37 Cybersecurity Specialist jobs in Huntsville
Senior Data Protection Analyst - Cyber
Posted 2 days ago
Job Viewed
Job Description
Recruiting for this role ends on 7/31/2025.
Work you'll do
DT-US Cyber Data Protection team is responsible for securing and protecting confidential data of Deloitte US Member Firm, our clients, and our employees. The team's core mission is to implement consistent security controls to protect Firm's data and data entrusted to us by our clients to build their trust and protect our brand. We are seeking an experienced and energetic Senior Data Protection Analyst with outstanding communication, analytical and cyber security technical skills to join our Cyber Data Protection team within Deloitte Technology US (DT - US).
If you're an experienced, hands-on IT professional with strong systems administration, engineering, IT technical support and/or cyber security technical skills who's interested in growing in the cybersecurity field, this may be the job for you. As part of our Cyber Data Protection team, you will be assisting in designing, deploying, and managing cyber technology and process solutions to reduce the potential of data compromise. You will be assisting with testing of data protection and data security solutions. You will work to enhance and mature existing cyber security data protection capabilities for Deloitte US Member Firm and provide on-going support for them. You will require an understanding of the ecosystem of data protection including well-rounded understanding of the information security domains and their inter-relations across that ecosystem. You will be responsible for providing technical product and troubleshooting assistance to Deloitte Employees. You will work closely with management, lead analysts, peers, development teams, business analysts, and end users to ensure data protection technologies and data protection controls for systems are operating appropriately without causing business impact.
As part of the DT- US Cyber Data Protection team, you will have the following core responsibilities:
+ Assist with the development, deployment and support of cyber data protection solutions.
+ Assist with the implementation of data security controls and design principles.
+ Provide Tier 2 technical support to Deloitte end users for several of the cyber data protection services supported by the team that includes but not limited to Data Loss Prevention, Data Minimization, Data Classification and Rights Management, CASB, Web Security, Web Application Firewall, Next Generation Anti-virus and Endpoint Detection and Response technology, Endpoint Admin Rights Management/Privilege Management technology, PKI Certificate Lifecycle Management, Encryption Key Management, Digital Code Signing, Removable Media Protection, Data Discovery Roll Off Scans etc.
+ Assist in maturing existing data protection solutions protecting against data exfiltration.
+ Assist in rolling out new data protection services to employees, getting them adopted and providing on-going support for those services.
+ Assist with technology and software reviews based on data protection and endpoint risks.
+ Provide technical engineering and troubleshooting support to employees for data protection services.
Experience working with various data protection technologies:
+ Data Loss Prevention (DLP) technology
+ Data Classification and Rights Management technology
+ Cloud Access Security Broker (CASB)
+ Secure Web Gateway/Proxy (SWG) technology
+ Next Generation Anti-virus and Endpoint Detection and Response technology
+ Endpoint Admin Rights Management/Privilege Management technology
+ PKI Certificate Management technology
+ Encryption Key Management technology
+ Web Application Firewall technology
+ Confidential Data Reduction technology
+ Data Access Governance technology
+ Removable Media Protection technology
+ Database Encryption technologies
The team
Deloitte Technology US (DT - US) helps power Deloitte's success, which serves many of the world's largest, most respected organizations. We develop and deploy cutting-edge internal and go-to-market solutions that help Deloitte operate effectively and lead in the market. Our reputation is built on a tradition of delivering with excellence.
The ~3,000 professionals in DT - US deliver services including:
+ Cyber Security
+ Technology Support
+ Technology & Infrastructure
+ Applications
+ Relationship Management
+ Strategy & Communications
+ Project Management
+ Financials
Cyber Security
Cyber Security vigilantly protects Deloitte and client data. The team leads a strategic cyber risk program that adapts to a rapidly changing threat landscape, changes in business strategies, risks, and vulnerabilities. Using situational awareness, threat intelligence, and building a security culture across the organization, the team helps to protect the Deloitte brand.
Areas of focus include:
+ Risk & Compliance
+ Identity & Access Management
+ Data Protection
+ Cyber Design
+ Incident Response
+ Security Architecture
+ Business Partnership
Required Qualifications:
+ Bachelor's degree or equivalent in Computer Science or Engineering.
+ Minimum 5 years of combined experience in the Information Security/Cybersecurity domain.
+ Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
Preferred Qualifications:
+ Experienced with implementing and managing data protection strategies across data at rest, data in motion, and data in use.
+ Experience with troubleshooting issues and assisting end users to mitigate technical challenges.
+ Familiarity with change management and deployment processes in large IT organizations.
+ Working knowledge with common IT technologies such as Windows Server, Linux/Unix, Databases, Active Directory/LDAP, virtualization, end-user devices etc.
+ Working knowledge of IT/security principles such as encryption, identity, cloud, etc.
+ Experience with PowerShell command-line scripting is a plus.
+ Professional security certification desirable, such as Security+ or CISSP.
+ Understanding of industry best practices related to risk assessment, mitigation, and incident response.
+ Knowledge of data protection regulations and standards (e.g., ISO 27001, ISO 27018, NIST 800-171).
+ Understanding of networking and core networking protocols (e.g., TCP/IP, UDP, DNS, SMTP, HTTP, TLS, and distributed networks).
+ Knowledge in different types of VPN, Encryption Standards, Certificates.
