We are looking for an experienced IT Security Specialist to join our team in Chicago, Illinois. In this role, you will oversee critical aspects of information security, ensuring compliance with industry standards and safeguarding organizational data. This is an excellent opportunity for someone with a strong attention to detail and a background in cybersecurity and governance to make a significant impact.<br><br>Responsibilities:<br>• Manage enterprise user access governance, including conducting regular reviews, assessing risks, and preparing executive reports.<br>• Administer and enhance the organization's third-party risk management program, ensuring effective vendor tiering and risk scoring methodologies.<br>• Lead efforts to align organizational controls and oversee remediation plans for identified security gaps.<br>• Collaborate with finance teams and external auditors to maintain compliance with regulatory standards and ensure evidence readiness.<br>• Evaluate and improve Microsoft tenant security configurations to strengthen the organization's security posture.<br>• Coordinate incident response activities, including facilitating tabletop exercises and compiling after-action reports.<br>• Create and maintain security metrics and dashboards to monitor risk reduction, audit outcomes, and remediation progress.<br>• Develop, update, and refine enterprise security policies and standards to align with best practices.<br>• Offer security expertise to cross-functional teams to ensure adherence to established controls.<br>• Stay informed on emerging cybersecurity threats, industry best practices, and evolving regulatory requirements.
<p>Robert Half is seeking a Identity & Access Management (IAM) Cybersecurity Engineer</p><p>This is an estimated 1 year consulting engagement</p><p><br></p><p>The Identity & Access Management (IAM) Cybersecurity Engineer is responsible for the design, deployment, integration, and ongoing administration of the organization’s IAM platform, with a primary focus on implementing and managing SailPoint Identity Security Cloud.</p><p>This role will ensure secure, scalable identity lifecycle management across on-premises and cloud environments, including Microsoft Azure Active Directory and on-premises Active Directory, while supporting future integrations with enterprise systems such as Workday.</p><p>The ideal candidate combines strong IAM engineering expertise with hands-on experience in SailPoint deployment, identity governance, and enterprise directory services.</p><p><br></p><p>Key Responsibilities</p><p>IAM Platform Deployment & Engineering;</p><p>•Lead the implementation, configuration, and deployment of SailPoint IAM solutions. </p><p>•Design identity governance processes including provisioning, deprovisioning, access requests, certifications, and role-based access control (RBAC). </p><p>•Integrate SailPoint with enterprise systems (Active Directory, Azure AD, ERP systems, SaaS platforms). </p><p>•Develop and maintain connectors, workflows, and policies within SailPoint. </p><p>IAM Operations & Administration;</p><p>•Administer and support the SailPoint platform post-deployment. </p><p>•Monitor system performance, troubleshoot issues, and implement enhancements. </p><p>•Manage identity lifecycle processes including joiner, mover, and leaver workflows. </p><p>•Conduct periodic access reviews and certifications. </p><p>Directory Services & Cloud Identity;</p><p>•Manage and integrate identity systems across: </p><p>o On-premises Active Directory </p><p>o Azure AD / Entra ID </p><p>•Implement and enforce strong authentication controls (MFA, conditional access). </p><p>•Support hybrid identity architecture and synchronization strategies. </p><p>Security & Compliance</p><p>•Ensure IAM controls align with security frameworks (e.g., NIST, least privilege, zero trust). </p><p>•Support audits by providing identity governance reports and evidence. </p><p>•Identify and remediate access risks, orphaned accounts, and privilege creep. </p><p>Enterprise Integration (Workday & Beyond);</p><p>•Support or lead integration of IAM with Workday for identity lifecycle automation. </p><p>•Collaborate with HR and IT teams to align identity processes with HR-driven events. </p><p>•Assist in designing just-in-time (JIT) provisioning and automated onboarding workflows. </p><p>Other duties as needed</p>
