Senior Data Protection Analyst - Cyber

35808 Redstone Arsenal, Alabama Deloitte

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Are you passionate about technology and interested in joining a community of collaborative colleagues who respectfully and courageously seek to challenge the status quo? If so, read on to learn more about an exciting opportunity with Deloitte Technology US (DT - US). We are curious and life-long learners focused on technology and innovation.
Recruiting for this role ends on 7/31/2025.
Work you'll do
DT-US Cyber Data Protection team is responsible for securing and protecting confidential data of Deloitte US Member Firm, our clients, and our employees. The team's core mission is to implement consistent security controls to protect Firm's data and data entrusted to us by our clients to build their trust and protect our brand. We are seeking an experienced and energetic Senior Data Protection Analyst with outstanding communication, analytical and cyber security technical skills to join our Cyber Data Protection team within Deloitte Technology US (DT - US).
If you're an experienced, hands-on IT professional with strong systems administration, engineering, IT technical support and/or cyber security technical skills who's interested in growing in the cybersecurity field, this may be the job for you. As part of our Cyber Data Protection team, you will be assisting in designing, deploying, and managing cyber technology and process solutions to reduce the potential of data compromise. You will be assisting with testing of data protection and data security solutions. You will work to enhance and mature existing cyber security data protection capabilities for Deloitte US Member Firm and provide on-going support for them. You will require an understanding of the ecosystem of data protection including well-rounded understanding of the information security domains and their inter-relations across that ecosystem. You will be responsible for providing technical product and troubleshooting assistance to Deloitte Employees. You will work closely with management, lead analysts, peers, development teams, business analysts, and end users to ensure data protection technologies and data protection controls for systems are operating appropriately without causing business impact.
As part of the DT- US Cyber Data Protection team, you will have the following core responsibilities:
+ Assist with the development, deployment and support of cyber data protection solutions.
+ Assist with the implementation of data security controls and design principles.
+ Provide Tier 2 technical support to Deloitte end users for several of the cyber data protection services supported by the team that includes but not limited to Data Loss Prevention, Data Minimization, Data Classification and Rights Management, CASB, Web Security, Web Application Firewall, Next Generation Anti-virus and Endpoint Detection and Response technology, Endpoint Admin Rights Management/Privilege Management technology, PKI Certificate Lifecycle Management, Encryption Key Management, Digital Code Signing, Removable Media Protection, Data Discovery Roll Off Scans etc.
+ Assist in maturing existing data protection solutions protecting against data exfiltration.
+ Assist in rolling out new data protection services to employees, getting them adopted and providing on-going support for those services.
+ Assist with technology and software reviews based on data protection and endpoint risks.
+ Provide technical engineering and troubleshooting support to employees for data protection services.
Experience working with various data protection technologies:
+ Data Loss Prevention (DLP) technology
+ Data Classification and Rights Management technology
+ Cloud Access Security Broker (CASB)
+ Secure Web Gateway/Proxy (SWG) technology
+ Next Generation Anti-virus and Endpoint Detection and Response technology
+ Endpoint Admin Rights Management/Privilege Management technology
+ PKI Certificate Management technology
+ Encryption Key Management technology
+ Web Application Firewall technology
+ Confidential Data Reduction technology
+ Data Access Governance technology
+ Removable Media Protection technology
+ Database Encryption technologies
The team
Deloitte Technology US (DT - US) helps power Deloitte's success, which serves many of the world's largest, most respected organizations. We develop and deploy cutting-edge internal and go-to-market solutions that help Deloitte operate effectively and lead in the market. Our reputation is built on a tradition of delivering with excellence.
The ~3,000 professionals in DT - US deliver services including:
+ Cyber Security
+ Technology Support
+ Technology & Infrastructure
+ Applications
+ Relationship Management
+ Strategy & Communications
+ Project Management
+ Financials
Cyber Security
Cyber Security vigilantly protects Deloitte and client data. The team leads a strategic cyber risk program that adapts to a rapidly changing threat landscape, changes in business strategies, risks, and vulnerabilities. Using situational awareness, threat intelligence, and building a security culture across the organization, the team helps to protect the Deloitte brand.
Areas of focus include:
+ Risk & Compliance
+ Identity & Access Management
+ Data Protection
+ Cyber Design
+ Incident Response
+ Security Architecture
+ Business Partnership
Required Qualifications:
+ Bachelor's degree or equivalent in Computer Science or Engineering.
+ Minimum 5 years of combined experience in the Information Security/Cybersecurity domain.
+ Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Preferred Qualifications:
+ Experienced with implementing and managing data protection strategies across data at rest, data in motion, and data in use.
+ Experience with troubleshooting issues and assisting end users to mitigate technical challenges.
+ Familiarity with change management and deployment processes in large IT organizations.
+ Working knowledge with common IT technologies such as Windows Server, Linux/Unix, Databases, Active Directory/LDAP, virtualization, end-user devices etc.
+ Working knowledge of IT/security principles such as encryption, identity, cloud, etc.
+ Experience with PowerShell command-line scripting is a plus.
+ Professional security certification desirable, such as Security+ or CISSP.
+ Understanding of industry best practices related to risk assessment, mitigation, and incident response.
+ Knowledge of data protection regulations and standards (e.g., ISO 27001, ISO 27018, NIST 800-171).
+ Understanding of networking and core networking protocols (e.g., TCP/IP, UDP, DNS, SMTP, HTTP, TLS, and distributed networks).
+ Knowledge in different types of VPN, Encryption Standards, Certificates.
+ Understanding of security controls in public cloud environments (i.e., Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform) and SaaS services hardening.
+ Ability to write technical reports and communicate technical content to business users.
+ Self-motivated with a strong willingness to learn and grow with changing cloud technologies.
+ Experience working in a virtual team.
+ Troubleshooting and problem analysis skills.
+ Understanding of information security frameworks, incident management/response, security operations, and application security best practices.
+ Competency with Microsoft Windows and/or MacOS Operating Systems
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $84,300 - $173,300.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation: qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
View Now

Network Security Engineer II

35824 Huntsville, Alabama Segra

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Segra is searching for a dynamic and experienced Network Security Engineer II .

