New
This position requires the development of Security System Plans (SSPs) and Information Assurance Vulnerability Management (IAVMs) following Risk Management Framework (RMF), Department of Defense Instructions (DoDI), and National Institute of Standards and Technology (NIST) 800-53 Rev 4 guidelines. The responsibilities also include conducting vulnerability assessments and audits using ACAS and STIG, performing risk assessments for networks, firewalls, and encryption, preparing security documentation, supporting avionics and PIT accreditation, monitoring for incidents, managing security controls, training junior ISSOs and admins, and liaising with the Authorizing Official.
The ideal candidate should have a minimum of 4 years of experience in information systems security with a degree or 6 years without a degree. A Bachelor’s degree in Information Security, System Administration, or a related field is preferred. Additionally, DoD 8570 certifications are required along with experience in RMF processes, proficiency in Windows and Linux, and a strong understanding of Equal Opportunity and Affirmative Action principles.
For more information about benefits and the referral bonus program, please visit https://www.arsiem.com/careers/.
New
Serve as the primary security representative in customer and prospect engagements.
Drive technical security discussions during pre-procurement stages.
New
Serve as primary security representative in customer engagements
Drive technical security discussions and support deal cycles
New
Represent primary security in customer interactions
Drive technical security discussions
New
Serve as the primary security representative in customer and prospect engagements.
Drive technical security discussions during pre-procurement stages.
New
Architect and validate end-to-end, multi-product solutions across ecosystems.
Lead technical discovery, solution mapping, and validation workshops/POCs with stakeholders.
New
Serve as the primary security representative in customer engagements
Articulate security architecture and risk management approach
New
Stedi is hiring for a remote Security Engineer position
Full-time opportunity for Security Engineers in Canada or the United States
Posted 3 days ago
Represent organization's security posture to customers
Drive technical security discussions
Posted 3 days ago
Represent the company's security interests to customers and prospects
Drive technical security discussions and strategies
Posted 4 days ago
Serve as the primary security representative in customer engagements
Articulate security architecture, threat model, controls, and risk management approach
Posted 5 days ago
Serve as the primary security representative in customer and prospect engagements.
Articulate security architecture, threat model, controls, and risk management approach.
Posted 6 days ago
Serve as primary security representative in customer engagements
Drive technical security discussions during pre-procurement stages
Posted 7 days ago
Representing the company in security discussions with customers and prospects.
Driving technical security discussions during pre-procurement stages.
Posted 7 days ago
Serve as primary security representative in customer engagements
Articulate security architecture and risk management approach
Posted 8 days ago
Serve as the primary security representative in customer and prospect engagements.
Articulate security architecture, threat model, controls, and risk management approach.
Posted 23 days ago
Seeking a Data Security Intern for Summer 2026
Remote internship open to candidates across Canada
Posted 287 days ago
Develop scalable backend infrastructure
Design and maintain secure APIs
Posted 322 days ago
Lead strategic planning and technical operations.
Ensure efficient engineering organization alignment to business goals.
Posted 325 days ago
Develop innovative cybersecurity products
Address global cyber threats
Posted 329 days ago
Provide advanced data security solutions
Enable secure data consumption for enterprises
Posted 344 days ago
Provide comprehensive payment solutions
Support diverse industries with tailored solutions
Posted 358 days ago
Identify unauthorized access
Gather evidence of monitoring
Posted 358 days ago
Identify remote data surveillance
Analyze methods of monitoring
Posted 365 days ago
Privately distribute internal applications
Ensure secure deployment of applications
Posted 366 days ago
Develop a secure password storage solution.
Implement encryption to protect user data.
Posted 380 days ago
* Complete audit procedures and lead audits in system security * Demonstrate good judgment in
ing methods for audit testing * Keep current on audit standards and technology advances * Adapt,
Posted 381 days ago
- Implement security measures to protect Figma's design platform - Conduct security assessments to
dentify vulnerabilities - Respond to and mitigate security incidents - Ensure compliance with
Posted 406 days ago
- Ensure the security and integrity of Squarespace's digital assets - Develop and implement
ty measures to protect against cyber threats - Conduct regular security assessments and audits -