<p>We are looking for an experienced Information Security Analyst to join our team. In this contract position, you will play a pivotal role in ensuring the organization's security policies and controls align with industry regulations and best practices. This role is ideal for someone who thrives in a financial services environment and has a solid background in information security governance, risk management, and regulatory compliance.</p><p><br></p><p>Responsibilities:</p><p>• Develop and implement security policies and controls to protect organizational data and assets.</p><p>• Ensure compliance with financial regulations and industry standards by leveraging the ServiceNow Integrated Risk Management platform.</p><p>• Conduct regular audits to assess and strengthen the organization's security posture.</p><p>• Support internal security awareness initiatives and training programs to enhance employee understanding of security protocols.</p><p>• Collaborate with cross-functional teams to align security measures with business objectives.</p><p>• Respond to audit requests and provide detailed documentation for regulatory reviews.</p><p>• Monitor and evaluate risk management practices to address vulnerabilities proactively.</p><p>• Maintain governance frameworks to ensure consistent application of security standards.</p><p>• Analyze security metrics and reports to identify potential areas for improvement.</p><p>• Provide hands-on expertise in the ServiceNow platform to optimize risk management processes.</p>
We are looking for an experienced Security Analyst II to join our team on a long-term contract basis in Allentown, Pennsylvania. In this role, you will focus on securing AI and machine learning systems, ensuring compliance with enterprise policies and evolving regulations. You will collaborate with cross-functional teams to implement robust security measures for innovative AI technologies, contributing to the organization's commitment to advancing a secure and sustainable energy future.<br><br>Responsibilities:<br>• Collaborate with product teams to integrate security measures into AI models, data pipelines, and applications.<br>• Perform detailed security assessments for AI systems, including generative AI and large language models.<br>• Develop and enforce security policies, controls, and standards tailored to AI technologies.<br>• Implement risk management strategies for AI solutions, addressing issues such as model bias and explainability.<br>• Work closely with legal, compliance, and data privacy teams to adhere to emerging AI regulations.<br>• Evaluate and deploy security tools for monitoring, model scanning, and data protection.<br>• Provide guidance on best practices for AI security within Agile and cloud-based environments.<br>• Support the adoption of frameworks for responsible AI use, emphasizing traceability and observability.<br>• Stay updated on advancements in AI security to continuously improve enterprise practices.<br>• Facilitate training sessions to enhance team awareness of AI security protocols.
<p><strong>Network Security Administrator</strong></p><p><strong>Position Summary</strong></p><p>The Network Security Administrator is responsible for protecting the organization’s network infrastructure through proactive monitoring, configuration, and management of next‑generation firewalls and related security technologies. This role focuses heavily on <strong>NGFW </strong>Next-Generation Firewalls, ensuring secure and reliable connectivity across enterprise environments. The specialist will be a key contributor to incident response, threat mitigation, and continuous improvement of security controls.</p><p><br></p><p><br></p><p><br></p><p><strong>Key Responsibilities</strong></p><p><strong>Firewall & Network Security Administration</strong></p><ul><li>Configure, manage, and maintain <strong>Next‑Generation Firewalls (NGFW)</strong>, including policies, objects, NAT rules, App‑ID, User‑ID, threat prevention profiles, and Remote access VPN, ACL’s, IDS/IPS policies.</li><li>Perform regular firewall rule reviews, cleanup, and optimization to improve performance and reduce risk.</li></ul><p><strong>Security Operations & Monitoring</strong></p><ul><li>Monitor network security alerts, traffic anomalies, and firewall logs using vendor specific tools, SIEM platforms, and packet capture utilities.</li><li>Investigate and remediate network‑based security incidents, coordinating with SOC or incident response teams as necessary.</li><li>Perform security event correlation and escalation following established SOPs.</li></ul><p><strong>Network Infrastructure Support</strong></p><ul><li>Support secure network connectivity across data centers, branch sites, cloud environments, and remote access solutions.</li><li>Troubleshoot layer 2/3 issues related to routing, switching, VPN tunnels, and connectivity impacts to security appliances.</li><li>Assist in deploying secure architectures for new network builds, migrations, and cloud integrations.</li></ul><p><br></p>
