaluate risk such that you have a great impact on the delivery of secure code. This role is not merely a +1.
+ You will have an understanding of risks, but may have some knowledge gaps in depth of risk management. It's OK, we'll teach you. The core skill set you bring to the table is a development mindset.
+ Work directly with DevOps peers to help build practical and usable security into the SDLC and AWS.
+ Own new projects for advancing security in our environment. Be a technical expert and collaborate with others on the teams to ensure project success. Your impact here cannot be understated, you are a core contributor and have deep influence to empower Datavant greatness.
**What You Need to Succeed**
+ You are humble.
+ You have an "automation first" mindset.
+ You can build Infrastructure as Code in Terraform. It is expected that you have a "git native" skillset.
+ You can articulate start to finish what a secure release cycle should look like in detail.
+ You have opinions and options on most of the steps.
+ You are a consummate collaborator, it's inherent in your work behavior.
+ You value time deeply and optimize for greatest impact.
+ 3+ years of working in at least 1 major public Cloud provider and a desire to learn a second.
+ 2+ years of operating, and securing Kubernetes clusters.
+ Broad scoped projects don't scare you, they energize you. However, you like to get things done fast (and help others) with limited dependencies.
**What Helps You Stand Out**
+ You are often viewed as the "expert in the room" on cloud security in your current role.
+ You have experience with SCA, SAST, and secrets detection.
+ You have experience with security in healthcare or other highly regulated space. Examples: FEDRAMP, HIPAA/HITRUST, SOC 2, PCI experience from an operational response standpoint.
We are committed to building a diverse team of Datavanters who are all responsible for stewarding a high-performance culture in which all Datavanters belong and thrive. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status.
At Datavant our total rewards strategy powers a high-growth, high-performance, health technology company that rewards our employees for transforming health care through creating industry-defining data logistics products and services.
The range posted is for a given job title, which can include multiple levels. Individual rates for the same job title may differ based on their level, responsibilities, skills, and experience for a specific job.
The estimated total cash compensation range for this role is:
$152,000-$190,000 USD
To ensure the safety of patients and staff, many of our clients require post-offer health screenings and proof and/or completion of various vaccinations such as the flu shot, Tdap, COVID-19, etc. Any requests to be exempted from these requirements will be reviewed by Datavant Human Resources and determined on a case-by-case basis. Depending on the state in which you will be working, exemptions may be available on the basis of disability, medical contraindications to the vaccine or any of its components, pregnancy or pregnancy-related medical conditions, and/or religion.
This job is not eligible for employment sponsorship.
Datavant is committed to a work environment free from job discrimination. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status. To learn more about our commitment, please review our EEO Commitment Statement here (************************************************** . Know Your Rights (*********************************************************************** , explore the resources available through the EEOC for more information regarding your legal rights and protections. In addition, Datavant does not and will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay.
At the end of this application, you will find a set of voluntary demographic questions. If you choose to respond, your answers will be anonymous and will help us identify areas for improvement in our recruitment process. (We can only see aggregate responses, not individual ones. In fact, we aren't even able to see whether you've responded.) Responding is entirely optional and will not affect your application or hiring process in any way.
Datavant is committed to working with and providing reasonable accommodations to individuals with physical and mental disabilities. If you need an accommodation while seeking employment, please contact us at *********************** . We will review your request for reasonable accommodation on a case-by-case basis.
For more information about how we collect and use your data, please review our Privacy Policy (**************************************** .
Information System Security Officer (ISSO) - Maui, Hawaii
Cyber Security Analyst job in Schofield Barracks, HI
Are you an Information Systems Security Officer looking for a place to make an impact every day? Serco has a place for you!
Serco, in conjunction with the newly formed United States Space Force (USSF), are responsible for tracking all man-made objects in orbit. Come join the team that provides this service to United States.