<p><strong>Job Summary:</strong></p><p>We are seeking an experienced <strong>IT Security Engineer</strong> to help safeguard the organization’s systems, data, and infrastructure. This role is responsible for identifying security risks, leading incident response efforts, supporting audit and certification activities, and ensuring compliance with applicable legal and regulatory requirements. The ideal candidate will bring strong technical security expertise, a proactive mindset, and the ability to develop and enforce enterprise-wide security policies.</p><p><strong>Key Responsibilities:</strong></p><ul><li>Conduct security assessments, vulnerability scans, and risk analyses to identify, evaluate, and remediate potential security threats.</li><li>Monitor the organization’s security posture and recommend improvements to strengthen defenses across systems, networks, and applications.</li><li>Serve as the primary point of contact for external security audits and certification processes, including ISO certification and related compliance reviews.</li><li>Develop, implement, and maintain incident response plans, corporate security policies, standards, and procedures.</li><li>Lead security investigations, document findings, and coordinate remediation efforts following security incidents.</li><li>Conduct regular incident response testing, tabletop exercises, and reviews to ensure organizational readiness.</li><li>Ensure compliance with legal, regulatory, and industry security requirements, including CCPA, GDPR, and HIPAA.</li><li>Maintain and enforce firm-wide security policies, controls, and best practices to support compliance and risk management objectives.</li><li>Partner with internal stakeholders across IT, legal, compliance, and business teams to address security risks and improve overall governance.</li><li>Stay current on emerging threats, vulnerabilities, and regulatory changes to continuously enhance the organization’s security program.</li></ul><p><br></p>
<p>Our client, a Nationwide benefits consulting organization, is seeking an IS Analyst to support and maintain their core IT infrastructure. The IS Analyst II supports and maintains IT infrastructure, ensuring systems, networks, and applications run reliably. This role serves as a key point of contact for end users and contributes to security, virtualization, and collaboration tools.</p><p><br></p><p>Key Responsibilities</p><p><strong>Infrastructure & Hardware Support</strong></p><ul><li>Install and maintain desktops, servers, and network equipment</li><li>Support telephony, printers, and endpoint devices</li><li>Troubleshoot hardware and connectivity issues</li></ul><p><strong>Server & Application Support</strong></p><ul><li>Maintain server operating systems and applications</li><li>Manage user accounts, storage, and backups</li><li>Install, update, and troubleshoot end-user applications</li></ul><p><strong>User Support</strong></p><ul><li>Act as primary IT contact for assigned locations</li><li>Diagnose and resolve hardware, software, and network issues</li></ul><p><strong>Security & Compliance</strong></p><ul><li>Monitor systems for security risks and vulnerabilities</li><li>Assist with incident response and remediation</li><li>Support audits and ensure compliance with IT security policies</li></ul><p><strong>Virtualization & Systems</strong></p><ul><li>Support virtual desktops, servers, and hypervisors</li></ul><p><strong>Collaboration Tools</strong></p><ul><li>Implement and maintain collaboration platforms</li><li>Provide user training and documentation</li><li>Integrate tools with email, phone, and other systems</li></ul><p><br></p>
We are looking for a skilled Data Security Analyst to join our team in San Jose, California. In this long-term contract position, you will play a crucial role in safeguarding organizational systems, data, and applications against cyber threats. The ideal candidate will have a solid understanding of cybersecurity practices and tools, with a proactive approach to identifying vulnerabilities and implementing robust security solutions.<br><br>Responsibilities:<br>• Monitor and analyze security incidents using SIEM tools to detect and respond to threats effectively.<br>• Develop, implement, and maintain cybersecurity policies to ensure compliance with industry standards.<br>• Conduct regular assessments of application security to identify vulnerabilities and recommend remediation strategies.<br>• Collaborate with cross-functional teams to enhance overall security measures and integrate best practices.<br>• Investigate and address potential breaches or suspicious activities to minimize risk and impact.<br>• Provide guidance and training to team members on cybersecurity protocols and procedures.<br>• Stay updated on emerging threats and technologies to proactively adapt security strategies.<br>• Perform regular audits and reviews of systems to ensure data integrity and protection.<br>• Support the deployment and management of security tools and technologies across the organization.<br>• Document and report security incidents and resolutions to maintain transparency and continuous improvement.