+ Understanding of security controls in public cloud environments (i.e., Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform) and SaaS services hardening.
+ Ability to write technical reports and communicate technical content to business users.
+ Self-motivated with a strong willingness to learn and grow with changing cloud technologies.
+ Experience working in a virtual team.
+ Troubleshooting and problem analysis skills.
+ Understanding of information security frameworks, incident management/response, security operations, and application security best practices.
+ Competency with Microsoft Windows and/or MacOS Operating Systems
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $84,300 - $173,300.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation: qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Network Security Engineer II
Posted 5 days ago
Job Viewed
Job Description
Segra is searching for a dynamic and experienced Network Security Engineer II .
Role Overview:
The primary responsibilities of the Network Security Engineer II include providing Tier III support, standards development and maintenance, project support, and capacity planning and management of firewalls and other security technologies, products, and solutions supported by the Security Operations Center. The successful candidate will be an integral member of the security operations team and will need to be fully cognizant of state-of-the-art network, firewall, and other security technologies, products and solutions, as well as industry best practice with regard to the design, implementation and deployment of firewall solutions. The successful candidate should also have deep hands-on experience with firewalls, networking, and security technologies. Candidate will also maintain Segra's DDoS mitigation processes and procedures.
Required Qualifications:
- Must have a minimum of 5 years of experience in network security, such as firewall management, IDS, and IPS technologies.
- Must have proficiency Fortinet (FortiGate) experience.
Preferred Qualifications:
- Cisco Meraki is highly preferred
- Bachelor degree or equivalent combination of education and experience
- 5+ years supporting configuration and testing Firewall, IDS, and IPS technologies
- 5+ years of experience implementing/deploying Information Security Best Practices, Network Routing, Switching, and Security Design infrastructures
- 5+ years of experience in Networking and Network Operations
- 5+ years of experience in Troubleshooting & Analysis tools
- 5+ years of experience supporting Virtual Private Networking (VPNs)/MPLS VPN
- 5+ years of experience with system administration
Key Competencies:
- Evaluates and recommends solutions for highly complex security systems according to industry best practices to safeguard internal information systems and database
- Exceptional ability to work in a cooperative team environment to formulate complex technical solutions
- Ability to be available for on-call duties
- Excellent verbal and written communication skills
- Must possess and demonstrate excellent customer service skills
- Must be detail oriented with good organizational and time management skills
- Must be analytical and have proven problem solving abilities
About Segra:
Segra is one of the largest independent fiber network companies in the nation, able to offer state-of-the-art communication solutions backed by always-on customer service. We are known for our future-forward infrastructure and state-of-the-art voice and data technology solutions for businesses and the public sector, as well as wholesale transport services to some of the world's largest carriers. Our network features the latest advances in IP, ethernet, and dark fiber architectures, as well as high performance data centers. Furthermore, our network powers technology solutions such as hosted voice, security, and cloud.
Segra has engineered our entire company operations to put our customers at the very center of everything we do. We invest in the communities we serve by hiring locally and continually upgrading our network infrastructure. Segra has over 1200 employees, 500k+ on-net and near-net buildings, and 44k+ fiber-route miles. We exist purely to help businesses within our footprint be successful.
Benefits Overview:
Segra offers a very robust benefits package to our full-time employees, some of which include:
- Medical, dental, vision insurance
- Life insurance
- 401(k) match
- Flexible Spending/Health Savings Accounts
- Tuition and gym reimbursements
- Vacation/PTO, paid holidays, floating holidays
- Volunteer days, parental leave
- Legal, accidental, hospital indemnity, identify theft, pet insurance
Our Commitment to Equality:
Segra is an equal opportunity employer and prohibits discrimination of any kind. Segra does not discriminate on the basis of race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service, or other non-merit factor.
Network Security Subject Matter Expert
Posted 5 days ago
Job Viewed
Job Description
Job Responsibilities:
- Provide system and network optimization design, implementation, testing, and maintenance support for a complex enterprise network using industry best practices.
- Resolve escalated network and security support issues (Tier 3).
- Independently conduct network assessments, identify possible vulnerabilities, and recommend/develop solutions to problems found.
- Lead development of network documentation, diagrams, and standard operating procedures.
- Support continuous service improvements (CSI).
- Active participation in Root Cause Analysis for Problem Management activities.
- Work with cross-functional teams to plan and execute network upgrades, migrations, and deployments.
- Manage vendor relationships, including engagement on Incident Support activities and ensure timely delivery of program deliverables.
- Monitoring, capacity planning, backup, and recovery of network equipment
- Keep up with technology trends. Evaluate and recommend new technologies, tactics, and tools to improve service delivery.
- Mentor and coach junior engineers, including providing training and support as required.
- Provide testing support for the setup, installation, and transition to operations of service infrastructure devices, NMS and tools.
- Function as the primary COOP capability support engineer.
- Support lifecycle sustainment and refresh activities.
- Utilize the designated ticketing system to document resolution and develop knowledge management artifacts.
Required Education and Experience:
• Bachelor’s or AA/AS degree and 8-10 years of prior relevant experience or Masters with 5-7 years of prior relevant experience. Specific years of related work experience may be substituted for a degree at the Hiring Manager's discretion.