Role Overview:

The primary responsibilities of the Network Security Engineer II include providing Tier III support, standards development and maintenance, project support, and capacity planning and management of firewalls and other security technologies, products, and solutions supported by the Security Operations Center. The successful candidate will be an integral member of the security operations team and will need to be fully cognizant of state-of-the-art network, firewall, and other security technologies, products and solutions, as well as industry best practice with regard to the design, implementation and deployment of firewall solutions. The successful candidate should also have deep hands-on experience with firewalls, networking, and security technologies. Candidate will also maintain Segra's DDoS mitigation processes and procedures.

Required Qualifications:

  • Must have a minimum of 5 years of experience in network security, such as firewall management, IDS, and IPS technologies.
  • Must have proficiency Fortinet (FortiGate) experience.

Preferred Qualifications:

  • Cisco Meraki is highly preferred
  • Bachelor degree or equivalent combination of education and experience
  • 5+ years supporting configuration and testing Firewall, IDS, and IPS technologies
  • 5+ years of experience implementing/deploying Information Security Best Practices, Network Routing, Switching, and Security Design infrastructures

  • 5+ years of experience in Networking and Network Operations
  • 5+ years of experience in Troubleshooting & Analysis tools
  • 5+ years of experience supporting Virtual Private Networking (VPNs)/MPLS VPN
  • 5+ years of experience with system administration

Key Competencies:

  • Evaluates and recommends solutions for highly complex security systems according to industry best practices to safeguard internal information systems and database
  • Exceptional ability to work in a cooperative team environment to formulate complex technical solutions
  • Ability to be available for on-call duties

  • Excellent verbal and written communication skills
  • Must possess and demonstrate excellent customer service skills
  • Must be detail oriented with good organizational and time management skills
  • Must be analytical and have proven problem solving abilities

About Segra:

Segra is one of the largest independent fiber network companies in the nation, able to offer state-of-the-art communication solutions backed by always-on customer service. We are known for our future-forward infrastructure and state-of-the-art voice and data technology solutions for businesses and the public sector, as well as wholesale transport services to some of the world's largest carriers. Our network features the latest advances in IP, ethernet, and dark fiber architectures, as well as high performance data centers. Furthermore, our network powers technology solutions such as hosted voice, security, and cloud.

Segra has engineered our entire company operations to put our customers at the very center of everything we do. We invest in the communities we serve by hiring locally and continually upgrading our network infrastructure. Segra has over 1200 employees, 500k+ on-net and near-net buildings, and 44k+ fiber-route miles. We exist purely to help businesses within our footprint be successful.

Benefits Overview:

Segra offers a very robust benefits package to our full-time employees, some of which include:

  • Medical, dental, vision insurance
  • Life insurance
  • 401(k) match
  • Flexible Spending/Health Savings Accounts
  • Tuition and gym reimbursements
  • Vacation/PTO, paid holidays, floating holidays
  • Volunteer days, parental leave
  • Legal, accidental, hospital indemnity, identify theft, pet insurance

Our Commitment to Equality:

Segra is an equal opportunity employer and prohibits discrimination of any kind. Segra does not discriminate on the basis of race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service, or other non-merit factor.

View Now

Network Security Subject Matter Expert

35824 Huntsville, Alabama MORI Associates

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Take your career to new heights. Come join us at MORI Associates and help us support the most exciting projects at NASA. As a Network Security Subject Matter Expert you will be part of a dedicated team of diverse professionals creating and supporting cutting edge solutions for our client’s critical missions.  MORI is a mid-sized nationwide company founded in 1997 with the ideals that creating an agile organization full of innovative and passionate people will progress science and technology for all life on earth.  We focus on offering a complete range of services from strategic consulting to the development of Information Systems and providing advanced engineering solutions. Now, let’s see if this opportunity is the right challenge for you.

Job Responsibilities:
  • Provide system and network optimization design, implementation, testing, and maintenance support for a complex enterprise network using industry best practices.
  • Resolve escalated network and security support issues (Tier 3).
  • Independently conduct network assessments, identify possible vulnerabilities, and recommend/develop solutions to problems found.
  • Lead development of network documentation, diagrams, and standard operating procedures.
  • Support continuous service improvements (CSI).
  • Active participation in Root Cause Analysis for Problem Management activities.
  • Work with cross-functional teams to plan and execute network upgrades, migrations, and deployments.
  • Manage vendor relationships, including engagement on Incident Support activities and ensure timely delivery of program deliverables.
  • Monitoring, capacity planning, backup, and recovery of network equipment
  • Keep up with technology trends. Evaluate and recommend new technologies, tactics, and tools to improve service delivery.
  • Mentor and coach junior engineers, including providing training and support as required.
  • Provide testing support for the setup, installation, and transition to operations of service infrastructure devices, NMS and tools.
  • Function as the primary COOP capability support engineer.
  • Support lifecycle sustainment and refresh activities.
  • Utilize the designated ticketing system to document resolution and develop knowledge management artifacts.