<p>We are looking for a Compliance Security Engineer to join a growing team. You must have experience consulting multiple organizations and teams. Experience with government consulting is a major plus. You must be a US Citizen as you'll be working on some government contracts.</p><p><br></p><p>• Guide clients through achieving and maintaining compliance with frameworks such as CMMC and NIST SP 800-171 </p><p>• Conduct gap assessments and develop Plans of Action & Milestones (POA&M) </p><p>• Support audit readiness through evidence collection, documentation, and reporting </p><p>• Maintain accurate records within the organization’s Governance, Risk, and Compliance (GRC) platform </p><p>• Perform vulnerability assessments, risk analyses, and security configuration reviews </p><p>• Configure and manage security tools such as EDR, SIEM, MFA, firewalls, and VPN solutions </p><p>• Develop and maintain secure configuration baselines and automation for scalable deployments </p><p>• Participate in incident response activities, including investigation, containment, and remediation </p><p>• Create and update incident response playbooks and procedures </p><p>• Contribute to continuous improvement of incident response capabilities</p><p>• Develop and maintain security policies, standards, and procedures aligned with compliance frameworks </p><p>• Create documentation tailored to individual environments and regulatory requirements </p><p>• Communicate effectively with both technical and non-technical stakeholders </p><p>• Lead or support stakeholder meetings related to compliance, risk, and incident response </p><p><br></p><p><br></p><p>Qualifications </p><p>• Working knowledge of cybersecurity frameworks (CMMC and NIST preferred) </p><p>• Strong understanding of network infrastructure, systems, and security technologies </p><p>• Experience securing cloud environments (AWS, Azure / 365, or GCP)</p><p>• Proven troubleshooting and analytical skills in high-pressure environments </p><p>• Strong written and verbal communication skills </p><p>• Ability to manage multiple projects and priorities</p><p><br></p>
<p>The Early–Mid Level Information Security Analyst supports MasTec’s security program across on‑premise, cloud, and SaaS environments. This role focuses on monitoring security tools, assisting with incident response, supporting compliance activities, and learning to apply modern, AI‑assisted security practices. The analyst works closely with senior team members to strengthen the company’s overall security posture.</p><p>Key Responsibilities</p><p>- Monitor security alerts across SIEM, SOAR, and cloud-native tools (AWS, Azure, GCP).</p><p>- Perform investigation and triage of security incidents in an on-call 24/7/365 day environment</p><p>- Support maintenance and tuning of SIEM/SOAR detection rules and automated playbooks.</p><p>- Contribute to threat hunting efforts using behavior analytics and AI-assisted tooling.</p><p>- Perform routine access reviews and support IT General Controls (ITGC) testing.</p><p>- Assist with internal and external audit requests, including evidence gathering.</p><p>- Support cloud security posture assessments and basic misconfiguration remediation.</p><p>- Assist in creating and maintaining security and DR policies and procedures.</p><p>- Participate in business continuity and disaster recovery exercises.</p><p>- Deliver or support security awareness training initiatives.</p><p>- Conduct basic vulnerability review tasks and follow up with system owners.</p>
We are looking for an experienced Information Security Lead to manage and enhance the organization's security operations, incident response, and compliance frameworks. Based in McAllen, Texas, this role is pivotal in safeguarding the company's systems, data, and infrastructure against emerging threats while ensuring compliance with regulatory standards. The ideal candidate will bring a strong background in cybersecurity operations, team leadership, and risk management.<br><br>Responsibilities:<br>• Direct and oversee daily security operations, including monitoring and triaging alerts, ensuring proper escalation procedures are followed.<br>• Develop and fine-tune detection use cases to address evolving security threats effectively.<br>• Implement and maintain robust security controls across all platforms and systems.<br>• Drive automation and orchestration efforts to improve operational efficiency and reduce manual processes.<br>• Lead incident response efforts, coordinating containment, eradication, and recovery activities across IT and business units.<br>• Maintain and regularly test incident response procedures and playbooks, ensuring readiness for security events.<br>• Supervise user provisioning and deprovisioning processes, enforcing access controls and periodic access reviews.<br>• Conduct risk assessments and ensure the implementation of security policies and procedures organization-wide.<br>• Develop and manage key performance and risk indicators to monitor and improve the organization's security posture.<br>• Mentor and provide leadership to security analysts and engineers, fostering a culture of collaboration and accountability.
We are looking for a dedicated Systems Security Administrator to join our team on a contract basis. In this role, you will play a vital part in safeguarding our systems and ensuring compliance with security standards in a hybrid environment that spans on-premises, cloud, and remote systems. Based in Cranston, Rhode Island, this position offers an excellent opportunity to contribute to both the operational and strategic aspects of security in a healthcare-regulated setting.<br><br>Responsibilities:<br>• Configure and manage endpoint security for Windows, macOS, and mobile devices, ensuring protection across all platforms.<br>• Oversee patch management and address vulnerabilities for servers, endpoints, and cloud infrastructure.<br>• Administer identity and access controls, including conditional access and privileged access, while securing non-human identities like service principals.<br>• Manage and maintain firewall configurations, edge rules, and secure remote access in collaboration with network and infrastructure teams.<br>• Coordinate with third-party security vendors to enhance monitoring capabilities and close security gaps.<br>• Harden servers and cloud workloads using industry-standard baselines, maintaining comprehensive documentation of security standards.<br>• Implement and refine data governance and information protection controls using tools like Microsoft Purview.<br>• Support the security of public-facing web applications and APIs, ensuring secure configurations and proper access controls.<br>• Assist in incident response planning, ransomware recovery strategies, and disaster recovery exercises.<br>• Develop and maintain security policies, runbooks, and audit documentation while automating repetitive tasks with scripting tools like PowerShell or Python.