<p><strong>Network Security Administrator</strong></p><p><strong>Position Summary</strong></p><p>The Network Security Administrator is responsible for protecting the organization’s network infrastructure through proactive monitoring, configuration, and management of next‑generation firewalls and related security technologies. This role focuses heavily on <strong>NGFW </strong>Next-Generation Firewalls, ensuring secure and reliable connectivity across enterprise environments. The specialist will be a key contributor to incident response, threat mitigation, and continuous improvement of security controls.</p><p><br></p><p><br></p><p><br></p><p><strong>Key Responsibilities</strong></p><p><strong>Firewall & Network Security Administration</strong></p><ul><li>Configure, manage, and maintain <strong>Next‑Generation Firewalls (NGFW)</strong>, including policies, objects, NAT rules, App‑ID, User‑ID, threat prevention profiles, and Remote access VPN, ACL’s, IDS/IPS policies.</li><li>Perform regular firewall rule reviews, cleanup, and optimization to improve performance and reduce risk.</li></ul><p><strong>Security Operations & Monitoring</strong></p><ul><li>Monitor network security alerts, traffic anomalies, and firewall logs using vendor specific tools, SIEM platforms, and packet capture utilities.</li><li>Investigate and remediate network‑based security incidents, coordinating with SOC or incident response teams as necessary.</li><li>Perform security event correlation and escalation following established SOPs.</li></ul><p><strong>Network Infrastructure Support</strong></p><ul><li>Support secure network connectivity across data centers, branch sites, cloud environments, and remote access solutions.</li><li>Troubleshoot layer 2/3 issues related to routing, switching, VPN tunnels, and connectivity impacts to security appliances.</li><li>Assist in deploying secure architectures for new network builds, migrations, and cloud integrations.</li></ul><p><br></p>
We are looking for an experienced Security Analyst III to join our team in Allentown, Pennsylvania. This position requires a skilled individual to enhance the effectiveness of IT compliance programs, strengthen control execution, and identify automation opportunities. As this is a long-term contract role, you will play a vital part in ensuring compliance and fostering continuous improvement within a hybrid work environment.<br><br>Responsibilities:<br>• Develop and maintain detailed control narratives for IT general controls, application controls, and system development controls.<br>• Ensure control documentation accurately reflects current design and operational procedures, collaborating with stakeholders to address gaps.<br>• Evaluate new and existing IT systems and applications, including third-party solutions, to assess compliance relevance and impact.<br>• Conduct risk assessments and recommend control requirements and remediation actions to meet compliance standards.<br>• Review and analyze SOC1 reports from third-party service providers, documenting findings and advising on corrective actions.<br>• Perform testing to validate the operational effectiveness of controls and track remediation of deficiencies through closure.<br>• Represent IT in meetings and communications with internal and external audit teams, providing insights to ensure compliance.<br>• Identify opportunities for operational improvements to enhance compliance efficiency and educate IT control owners.<br>• Mentor and train control owners to improve the quality and consistency of control evidence.<br>• Collaborate with cross-functional teams to integrate security controls into infrastructure and applications.
We are looking for a skilled Data Analyst / Engineer to join our team in Marysville, Ohio. In this long-term contract position, you will play a vital role in analyzing complex data sets, developing solutions, and ensuring data security and quality. This onsite role requires working four days a week on location, collaborating with cross-functional teams to drive insightful decision-making.<br><br>Responsibilities:<br>• Analyze and interpret complex data sets to uncover meaningful insights and trends.<br>• Design and maintain efficient data pipelines utilizing AWS services such as S3, Redshift, and Lambda.<br>• Collaborate with developers, designers, and business stakeholders to gather requirements and deliver tailored data solutions.<br>• Present findings and recommendations effectively to both technical and non-technical audiences.<br>• Lead data-related projects, ensuring accurate and timely delivery of tasks.<br>• Implement data governance standards and best practices to maintain data integrity and security.<br>• Create and manage data models, dashboards, and reports to visualize performance metrics.<br>• Troubleshoot data issues and provide technical support to resolve challenges.<br>• Stay informed on emerging data technologies to improve processes and outcomes.
We are looking for a skilled Data Analyst to join our team in Delray Beach, Florida, on a contract with the potential for long-term employment. In this role, you will bridge the gap between management and technology teams, ensuring data is organized, analyzed, and leveraged effectively to meet business needs. This position offers an opportunity to take ownership of data reporting processes and deliver solutions that drive organizational success.<br><br>Responsibilities:<br>• Retrieve, organize, and analyze data to support strategic business decisions.<br>• Serve as a subject matter expert on organizational data systems and promote their adoption across teams.<br>• Develop and implement data reporting solutions for internal and external stakeholders.<br>• Conduct daily, monthly, and quarterly data uploads and submissions as required.<br>• Maintain the security of organizational data by enforcing appropriate access controls.<br>• Provide assistance and support to end-users on data systems and tools.<br>• Lead onboarding training sessions and ongoing education initiatives related to data systems.<br>• Utilize Microsoft Access and other reporting tools to create insightful reports.<br>• Manage ad hoc reporting requests to address immediate business needs.<br>• Participate in meetings, training sessions, and other tasks as assigned by the supervisor.