Skills:
Required
- Extensive knowledge of defense-in-depth principles, Network and Security architecture, network topology, IT device integrity, and common security elements.
- 8+ years’ experience engineering and troubleshooting networks, including extensive routing and switching experience such as one or more of the following: MPLS, VPNs, routing protocols i.e. BGP, OSPF, IS-IS, switching protocols i.e. Spanning Tree Protocol, VLANs, LLDP, VoIP, Multicast protocols and emerging network technologies.
- Hands-on experience with standard industry products e.g. Cisco, Juniper, and Ciena.
- Effective communicator and able to coordinate network and customer issues with other technical sections.
- Strong understanding and in-depth knowledge of IP network/subnet addressing.
- Experienced and adept at developing and maintaining technical documents, analyses, and reports.
- Experience developing and presenting technical information to senior customer management, customer stakeholders, and company management.
- Ability to multi-task and respond quickly to real-time dataflow issues.
- Ability to work non-standard work hours/shifts.
- Knowledge of Network Monitoring tools, e.g. NNMi, Specturm, MRTG, CACTI.
- Experience with Juniper route, switch and security appliances. (MX, EX, SRX)
- Experience with Session Initiation Protocol (SIP) implementation and design concepts.
- Experience with NNMi configuration and maintenance.
- Experience with Splunk
- Experience with change, configuration and performance management NetOps concepts.
- Experience working with Commercial Carrier service providers, e.g., AT&T, Verizon.
- Knowledge of Linux.
Clearance:
- Candidate must have or be able to obtain a Public Trust with a Level of Confidence of 50 or higher.
Desired Certifications / Training:
- Current holders of either a CCNA, CCNP or JNCIA
Travel (if any):
• Occasional travel to Greenbelt, Maryland may be required.
Chief Information Security Officer
Posted 4 days ago
Job Viewed
Job Description
About Stem
Stem (NYSE: STEM) is a global leader in AI-enabled software and services that enable its customers to plan, deploy, and operate clean energy assets. The company offers a complete set of solutions that transform how solar and energy storage projects are developed, built, and operated, including an integrated suite of software and edge products, and full lifecycle services from a team of leading experts. More than 16,000 global customers rely on Stem to maximize the value of their clean energy projects and portfolios. Learn more at
Stem's culture embodies diversity & inclusion beyond the traditional facets of gender, ethnicity, age, disabilities, and sexual orientation to include experience, personality, communication, workstyles, and more. At our core, Stem is at the momentous intersection of clean energy and software technology where diverse ideas, experiences, and professional skills converge to make the inclusive culture we have today. Together, we are turning old school thoughts about software and energy into progressive, collaborative, and innovative solutions. By joining our team, you will be collaborating with data scientists, energy experts, skilled salespeople, thought-leading executives and more from a range of backgrounds. This intersection of ideas, beliefs, and skills is what makes us unique enough to lead the world's largest network of digitally connected energy storage systems.
What we are looking for:
As a Chief Information Security Officer, you will be responsible for establishing and maintaining Stem's enterprise-wide cybersecurity vision, strategy, and program to ensure all information assets and technologies are adequately protected. You will lead the development and implementation of comprehensive security policies, procedures, and controls while ensuring regulatory compliance across multiple frameworks. This role requires both strategic leadership and hands-on expertise in cybersecurity, with a focus on building a security-first culture that aligns with our business objectives and supports our growth in the clean energy sector.
Responsibilities:
- Strategic Security Leadership - Develop and implement a comprehensive cybersecurity strategy that aligns with Stem's business objectives and risk tolerance, ensuring protection of our clean energy technology platform and customer data.
- Develop and implement cybersecurity and data privacy policies that enable business objectives and satisfy external requirements.
- Risk Management & Governance - Establish and oversee enterprise-wide cybersecurity risk management program, conducting regular risk assessments and implementing appropriate controls to mitigate identified vulnerabilities.
- Compliance & Audit Management - Lead SOC 2 Type II audits, ISO 27001 certification processes, and other regulatory compliance requirements. Ensure adherence to industry standards including NIST, Zero Trust, PCI DSS, and relevant data privacy regulations (GDPR, CCPA).
- Incident Response & Crisis Management - Develop and maintain comprehensive incident response plans, lead crisis communications during security events, and oversee post-incident analysis and remediation efforts.
- Security Architecture & Technology - Guide the selection, implementation, and management of security technologies including SIEM, endpoint detection and response (EDR), identity and access management (IAM), and cloud security solutions.
- Team Leadership & Development - Build and lead a high-performing cybersecurity team. Manage relationships with external security providers and consultants.
- Business Enablement - Collaborate with executive leadership to ensure security initiatives support business growth while maintaining appropriate risk levels. Translate complex security concepts into business-friendly language for stakeholders.
- Security Awareness & Training - Develop and implement comprehensive cybersecurity awareness programs for all employees, ensuring a security-first culture throughout the organization.
- Regulatory & Legal Coordination - Work closely with legal, compliance, and privacy teams to ensure cybersecurity practices meet all regulatory requirements and contractual obligations.
- Budget Management - Develop and manage cybersecurity budget, ensuring efficient allocation of resources while maintaining effective security posture.
- Third-Party Risk Management - Establish and oversee vendor security assessment programs, ensuring all third-party relationships maintain appropriate security standards.