<p>We are looking for a Systems Security Administrator to support and strengthen enterprise security operations for an organization in Houston, Texas. This Long-term Contract position is ideal for a detail-oriented individual who can monitor threats, respond decisively to incidents, and help maintain a secure Microsoft-based environment. The role will work across security tools, vulnerability management processes, and infrastructure protection efforts while collaborating closely with technical teams to reduce risk and improve response readiness.</p><p><br></p><p>Responsibilities:</p><p>• Monitor security platforms across the Microsoft ecosystem, including O365 E5 security solutions and endpoint protection tools, to identify and address potential threats quickly.</p><p>• Investigate alerts, analyze suspicious activity, and take appropriate containment and remediation steps to minimize operational and security impact.</p><p>• Administer and optimize SIEM and endpoint security technologies to improve detection accuracy, response efficiency, and overall platform performance.</p><p>• Manage vulnerability assessment tools such as Rapid7 or Tenable, including configuration tuning, reporting, and coordination of remediation priorities.</p><p>• Partner with internal teams to support patching efforts and help resolve challenges that affect vulnerability reduction and security compliance.</p><p>• Conduct proactive threat hunting and review intrusion detection and prevention data to uncover indicators of compromise or abnormal behavior.</p><p>• Install, maintain, and update security applications and controls to ensure continued effectiveness across the environment.</p><p>• Apply and support security policies, standards, and architecture practices across Windows systems, networking components, and firewall-related controls.</p><p>• Provide support during security events outside standard business hours when urgent incident response is required.</p><p>• Contribute to secure development and operational practices by collaborating with teams that use DevSecOps-related tools such as GitHub and similar platforms.</p>
<p>Robert Half is seeking an Infrastructure Security Analyst to support day‑to‑day information security operations in a highly regulated environment. This Infrastructure Security Analyst role is hands‑on and operational, focused on access reviews, ticket-based security work, vulnerability management, endpoint security, and audit support.</p><p>The organization has experienced prior churn in the security function, and this Infrastructure Security Analyst role will provide stability, execution, and follow‑through while partnering with a senior information security leader who is currently stretched across multiple initiatives. This is a hybrid onsite to remote role in Oakland. This Infrastructure Security Analyst role is a contract to hire opportunity.</p><p><br></p><p>Key Responsibilities for Infrastructure Security Analyst</p><ul><li>Review and resolve infrastructure and security-related tickets (access requests, incident follow-ups, control changes)</li><li>Perform user and system access reviews across enterprise systems</li><li>Execute patching and support vulnerability scanning and remediation efforts</li><li>Support and administer endpoint security tools, including CrowdStrike</li><li>Assist with DLP and email security, including phishing detection, investigations, and user follow-ups</li><li>Participate in audit preparation and support (internal and external), including evidence gathering and control validation</li><li>Work closely with infrastructure, IT operations, and leadership to support security controls and improvements</li><li>Help establish consistent security processes and documentation in a maturing environment</li></ul><p><br></p>
<p><strong>Security Engineer – Manchester, NH</strong></p><p>We’re seeking a Security Engineer to join an established team. This role is ideal for someone who enjoys solving complex technical challenges, strengthening security posture, and working across infrastructure and networking environments.</p><p>Past experience as a Systems Engineer or Network Engineer is preferred.</p><p><br></p><p><strong>Key Responsibilities:</strong></p><ul><li>Implement and maintain security controls across network and virtualized environments</li><li>Monitor, troubleshoot, and respond to security events</li><li>Collaborate with IT teams to harden systems, enforce policies, and support compliance initiatives</li></ul><p><strong>Required Skills:</strong></p><ul><li>Strong networking experience (firewalls, routing, switching, VLANs)</li><li>Hands-on VMware experience (ESXi, vCenter, virtualization security best practices)</li><li>Understanding of security frameworks and common threat vectors</li></ul><p><strong>Nice to Have:</strong></p><ul><li>Experience with SIEM tools, IDS/IPS, or endpoint protection platforms</li><li>Security certifications (Security+, CEH, CISSP, etc.)</li></ul><p>If you're looking for an opportunity to make a direct impact and work with modern infrastructure, we'd love to hear from you.</p>