Required Education and Experience:

• Bachelor’s or AA/AS degree and 8-10 years of prior relevant experience or Masters with 5-7 years of prior            relevant experience. Specific years of related work experience may be substituted for a degree at the Hiring        Manager's discretion.

Skills:

Required
  • Extensive knowledge of defense-in-depth principles, Network and Security architecture, network topology, IT device integrity, and common security elements.
  • 8+ years’ experience engineering and troubleshooting networks, including extensive routing and switching experience such as one or more of the following: MPLS, VPNs, routing protocols i.e. BGP, OSPF, IS-IS, switching protocols i.e. Spanning Tree Protocol, VLANs, LLDP, VoIP, Multicast protocols and emerging network technologies.
  • Hands-on experience with standard industry products e.g. Cisco, Juniper, and Ciena.
  • Effective communicator and able to coordinate network and customer issues with other technical sections.
  • Strong understanding and in-depth knowledge of IP network/subnet addressing.
  • Experienced and adept at developing and maintaining technical documents, analyses, and reports.
  • Experience developing and presenting technical information to senior customer management, customer stakeholders, and company management.
  • Ability to multi-task and respond quickly to real-time dataflow issues.
  • Ability to work non-standard work hours/shifts.
  • Knowledge of Network Monitoring tools, e.g. NNMi, Specturm, MRTG, CACTI.
Desired
  • Experience with Juniper route, switch and security appliances. (MX, EX, SRX)
  • Experience with Session Initiation Protocol (SIP) implementation and design concepts.
  • Experience with NNMi configuration and maintenance.
  • Experience with Splunk
  • Experience with change, configuration and performance management NetOps concepts.
  • Experience working with Commercial Carrier service providers, e.g., AT&T, Verizon.
  • Knowledge of Linux.

Clearance:
  • Candidate must have or be able to obtain a Public Trust with a Level of Confidence of 50 or higher.

Desired Certifications / Training:
  • Current holders of either a CCNA, CCNP or JNCIA

Travel (if any):

• Occasional travel to Greenbelt, Maryland may be required.
View Now

Chief Information Security Officer

35824 Huntsville, Alabama Stem

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

About Stem
Stem (NYSE: STEM) is a global leader in AI-enabled software and services that enable its customers to plan, deploy, and operate clean energy assets. The company offers a complete set of solutions that transform how solar and energy storage projects are developed, built, and operated, including an integrated suite of software and edge products, and full lifecycle services from a team of leading experts. More than 16,000 global customers rely on Stem to maximize the value of their clean energy projects and portfolios. Learn more at


Stem's culture embodies diversity & inclusion beyond the traditional facets of gender, ethnicity, age, disabilities, and sexual orientation to include experience, personality, communication, workstyles, and more. At our core, Stem is at the momentous intersection of clean energy and software technology where diverse ideas, experiences, and professional skills converge to make the inclusive culture we have today. Together, we are turning old school thoughts about software and energy into progressive, collaborative, and innovative solutions. By joining our team, you will be collaborating with data scientists, energy experts, skilled salespeople, thought-leading executives and more from a range of backgrounds. This intersection of ideas, beliefs, and skills is what makes us unique enough to lead the world's largest network of digitally connected energy storage systems.

What we are looking for:

As a Chief Information Security Officer, you will be responsible for establishing and maintaining Stem's enterprise-wide cybersecurity vision, strategy, and program to ensure all information assets and technologies are adequately protected. You will lead the development and implementation of comprehensive security policies, procedures, and controls while ensuring regulatory compliance across multiple frameworks. This role requires both strategic leadership and hands-on expertise in cybersecurity, with a focus on building a security-first culture that aligns with our business objectives and supports our growth in the clean energy sector.

Responsibilities:

  • Strategic Security Leadership - Develop and implement a comprehensive cybersecurity strategy that aligns with Stem's business objectives and risk tolerance, ensuring protection of our clean energy technology platform and customer data.
  • Develop and implement cybersecurity and data privacy policies that enable business objectives and satisfy external requirements.
  • Risk Management & Governance - Establish and oversee enterprise-wide cybersecurity risk management program, conducting regular risk assessments and implementing appropriate controls to mitigate identified vulnerabilities.
  • Compliance & Audit Management - Lead SOC 2 Type II audits, ISO 27001 certification processes, and other regulatory compliance requirements. Ensure adherence to industry standards including NIST, Zero Trust, PCI DSS, and relevant data privacy regulations (GDPR, CCPA).
  • Incident Response & Crisis Management - Develop and maintain comprehensive incident response plans, lead crisis communications during security events, and oversee post-incident analysis and remediation efforts.
  • Security Architecture & Technology - Guide the selection, implementation, and management of security technologies including SIEM, endpoint detection and response (EDR), identity and access management (IAM), and cloud security solutions.
  • Team Leadership & Development - Build and lead a high-performing cybersecurity team. Manage relationships with external security providers and consultants.
  • Business Enablement - Collaborate with executive leadership to ensure security initiatives support business growth while maintaining appropriate risk levels. Translate complex security concepts into business-friendly language for stakeholders.
  • Security Awareness & Training - Develop and implement comprehensive cybersecurity awareness programs for all employees, ensuring a security-first culture throughout the organization.
  • Regulatory & Legal Coordination - Work closely with legal, compliance, and privacy teams to ensure cybersecurity practices meet all regulatory requirements and contractual obligations.
  • Budget Management - Develop and manage cybersecurity budget, ensuring efficient allocation of resources while maintaining effective security posture.
  • Third-Party Risk Management - Establish and oversee vendor security assessment programs, ensuring all third-party relationships maintain appropriate security standards.
  • Business Continuity & Disaster Recovery - Develop and maintain comprehensive business continuity and disaster recovery plans, ensuring rapid recovery from security incidents.