This mission is vital to keeping existing satellites safe and to provide critical information to organizations launching new satellites in the future. One of the assets USSF uses to accomplish this mission is the Ground-based Electro Optical Deep Space Surveillance (GEODSS) System. This optical sensor is employed at three (3) different locations around the world (White Sands Missile Range, New Mexico; Diego Garcia, British Indian Ocean Territory; and Maui, Hawaii) and helps track the objects in deep space orbit (altitude of 10,000 to 45,000 km).
In this role, you will:
Provide high level expertise on technical security, to include cyber security, to internal and external customers.
Provides expertise and direction in the development or modification of complex security requirements, processes, architectures, mechanisms, or validation activities in order to enhance the security posture of an enterprise.
Perform computer security assessments and implement required countermeasures; implement and maintain a site mission system and network Cybersecurity program. Candidate
Execute cybersecurity responsibilities protecting and defending information systems by ensuring the availability, integrity, confidentiality, authentication, and non-repudiation of data through the application of cybersecurity measures.
Protect ISs, their operating system, peripherals (media and devices), applications, and the information it contains against loss, misuse, unauthorized access, or modification.
Ensure all users and ISSOs receive COMPUSEC training.
Provide information to update system Assessment and Authorization (A&A) packages.
Review TEMPEST packages and provide documentation for TEMPEST package updates.
Physically oversee construction of SCI facility (SCIF) IAW design plans and other security requirements
Standup SCI security program(s) as needed per contract requirements
Implement and manage the day-to-day operations of the SCIF and SCI security programs
Performs other duties as assigned.
Get to know your recruiter:
https://serco.kzoplatform.com/player/medium/**********937301809?embed=true&layout=fullscreen&overlay=false&auth=public
Qualifications
To be successful in this role, you will have:
An active DoD Secret security clearance.
A high school diploma/GED
5+ years' experience in related field.
Extensive knowledge of USSF SCIF Managers Handbook (DoDM 5105.21)
DoD 8570 IAT Level II certification
Experience in Microsoft Windows OS.
Experience in RedHat Linux.
Experience in Tru64 UNIX Operating System.
Additional desired experience and skills:
An advanced degree
Industry-recognized certifications
Ability to obtain a Top Secret Clearance
In compliance with state and local laws regarding pay transparency, the salary range for this role is $131,293 to $227,532; however, Serco considers several factors when extending an offer, including but not limited to, the role and associated responsibilities, a candidate's work experience, education/training, and key skills.
Company Overview
Serco Inc. (Serco) is the Americas division of Serco Group, plc. In North America, Serco's 9,000+ employees strive to make an impact every day across 100+ sites in the areas of Defense, Citizen Services, and Transportation. We help our clients deliver vital services more efficiently while increasing the satisfaction of their end customers. Serco serves every branch of the U.S. military, numerous U.S. Federal civilian agencies, the Intelligence Community, the Canadian government, state, provincial and local governments, and commercial clients. While your place may look a little different depending on your role, we know you will find yours here. Wherever you work and whatever you do, we invite you to discover your place in our world. Serco is a place you can count on and where you can make an impact because every contribution matters.
To review Serco benefits please visit: ************************************************************ If you require an accommodation with the application process please email: ******************** or call the HR Service Desk at ************, option 1. Please note, due to EEOC/OFCCP compliance, Serco is unable to accept resumes by email.
Candidates may be asked to present proof of identify during the selection process. If requested, this will require presentation of a government-issued I.D. (with photo) with name and address that match the information entered on the application. Serco will not take possession of or retain/store the information provided as proof of identity. For more information on how Serco uses your information, please see our Applicant Privacy Policy and Notice.
Serco does not accept unsolicited resumes through or from search firms or staffing agencies without being a contracted approved vendor. All unsolicited resumes will be considered the property of Serco and will not be obligated to pay a placement or contract fee. If you are interested in becoming an approved vendor at Serco, please email *********************.
Serco is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other legally protected characteristics.