<p>We are seeking a cleared Information System Security Officer (ISSO) to support classified systems operating within the DoD Risk Management Framework (RMF) and JSIG environments. This role is highly documentation‑focused and centered on ATO support, continuous monitoring, audit readiness, and compliance across multiple classified networks. The ISSO will primarily support the ISSM and may assume ownership of smaller ATO efforts based on workload and system scope. This role will be a 3–6-month contract to hire opportunity!</p><p><br></p><p><strong>Key Responsibilities</strong></p><ul><li>Serve as the ISSO for multiple classified systems, supporting RMF lifecycle activities under ISSM direction</li><li>Create, update, and submit security authorization artifacts for:</li><li>New hardware and software extensions</li><li>RMF updates and control changes</li><li>Support and maintain ATO packages, including initial authorizations, renewals, and extensions</li><li>Monitor and assess 3–5 classified networks, averaging ~1 hour per network for compliance and security reviews</li><li>Execute and document continuous monitoring activities using approved security tools</li><li>Participate in and support routine audits, inspections, and DoD compliance submissions</li><li>Partner with IT and engineering teams to ensure controls, scans, and audit activities are executed correctly</li><li>Conduct vulnerability scanning on a recurring schedule (not a primary time driver)</li><li>Support systems currently partially complete within the NIST RMF lifecycle</li><li>Participate in regular stakeholder syncs with ISSM, IT, security teams, and government representatives</li><li>Operate within a classified, air-gapped environment supporting a mixed operating system infrastructure</li></ul><p><br></p>
<p>We are seeking a skilled <strong>Security Analyst</strong> with <strong>Security Operations Center (SOC)</strong> experience to support and strengthen our client’s cybersecurity operations. This role is ideal for a hands-on professional with experience monitoring, detecting, investigating and responding to security threats across enterprise environments.</p><p>The Security Analyst will play a key role in protecting systems and data by leveraging <strong>Microsoft Sentinel</strong>, <strong>SIEM platforms</strong>, <strong>vulnerability management tools</strong>, and <strong>network monitoring solutions</strong>.</p><p><strong>Key Responsibilities:</strong></p><ul><li>Monitor security events and alerts through <strong>Microsoft Sentinel</strong> and other <strong>SIEM tools</strong></li><li>Investigate and respond to security incidents, suspicious activity and potential threats</li><li>Perform triage, analysis and escalation of security events within a <strong>SOC environment</strong></li><li>Conduct <strong>vulnerability assessments</strong> and support remediation efforts across systems, applications and networks</li><li>Analyze logs, traffic and endpoint data to identify indicators of compromise</li><li>Support <strong>network monitoring</strong> efforts to detect unauthorized access, anomalies and malicious behavior</li><li>Collaborate with IT and infrastructure teams to strengthen security controls and incident response processes</li><li>Assist with threat detection use cases, alert tuning and continuous improvement of SOC procedures</li><li>Document incidents, findings, response actions and recommendations</li></ul><p><br></p>
<p>We are looking for a dedicated Security Analyst II to join our team in either North Carolina, South Carolina, Indiana or Georgia! In this role, you will focus on enhancing network security and protecting critical infrastructure. This is a long-term contract position requiring on-site presence four days a week, with one remote workday if desired.</p><p><br></p><p>Responsibilities:</p><p>• Configure, manage, and optimize Palo Alto Next Generation Firewalls, including policies, threat prevention profiles, and GlobalProtect software.</p><p>• Administer and troubleshoot Cisco Firepower devices, including ACLs, VPNs, and security rules.</p><p>• Review and refine firewall rules regularly to ensure optimal performance and mitigate risks.</p><p>• Monitor and analyze network security alerts, anomalies, and logs using tools such as Panorama and packet capture utilities.</p><p>• Investigate and resolve network-based security incidents, working with incident response teams as needed.</p><p>• Support secure network connectivity across data centers, branch sites, and cloud environments.</p><p>• Troubleshoot layer 2/3 networking issues affecting security appliances and connectivity.</p><p>• Assist in deploying secure architectures for new network builds and cloud integrations.</p><p>• Maintain detailed documentation of firewall configurations, network diagrams, and operational procedures.</p><p>• Contribute to compliance activities and enforce security standards aligned with industry best practices.</p>
We are looking for a Director of DevOps & Security to lead the evolution of a scalable, secure, and developer-focused platform in American Fork, Utah. This role is ideal for a hands-on technology leader who thrives in SaaS environments, balances speed with stability, and helps teams deliver software efficiently without unnecessary complexity. You will shape cloud and platform strategy, strengthen operational reliability, and foster close collaboration across engineering, quality, and operations.<br><br>Responsibilities:<br>• Lead the design and continuous improvement of an internal platform that gives development teams reliable self-service tools and streamlined workflows.<br>• Guide deployment practices and environment management to shorten release cycles and remove obstacles that slow delivery.<br>• Define infrastructure and cloud direction with a focus on scalability, resilience, and responsible cost management.<br>• Establish practical CI/CD automation that supports frequent, low-risk releases across a growing SaaS ecosystem.<br>• Build observability practices through monitoring, alerting, and operational insights that improve system performance and incident response.<br>• Partner across development, QA, and operations to create aligned processes and shared accountability for product delivery.<br>• Embed security into engineering workflows through pragmatic DevSecOps practices that reduce risk without disrupting momentum.<br>• Mentor teams and influence technical decisions by staying close to implementation details and helping unblock execution when needed.
