<p>This leadership role is responsible for overseeing all aspects of an organization’s Information Technology (IT) operations. The position manages a wide range of IT functions including business continuity planning, database and systems administration, network infrastructure, cybersecurity, technical services, and application development and support. The role emphasizes innovation and strategic leadership in developing and implementing initiatives that support organizational goals.</p><p><br></p><p><strong>What You’ll Do: Responsibilities</strong></p><ul><li>Establish and execute the overall IT strategy and vision in alignment with the organization’s strategic objectives.</li><li>Lead the development, implementation, and oversight of a comprehensive information security and cybersecurity program to protect data assets and technology infrastructure from internal and external threats.</li><li>Prioritize and manage strategic and tactical IT projects, allocating resources based on scope, timelines, and organizational priorities. Monitor performance metrics and ensure risks are mitigated.</li><li>Identify and implement emerging technologies and process improvements to enhance agility, innovation, and responsiveness to business needs.</li><li>Direct and support IT staff, including performance management, training, and professional development.</li><li>Oversee multiple projects to successful completion within budget and timeline constraints.</li><li>Manage relationships with technology vendors and ensure compliance with service level agreements.</li><li>Collaborate with internal and external stakeholders on IT-related initiatives and issues.</li><li>Recommend and implement new technologies and services to improve operational efficiency and effectiveness, ensuring systems capacity meets organizational needs.</li><li>Serve as a liaison between IT and other departments to ensure alignment and support for cross-functional initiatives.</li><li>Lead efforts related to IT grant proposals and execution, ensuring compliance with grant requirements.</li><li>Prepare and manage the annual IT budget, including planning for current and future capital projects.</li><li>Contribute to the development and implementation of asset management strategies that minimize lifecycle costs and support organizational objectives.</li><li>Perform other duties as assigned.</li><li>This role may require flexibility in schedule and location to support a 24/7 operational environment.</li></ul>
<p>The IT Manager will be responsible for leading the strategic and operational direction of the organization's information technology functions. This position focuses on aligning IT resources to support and improve critical business operations, fostering the implementation of advanced and secure technologies such as AI and automation, and developing long-term strategies that drive growth, optimize efficiency, and strengthen competitive positioning.</p><p><br></p><p><strong>Responsibilities:</strong></p><ul><li>Lead the organization's IT strategies, ensuring alignment with overall business goals.</li><li>Oversee the development and implementation of innovative and secure technologies, focusing on automation and AI applications.</li><li>Define and execute long-term plans to optimize the organization's IT infrastructure.</li><li>Drive project planning and execution for technology-related initiatives.</li><li>Lead, manage, and mentor IT teams at various levels.</li><li>Support customization and development of software applications tailored to business needs.</li><li>Improve system reliability, security, and performance through data-driven analytical approaches.</li><li>Collaborate effectively with internal teams and external vendors to meet organizational objectives.</li></ul><p><br></p>
<p>Our client is seeking an Infrastructure & Information Security Manager to lead and advance the company’s information security strategy—safeguarding data, systems, and assets across all platforms. In this role, you will design, implement, and continuously enhance security policies, risk management frameworks, and incident response processes that support regulatory and operational standards. You will partner with senior leadership and cross-functional teams to identify risks, implement safeguards, drive compliance, and foster a culture of security awareness.</p><p><br></p><p>Responsibilities</p><p><br></p><p>Strategic Planning and Execution</p><ul><li>Define and lead the organization’s information security strategy, aligning with business goals, regulatory requirements, and client expectations.</li><li>Develop and maintain security policies, standards, and procedures to support secure operations across all platforms.</li><li>Establish risk management frameworks and governance models to assess, monitor, and mitigate security risks across the technology ecosystem.</li><li>Evaluate emerging threats, technologies, and best practices to inform the security strategy and support continuous improvement.</li></ul><p>Team Leadership and Development</p><ul><li>Partner with cross-functional teams to embed security concepts into technology initiatives, operational processes, and client service delivery.</li><li>Provide training and development opportunities to strengthen internal security capabilities and promote a culture of security awareness.</li><li>Define team roles, responsibilities, and performance expectations aligned with the organization’s strategic priorities.</li></ul><p>Operational Management and Delivery</p><ul><li>Oversee the implementation and management of security tools, systems, and controls across infrastructure platforms.</li><li>Lead incident response planning and execution to ensure timely resolution of security events and effective stakeholder communication.</li><li>Manage third-party risk assessments, vendor security reviews, and compliance audits to drive adherence to organizational standards.</li><li>Monitor security performance, conduct vulnerability assessments, and implement remediation plans that meet critical business needs.</li></ul><p>Continuous Improvement and Innovation</p><ul><li>Identify opportunities to enhance security operations through automation, analytics, and integration with broader technology initiatives.</li><li>Stay informed on legal industry trends, regulatory developments, and cybersecurity innovations—especially as they relate to legal technology.</li><li>Lead initiatives to modernize the organization’s security architecture, enhancing scalability and resilience.</li><li>Gather feedback from stakeholders to refine security practices and drive alignment with evolving business and client needs.</li></ul>