Information Systems Security Officer (ISSO)
Cyber Security Analyst job in Schofield Barracks, HI
Valiant Integrated Services is seeking an experienced, highly skilled Information System Security Analyst to act as Information Systems Security Officer (ISSO) to join our professional team protecting mission training services for a Mission Training Complex (MTC) on Schofield Barracks, HI.
Duties and Responsibilities
Develop and maintain an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
Provide support to the System Owner and the ISSM for maintaining the appropriate operational IA posture for a system, program, or enclave.
Provide support to the customer on all matters involving the security of their information systems.
Assist with the management of all security aspects of the information system and as assigned performs day-to-day security operations of the system.
Assist in the development of the system security policy and ensures compliance with that policy on a routine basis.
Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization.
Provide configuration management for security-relevant information system software, hardware, and firmware, controlling changes to the system and assessing the security impact of those changes.
Identify and mitigate security business and system risks.
Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M.
Maintain a repository for all organizational or system-level cybersecurity-related documentation such as DIACAP/RMF processes within eMASS or other automated process.
Maintain Defense Information Technology Portfolio Registry (DITPR) for client systems and software.
Ensure implementation of Information System (IS) security measures and procedures, including reporting incidents to the Command Information System Security Manger (ISSM) and appropriate reporting chains as well as coordinating system-level responses to unauthorized disclosures in accordance with DoDM 5200.01 Vol 3 for classified information or DoDM 5200.01 Vol 4 for CUI, respectively.
Implement and enforce all DoD IS and Platform Information Technology (PIT) system cybersecurity policies and procedures, as defined by cybersecurity-related documentation.
Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems.
In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered.
Establish a process for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO.
Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals.
Ensures proper Configuration Management procedures are followed. Prior to implementation and contingent upon necessary approval with the ISSM.
Initiates requests for temporary and permanent exception, deviations, or waivers to IA requirements such as Plan of Action and Milestones (POA&Ms).
Ensures IA and IA-enabled software, hardware and firmware comply with appropriate security configuration guides.
Provide status updates of assigned duties to the appropriate agency heads as defined in their respective Service Level Agreement (SLA).
Respond to all applicable data calls, CTO's, FRAGO's, IAVA's ,etc within the requested timeframe.
Attend all Cybersecurity Workforce Meetings when requested.
Required Education and Experiences
A bachelor's degree plus 3 years of recent specialized experience OR an associate's degree plus 7 years of recent specialized experience OR a major certification plus 7 years of recent specialized experience OR 11 years of recent specialized experience.
Required to have active U.S. Top Secret/SCI security clearance with the ability to pass a CI/Polygraph exam.
Baseline DoDI 8570 IA Certifications are required -
a current CompTIA Security+ or greater certification.
A higher level certification, such as GSLC, CAP, CASP, CISM, CISSP, is also appropriate.
Desired Skills and Qualifications
A working knowledge of RMF and the security authorization processes and procedures.
Knowledge of NIST Special Publications and their counterparts, especially SP800-37, SP800-53, ICD 503, and CNSS 1253. Ability to communicate clearly and present information to the customer in a format they can understand.
Experience in several of the following areas: knowledge of current security tools, hardware and software security implementation; different communication protocols; and encryption techniques/tools.
Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
Must be able to prioritize tasks, deliver solutions on time and be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints.
Have strong analysis, oral and written communication, and change management skills with ability to plan, organize, prioritize, track, manage, and learn new skills.
It is preferred that a candidate have at least one year of experience under the DoD Information Assurance Certification and Accreditation Process (DIACAP) and/or Risk Management Framework (RMF) accreditation process and has a familiarity with Enterprise Mission Assurance Support Service (eMASS).
Technical familiarity with Windows 7 Enterprise/Windows 10 Professional, Windows Server 2012, and Red Hat Linux.
Experience with providing IA or IT support to a US Army client desirable, but not required.