<p>**** For Faster response on the position, please send a message to Jimmy Escobar on LinkedIn or send an email to Jimmy.Escobar@roberthalf(.com) with your resume. You can also call my office number at 424-270-9193****</p><p><br></p><p>We are looking for an experienced Info Sec Architect to join our team on a long-term contract basis in Los Angeles, California. This role involves safeguarding critical systems and networks while implementing robust security protocols to minimize risks. The ideal candidate will have a strong background in cloud technologies, firewall management, and cybersecurity strategies.</p><p><br></p><p>Responsibilities:</p><p>• Design, implement, and maintain advanced firewall solutions, including Checkpoint and Cisco ASA, to protect network integrity.</p><p>• Evaluate and enhance cloud-based security frameworks to ensure the secure deployment and operation of services.</p><p>• Conduct regular security audits and vulnerability assessments to identify and mitigate risks.</p><p>• Configure, monitor, and troubleshoot Cisco technologies to optimize system performance and security.</p><p>• Develop and execute cybersecurity strategies to address potential threats and ensure compliance with industry standards.</p><p>• Collaborate with cross-functional teams to implement configuration management processes that streamline security operations.</p><p>• Perform AB testing to analyze the effectiveness of security measures and recommend improvements.</p><p>• Manage AWS technologies to strengthen cloud security and scalability.</p><p>• Provide expertise in cyber threat analysis and response to safeguard sensitive data.</p><p>• Document and maintain security protocols, procedures, and configurations for future reference.</p>
<p>We are seeking a detail-oriented Financial Crimes Analyst to support our compliance and risk teams by accurately entering, updating, and maintaining sensitive financial crimes data. This role requires strong attention to detail, confidentiality, and the ability to work with large volumes of information in a fast-paced environment. This role is highly data-entry focused, so strong Excel skills and a high level of accuracy are essential. It’s a great opportunity for someone looking to get their foot in the door in business and finance. You will be working onsite Monday to Friday. Interviews are beginning Thursday 23rd 2026. Please respond to Jackie Bailey at 571-297-7549 and leave a message.</p><p><br></p><p>Responsibilities:</p><ul><li>Enter, review, and update data related to financial crimes investigations, suspicious activity, and compliance records</li><li>Maintain accurate and organized electronic files and databases</li><li>Verify information for completeness and accuracy before submission</li><li>Assist with tracking case documentation and investigation records</li><li>Identify discrepancies, missing information, and data inconsistencies</li><li>Support reporting needs for compliance, fraud, AML, and KYC teams</li><li>Follow internal procedures, regulatory guidelines, and confidentiality standards</li><li>Communicate with internal departments to resolve data issues as needed</li></ul><p><br></p>
<p>We are seeking a highly experienced <strong>Microsoft Security Framework Engineer</strong> to lead the full activation and optimization of the Microsoft Security stack within our Microsoft 365 E5 environment. This is a critical contract role focused on designing, configuring, and deploying a comprehensive security framework to protect endpoints, identities, cloud applications, email, and sensitive Protected Health Information (PHI).</p><p>The successful candidate will serve as the subject matter expert responsible for implementing Microsoft Defender and Purview capabilities from the ground up, ensuring alignment with industry best practices and regulatory requirements.</p><p> </p><p><strong>Key Responsibilities</strong></p><ul><li>Lead the end-to-end design, configuration, and deployment of the full Microsoft Security stack, including:</li><li>Microsoft Defender for Endpoint</li><li>Microsoft Defender for Office 365 Plan 2</li><li>Microsoft Defender for Identity</li><li>Microsoft Defender for Cloud Apps</li><li>Entra ID Protection</li><li>Microsoft Purview (Data Loss Prevention (DLP) and Sensitivity Labels for PHI)</li><li>Architect and implement a cohesive Microsoft security framework that integrates all components for maximum protection and visibility</li><li>Configure advanced threat protection, automated investigation and response (AIR), attack surface reduction rules, and device control policies</li><li>Design and deploy Purview DLP policies and sensitivity labeling strategies tailored for PHI protection and regulatory compliance (HIPAA, etc.)</li><li>Implement Entra ID Protection policies, Conditional Access, and identity threat detection capabilities</li><li>Conduct security assessments, gap analysis, and provide recommendations to strengthen the overall security posture</li><li>Collaborate with internal IT, security, and compliance teams to ensure successful adoption and operational handover</li><li>Develop documentation, runbooks, and knowledge transfer materials for ongoing management and maintenance</li><li>Provide expert guidance on Microsoft 365 E5 security licensing, features, and roadmap</li></ul><p><br></p>
We are looking for a skilled Security Engineer IV to join our team on a long-term contract basis in Philadelphia, Pennsylvania. This role focuses on enhancing cybersecurity practices, ensuring compliance with security policies, and developing innovative solutions to protect network systems. The ideal candidate will possess a strong technical background in network security, risk management, and Agile methodologies.<br><br>Responsibilities:<br>• Collaborate with program managers to define product vision and plan security-related initiatives.<br>• Ensure evidence collection processes are conducted, managed, and archived according to established guidelines to preserve data integrity.<br>• Identify areas for improvement and recommend changes to enhance security protocols.<br>• Perform complex updates and routine maintenance for security products.<br>• Respond to security incidents and provide advanced support for help desk tickets.<br>• Manage relationships with internal business units, customers, suppliers, and stakeholders to uphold security standards.<br>• Conduct risk assessments and apply risk management principles to strengthen security measures.<br>• Review and monitor security logs to identify and address potential violations.<br>• Develop and implement policies to align with cybersecurity best practices.<br>• Contribute to the secure software development lifecycle, including DevOps processes.