We are looking for a Trade and File Data Analyst to join our team in Palm Beach Gardens, Florida. In this Contract to permanent position, you will play a key role in managing and analyzing file data, ensuring secure and efficient data transfers, and supporting mutual fund trading processes. The ideal candidate will bring expertise in data security, file transfer protocols, and mutual fund operations to help us maintain high standards of accuracy and compliance.<br><br>Responsibilities:<br>• Analyze all outgoing files to determine their contents, origin, recipients, and the purpose of distribution.<br>• Review incoming files to identify the sender, content details, and intended use within the organization.<br>• Manage mutual fund trading processes, ensuring accuracy and compliance with industry standards.<br>• Monitor and troubleshoot file transfer issues, resolving discrepancies promptly to maintain operational efficiency.<br>• Coordinate with external partners such as custodians, fund companies, and vendors to ensure seamless data exchanges.<br>• Document workflows and identify opportunities for process improvements to enhance efficiency.<br>• Apply file transfer protocols and security measures to protect sensitive data during transfers.<br>• Utilize tools such as VisualCron and IBM iSeries to automate and streamline file management.<br>• Ensure compliance with data handling and trading regulations to uphold organizational standards.<br>• Support the implementation of security policies and encryption methods to safeguard information.
We are looking for a detail-oriented Data Analyst to join our team in Clarksville, Tennessee. In this role, you will collect, analyze, and interpret data to provide actionable insights that drive decision-making across the organization. You will collaborate with various departments to understand business needs, develop impactful reports and dashboards, and ensure the accuracy and security of data used for analysis.<br><br>Responsibilities:<br>• Gather, clean, and preprocess data from multiple sources to ensure accuracy and readiness for analysis.<br>• Analyze datasets to uncover trends, patterns, and actionable insights that support strategic decisions.<br>• Create and maintain dashboards and reports using tools like Power BI, Spotfire, or Excel, enhancing efficiency through automation.<br>• Present data findings clearly to non-technical stakeholders, tailoring visualizations to meet specific business needs.<br>• Work closely with departments to identify reporting requirements and translate them into analytical solutions.<br>• Monitor and evaluate key performance indicators (KPIs) to assess business performance and recommend improvements.<br>• Ensure compliance with data governance policies and maintain the confidentiality of sensitive information.<br>• Perform research and analysis to understand industry trends and identify opportunities for growth and optimization.<br>• Document analytical processes, data sources, and reporting solutions for future reference and training purposes.<br>• Stay updated on industry advancements in data analytics to continuously improve tools and techniques.
<p>We are looking for an experienced HRIS Analyst to join our team in Jacksonville, Florida. This long-term contract position offers the opportunity to work on optimizing and managing Human Resources Information Systems (HRIS), ensuring they meet organizational needs effectively. The ideal candidate will bring a deep understanding of HRIS tools, database management, and system implementation processes.</p><p><br></p><p>Responsibilities:</p><p>• Analyze and evaluate HRIS systems to identify areas for improvement and increased efficiency.</p><p>• Implement and configure HRIS tools to align with organizational requirements.</p><p>• Ensure the accuracy, security, and maintenance of HRIS databases.</p><p>• Collaborate with HR and IT teams to troubleshoot system issues and provide solutions.</p><p>• Generate detailed reports and insights to support HR decision-making processes.</p><p>• Develop and document best practices for HRIS usage and management.</p><p>• Train and support end-users in utilizing HRIS functionalities effectively.</p><p>• Stay updated on industry trends and emerging technologies relevant to HRIS.</p><p>• Conduct regular audits of HRIS systems to ensure compliance and data integrity.</p><p>• Assist in integrating HRIS systems with other organizational platforms as needed.</p>