Requirements:

Education:

  • Bachelor's degree in Computer Science, Information Security, or related technical field required. Master's degree in Cybersecurity, Information Systems, or relevant discipline preferred.

Experience:

  • 12+ years of progressive experience in information security roles with at least 5 years in senior leadership positions
  • 10+ years of hands-on experience with cybersecurity technologies and frameworks
  • Proven track record of leading SOC 2, ISO 27001, and other compliance audit processes
  • Experience in technology companies, preferably in clean energy, SaaS, or IoT environments

Technical Expertise:

  • Deep knowledge of cybersecurity frameworks (NIST, ISO 27001, COBIT, SANS)
  • Extensive experience with security technologies (SIEM, EDR, IAM, firewalls, intrusion detection/prevention)
  • Strong understanding of cloud security (AWS, Azure, GCP) and DevSecOps practices
  • Experience with vulnerability management, penetration testing, and security assessments
  • Knowledge of data privacy regulations (GDPR, CCPA, HIPAA) and their implementation

Certifications (Required):

  • CISSP (Certified Information Systems Security Professional)
  • CISM (Certified Information Security Manager) or CISA (Certified Information Systems Auditor)
  • Additional preferred certifications: CCISO, CISSP, CGEIT, CRISC

Leadership & Business Skills:

  • Proven ability to build and lead high-performing security teams
  • Strong business acumen with ability to align security strategy with business objectives
  • Excellent communication skills with ability to present to executive audiences and board members
  • Experience working with customers on security and compliance requirements
  • Track record of successfully managing security budgets and vendor relationships

Industry Knowledge:

  • Understanding of critical infrastructure security requirements
  • Knowledge of energy sector regulations and compliance requirements
  • Experience with IoT security and industrial control systems preferred
  • Familiarity with financial services and energy trading security requirements
Salary Range$220,400.00 - $330,600.00

What We Offer:

At Stem, you will work in a growing, innovative, mission-driven company with talented colleagues that have a passion for building renewable energy systems.Stem offers competitive compensation as well as a comprehensive set of benefits to support the health and wellness of our employee including:

  • A competitive compensation package, including eligibility for a bonus or commission based on the role, and equity
  • Full health benefits on the first day of employment (several medical plan options-HDHP and PPO, dental plans, FSA/HSA-with employer contribution, employer paid vision/LTD/STD/Life, variety of voluntary coverage)
  • 401k (pre- or post-tax) on first day of employment
  • 12 paid calendar holidays per year
  • Flexible time-off

Learn More

To learn more about Stem, visit our stem.com where you'll find information about our solutions, technology, partners, case studies, resources, latest news and more. Here are some relevant links:

  • Company Overview
  • Newsroom
  • Case Studies
  • LinkedIn

Stem, Inc . is an equal opportunity employer committed to diversity in the workplace and does not discriminate against any employee or applicant for employment because of race, color, sex, pregnancy, religion, national origin, ethnicity, citizenship, sexual orientation, gender identity, age, marital status, disability, genetic information, military status, protected veteran status or any other factor protected by applicable federal, state or local laws.