- Business Continuity & Disaster Recovery - Develop and maintain comprehensive business continuity and disaster recovery plans, ensuring rapid recovery from security incidents.
Requirements:
Education:
- Bachelor's degree in Computer Science, Information Security, or related technical field required. Master's degree in Cybersecurity, Information Systems, or relevant discipline preferred.
Experience:
- 12+ years of progressive experience in information security roles with at least 5 years in senior leadership positions
- 10+ years of hands-on experience with cybersecurity technologies and frameworks
- Proven track record of leading SOC 2, ISO 27001, and other compliance audit processes
- Experience in technology companies, preferably in clean energy, SaaS, or IoT environments
Technical Expertise:
- Deep knowledge of cybersecurity frameworks (NIST, ISO 27001, COBIT, SANS)
- Extensive experience with security technologies (SIEM, EDR, IAM, firewalls, intrusion detection/prevention)
- Strong understanding of cloud security (AWS, Azure, GCP) and DevSecOps practices
- Experience with vulnerability management, penetration testing, and security assessments
- Knowledge of data privacy regulations (GDPR, CCPA, HIPAA) and their implementation
Certifications (Required):
- CISSP (Certified Information Systems Security Professional)
- CISM (Certified Information Security Manager) or CISA (Certified Information Systems Auditor)
- Additional preferred certifications: CCISO, CISSP, CGEIT, CRISC
Leadership & Business Skills:
- Proven ability to build and lead high-performing security teams
- Strong business acumen with ability to align security strategy with business objectives
- Excellent communication skills with ability to present to executive audiences and board members
- Experience working with customers on security and compliance requirements
- Track record of successfully managing security budgets and vendor relationships
Industry Knowledge:
- Understanding of critical infrastructure security requirements
- Knowledge of energy sector regulations and compliance requirements
- Experience with IoT security and industrial control systems preferred
- Familiarity with financial services and energy trading security requirements
What We Offer:
At Stem, you will work in a growing, innovative, mission-driven company with talented colleagues that have a passion for building renewable energy systems.Stem offers competitive compensation as well as a comprehensive set of benefits to support the health and wellness of our employee including:
- A competitive compensation package, including eligibility for a bonus or commission based on the role, and equity
- Full health benefits on the first day of employment (several medical plan options-HDHP and PPO, dental plans, FSA/HSA-with employer contribution, employer paid vision/LTD/STD/Life, variety of voluntary coverage)
- 401k (pre- or post-tax) on first day of employment
- 12 paid calendar holidays per year
- Flexible time-off
Learn More
To learn more about Stem, visit our stem.com where you'll find information about our solutions, technology, partners, case studies, resources, latest news and more. Here are some relevant links:
- Company Overview
- Newsroom
- Case Studies
Stem, Inc . is an equal opportunity employer committed to diversity in the workplace and does not discriminate against any employee or applicant for employment because of race, color, sex, pregnancy, religion, national origin, ethnicity, citizenship, sexual orientation, gender identity, age, marital status, disability, genetic information, military status, protected veteran status or any other factor protected by applicable federal, state or local laws.
Chief Information Security Officer
Posted 1 day ago
Job Viewed
Job Description
About Stem Stem (NYSE: STEM) is a global leader in AI-enabled software and services that enable its customers to plan, deploy, and operate clean energy assets. The company offers a complete set of solutions that transform how solar and energy storage projects are developed, built, and operated, including an integrated suite of software and edge products, and full lifecycle services from a team of leading experts. More than 16,000 global customers rely on Stem to maximize the value of their clean energy projects and portfolios. Learn more at Stem's culture embodies diversity & inclusion beyond the traditional facets of gender, ethnicity, age, disabilities, and sexual orientation to include experience, personality, communication, workstyles, and more. At our core, Stem is at the momentous intersection of clean energy and software technology where diverse ideas, experiences, and professional skills converge to make the inclusive culture we have today. Together, we are turning old school thoughts about software and energy into progressive, collaborative, and innovative solutions. By joining our team, you will be collaborating with data scientists, energy experts, skilled salespeople, thought-leading executives and more from a range of backgrounds. This intersection of ideas, beliefs, and skills is what makes us unique enough to lead the world's largest network of digitally connected energy storage systems. What we are looking for: As a Chief Information Security Officer, you will be responsible for establishing and maintaining Stem's enterprise-wide cybersecurity vision, strategy, and program to ensure all information assets and technologies are adequately protected. You will lead the development and implementation of comprehensive security policies, procedures, and controls while ensuring regulatory compliance across multiple frameworks. This role requires both strategic leadership and hands-on expertise in cybersecurity, with a focus on building a security-first culture that aligns with our business objectives and supports our growth in the clean energy sector. Responsibilities: Strategic Security Leadership - Develop and implement a comprehensive cybersecurity strategy that aligns with Stem's business objectives and risk tolerance, ensuring protection of our clean energy technology platform and customer data. Develop and implement cybersecurity and data privacy policies that enable business objectives and satisfy external requirements. Risk Management & Governance - Establish and oversee enterprise-wide cybersecurity risk management program, conducting regular risk assessments and implementing appropriate controls to mitigate identified vulnerabilities. Compliance & Audit Management - Lead SOC 2 Type II audits, ISO 27001 certification processes, and other regulatory compliance requirements. Ensure adherence to industry standards including NIST, Zero Trust, PCI DSS, and relevant data privacy regulations (GDPR, CCPA). Incident Response & Crisis Management - Develop and maintain comprehensive incident response plans, lead crisis communications during security events, and