<p>Position Overview</p><p>We are seeking a Mid-Level Cyber Security Engineer to provide expert cyber domain guidance across compliance, vulnerability assessment, cyber defense, and incident response activities. This position supports a highly technical environment requiring hands‑on security engineering, risk assessment, and continuous monitoring across systems with varying classification levels. The ideal candidate brings strong technical depth, excellent communication skills, and the ability to lead or guide other technical staff in cyber‑related initiatives.</p><p><br></p><p>This role is 100% onsite in Washington, DC and requires the ability to obtain a Public Trust clearance.</p><p><br></p><p>Key Responsibilities</p><p>Cyber Security Engineering & Analysis</p><ul><li>Conduct and review complex cybersecurity assessments</li><li>Identify system vulnerabilities and areas of non‑compliance with cybersecurity standards</li><li>Recommend mitigation strategies and risk‑reduction approaches</li><li>Perform research, evaluation, and development in advanced cybersecurity areas</li></ul><p>Security Operations & Monitoring</p><ul><li>Perform and maintain vulnerability scans, generating clear reports for leadership</li><li>Track and report Information Assurance Vulnerability Management (IAVM) compliance</li><li>Support incident response teams with domain-specific expertise</li><li>Maintain a library of security audit tools and related testing processes</li></ul><p>Risk Management & Compliance</p><ul><li>Review and update Authorization to Operate (ATO) documentation</li><li>Manage and report Plan of Action & Milestones (POA& M) compliance</li><li>Review Certification & Accreditation (C& A) documentation for compliance and completeness</li><li>Ensure systems adhere to agency standards, regulatory frameworks, and RMF requirements</li></ul><p>Technical Leadership & Collaboration</p><ul><li>Provide cybersecurity guidance to penetration testers, analysts, incident handlers, and support teams</li><li>Lead or support integration of cyber requirements into IT and communication systems</li><li>Assist with managing networks and systems across multiple classification environments</li><li>Coordinate with cross‑functional engineering teams and mentor technical staff</li></ul><p><br></p>
We are looking for a skilled AWS Security Analyst to join our team on a long-term contract basis in Columbus, Ohio. In this role, you will focus on strengthening our cybersecurity posture by implementing controls, ensuring compliance, and addressing security vulnerabilities in a dynamic and collaborative environment. This position offers the opportunity to work closely with engineering teams, auditors, and cloud operations to support security initiatives across global teams.<br><br>Responsibilities:<br>• Lead readiness, implementation, and ongoing audit activities for SOC 2 Type II compliance across multiple operational areas.<br>• Collaborate with auditors, engineering teams, and cloud operations to implement security controls and resolve compliance gaps.<br>• Apply cybersecurity and cloud control frameworks to enhance organizational security measures.<br>• Validate compliance within SaaS-based infrastructure, troubleshoot security challenges, and confirm the effectiveness of controls.<br>• Conduct application security tasks such as vulnerability scanning, basic penetration testing, and remediation validation.<br>• Analyze security issues identified during audits or scans and work with developers to implement resolutions.<br>• Develop proof-of-concept solutions to verify security approaches and address vulnerabilities.<br>• Participate actively in agile workflows and contribute to security workstreams across global teams.<br>• Utilize compliance tools such as Vanta and productivity platforms like Jira, Confluence, Slack, and Teams to manage security operations.
<p>Robert Half is seeking a skilled <strong>Power BI Analyst </strong>with deep expertise in <strong>Power BI</strong> and the <strong>Microsoft Fabric ecosystem</strong> to support reporting, analytics, and data optimization initiatives for a law firm based in Seattle, WA. This role is ideal for someone who enjoys troubleshooting complex reporting issues, optimizing DAX for performance, and partnering with other analysts to elevate overall data quality and usability.</p><p><br></p><p><strong>Duration:</strong> 3 months with potential to extend</p><p><strong>Location: </strong>100% Remote</p><p><strong>Schedule:</strong> Monday - Friday 8 to 5pm (Core Hours)</p><p><br></p><p>The Power BI Analyst will play a key role in reviewing and enhancing existing reports, building new analytics solutions, and ensuring secure, scalable, and well-governed reporting across the organization.</p><p> </p><p><strong>Job Responsibilities: </strong></p><ul><li>Review and remediate a backlog of Power BI reports that are not functioning correctly.</li><li>Enhance existing reports and create new Power BI reports and dashboards to meet business needs.</li><li>Validate report accuracy, refresh schedules, and data sources.</li><li>Translate business requirements into effective reporting solutions.</li><li>Build, maintain, and enhance Power BI data models.</li><li>Write, optimize, and refactor DAX expressions to improve report performance and scalability.</li><li>Review Power BI reports created by other analysts and provide recommendations for DAX optimization and model improvements.</li><li>Create data ingestion workflows and reporting stories using Fabric tools.</li><li>Support data lifecycle management and reporting best practices.</li><li>Implement and maintain role-level security (RLS) and object-level security (OLS) within Power BI.</li><li>Ensure reporting solutions comply with data governance, security, and access control standards.</li><li>Support updates and changes to governed datasets and semantic models.</li><li>Troubleshoot credential issues, refresh failures, and report errors.</li><li>Partner with business stakeholders and fellow analysts to resolve data and reporting challenges.</li><li>Contribute to documentation and knowledge sharing to improve team efficiency and reporting quality.</li></ul>