View Now

Chief Information Security Officer

35824 Huntsville, Alabama MedStar Health

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

About Stem Stem (NYSE: STEM) is a global leader in AI-enabled software and services that enable its customers to plan, deploy, and operate clean energy assets. The company offers a complete set of solutions that transform how solar and energy storage projects are developed, built, and operated, including an integrated suite of software and edge products, and full lifecycle services from a team of leading experts. More than 16,000 global customers rely on Stem to maximize the value of their clean energy projects and portfolios. Learn more at Stem's culture embodies diversity & inclusion beyond the traditional facets of gender, ethnicity, age, disabilities, and sexual orientation to include experience, personality, communication, workstyles, and more. At our core, Stem is at the momentous intersection of clean energy and software technology where diverse ideas, experiences, and professional skills converge to make the inclusive culture we have today. Together, we are turning old school thoughts about software and energy into progressive, collaborative, and innovative solutions. By joining our team, you will be collaborating with data scientists, energy experts, skilled salespeople, thought-leading executives and more from a range of backgrounds. This intersection of ideas, beliefs, and skills is what makes us unique enough to lead the world's largest network of digitally connected energy storage systems. What we are looking for: As a Chief Information Security Officer, you will be responsible for establishing and maintaining Stem's enterprise-wide cybersecurity vision, strategy, and program to ensure all information assets and technologies are adequately protected. You will lead the development and implementation of comprehensive security policies, procedures, and controls while ensuring regulatory compliance across multiple frameworks. This role requires both strategic leadership and hands-on expertise in cybersecurity, with a focus on building a security-first culture that aligns with our business objectives and supports our growth in the clean energy sector. Responsibilities: Strategic Security Leadership - Develop and implement a comprehensive cybersecurity strategy that aligns with Stem's business objectives and risk tolerance, ensuring protection of our clean energy technology platform and customer data. Develop and implement cybersecurity and data privacy policies that enable business objectives and satisfy external requirements. Risk Management & Governance - Establish and oversee enterprise-wide cybersecurity risk management program, conducting regular risk assessments and implementing appropriate controls to mitigate identified vulnerabilities. Compliance & Audit Management - Lead SOC 2 Type II audits, ISO 27001 certification processes, and other regulatory compliance requirements. Ensure adherence to industry standards including NIST, Zero Trust, PCI DSS, and relevant data privacy regulations (GDPR, CCPA). Incident Response & Crisis Management - Develop and maintain comprehensive incident response plans, lead crisis communications during security events, and oversee post-incident analysis and remediation efforts. Security Architecture & Technology - Guide the selection, implementation, and management of security technologies including SIEM, endpoint detection and response (EDR), identity and access management (IAM), and cloud security solutions. Team Leadership & Development - Build and lead a high-performing cybersecurity team. Manage relationships with external security providers and consultants. Business Enablement - Collaborate with executive leadership to ensure security initiatives support business growth while maintaining appropriate risk levels. Translate complex security concepts into business-friendly language for stakeholders. Security Awareness & Training - Develop and implement comprehensive cybersecurity awareness programs for all employees, ensuring a security-first culture throughout the organization. Regulatory & Legal Coordination - Work closely with legal, compliance, and privacy teams to ensure cybersecurity practices meet all regulatory requirements and contractual obligations. Budget Management - Develop and manage cybersecurity budget, ensuring efficient allocation of resources while maintaining effective security posture. Third-Party Risk Management - Establish and oversee vendor security assessment programs, ensuring all third-party relationships maintain appropriate security standards. Business Continuity & Disaster Recovery - Develop and maintain comprehensive business continuity and disaster recovery plans, ensuring rapid recovery from security incidents. Requirements: Education: Bachelor's degree in Computer Science, Information Security, or related technical field required. Master's degree in Cybersecurity, Information Systems, or relevant discipline preferred. Experience: 12+ years of progressive experience in information security roles with at least 5 years in senior leadership positions 10+ years of hands-on experience with cybersecurity technologies and frameworks Proven track record of leading SOC 2, ISO 27001, and other compliance audit processes Experience in technology companies, preferably in clean energy, SaaS, or IoT environments Technical Expertise: Deep knowledge of cybersecurity frameworks (NIST, ISO 27001, COBIT, SANS) Extensive experience with security technologies (SIEM, EDR, IAM, firewalls, intrusion detection/prevention) Strong understanding of cloud security (AWS, Azure, GCP) and DevSecOps practices Experience with vulnerability management, penetration testing, and security assessments Knowledge of data privacy regulations (GDPR, CCPA, HIPAA) and their implementation Certifications (Required): CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) or CISA (Certified Information Systems Auditor) Additional preferred certifications: CCISO, CISSP, CGEIT, CRISC Leadership & Business Skills: Proven ability to build and lead high-performing security teams Strong business acumen with ability to align security strategy with business objectives Excellent communication skills with ability to present to executive audiences and board members Experience working with customers on security and compliance requirements Track record of successfully managing security budgets and vendor relationships Industry Knowledge: Understanding of critical infrastructure security requirements Knowledge of energy sector regulations and compliance requirements Experience with IoT security and industrial control systems preferred Familiarity with financial services and energy trading security requirements Salary Range $220,400.00 - $330,600.00 What We Offer: At Stem, you will work in a growing, innovative, mission-driven company with talented colleagues that have a passion for building renewable energy systems.Stem offers competitive compensation as well as a comprehensive set of benefits to support the health and wellness of our employee including: A competitive compensation package, including eligibility for a bonus or commission based on the role, and equity F ull health benefits on the first day of employment (several medical plan options-HDHP and PPO, dental plans, FSA/HSA-with employer contribution, employer paid vision/LTD/STD/Life, variety of voluntary coverage) 401k (pre- or post-tax) on first day of employment 12 paid calendar holidays per year Flexible time-off Learn More To learn more about Stem, visit our stem.com where you'll find information about our solutions, technology, partners, case studies, resources, latest news and more. Here are some relevant links: Company Overview Newsroom Case Studies LinkedIn Stem, Inc . is an equal opportunity employer committed to diversity in the workplace and does not discriminate against any employee or applicant for employment because of race, color, sex, pregnancy, religion, national origin, ethnicity, citizenship, sexual orientation, gender identity, age, marital status, disability, genetic information, military status, protected veteran status or any other factor protected by applicable federal, state or local laws. #J-18808-Ljbffr