oversee post-incident analysis and remediation efforts. Security Architecture & Technology - Guide the selection, implementation, and management of security technologies including SIEM, endpoint detection and response (EDR), identity and access management (IAM), and cloud security solutions. Team Leadership & Development - Build and lead a high-performing cybersecurity team. Manage relationships with external security providers and consultants. Business Enablement - Collaborate with executive leadership to ensure security initiatives support business growth while maintaining appropriate risk levels. Translate complex security concepts into business-friendly language for stakeholders. Security Awareness & Training - Develop and implement comprehensive cybersecurity awareness programs for all employees, ensuring a security-first culture throughout the organization. Regulatory & Legal Coordination - Work closely with legal, compliance, and privacy teams to ensure cybersecurity practices meet all regulatory requirements and contractual obligations. Budget Management - Develop and manage cybersecurity budget, ensuring efficient allocation of resources while maintaining effective security posture. Third-Party Risk Management - Establish and oversee vendor security assessment programs, ensuring all third-party relationships maintain appropriate security standards. Business Continuity & Disaster Recovery - Develop and maintain comprehensive business continuity and disaster recovery plans, ensuring rapid recovery from security incidents. Requirements: Education: Bachelor's degree in Computer Science, Information Security, or related technical field required. Master's degree in Cybersecurity, Information Systems, or relevant discipline preferred. Experience: 12+ years of progressive experience in information security roles with at least 5 years in senior leadership positions 10+ years of hands-on experience with cybersecurity technologies and frameworks Proven track record of leading SOC 2, ISO 27001, and other compliance audit processes Experience in technology companies, preferably in clean energy, SaaS, or IoT environments Technical Expertise: Deep knowledge of cybersecurity frameworks (NIST, ISO 27001, COBIT, SANS) Extensive experience with security technologies (SIEM, EDR, IAM, firewalls, intrusion detection/prevention) Strong understanding of cloud security (AWS, Azure, GCP) and DevSecOps practices Experience with vulnerability management, penetration testing, and security assessments Knowledge of data privacy regulations (GDPR, CCPA, HIPAA) and their implementation Certifications (Required): CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) or CISA (Certified Information Systems Auditor) Additional preferred certifications: CCISO, CISSP, CGEIT, CRISC Leadership & Business Skills: Proven ability to build and lead high-performing security teams Strong business acumen with ability to align security strategy with business objectives Excellent communication skills with ability to present to executive audiences and board members Experience working with customers on security and compliance requirements Track record of successfully managing security budgets and vendor relationships Industry Knowledge: Understanding of critical infrastructure security requirements Knowledge of energy sector regulations and compliance requirements Experience with IoT security and industrial control systems preferred Familiarity with financial services and energy trading security requirements Salary Range $220,400.00 - $330,600.00 What We Offer: At Stem, you will work in a growing, innovative, mission-driven company with talented colleagues that have a passion for building renewable energy systems.Stem offers competitive compensation as well as a comprehensive set of benefits to support the health and wellness of our employee including: A competitive compensation package, including eligibility for a bonus or commission based on the role, and equity F ull health benefits on the first day of employment (several medical plan options-HDHP and PPO, dental plans, FSA/HSA-with employer contribution, employer paid vision/LTD/STD/Life, variety of voluntary coverage) 401k (pre- or post-tax) on first day of employment 12 paid calendar holidays per year Flexible time-off Learn More To learn more about Stem, visit our stem.com where you'll find information about our solutions, technology, partners, case studies, resources, latest news and more. Here are some relevant links: Company Overview Newsroom Case Studies LinkedIn Stem, Inc . is an equal opportunity employer committed to diversity in the workplace and does not discriminate against any employee or applicant for employment because of race, color, sex, pregnancy, religion, national origin, ethnicity, citizenship, sexual orientation, gender identity, age, marital status, disability, genetic information, military status, protected veteran status or any other factor protected by applicable federal, state or local laws. #J-18808-Ljbffr
Information Systems Security Officer
Posted 1 day ago
Job Viewed
Job Description
Description Leidos Chief Information Security Office within the Digital Modernization sector is seeking a talented Information System Security Officer (ISSO) to join a diverse team to create unique solutions for complex problems. With offices across the United States engaging in the defense, space, cyber and commercial fields, Leidos provides responsive, cost-effective engineering, scientific and IT solutions.In this role, you will be responsible for supporting our Classified Information System Cybersecurity/Information Assurance Program. You will report to the Information System Security Manager (ISSM) on all aspects of classified information system security compliance. Your work will be conducted on site at our Huntsville, AL location.CLEARANCE REQUIREMENT:• Must currently possess and be able to maintain an active DoD TOP SECRET security clearance. (US Citizenship required)What will you be doing?Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awarenessInvestigating information system security violations and help prepare reports specifying corrective and preventative actionsConducting technical and administrative assessmentsIntegrating new cybersecurity processes, procedures, and toolsSupport the creation, review and update of cybersecurity documentation and other technical writingThe ISSO's primary duties will consist of managing the day-to-day compliance of our classified information systems by:Auditing information systems to ensure compliance with security policies and procedures while reporting any discrepancies to the ISSM, ISO or FSO.Assisting in the Risk Management Framework (RMF) authorization process by developing and maintaining artifacts for the IS Body of Evidence (BoE).Reviewing and approving (within authority) Configuration Management (CM) requests of all associated hardware, software, and security relevant functions is maintained and documented as part of CCB approval process.Assisting with sanitization and release of hardware in accordance with security policies or Authorizing Official (AO) guidance.Testing/evaluation and application of required technical security controls and periodic inspections of information systems.Basic Qualifications:Bachelor's Degree and 8 or more years' related experience in a computer related discipline; Associate and 10 years, Master's and 6 years or equivalent work experience may be considered in lieu of a degree.Must hold current Security+ or equivalent certification to be considered; must be able to maintain.Relevant Experience Considered:Cybersecurity, systems security or hardening, Information Technology.Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), National Industrial Security Program Operating Manual (NISPOM) or Joint Special Access Program (SAP) Implementation Guide (JSIG).Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics).Physical security, project or program management, office management, senior administration, or account management.Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy, Centrify, etc. is required.Highly organized and self-motivated with excellent documentation skills and the ability to work with minimal supervision.Preferred Qualifications:Experience performing IT work with Windows or Linux systems is preferred.Experience working in DoD classified operating and/or laboratory environments.Experience with various information system security tools that address vulnerability analysis and mitigation. These may include SolarWinds, Tenable, SCAP.Familiarity with implementation of Government directives and policies derived from NIST, STIG, DoD, or other Government Regulatory compliance standards within a professional industry.Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF).Experience providing technical security consultation for complex, cross-domain, diverse classified networked environments in collaboration with internal/external Customers, Information Technology (IT).Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication.Original Posting:July 18, 2025For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:Pay Range $104,650.00 - $189,175.00The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Information System Security Officer
Posted 1 day ago
Job Viewed
Job Description
Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research.
We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins.
Job SummaryThe Mid-Level to Senior Level Information System Security Officer (Mid-Sr. ISSO) will assist in preparation, development, and maintenance of specialized Information Systems (IS) security plans used to obtain/retain DCSA accreditation.
Essential Duties and ResponsibilitiesMay include the following. Other duties may be assigned.
- You will be required to oversee the system compliance, and auditing of the information systems.
- Review and revise IS system plans documentation based on analysis of the existing equipment configuration. Document any changes or special security requirements.
- Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices.
- Assist with the design, develop, and implement annual IS security training for the end-users. Similar but specialized training will also be given to the Data Transfer Agents DTAs and SAs annually.
- Assist in the development of drafting procedures for the protection of the information system.
- Assists in spill containment and cleanup.
- Develop procedures to assist with manufacturing processes with Cybersecurity requirements in mind.
- Partners and works with Government agencies, including the Department of Defense (DoD) and other relevant agencies, on information security matters
- Participates in investigations relating to any IS security violations and provides "lessons learned" information to the IS community to prevent reoccurrence.
- Communicates security risks and solutions to business partners and IT staff as needed
- Assists the Information Systems Security Manager (ISSM) and implements information systems security tasks, as required for safeguarding, handling, and controlling of classified materials, documents and equipment. Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
- Attends cybersecurity events and participates in other external cybersecurity activities to maintain current in the field
- Knowledge of National Industrial Security Program Operating Manual (NISPOM), DCSA Assessment and Authorization Process Manual (DAAPM), and Risk Management Framework is required.
- Responds to emergencies and remediates information security incidents.
This job has no supervisory responsibilities.
CompetenciesTo perform the job successfully, an individual should demonstrate the following competencies:
- Problem Solving - Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully.
- Project Management - Communicates changes and progress.
- Technical Skills - Pursues training and development opportunities; Strives to continuously build knowledge and skills.
- Oral/Written Communication Listens and gets clarification; Responds well to questions; Records data; Writes clearly and informatively; Able to read and interpret written information.
- Teamwork - Gives and welcomes feedback; Supports everyone's efforts to succeed.
- Leadership - Exhibits confidence in self and others; Inspires and motivates others to perform well; Accepts feedback from others; Gives appropriate recognition to others.
- Change Management - Develops workable implementation plans; Communicates changes effectively.
- Business Acumen - Understands business implications of decisions.
- Ethics - Treats people with respect;
- Organizational Support - Follows policies and procedures; Supports organization's goals and values.
- Judgment - Includes appropriate people in decision-making process.
- Motivation - Demonstrates persistence and overcomes obstacles.
- Planning/Organizing - Prioritizes and plans work activities; Uses time efficiently.
- Professionalism - Approaches others in a tactful manner; Reacts well under pressure; Accepts responsibility for own actions; Follows through on commitments.
- Quality - Demonstrates accuracy and thoroughness; Looks for ways to improve and promote quality; Applies feedback to improve performance; Monitors own work to ensure quality.
- Quantity - Completes work in timely manner; Strives to increase productivity.
- Safety and Security - Observes safety and security procedures including using Personal Protective Equipment (PPE) as required and wearing company issued badge when on company property; Reports potentially unsafe conditions ; Uses equipment and materials properly.
- Adaptability - Adapts to changes in the work environment; Able to deal with frequent change, delays, or unexpected events.