<p>Robert Half is looking for a <strong>Cloud Security Engineer</strong> to support our cloud security initiatives and enterprise cybersecurity programs. This is a hands-on role focused on securing Azure environments, automating security processes, and supporting enterprise security monitoring.</p><p> </p><p><strong>Duration:</strong> Contract</p><p><strong>Location: </strong>Portland, Oregon based client (100% Remote - working in PST hours)</p><p><strong>Schedule: </strong>Monday-Friday (8AM-5PM - 40 hours weekly)</p><p> </p><p><strong>Responsibilities</strong></p><ul><li>Implement and maintain secure cloud and remote access solutions, including Azure CASB</li><li>Evaluate vulnerabilities, triage issues, and drive remediation with technology and business teams</li><li>Automate security processes, log collection, baseline configuration, and utility deployment using Ansible</li><li>Configure and manage Azure Score Manager to track historical score data</li><li>Develop Splunk integrations and alerts for vulnerability monitoring</li><li>Collect, script, and present KPIs and security metrics</li><li>Maintain documentation for ARB, TRB, CMRB, CAB, audits, and other compliance requirements</li><li>Collaborate with cross-functional teams including IT, Cybersecurity, Enterprise Architecture, Applications, Infrastructure, Network, and Database teams</li></ul>
<p>We are looking for a skilled Sr. IT Security Engineer to join our team in Bensalem, Pennsylvania. In this role, you will lead efforts to design, implement, and manage security solutions that safeguard the organization’s infrastructure and data. Your expertise will be instrumental in developing advanced threat detection systems, conducting vulnerability assessments, and driving compliance with industry standards.</p><p><br></p><p>Responsibilities:</p><p>• Design and deploy centralized security monitoring systems and advanced threat detection solutions to enhance incident response capabilities.</p><p>• Oversee intrusion detection and prevention systems, analyzing and responding to suspicious activities to mitigate risks.</p><p>• Implement and maintain network-based security solutions while establishing data privacy policies.</p><p>• Perform regular vulnerability assessments using tools like Nessus, identifying and remediating security gaps.</p><p>• Develop strategies for zero-day threat protection and manage endpoint protection technologies to prevent malware.</p><p>• Configure and manage identity and access management systems, such as Okta, to ensure secure user authentication.</p><p>• Architect secure network solutions, including firewalls, web content filtering, and data loss prevention systems.</p><p>• Maintain detailed security architecture documentation and provide periodic reports on security posture.</p><p>• Collaborate with IT and compliance teams to promote security best practices and ensure regulatory compliance.</p><p>• Monitor and manage security devices to protect systems from internal and external threats.</p>
<p>Position Overview</p><p>We are seeking a Cyber Security Engineer to provide hands‑on cyber expertise across compliance, vulnerability management, incident response, and secure systems engineering. The role supports complex networks and systems (including multi‑classification environments), integrates cybersecurity into IT/communications platforms, and guides cross‑functional technical teams. This position is 100% onsite in Washington, DC and requires eligibility for a Public Trust.</p><p><br></p><p>Key Responsibilities</p><p>Cyber Engineering & Analysis</p><ul><li>Conduct and review technical cybersecurity assessments.</li><li>Identify vulnerabilities and non‑compliance with cybersecurity standards; recommend mitigations.</li><li>Perform research, design evaluation, technical development, and system integration planning.</li></ul><p>Security Operations & Monitoring</p><ul><li>Perform and maintain vulnerability scans; produce clear reports and metrics.</li><li>Track and report IAVM (Information Assurance Vulnerability Management) compliance.</li><li>Maintain a curated library of security audit tools and procedures for testing, internal audits, incident response, and diagnosis.</li></ul><p>Risk Management & Authorization</p><ul><li>Maintain Authorization to Operate (ATO) records and supporting artifacts.</li><li>Manage and report POA& M (Plan of Action & Milestones) compliance.</li><li>Review C& A (Certification & Accreditation) documentation for completeness and compliance.</li></ul><p>Architecture, Integration & Leadership</p><ul><li>Integrate cybersecurity requirements with IT and communications systems.</li><li>Guide/coordinate activities of penetration testers, incident handlers, cyber analysts, and product support teams.</li><li>Lead or contribute to complex cyber, engineering, and architecture tasks; mentor technical staff as needed.</li></ul>