View Now

Information Systems Security Officer

35824 Huntsville, Alabama Leidos

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Description Leidos Chief Information Security Office within the Digital Modernization sector is seeking a talented Information System Security Officer (ISSO) to join a diverse team to create unique solutions for complex problems. With offices across the United States engaging in the defense, space, cyber and commercial fields, Leidos provides responsive, cost-effective engineering, scientific and IT solutions.In this role, you will be responsible for supporting our Classified Information System Cybersecurity/Information Assurance Program. You will report to the Information System Security Manager (ISSM) on all aspects of classified information system security compliance. Your work will be conducted on site at our Huntsville, AL location.CLEARANCE REQUIREMENT:• Must currently possess and be able to maintain an active DoD TOP SECRET security clearance. (US Citizenship required)What will you be doing?Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awarenessInvestigating information system security violations and help prepare reports specifying corrective and preventative actionsConducting technical and administrative assessmentsIntegrating new cybersecurity processes, procedures, and toolsSupport the creation, review and update of cybersecurity documentation and other technical writingThe ISSO's primary duties will consist of managing the day-to-day compliance of our classified information systems by:Auditing information systems to ensure compliance with security policies and procedures while reporting any discrepancies to the ISSM, ISO or FSO.Assisting in the Risk Management Framework (RMF) authorization process by developing and maintaining artifacts for the IS Body of Evidence (BoE).Reviewing and approving (within authority) Configuration Management (CM) requests of all associated hardware, software, and security relevant functions is maintained and documented as part of CCB approval process.Assisting with sanitization and release of hardware in accordance with security policies or Authorizing Official (AO) guidance.Testing/evaluation and application of required technical security controls and periodic inspections of information systems.Basic Qualifications:Bachelor's Degree and 8 or more years' related experience in a computer related discipline; Associate and 10 years, Master's and 6 years or equivalent work experience may be considered in lieu of a degree.Must hold current Security+ or equivalent certification to be considered; must be able to maintain.Relevant Experience Considered:Cybersecurity, systems security or hardening, Information Technology.Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), National Industrial Security Program Operating Manual (NISPOM) or Joint Special Access Program (SAP) Implementation Guide (JSIG).Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics).Physical security, project or program management, office management, senior administration, or account management.Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy, Centrify, etc. is required.Highly organized and self-motivated with excellent documentation skills and the ability to work with minimal supervision.Preferred Qualifications:Experience performing IT work with Windows or Linux systems is preferred.Experience working in DoD classified operating and/or laboratory environments.Experience with various information system security tools that address vulnerability analysis and mitigation. These may include SolarWinds, Tenable, SCAP.Familiarity with implementation of Government directives and policies derived from NIST, STIG, DoD, or other Government Regulatory compliance standards within a professional industry.Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF).Experience providing technical security consultation for complex, cross-domain, diverse classified networked environments in collaboration with internal/external Customers, Information Technology (IT).Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication.Original Posting:July 18, 2025For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:Pay Range $104,650.00 - $189,175.00The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

View Now

Information System Security Officer

35824 Huntsville, Alabama FLIR Systems

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Be Visionary

Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research.

We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins.

Job Summary

The Mid-Level to Senior Level Information System Security Officer (Mid-Sr. ISSO) will assist in preparation, development, and maintenance of specialized Information Systems (IS) security plans used to obtain/retain DCSA accreditation.

Essential Duties and Responsibilities

May include the following. Other duties may be assigned.

  • You will be required to oversee the system compliance, and auditing of the information systems.
  • Review and revise IS system plans documentation based on analysis of the existing equipment configuration. Document any changes or special security requirements.
  • Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices.
  • Assist with the design, develop, and implement annual IS security training for the end-users. Similar but specialized training will also be given to the Data Transfer Agents DTAs and SAs annually.
  • Assist in the development of drafting procedures for the protection of the information system.
  • Assists in spill containment and cleanup.
  • Develop procedures to assist with manufacturing processes with Cybersecurity requirements in mind.
  • Partners and works with Government agencies, including the Department of Defense (DoD) and other relevant agencies, on information security matters
  • Participates in investigations relating to any IS security violations and provides "lessons learned" information to the IS community to prevent reoccurrence.
  • Communicates security risks and solutions to business partners and IT staff as needed
  • Assists the Information Systems Security Manager (ISSM) and implements information systems security tasks, as required for safeguarding, handling, and controlling of classified materials, documents and equipment. Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
  • Attends cybersecurity events and participates in other external cybersecurity activities to maintain current in the field
  • Knowledge of National Industrial Security Program Operating Manual (NISPOM), DCSA Assessment and Authorization Process Manual (DAAPM), and Risk Management Framework is required.
  • Responds to emergencies and remediates information security incidents.
Supervisory Responsibilities

This job has no supervisory responsibilities.

Competencies

To perform the job successfully, an individual should demonstrate the following competencies:

  • Problem Solving - Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully.
  • Project Management - Communicates changes and progress.
  • Technical Skills - Pursues training and development opportunities; Strives to continuously build knowledge and skills.
  • Oral/Written Communication Listens and gets clarification; Responds well to questions; Records data; Writes clearly and informatively; Able to read and interpret written information.
  • Teamwork - Gives and welcomes feedback; Supports everyone's efforts to succeed.
  • Leadership - Exhibits confidence in self and others; Inspires and motivates others to perform well; Accepts feedback from others; Gives appropriate recognition to others.
  • Change Management - Develops workable implementation plans; Communicates changes effectively.
  • Business Acumen - Understands business implications of decisions.
  • Ethics - Treats people with respect;
  • Organizational Support - Follows policies and procedures; Supports organization's goals and values.
  • Judgment - Includes appropriate people in decision-making process.
  • Motivation - Demonstrates persistence and overcomes obstacles.
  • Planning/Organizing - Prioritizes and plans work activities; Uses time efficiently.
  • Professionalism - Approaches others in a tactful manner; Reacts well under pressure; Accepts responsibility for own actions; Follows through on commitments.
  • Quality - Demonstrates accuracy and thoroughness; Looks for ways to improve and promote quality; Applies feedback to improve performance; Monitors own work to ensure quality.
  • Quantity - Completes work in timely manner; Strives to increase productivity.
  • Safety and Security - Observes safety and security procedures including using Personal Protective Equipment (PPE) as required and wearing company issued badge when on company property; Reports potentially unsafe conditions ; Uses equipment and materials properly.
  • Adaptability - Adapts to changes in the work environment; Able to deal with frequent change, delays, or unexpected events.
  • Initiative - Seeks increased responsibilities; Asks for and offers help when needed.
  • Innovation - Generates suggestions for improving work.
Qualifications