We are looking for an experienced Penetration Tester to join our cybersecurity team and enhance the security of our Windows-based systems. The ideal candidate will play a key role in identifying vulnerabilities, conducting simulated attacks, and implementing strategies to safeguard critical infrastructure, including servers, endpoints, and Active Directory environments. This position offers an opportunity to apply advanced penetration testing techniques and collaborate with IT teams to strengthen security measures.<br><br>Responsibilities:<br>• Perform penetration tests and security evaluations of Windows environments, including Active Directory, servers, endpoints, and domain controllers.<br>• Execute red team scenarios to simulate real-world attack tactics, techniques, and procedures.<br>• Identify and exploit vulnerabilities within Windows systems, applications, and networks, documenting findings comprehensively.<br>• Develop and utilize custom scripts and tools using programming languages such as PowerShell, Python, C++, or C#.<br>• Work closely with IT teams to address security gaps and implement mitigation strategies.<br>• Prepare detailed reports outlining vulnerabilities and actionable recommendations to fortify Windows infrastructure.<br>• Stay updated on emerging threats, attack vectors, and techniques targeting Windows-based systems.<br>• Evaluate Group Policy Objects and other system configurations to ensure adherence to security standards.<br>• Support the improvement of cybersecurity practices by sharing insights and conducting knowledge transfer sessions.
<p><strong>Senior Juniper Network Engineer</strong></p><p><strong>Location:</strong> Onsite in Lorton, VA</p><p><strong>Schedule:</strong> Monday–Friday, 9:00am–5:00pm</p><p><strong>Employment Type:</strong> Full-time Contract, 6 Months with Potential for Conversion </p><p><strong>Overview</strong></p><p>A government IT program is seeking a <strong>Senior Juniper Network Engineer</strong> to provide expert-level engineering, operations, and maintenance support for mission‑critical field communications systems used worldwide. This program delivers a wide range of IT applications and infrastructure services, including enterprise network support, service desk, workstation engineering, telecommunications engineering, mobility services, and more.</p><p>This role supports a high‑visibility customer environment and requires someone who can operate independently, communicate effectively with technical and non-technical stakeholders, and manage complex network systems with a high degree of accuracy and professionalism.</p><p><strong>Key Responsibilities</strong></p><ul><li>Serve as the <strong>primary Subject Matter Expert (SME)</strong> for a specialized government system, becoming the single point of technical authority for network-related issues.</li><li>Provide <strong>independent operations & maintenance (O&M)</strong> support for mission‑critical systems, requiring broad and deep knowledge across applicable network technologies.</li><li>Configure and support <strong>Juniper SRX‑series security devices</strong> (JNCIP‑SEC or JNCIE‑SEC level proficiency), ensuring alignment with industry best practices and federal security standards.</li><li>Configure and support <strong>Juniper EX‑series switches</strong> using 1Gbps and 10Gbps backplanes, including copper and fiber connectivity and high‑availability (HA) solutions.</li><li>Configure and support <strong>Cisco Firepower ASA firewalls</strong>, including AnyConnect VPN access, HA configurations, secure authentication integrations, and remote-access security.</li><li>Design and maintain an <strong>out‑of‑band (OOB) management network</strong> using TrippLite serial consoles, iDRAC, and similar technologies.</li><li>Collaborate with customers, contractors, and vendors on the design and specification of <strong>Private IP (PIP)</strong> and Internet circuits.</li><li>Ensure high availability of <strong>Network Time Protocol (NTP)</strong> across all networks.</li><li>Follow established <strong>configuration management processes</strong> to maintain consistency, security, and accuracy in network configurations.</li><li>Develop and maintain <strong>technical documentation</strong>, network diagrams, and system references.</li><li>Provide clear communication and briefings to customers, including senior leadership.</li></ul>