- Initiative - Seeks increased responsibilities; Asks for and offers help when needed.
- Innovation - Generates suggestions for improving work.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education and/or Experience:- Bachelor's degree (B.S.) from four-year college or university in a related field, such as: computer science, information systems, engineering, or other technical disciplines involving information systems and 5-10 years of relevant experience.
- Strong interpersonal skills.
- Strong oral and written communication abilities with all levels of management, employees, and customers, ability to communicate and explain information efficiently.
- Ability to translate security situations and postures into business objectives and outcomes
- Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.
- Ability to compute rate, ratio, and percent.
Develops solutions to a variety of complex problems. May refer to established precedents and policies. Demonstrates judgment and discretion in working with sensitive information and confidential matters
Computer Skills:- Ability to learn and adapt to new technologies
- Full knowledge and thorough understanding of:
- Automated vulnerability scanning tools, forensic tools, Windows and other operating systems
- Information security architecture, systems design, integration of systems and networking
- Microsoft Office Suite (i.e., Outlook, Word, Access, Excel, PowerPoint, Project, Visio, etc.)
- Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
- Follows all import/export requirements, consulting with facility import/export personnel as required.
- Experience with the DCSA Assessment & Authorization Process.
- Within 6 months of hire, you must obtain and maintain a cybersecurity certification Security + or equivalent.
- US Citizenship with ability to attain/maintain government security clearance.
- Ability to travel approximately 5% domestically/internationally
#TBE
Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions.
Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws.
Be The First To Know
About the latest Cybersecurity specialist Jobs in Huntsville !
Information Systems Security Officer
Posted 1 day ago
Job Viewed
Job Description
Leidos Chief Information Security Office within the Digital Modernization sector is seeking a talented **Information System Security Officer (ISSO)** to join a diverse team to create unique solutions for complex problems. With offices across the United States engaging in the defense, space, cyber and commercial fields, Leidos provides responsive, cost-effective engineering, scientific and IT solutions.
In this role, you will be responsible for supporting our Classified Information System Cybersecurity/Information Assurance Program. You will report to the Information System Security Manager (ISSM) on all aspects of classified information system security compliance. **_Your work will be conducted on site at our Huntsville, AL location._**
**CLEARANCE REQUIREMENT:**
- Must currently possess and be able to maintain an active DoD TOP SECRET security clearance. (US Citizenship required)
**What will you be doing?**
+ Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness
+ Investigating information system security violations and help prepare reports specifying corrective and preventative actions
+ Conducting technical and administrative assessments
+ Integrating new cybersecurity processes, procedures, and tools
+ Support the creation, review and update of cybersecurity documentation and other technical writing
+ The ISSO's primary duties will consist of managing the day-to-day compliance of our classified information systems by:
+ Auditing information systems to ensure compliance with security policies and procedures while reporting any discrepancies to the ISSM, ISO or FSO.
+ Assisting in the Risk Management Framework (RMF) authorization process by developing and maintaining artifacts for the IS Body of Evidence (BoE).
+ Reviewing and approving (within authority) Configuration Management (CM) requests of all associated hardware, software, and security relevant functions is maintained and documented as part of CCB approval process.
+ Assisting with sanitization and release of hardware in accordance with security policies or Authorizing Official (AO) guidance.
+ Testing/evaluation and application of required technical security controls and periodic inspections of information systems.
**Basic Qualifications:**
+ Bachelor's Degree and 8 or more years' related experience in a computer related discipline; Associate and 10 years, Master's and 6 years or equivalent work experience may be considered in lieu of a degree.
+ Must hold current Security+ or equivalent certification to be considered; must be able to maintain.
+ Relevant Experience Considered:
+ Cybersecurity, systems security or hardening, Information Technology.
+ Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), National Industrial Security Program Operating Manual (NISPOM) or Joint Special Access Program (SAP) Implementation Guide (JSIG).
+ Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics).
+ Physical security, project or program management, office management, senior administration, or account management.
+ Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy, Centrify, etc. is required.
+ Highly organized and self-motivated with excellent documentation skills and the ability to work with minimal supervision.
**Preferred Qualifications:**
+ Experience performing IT work with Windows or Linux systems is preferred.
+ Experience working in DoD classified operating and/or laboratory environments.
+ Experience with various information system security tools that address vulnerability analysis and mitigation. These may include SolarWinds, Tenable, SCAP.
+ Familiarity with implementation of Government directives and policies derived from NIST, STIG, DoD, or other Government Regulatory compliance standards within a professional industry.
+ Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF).
+ Experience providing technical security consultation for complex, cross-domain, diverse classified networked environments in collaboration with internal/external Customers, Information Technology (IT).
+ Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication.
**Original Posting:**
July 18, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
Pay Range $104,650.00 - $189,175.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R-00162909
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
Information System Security Officer

Posted 3 days ago
Job Viewed
Job Description
Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research?
We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins.
**Job Description**
**Job Summary**
The Mid-Level to Senior Level Information System Security Officer (Mid-Sr. ISSO) will assist in preparation, development, and maintenance of specialized Information Systems (IS) security plans used to obtain/retain DCSA accreditation.
**Essential Duties and Responsibilities** may include the following. Other duties may be assigned.
+ You will be required to oversee the system compliance, and auditing of the information systems.