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Education and/or Experience:
  • Bachelor's degree (B.S.) from four-year college or university in a related field, such as: computer science, information systems, engineering, or other technical disciplines involving information systems and 5-10 years of relevant experience.
Language Skills:
  • Strong interpersonal skills.
  • Strong oral and written communication abilities with all levels of management, employees, and customers, ability to communicate and explain information efficiently.
  • Ability to translate security situations and postures into business objectives and outcomes
Mathematical Skills:
  • Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.
  • Ability to compute rate, ratio, and percent.
Reasoning Ability:

Develops solutions to a variety of complex problems. May refer to established precedents and policies. Demonstrates judgment and discretion in working with sensitive information and confidential matters

Computer Skills:
  • Ability to learn and adapt to new technologies
  • Full knowledge and thorough understanding of:
    • Automated vulnerability scanning tools, forensic tools, Windows and other operating systems
    • Information security architecture, systems design, integration of systems and networking
  • Microsoft Office Suite (i.e., Outlook, Word, Access, Excel, PowerPoint, Project, Visio, etc.)
  • Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
Other Essential Duties:
  • Follows all import/export requirements, consulting with facility import/export personnel as required.
  • Experience with the DCSA Assessment & Authorization Process.
Other Skills and Abilities:
  • Within 6 months of hire, you must obtain and maintain a cybersecurity certification Security + or equivalent.
Other Qualifications:
  • US Citizenship with ability to attain/maintain government security clearance.
  • Ability to travel approximately 5% domestically/internationally

#TBE

Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions.

Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws.

View Now
Be The First To Know

About the latest Cybersecurity specialist Jobs in Huntsville !

Information Systems Security Officer

35808 Redstone Arsenal, Alabama Leidos

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

**Description**
Leidos Chief Information Security Office within the Digital Modernization sector is seeking a talented **Information System Security Officer (ISSO)** to join a diverse team to create unique solutions for complex problems. With offices across the United States engaging in the defense, space, cyber and commercial fields, Leidos provides responsive, cost-effective engineering, scientific and IT solutions.
In this role, you will be responsible for supporting our Classified Information System Cybersecurity/Information Assurance Program. You will report to the Information System Security Manager (ISSM) on all aspects of classified information system security compliance. **_Your work will be conducted on site at our Huntsville, AL location._**
**CLEARANCE REQUIREMENT:**
- Must currently possess and be able to maintain an active DoD TOP SECRET security clearance. (US Citizenship required)
**What will you be doing?**
+ Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness
+ Investigating information system security violations and help prepare reports specifying corrective and preventative actions
+ Conducting technical and administrative assessments
+ Integrating new cybersecurity processes, procedures, and tools
+ Support the creation, review and update of cybersecurity documentation and other technical writing
+ The ISSO's primary duties will consist of managing the day-to-day compliance of our classified information systems by:
+ Auditing information systems to ensure compliance with security policies and procedures while reporting any discrepancies to the ISSM, ISO or FSO.
+ Assisting in the Risk Management Framework (RMF) authorization process by developing and maintaining artifacts for the IS Body of Evidence (BoE).
+ Reviewing and approving (within authority) Configuration Management (CM) requests of all associated hardware, software, and security relevant functions is maintained and documented as part of CCB approval process.
+ Assisting with sanitization and release of hardware in accordance with security policies or Authorizing Official (AO) guidance.
+ Testing/evaluation and application of required technical security controls and periodic inspections of information systems.
**Basic Qualifications:**
+ Bachelor's Degree and 8 or more years' related experience in a computer related discipline; Associate and 10 years, Master's and 6 years or equivalent work experience may be considered in lieu of a degree.
+ Must hold current Security+ or equivalent certification to be considered; must be able to maintain.
+ Relevant Experience Considered:
+ Cybersecurity, systems security or hardening, Information Technology.
+ Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), National Industrial Security Program Operating Manual (NISPOM) or Joint Special Access Program (SAP) Implementation Guide (JSIG).
+ Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics).
+ Physical security, project or program management, office management, senior administration, or account management.
+ Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy, Centrify, etc. is required.
+ Highly organized and self-motivated with excellent documentation skills and the ability to work with minimal supervision.
**Preferred Qualifications:**
+ Experience performing IT work with Windows or Linux systems is preferred.
+ Experience working in DoD classified operating and/or laboratory environments.
+ Experience with various information system security tools that address vulnerability analysis and mitigation. These may include SolarWinds, Tenable, SCAP.
+ Familiarity with implementation of Government directives and policies derived from NIST, STIG, DoD, or other Government Regulatory compliance standards within a professional industry.
+ Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF).
+ Experience providing technical security consultation for complex, cross-domain, diverse classified networked environments in collaboration with internal/external Customers, Information Technology (IT).
+ Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication.
**Original Posting:**
July 18, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
Pay Range $104,650.00 - $189,175.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R-00162909
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
View Now