We are looking for an experienced Data Architect to design and implement cutting-edge data solutions that meet the evolving needs of our enterprise. This role involves building secure, scalable, and high-performing data platforms while leveraging modern technologies and aligning with organizational goals. The ideal candidate will have expertise in cloud-based architecture, data governance, and advanced analytics, driving innovation across diverse business functions.<br><br>Responsibilities:<br>• Develop comprehensive data architecture strategies for advanced analytics and big data solutions using Azure Databricks.<br>• Design and implement Databricks Delta Lake-based Lakehouse architecture, utilizing PySpark Jobs, Databricks Workflows, Unity Catalog, and Medallion architecture.<br>• Optimize and configure Databricks clusters, notebooks, and workflows to ensure efficiency and scalability.<br>• Integrate Databricks with Azure services such as Azure Data Lake Storage, Azure Data Factory, Azure Key Vault, and Microsoft Fabric.<br>• Establish and enforce best practices for data governance, security, and cost management.<br>• Collaborate with data engineers, analysts, and business stakeholders to translate functional requirements into robust technical solutions.<br>• Provide technical mentoring and leadership to team members focused on Databricks and Azure technologies.<br>• Monitor, troubleshoot, and enhance data pipelines and workflows to maintain reliability and performance.<br>• Ensure compliance with organizational and regulatory standards regarding data security and privacy.<br>• Document configurations, processes, and governance standards to support long-term scalability and usability.
We are looking for a dedicated Help Desk/Desktop Support Analyst to join our team in Orlando, Florida. This role involves providing technical assistance to end-users, resolving hardware and software issues, and ensuring seamless functionality of computer systems. The ideal candidate will possess strong troubleshooting skills and a proactive approach to customer support.<br><br>Responsibilities:<br>• Provide timely and efficient technical support to resolve user issues related to hardware, software, and network systems.<br>• Manage and maintain user accounts through Active Directory, including password resets and access permissions.<br>• Troubleshoot and resolve problems with Microsoft Windows 10 and other operating systems.<br>• Handle service desk tickets, ensuring issues are documented, prioritized, and resolved within established timeframes.<br>• Assist in the installation, configuration, and maintenance of desktop systems and applications.<br>• Deliver clear and effective communication to users regarding technical issues and solutions.<br>• Perform routine system checks to maintain optimal performance and identify potential issues.<br>• Collaborate with other IT team members to escalate and resolve complex technical problems.<br>• Ensure adherence to company policies and procedures regarding IT security and data protection.<br>• Provide guidance and training to users on best practices for utilizing IT systems.
We are looking for an experienced IT Security Specialist to join our team in Sacaton, Arizona. This role is critical in ensuring the protection of sensitive data, maintaining network security, and implementing cybersecurity measures. The ideal candidate will have a strong background in information security, with a focus on safeguarding systems and data from potential threats.<br><br>Responsibilities:<br>• Monitor and manage network security devices, including firewalls and intrusion detection systems, to prevent unauthorized access.<br>• Administer and secure Microsoft technologies and services, including Active Directory, to maintain system integrity.<br>• Conduct vulnerability assessments and audits to identify potential risks and implement corrective actions.<br>• Develop and enforce cybersecurity policies and procedures to ensure compliance with industry standards.<br>• Investigate and respond to security incidents, mitigating risks and preventing recurrence.<br>• Implement data privacy and database security measures to protect sensitive information.<br>• Collaborate with cross-functional teams to ensure cyber governance and alignment with organizational goals.<br>• Maintain up-to-date knowledge of cybersecurity trends and emerging threats.<br>• Provide training and guidance to staff on best practices for maintaining IT security.<br>• Evaluate and recommend security tools and solutions to enhance overall cybersecurity posture.