Proficiency with using the Internet and with Microsoft Office products including e-mail, Word, Excel, Access and Project is required.
Completion of required certifications required within six (6) months of hire date.
*****************************************
Certification & Accreditation Specialist / Security Systems Engineer
Cyber Security Analyst job in Urban Honolulu, HI
Job Description
Vision IT is seeking a highly skilled Certification & Accreditation (C&A) Specialist / Security Systems Engineer to support the U.S. Air Force Pacific Air Forces (PACAF) mission with expert-level cybersecurity engineering and Risk Management Framework (RMF) support. This position plays a critical role in the ongoing security assurance and accreditation of high-visibility systems including SecureView, Virtual Desktop Infrastructure (VDI), and Commercial Solutions for Classified (CSfC) deployments.
This role demands a proven cybersecurity professional who understands both the technical and regulatory sides of system accreditation. You will work closely with government stakeholders, lead engineering reviews, and act as the point of contact for coordination with the NSA and other agencies. This is a mission-critical role, and Vision IT is seeking someone who shares a passion for strong cybersecurity and safeguarding defense assets.
Key ResponsibilitiesCertification & Accreditation Leadership
Lead all C&A/RMF activities for SecureView, VDI, and CSfC systems.
Manage full lifecycle of NIST RMF (SP 800-37): Categorization, Control Selection, Implementation, Assessment, Authorization, and Continuous Monitoring.
Serve as primary POC for all A&A activities and develop/update all key artifacts: SSPs, POA&Ms, risk assessments, compliance checklists, etc.
Technical & Security Policy Development
Develop and implement security policies and procedures including Access Control, Configuration Management, Incident Response, Disaster Recovery, and Business Continuity.
Translate technical cybersecurity requirements into business language for leadership.
Collaborate with NSA and other external agencies to ensure compliance with national policies.
Security Engineering & Oversight
Conduct security engineering analysis and lead technical efforts supporting the implementation of secure cross-domain solutions (CDS) and CSfC.
Oversee STIG compliance, vulnerability scanning, and mitigation efforts.
Support and validate security posture through testing, training, and documentation of procedures.
Project Reporting & Coordination
Provide monthly status reports, inputs for project planning, milestone tracking, and operational checklists.
Collaborate with internal teams, base leadership, and external stakeholders to ensure successful system ATOs and sustainment.
Required Qualifications
Active CISSP Certification (must meet DoD 8570 IAM Level III standards)
Clearance Required: Active DoD Secret
5+ years experience supporting C&A / RMF in DoD environments
4+ years experience applying NIST SP 800-37 and SP 800-53 controls
3+ years experience with Air Force-specific RMF (AFI 17-101)
Proficiency with A&A tools such as eMASS, GIAP, SNAP
Strong ability to produce comprehensive and accurate A&A documentation and artifacts
Technical expertise in Windows, Linux, and Cisco Systems
Effective communication skills, both technical and executive-level
Proficient in Microsoft Office Suite, Visio, and documentation tools
Ability to lead and mentor less experienced cybersecurity professionals
Nice to Have
Bachelor's degree in Cybersecurity, IT Management, or related field
Understanding of NSA CSfC and CDS submission/approval processes
Familiarity with Air Force base cybersecurity practices and enclave management
Working knowledge of DISN connection and procurement policies
Why This Role Matters
This project has deep mission impact. The outgoing team member, who has helped establish and elevate the cybersecurity posture of these systems, is committed to ensuring the right candidate continues the work with integrity and excellence. Missteps in this role could have significant negative impacts - therefore, Vision IT is seeking not just a qualified candidate, but a passionate professional with a deep respect for process and security mission assurance.
Why Join Vision IT?
At Vision IT, we know that people drive mission success. We empower our team with tools, mentorship, and opportunity to lead and grow. You'll be surrounded by professionals who care deeply about their craft and the people they support.