+ Review and revise IS system plans documentation based on analysis of the existing equipment configuration. Document any changes or special security requirements.
+ Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices.
+ Assist with the design, develop, and implement annual IS security training for the end-users. Similar but specialized training will also be given to the Data Transfer Agents DTAs and SAs annually.
+ Assist in the development of drafting procedures for the protection of the information system.
+ Assists in spill containment and cleanup.
+ Develop procedures to assist with manufacturing processes with Cybersecurity requirements in mind.
+ Partners and works with Government agencies, including the Department of Defense (DoD) and other relevant agencies, on information security matters
+ Participates in investigations relating to any IS security violations and provides "lessons learned" information to the IS community to prevent reoccurrence.
+ Communicates security risks and solutions to business partners and IT staff as needed
+ Assists the Information Systems Security Manager (ISSM) and implements information systems security tasks, as required for safeguarding, handling, and controlling of classified materials, documents and equipment. Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
+ Attends cybersecurity events and participates in other external cybersecurity activities to maintain current in the field
+ Knowledge of National Industrial Security Program Operating Manual (NISPOM), DCSA Assessment and Authorization Process Manual (DAAPM), and Risk Management Framework is required.
+ Responds to emergencies and remediates information security incidents.
**Supervisory Responsibilities**
This job has no supervisory responsibilities.
**Competencies**
To perform the job successfully, an individual should demonstrate the following competencies:
+ Problem Solving - Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully.
+ Project Management - Communicates changes and progress.
+ Technical Skills - Pursues training and development opportunities; Strives to continuously build knowledge and skills.
+ Oral/Written Communication - Listens and gets clarification; Responds well to questions; Records data; Writes clearly and informatively; Able to read and interpret written information.
+ Teamwork - Gives and welcomes feedback; Supports everyone's efforts to succeed.
+ Leadership - Exhibits confidence in self and others; Inspires and motivates others to perform well; Accepts feedback from others; Gives appropriate recognition to others.
+ Change Management - Develops workable implementation plans; Communicates changes effectively.
+ Business Acumen - Understands business implications of decisions.
+ Ethics - Treats people with respect;
+ Organizational Support - Follows policies and procedures; Supports organization's goals and values.
+ Judgment - Includes appropriate people in decision-making process.
+ Motivation - Demonstrates persistence and overcomes obstacles.
+ Planning/Organizing - Prioritizes and plans work activities; Uses time efficiently.
+ Professionalism - Approaches others in a tactful manner; Reacts well under pressure; Accepts responsibility for own actions; Follows through on commitments.
+ Quality - Demonstrates accuracy and thoroughness; Looks for ways to improve and promote quality; Applies feedback to improve performance; Monitors own work to ensure quality.
+ Quantity - Completes work in timely manner; Strives to increase productivity.
+ Safety and Security - Observes safety and security procedures including using Personal Protective Equipment (PPE) as required and wearing company issued badge when on company property; Reports potentially unsafe conditions ; Uses equipment and materials properly.
+ Adaptability - Adapts to changes in the work environment; Able to deal with frequent change, delays, or unexpected events.
+ Initiative - Seeks increased responsibilities; Asks for and offers help when needed.
+ Innovation - Generates suggestions for improving work.
**Qualifications**
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**Education and/or Experience:**
+ Bachelor's degree (B.S.) from four-year college or university in a related field, such as: computer science, information systems, engineering, or other technical disciplines involving information systems and 5-10 years of relevant experience.
**Language Skills**
+ Strong interpersonal skills.
+ Strong oral and written communication abilities with all levels of management, employees, and customers, ability to communicate and explain information efficiently.
+ Ability to translate security situations and postures into business objectives and outcomes
**Mathematical Skills**
+ Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals.
+ Ability to compute rate, ratio, and percent.
**Reasoning Ability**
Develops solutions to a variety of complex problems. May refer to established precedents and policies. Demonstrates judgment and discretion in working with sensitive information and confidential matters
**Computer Skills**
+ Ability to learn and adapt to new technologies
+ Full knowledge and thorough understanding of:
+ Automated vulnerability scanning tools, forensic tools, Windows and other operating systems
+ Information security architecture, systems design, integration of systems and networking
+ Microsoft Office Suite (i.e., Outlook, Word, Access, Excel, PowerPoint, Project, Visio, etc.)
+ Knowledgeable in information systems security in order to assure enforcement of company and government regulations.
**Other Essential Duties**
+ Follows all import/export requirements, consulting with facility import/export personnel as required.
+ Experience with the DCSA Assessment & Authorization Process.
**Other Skills and Abilities**
+ Within 6 months of hire, you must obtain and maintain a cybersecurity certification Security + or equivalent.
**Other Qualifications**
+ US Citizenship with ability to attain/maintain government security clearance.
+ Ability to travel (domestically/internationally) approximately _5__%
#TBE
Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions.
Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws. ?
You may not realize it, but Teledyne enables many of the products and services you use every day **.**
Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.
Information Systems Security Officer (ISSO)
Posted today
Job Viewed
Job Description
Security and Safety and Special Programs Security provides quality leadership, services and solutions to safeguard people and the environment, secure and protect company information and assets and enhance operational efficiency for the Corporation. Y Security Officer, Systems, Security, Information, Officer, Leadership, Technology