<p><strong>Cybersecurity Analyst</strong></p><p>We are seeking a detail-oriented <strong>Cybersecurity Analyst</strong> to strengthen our security posture and protect sensitive systems. This role is ideal for someone who enjoys investigating threats, analyzing vulnerabilities, and supporting incident response. The ideal candidate will have strong analytical skills, a security-first mindset, and foundational security experience with room to grow into senior roles.</p><p><strong>Responsibilities</strong></p><ul><li>Monitor SIEM alerts, logs, and security dashboards for potential threats</li><li>Investigate suspicious behavior, malware activity, and endpoint security incidents</li><li>Perform vulnerability scans and track remediation efforts with IT teams</li><li>Support endpoint security tools including EDR platforms, antivirus, and application control</li><li>Assist in incident response activities including containment, analysis, and documentation</li><li>Review firewall rules, access permissions, and authentication logs for anomalies</li><li>Assist with compliance efforts including audits, risk assessments, and policy documentation</li><li>Help build and maintain security playbooks, SOPs, and incident response guides</li><li>Participate in phishing simulations, user awareness training, and security education initiatives</li><li>Collaborate with infrastructure and application teams to implement security best practices</li></ul><p><br></p>
<p>We are looking for an experienced Information Security Engineer to join our client's team. In this role, you will play a key part in enhancing organizational security measures by leveraging your expertise in CyberArk and other security technologies. You will collaborate with various teams and contribute to creating robust security processes and practices.</p><p><br></p><p>Responsibilities:</p><p>• Design, implement, and manage CyberArk solutions to strengthen privileged access security.</p><p>• Develop and refine processes, use cases, and best practices to enhance security initiatives.</p><p>• Lead and advance the organization's security program to ensure alignment with industry standards.</p><p>• Provide support for general security initiatives and related projects.</p><p>• Work closely with cloud, network, and security architecture teams to ensure integrated security solutions.</p><p>• Maintain and troubleshoot Active Directory configurations and networking fundamentals to support security operations.</p><p>• Operate as a hands-on security generalist, addressing diverse challenges across the IT landscape.</p><p>• Monitor and ensure compliance with data privacy and cybersecurity governance standards.</p><p>• Identify vulnerabilities and recommend solutions to mitigate risks within the IT environment.</p>
We are looking for a skilled and dedicated Cyber Security Engineer to join our team in Chesterbrook, Pennsylvania. This contract-to-permanent position involves overseeing information security governance, managing vendor relationships, and mitigating risks to ensure a secure and compliant environment. The ideal candidate will bring hands-on expertise in security practices, coupled with strong analytical and communication skills, to drive the implementation of robust security programs.<br><br>Responsibilities:<br>• Act as the primary liaison with offshore teams to ensure compliance with organizational security policies and standards.<br>• Monitor vendor performance against service level agreements and identify areas for improvement.<br>• Develop and enforce governance practices to align operations with security and compliance requirements.<br>• Collaborate with business units to ensure security measures are integrated into vendor projects.<br>• Conduct assessments to evaluate supplier compliance with confidentiality, integrity, and availability standards.<br>• Provide expert advice on information security, analyzing vulnerabilities and recommending remediation strategies.<br>• Draft and maintain organizational security policies and procedures, ensuring adherence to compliance standards.<br>• Prepare detailed reports on security governance and vulnerabilities for stakeholders and leadership teams.<br>• Facilitate regular risk assessments and vulnerability scans, ensuring timely resolution of findings.<br>• Support special projects and contribute to the continuous improvement of security practices.
Identifies, implements, maintains, and monitors risk-informed, standards-based, effective, and efficient security controls within a hybrid multi-cloud technology environment.<br><br>Supports continuous integration and continuous development pipelines and processes that automatically build, test, and deploy infrastructure and containerized applications to ensure appropriate security checks are included automatically or manually. Reviews software releases and infrastructure changes for security vulnerabilities and risks prior to approval.<br><br>Supports enterprise software development and cloud infrastructure projects and production applications that store, process, and transmit regulated data to ensure controls meet or exceed standards.<br><br>Manages vulnerabilities and security testing for on premise and cloud-hosted applications and tracks issues to remediation.<br><br>Supports audit and compliance efforts to ensure applications, infrastructure, and integrations meet applicable compliance and contractual standards.<br><br>Identifies, recommends, and tests technical security standards and guidelines for software development, DevOps, and release management to ensure that all delivered solutions and architecture adhere to industry best-practices for availability, confidentiality, and integrity.<br><br>Partners with internal and external development teams and other stakeholders to improve security and operational monitoring for cloud hosted workloads.<br><br>Develops and tests incident response plans to prepare for, respond to, and recover from security incidents and operational issues as part of an incident response team.<br><br>Supports efforts to provide for a secure integrated development environment for external and internal software and release management pipelines.<br><br>Builds and tracks performance indicators and metrics to inform security control monitoring in cloud environments.<br><br>Performs all other duties as assigned.<br><br>Serious candidates will possess the minimum qualifications:<br><br>Bachelor’s Degree in Computer or Software Engineering, Information Security, Cybersecurity or related field from an accredited four year college or university required. Master’s Degree preferred.<br><br>AWS Certified Solutions Architect or DevOps Engineer Professional certification required.<br><br>AWS Security Specialty certification highly desired.<br><br>Certified Information Systems Security Professional (CISSP) and Certified Cloud Security Professional (CCSP) highly desired.<br><br>Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge (CCSK) desired.<br><br>GIAC Cloud Security Automation (GCSA) certification highly desired. Must be able to obtain certification within 6 months of hire.<br><br>Minimum eight (8) years of extensive security engineering experience, including architectural design using AWS best practices and industry standards.<br><br>Experience implementing and managing tools for security, availability, and compliance monitoring in a cloud environment which includes collecting data, parsing log files, capturing network traffic, setting alert thresholds, and notifying stakeholders.