Benefits
Competitive Salary (Based on Experience & Certifications)
401(k) with Employer Match
Medical, Dental, and Vision Insurance
Paid Time Off (PTO)
Short/Long-Term Disability & Life Insurance
Certification and Professional Development Support
Equal Opportunity Employer
Vision IT is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, identity, national origin, disability, or veteran status.
Security Engineer II
Cyber Security Analyst job in Urban Honolulu, HI
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Integrated Air and Missile Defense (IAMD) Analyst
Cyber Security Analyst job in Hickam Housing, HI
Amentum is seeking a versatile and dedicated Integrated Air and Missile Defense (IAMD) Analyst to provide research, planning, analytical, and training support to U.S. Indo-Pacific Command (USINDOPACOM), Camp H.M. Smith, HI, with duty at U.S. Pacific Air Force Headquarters.
You will provide analysis to support credible planning, development, synchronization, facilitation, evaluation, and integration of USINDOPACOM and component IAMD that focuses on existing and future IAMD capabilities to ensure adequate protection of defined critical assets in the USINDOPACOM AOR. This position also includes interagency partnering, international military exercises, and the defense of U.S. interests abroad to enhance regional peace, and will support new concepts of national strategic policy, emerging technologies, and evolving partner nation requirements.
USINDOPACOM conducts planning in support of the INDOPACOM Campaign Plan (IPCP) to shape the environment in the INDOPACOM Area of Operation (AOR) and success depends on the command's ability to understand the complex dynamics of the theater as a whole and the nuanced details of each sub-region. To that end, you would support the planning requirements with research, analysis, intelligence and threat assessments, complex data management and policy integration throughout the AOR. Your results and recommendations will further inform senior level staff at USINDOPACOM, the Service Components, Joint Staff and OSD.
Essential Responsibilities:
* Be well versed in Joint data information integration systems and networks which enable IAMD defense design as well as be capable of recommending appropriate plans and TTPs that ensure the successful employment of limited, critical IAMD assets.
* Responsible for researching and developing recommendations for next generation technological hardware and software, conduct mission capabilities evaluations, and provide the warfighter with analysis of current and future technologies.
* Support the development of IAMD/Ballistic Missile Defense (BMD) Concepts of Operations (CONOPS) for USINDOPACOM and its components. The CONOPS will document how operators utilize IAMD/BMD systems and Command and control.
* Provide assessments of the ability of adversary nations, in both the near and long term, to target the USINDOPACOM AOR and the U.S. homeland with ballistic missiles.
* Services to be performed under this task consist of the functional areas of IAMD operations, exercise planning and participation, integration, interoperability, resources, policy, strategy, cyber, threat analysis, C2, logistics, and exercises/war games.
* Identify high-value gaps and develop innovative solutions, must have unique insights to both intelligence analysis processes and theater engagement.
* Provide in-depth analysis based on data collected and provide recommendations in support of USINDOPACOM J36 initiatives. This analysis will be applied to support, streamline, and enable the USINDOPACOM engagement strategy.
* Aid senior-level strategic planning and briefings, including preparing formal papers and background information for USINDOPACOM.
Minimum Requirements:
* Bachelor's degree or 10 years of IAMD experience in lieu of degree.
* At least 5 years of experience supporting the DoD, including:
* At least 3 years of experience in Ballistic Missile Defense (BMD) and/or Integrated Air and Missile Defense (IAMD) operations.
* Familiarity with strategic and campaign plan documents, the USINDOPACOM Theater Engagement Plan and other Combatant Command OPLANS.
* Well versed in joint doctrine, contingency, and crisis action planning procedures.
* Ability to communicate effectively verbally and in writing to provide information, articles, written reports, and presentations to include delivering executive summaries to flag and general officers (FO/GO) and Senior Executive Service (SES) level officials.
* Experience providing regularly scheduled project plans and status reports.
* Must have demonstrated skill in using integrated software (e.g., MS Office suite).