<p>We are seeking experienced CyberArk L2/L3 Administrator to support an enterprise Privileged Access Management (PAM) environment focused on server-based access control. This role will work alongside an existing CyberArk SME to manage privileged account onboarding, password rotation, incident response and audit support. This is a hands-on operational role requiring strong CyberArk knowledge, solid troubleshooting ability, and comfort working in a fast-moving environment with on-call expectations.</p><p><br></p><p>This role is 4 days/week onsite in Marysville, OH</p><p><br></p><p><strong>CyberArk Administration</strong></p><p>• Support CyberArk EPV, PVWA, CPM, and PSM modules in a large enterprise environment</p><p> • Perform privileged account onboarding into CyberArk safes (currently a manual process)</p><p> • Manage password rotation, reconciliation, and platform configuration</p><p> • Monitor and troubleshoot access failures, rotation errors, and session issues</p><p> • Assist with time‑boxed privileged access and Break Glass workflows</p><p><strong>Operational Support</strong></p><p>• Work from ServiceNow request queues (access, activities, break/fix) with a 2‑day SLA</p><p> • Respond to severity‑based incidents; Sev1 requires 2‑hour response</p><p> • Participate in weekend on‑call rotations (Sat → Sun)</p><p> • Assist users with CyberArk workflows and provide training as needed</p><p><strong>Audit, Compliance & Security</strong></p><p>• Provide evidence for audits, including access approvals and session recording review</p><p> • Investigate suspicious activity using CyberArk logs and integrated SIEM alerts (QRadar)</p><p> • Support Disaster Recovery activities (e.g., adjusting password rotation parameters)</p><p><strong>Process Improvement & Automation</strong></p><p>• Recommend improvements to reduce manual onboarding</p><p> • Use scripting (PowerShell/Python) to streamline repeatable tasks</p><p> • Contribute to future automation between ServiceNow and CyberArk</p>
<p>We are looking for an experienced Data Privacy Consultant to support and advise our client. In this role, you will play a critical part in ensuring compliance with privacy regulations while supporting the development of a new, data-driven product line. This is a long-term contract position offering an opportunity to make a significant impact in the service industry.</p><p><br></p><p>Responsibilities:</p><p>• Collaborate with the product team to implement privacy-by-design principles throughout the development lifecycle.</p><p>• Assess and ensure compliance with applicable privacy regulations and requirements.</p><p>• Serve as a trusted advisor for privacy-related matters, providing expertise and guidance to internal stakeholders.</p><p>• Conduct thorough analyses of client data to identify potential privacy risks and recommend actionable solutions.</p><p>• Develop and maintain privacy policies, procedures, and documentation to support organizational compliance.</p><p>• Monitor emerging privacy trends and regulations to proactively address potential impacts on the organization.</p><p>• Offer insights and recommendations to enhance data protection strategies and safeguard sensitive information.</p>
<p>We are seeking a highly experienced <strong>Microsoft Security Framework Engineer</strong> to lead the full activation and optimization of the Microsoft Security stack within our Microsoft 365 E5 environment. This is a critical contract role focused on designing, configuring, and deploying a comprehensive security framework to protect endpoints, identities, cloud applications, email, and sensitive Protected Health Information (PHI).</p><p>The successful candidate will serve as the subject matter expert responsible for implementing Microsoft Defender and Purview capabilities from the ground up, ensuring alignment with industry best practices and regulatory requirements.</p><p> </p><p><strong>Key Responsibilities</strong></p><ul><li>Lead the end-to-end design, configuration, and deployment of the full Microsoft Security stack, including:</li><li>Microsoft Defender for Endpoint</li><li>Microsoft Defender for Office 365 Plan 2</li><li>Microsoft Defender for Identity</li><li>Microsoft Defender for Cloud Apps</li><li>Entra ID Protection</li><li>Microsoft Purview (Data Loss Prevention (DLP) and Sensitivity Labels for PHI)</li><li>Architect and implement a cohesive Microsoft security framework that integrates all components for maximum protection and visibility</li><li>Configure advanced threat protection, automated investigation and response (AIR), attack surface reduction rules, and device control policies</li><li>Design and deploy Purview DLP policies and sensitivity labeling strategies tailored for PHI protection and regulatory compliance (HIPAA, etc.)</li><li>Implement Entra ID Protection policies, Conditional Access, and identity threat detection capabilities</li><li>Conduct security assessments, gap analysis, and provide recommendations to strengthen the overall security posture</li><li>Collaborate with internal IT, security, and compliance teams to ensure successful adoption and operational handover</li><li>Develop documentation, runbooks, and knowledge transfer materials for ongoing management and maintenance</li><li>Provide expert guidance on Microsoft 365 E5 security licensing, features, and roadmap</li></ul><p><br></p>