We are looking for an IT Security Specialist to join our team in Chicago, Illinois. This role is ideal for individuals who excel in managing FedRAMP-compliant environments and hybrid cloud infrastructures while fostering collaboration across departments. As a Contract position with the potential for long-term employment, this opportunity combines technical expertise with stakeholder engagement to drive security initiatives effectively.<br><br>Responsibilities:<br>• Ensure the operation and maintenance of FedRAMP-compliant environments and hybrid cloud systems.<br>• Collaborate across departments to align compliance, security, and operational goals.<br>• Effectively communicate technical concepts to both technical and non-technical stakeholders.<br>• Advocate for security programs internally by promoting processes, standards, and their organizational value.<br>• Apply expertise in data privacy, database security, and cybersecurity to safeguard systems.<br>• Support cyber governance initiatives to ensure adherence to industry standards.<br>• Manage computer files and related systems to maintain security and accessibility.<br>• Provide guidance on implementing best practices for FedRAMP compliance.<br>• Proactively identify and address vulnerabilities within hybrid environments.
<p><strong>Job Title: Azure Administrator – Security & Identity Focus</strong></p><p><strong>Location:</strong> On-site</p><p><strong>Employment Type:</strong> Full-time</p><p><strong>Department:</strong> IT</p><p> </p><p><strong>Position Summary</strong></p><p>We are seeking a skilled <strong>Azure Administrator</strong> with strong experience in <strong>Microsoft Entra ID (Azure AD), Microsoft Intune, Microsoft Sentinel, and Microsoft Defender</strong> to support, secure, and maintain our Microsoft cloud environment.</p><p>This role is responsible for <strong>identity management, endpoint management, security monitoring, and threat protection</strong> across Azure and Microsoft 365. The ideal candidate has hands-on experience implementing <strong>Zero Trust principles</strong>, enforcing security baselines, and supporting compliance-driven environments.</p><p> </p><p><strong>Key Responsibilities</strong></p><p><strong>Azure & Identity Administration</strong></p><ul><li>Administer and maintain <strong>Microsoft Entra ID (Azure AD)</strong> including:</li><li>User and group management</li><li>Conditional Access policies</li><li>MFA enforcement</li><li>Privileged Identity Management (PIM)</li><li>Identity lifecycle governance</li><li>Support hybrid identity environments (Azure AD Connect / Cloud Sync)</li></ul><p> </p><p><strong>Endpoint Management (Intune)</strong></p><ul><li>Configure and manage <strong>Microsoft Intune</strong> for Windows, macOS, and mobile devices</li><li>Create and maintain:</li><li>Device compliance policies</li><li>Configuration profiles</li><li>Application deployment policies</li><li>Integrate Intune with Conditional Access and Microsoft Defender for Endpoint</li><li>Monitor device compliance and remediate non-compliant endpoints</li></ul><p> </p><p><strong>Security Operations & Monitoring</strong></p><ul><li>Configure, maintain, and monitor <strong>Microsoft Sentinel</strong></li><li>Log ingestion and data connectors</li><li>Analytics rules and alerts</li><li>Incident triage and response</li><li>KQL queries and workbooks</li><li>Administer <strong>Microsoft Defender</strong> solutions including:</li><li>Defender for Endpoint</li><li>Defender for Identity</li><li>Defender for Cloud Apps</li><li>Defender for Office 365</li><li>Assist with threat detection, investigation, and response activities</li></ul><p> </p><p><strong>Security & Compliance Support</strong></p><ul><li>Implement and maintain security controls aligned with best practices (Zero Trust, least privilege)</li><li>Support audit and compliance requirements (e.g., NIST, ISO, CMMC, internal audits)</li><li>Maintain documentation, runbooks, and standard operating procedures</li><li>Participate in security assessments, vulnerability remediation, and continuous improvement initiatives</li></ul><p> </p><p><br></p><p><br></p>