* Previous experience working TS/SCI level projects.
* Must have an active Secret security clearance with the eligibility to obtain a Top-Secret clearance with SCI eligibility after your start date. Note: US Citizenship is required to obtain a Secret Clearance.
Preferred Qualifications:
* Experience in the Air Force or Navy preferred.
* At least 3 years' experience working in USINDOPACOM specific topics and/or engagement activities.
* At least 2 years of experience in joint or senior command organizations, including USINDOPACOM and/or components.
* Understanding of the Joint Training Information Management System (JTIMS).
* Understanding of the Joint Theater Air and Missile Defense process (JTAMD),
* Graduate of Service or Joint Planner Course.
* Graduate of an advanced integrated air defense or equivalent service school.
The salary range for this position is $135K to $160K. (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, and alignment with market data.) This position includes a competitive benefits package. For more detailed information on our Benefits and what it is like to work for Amentum: please visit our careers site: ***********************
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.
Information Systems Security Officer (ISSO)
Cyber Security Analyst job in Urban Honolulu, HI
Information Systems Security Officer (ISSO) LOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a detail-oriented and proactive Information Systems Security Officer (ISSO) to support and maintain the security of our information systems. In this role, you will be responsible for ensuring systems operate in compliance with established security policies, procedures, and regulations. You will work closely with technical teams to identify and mitigate vulnerabilities, manage security documentation, and assist with audits and assessments. The ideal candidate will have a strong understanding of information security principles, excellent organizational skills, and the ability to manage multiple tasks in a dynamic environment. Join us to play a key role in safeguarding our organization's critical systems and data.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESInformation Systems Security Officer (ISSO), Cybersecurity Officer, Security Compliance Officer, IT Security Specialist, Information Assurance Officer, Network Security Analyst, Security Controls Assessor, System Security Administrator, Cyber Defense Analyst, Risk Management Framework Specialist, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Information Systems, Computer Science, Information Technology, Computer Engineering, Network Security, Information Assurance, Systems Engineering, Risk Management, Data Science, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Ensure compliance with security policies
Maintain and update system security plans
Monitor security controls for effectiveness
Conduct regular vulnerability scans
Support security audits and assessments
Respond to and document security incidents
REQUIRED SKILLS
Proficiency in risk management frameworks
Ability to perform security assessments
Familiarity with security tools and technologies
Strong documentation skills
Understanding of access control mechanisms
Expertise in vulnerability management
DESIRED SKILLS
Knowledge of cloud security practices
Experience with automation tools for security tasks
Familiarity with DevSecOps concepts
Understanding of advanced persistent threats
Proficiency in forensic analysis tools
Knowledge of secure software development practices
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Information System Security Officer
Cyber Security Analyst job in Urban Honolulu, HI
**ManTech** seeks a motivated, career and customer-oriented Information **Systems Security Officer (ISSO)** to join our team at Marine Corps Base **Hawaii/Kaneohe** . This position will assist Marine Corps Warfighting Laboratory (MCWL) Program and Site Security Managers (SSMs) plan, design, install, and maintain networks across multiple security domains for ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Program Facilities (SAPFs).
**Responsibilities include but are not limited to:**
+ Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and receiving unit Information Systems Security Manager (ISSM) oversee the installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
+ Establish and satisfy complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands; supports Marine Corps receiving units and their ISSMs in the development and implementation of doctrine and policies.
+ Provides subject-matter-expertise to integrate special purpose systems requiring specialized security features and procedures.
+ Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives; coordinates tests, firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools with appropriate system/capability program offices.
+ Applies knowledge of current IA policies, directives, best practices, and guidance to facilitate reporting requirements and structure.
+ Oversee collateral, SCI, and SAP networks - both "inside plant" and "outside plant."
**Minimum Qualifications** **_:_**
+ Bachelor's degree in related field and at least 10+ years' experience operating within or constructing ICD 705 facilities.