Information System Security Officer

35808 Redstone Arsenal, Alabama Teledyne

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

**Be visionary**
Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research?
We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins.
**Job Description**
**Job Summary**
The Mid-Level to Senior Level Information System Security Officer (Mid-Sr. ISSO) will assist in preparation, development, and maintenance of specialized Information Systems (IS) security plans used to obtain/retain DCSA accreditation.
**Essential Duties and Responsibilities** may include the following. Other duties may be assigned.
+ You will be required to oversee the system compliance, and auditing of the information systems.
+ Review and revise IS system plans documentation based on analysis of the existing equipment configuration. Document any changes or special security requirements.
+ Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices.
+ Assist with the design, develop, and implement annual IS security training for the end-users. Similar but specialized training will also be given to the Data Transfer Agents DTAs and SAs annually.
+ Assist in the development of drafting procedures for the protection of the information system.
+ Assists in spill containment and cleanup.
+ Develop procedures to assist with manufacturing processes with Cybersecurity requirements in mind.
+ Partners and works with Government agencies, including the Department of Defense (DoD) and other relevant agencies, on information security matters
+ Participates in investigations relating to any IS security violations and provides "lessons learned" information to the IS community to prevent reoccurrence.
+ Communicates security risks and solutions to business partners and IT staff as needed
+ Assists the Information Systems Security Manager (ISSM) and implements information systems security tasks, as required for safeguarding, handling, and controlling of classified materials, documents and equipment. Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
+ Attends cybersecurity events and participates in other external cybersecurity activities to maintain current in the field
+ Knowledge of National Industrial Security Program Operating Manual (NISPOM), DCSA Assessment and Authorization Process Manual (DAAPM), and Risk Management Framework is required.
+ Responds to emergencies and remediates information security incidents.
**Supervisory Responsibilities**
This job has no supervisory responsibilities.
**Competencies**
To perform the job successfully, an individual should demonstrate the following competencies:
+ Problem Solving - Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully.
+ Project Management - Communicates changes and progress.
+ Technical Skills - Pursues training and development opportunities; Strives to continuously build knowledge and skills.
+ Oral/Written Communication - Listens and gets clarification; Responds well to questions; Records data; Writes clearly and informatively; Able to read and interpret written information.
+ Teamwork - Gives and welcomes feedback; Supports everyone's efforts to succeed.
+ Leadership - Exhibits confidence in self and others; Inspires and motivates others to perform well; Accepts feedback from others; Gives appropriate recognition to others.
+ Change Management - Develops workable implementation plans; Communicates changes effectively.
+ Business Acumen - Understands business implications of decisions.
+ Ethics - Treats people with respect;
+ Organizational Support - Follows policies and procedures; Supports organization's goals and values.
+ Judgment - Includes appropriate people in decision-making process.
+ Motivation - Demonstrates persistence and overcomes obstacles.
+ Planning/Organizing - Prioritizes and plans work activities; Uses time efficiently.
+ Professionalism - Approaches others in a tactful manner; Reacts well under pressure; Accepts responsibility for own actions; Follows through on commitments.
+ Quality - Demonstrates accuracy and thoroughness; Looks for ways to improve and promote quality; Applies feedback to improve performance; Monitors own work to ensure quality.
+ Quantity - Completes work in timely manner; Strives to increase productivity.
+ Safety and Security - Observes safety and security procedures including using Personal Protective Equipment (PPE) as required and wearing company issued badge when on company property; Reports potentially unsafe conditions ; Uses equipment and materials properly.
+ Adaptability - Adapts to changes in the work environment; Able to deal with frequent change, delays, or unexpected events.
+ Initiative - Seeks increased responsibilities; Asks for and offers help when needed.
+ Innovation - Generates suggestions for improving work.
**Qualifications**
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**Education and/or Experience:**
+ Bachelor's degree (B.S.) from four-year college or university in a related field, such as: computer science, information systems, engineering, or other technical disciplines involving information systems and 5-10 years of relevant experience.
**Language Skills**
+ Strong interpersonal skills.
+ Strong oral and written communication abilities with all levels of management, employees, and customers, ability to communicate and explain information efficiently.
+ Ability to translate security situations and postures into business objectives and outcomes
**Mathematical Skills**
+ Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.
+ Ability to compute rate, ratio, and percent.
**Reasoning Ability**
Develops solutions to a variety of complex problems. May refer to established precedents and policies. Demonstrates judgment and discretion in working with sensitive information and confidential matters
**Computer Skills**
+ Ability to learn and adapt to new technologies
+ Full knowledge and thorough understanding of:
+ Automated vulnerability scanning tools, forensic tools, Windows and other operating systems
+ Information security architecture, systems design, integration of systems and networking
+ Microsoft Office Suite (i.e., Outlook, Word, Access, Excel, PowerPoint, Project, Visio, etc.)
+ Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
**Other Essential Duties**
+ Follows all import/export requirements, consulting with facility import/export personnel as required.
+ Experience with the DCSA Assessment & Authorization Process.
**Other Skills and Abilities**
+ Within 6 months of hire, you must obtain and maintain a cybersecurity certification Security + or equivalent.
**Other Qualifications**
+ US Citizenship with ability to attain/maintain government security clearance.
+ Ability to travel (domestically/internationally) approximately _5__%
#TBE
Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions.
Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws. ?
You may not realize it, but Teledyne enables many of the products and services you use every day **.**
Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.
View Now

Information Systems Security Officer (ISSO)

35824 Huntsville, Alabama The Aerospace Corporation

Posted today

Job Viewed

Tap Again To Close

Job Description

Security and Safety and Special Programs Security provides quality leadership, services and solutions to safeguard people and the environment, secure and protect company information and assets and enhance operational efficiency for the Corporation. Y Security Officer, Systems, Security, Information, Officer, Leadership, Technology

View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Specialist Jobs View All Jobs in Huntsville