+ DoD 8570 IAT II (Security +) Certification.
+ Experience with MS Word, MS Excel.
+ Ability to draft network diagrams and IT rack elevations.
**Preferred Qualifications** **:**
+ Masters degree in Information Systems
+ Experience with ICD 705 SCIF/SAPF systems and network requirements
**Clearance Requirements:**
+ Candidate must hold a current/active TS/SCI security clearance.
**Physical Requirements:**
+ Ability to initially augment construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure, as well as observe/lead network infrastructure installation and activation. Environment will transition to a structure under construction and then an environmentally controlled facility.
ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at ******************* and provide your name and contact information.
Information Security Engineer I
Cyber Security Analyst job in Urban Honolulu, HI
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Federal SOC Information Security Engineers will provide monitoring, triage, and escalation support for internal Federal SOC and External Customer operations. The SOC Information Security Engineers will work shifts to provide 24x7x365 coverage. SOC Information Security Engineers will work in tandem with other Information Security Engineers in the Global SOC and Federal NOC Organizations.
**The Main Responsibilities**
-Review SOC Shift end Summary and SOC activity logs, emails, tickets, cases and other monitoring tools for complete understanding of previous shift activities and incidents with the goal of maintaining the highest level of customer service by keeping track of the critical customer impacting issue.
-Provide monitoring and responding to alerts and events within SLAs. Services and systems include but not limited to Splunk (internal/external SIEM), Firewalls alerts (MTIPS and MSS), TrendMicro Anti Virus, Tripwire File Integrity Checks, IDS/IPS for customers.
-Monitor multiple ticketing systems and queues. Ensure tickets are created and notated within SLAs
-Login to phone call queues to answer both internal and external calls
-Work closely with FedNOC, the Federal SOC Tier II and Ops Eng teams
-Escalate issues to Vendors, SOC Tier II and Ops Engineers as soon as there is a need
-Adhere to all defined processes and procedures.
-Provide process and operational improvement suggestions.
-Performs a long-term project leadership role working towards the development of new solutions, processes, tools, systems that have company-wide and possibly industry-wide impacts.
-Frequent contact with senior leadership of customers and contractors for the purpose of creating and presenting innovative long-term solutions and managing key relationships. Acts as a resource within the engineering and scientific communities to develop solutions or handle the most complex tasks for which existing methods and procedures may not apply.
-Provides consultation and advice to Federal customers, engineers and management regarding work functions, processes, methods, procedures, and tools. Develops and delivers technical and process training, including, documentation in areas of expertise and innovative areas of technology.
**What We Look For in a Candidate**
(education / experience / skills / competencies).
-Tripwire, TrendMicro, Web Inspect, Tennable Nessus and Qualys vulnerability scanners, Splunk, Secure Log Management, Firewalls, Intrusion Detection.
-Ability to diagnose Trip Wire Events, Trend Micro Events, System Events, Network Events from 4 Supported Environments with dissimilar architecture.
-MFA provisioning, repair, revocation, re-provisioning, reporting, and troubleshooting experience.
-Diagnose and identify reports and alerts within Splunk.
-Isolate BGP alerts and notify customer and other operational teams of an event.
-Perform Analytics on events from customer networks per CDM Framework.
-Experience working out of a ticket queue and receiving inbound customer calls.
-Experience managing Fortigates and Palo Alto Firewalls.
-Equivalent educational experience. Above all, a motivated and trainable individual.
Clearance: Government Suitability Clearance required.
Certifications (preferred but not required): CEH, GIAC Certified Incident Handler (GCIH), CCNA, NSE4.
Education: BS Computer Science or related areas with experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
**Location Based Pay Ranges:**
**$55,313 - $73,750 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.**
**$58,078 - $77,438 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.**
**$60,844 - $81,125 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.**
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
**What to Expect Next**
Requisition #: 337162
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
07/18/2025