<p>IT Security Analyst:</p><p>We are accepting applications for an IT Security Analyst which involves a variety of responsibilities aimed at protecting an organization's computer networks and systems from cyber threats. </p><p><strong>Responsibilities:</strong></p><ul><li>Monitor, detect, and respond to security incidents and threats using security information and event management (SIEM) tools.</li><li>Collaborate with IT teams to identify vulnerabilities and implement appropriate security measures.</li><li>Perform regular security assessments, risk analyses, and vulnerability scans.</li><li>Develop, document, and enforce security policies, protocols, and best practices.</li><li>Investigate security breaches, conduct forensic analysis, and recommend corrective actions.</li><li>Maintain up-to-date knowledge of the latest cybersecurity trends, vulnerabilities, and compliance requirements.</li><li>Assist in security awareness training for staff and end-users.</li><li>Prepare reports for management on incident outcomes, risks, and preventative strategies.</li></ul><p><br></p><p><br></p>
<p>IT Security Analyst</p><p>We are accepting applications for an IT Security Analyst which involves a variety of responsibilities aimed at protecting an organization's computer networks and systems from cyber threats. </p><p><strong>Responsibilities:</strong></p><ul><li>Monitor, detect, and respond to security incidents and threats using security information and event management (SIEM) tools.</li><li>Collaborate with IT teams to identify vulnerabilities and implement appropriate security measures.</li><li>Perform regular security assessments, risk analyses, and vulnerability scans.</li><li>Develop, document, and enforce security policies, protocols, and best practices.</li><li>Investigate security breaches, conduct forensic analysis, and recommend corrective actions.</li><li>Maintain up-to-date knowledge of the latest cybersecurity trends, vulnerabilities, and compliance requirements.</li><li>Assist in security awareness training for staff and end-users.</li><li>Prepare reports for management on incident outcomes, risks, and preventative strategies.</li></ul><p><br></p>
<p><strong>Key Responsibilities</strong></p><ul><li>Strategically implement the security program by translating high-level plans into targeted initiatives and monitor projects through robust milestone, risk, and deliverable management. Lead collaborative working sessions and deliver articulate, insightful status briefings to stakeholders.</li><li>Oversee enterprise risk management, partnering closely with Security Compliance to maintain an authoritative risk register. Facilitate risk remediation across systems and business units, while supporting audit procedures and expertly addressing partner and customer security assessments.</li><li>Champion the institutionalization of security governance by orchestrating the deployment and integration of policies and standards. Ensure the creation and dissemination of practical operating procedures, proactively identify operational deficiencies, and advocate for progressive enhancements in security maturity.</li><li>Direct sophisticated Identity and Access Management (IAM) operations, embracing end-to-end lifecycle processes (onboarding, transitions, separation), role-based access control, periodic entitlement reviews, and privileged access oversight. Collaborate with IT and business application owners for seamless MFA/SSO deployments and continuously optimize IAM for organizational agility.</li><li>Advance protection of sensitive and regulated data—particularly PHI—through rigorous data classification, handling protocols, and comprehensive encryption standards. Drive enterprise-wide adoption of effective key management and fine-tune Data Loss Prevention (DLP) strategies in partnership with internal stakeholders.</li><li>Coordinate security operations and incident management as the primary liaison to MDR/MSSP partners. Continually enhance incident response methodologies, escalation mechanisms, and contact lists, while orchestrating simulation exercises and post-incident analyses to reinforce organizational preparedness.</li><li>Lead the rhythm of vulnerability and patch management by administering scan cycles, prioritization, and remediation in alignment with SLA commitments. Closely partner with technical teams to verify resolutions and communicate the risk landscape underlying remediation efforts.</li><li>Strengthen third-party risk governance by collaborating with compliance, procurement, and legal teams throughout vendor evaluation, tiering, and diligence processes. Define and monitor security standards for external relationships, ensuring alignment with organizational obligations and best practices.</li><li>Administer Business Continuity and Disaster Recovery (BC/DR) initiatives by maintaining structured testing calendars, scenario playbooks, and evidence collection protocols for mission-critical systems. Facilitate exercises and post-test remediation to bolster resilience and continuity of clinical and operational services.</li><li>Enable a robust Secure Software Development Lifecycle (SSDLC) by championing minimum security checkpoints (e.g., SAST, DAST, dependency scanning), providing mentorship to development teams on secure architecture, and fostering security-driven innovation in support of strategic organizational goals.</li><li>Steward security culture and talent development by coordinating immersive training programs, phishing simulations, and reporting key performance indicators to leadership. Mentor direct reports and junior team members, fostering a spirit of curiosity, initiative, and continual professional advancement.</li></ul><p><br></p>
<p>We are looking for an experienced IT Security Manager/Production Lead Type, over 1 direct report in IT Infrastructure Administration, to take ownership of our organization's information security initiatives. This role involves leading and advancing our security program across various environments while mentoring and managing a direct report. You will collaborate closely with cross-functional teams, including Engineering, DevOps, Product, and Legal, to ensure a secure and compliant infrastructure.</p><p><br></p><p>Responsibilities:</p><p>• Oversee and implement the organization's security program across cloud, application, network, endpoint, identity, and SaaS platforms.</p><p>• Conduct vulnerability assessments, penetration testing, threat modeling, and security code reviews for web applications.</p><p>• Manage the incident response lifecycle, including detection, triage, containment, recovery, and post-incident reporting.</p><p>• Administer and enhance security tools and systems such as identity management, threat detection, and compliance monitoring.</p><p>• Strengthen access controls and identity management processes, ensuring privileged access and Zero Trust principles are upheld.</p><p>• Evaluate vendors and SaaS providers for security risks and oversee third-party risk management.</p><p>• Lead security awareness training sessions and simulate phishing campaigns to educate employees.</p><p>• Maintain compliance with frameworks like SOC 2 and ISO 27001, and coordinate audit activities.</p><p>• Develop and enforce security policies, standards, and procedures tailored to organizational needs.</p><p>• Mentor and manage a Security Analyst, supporting their growth through regular check-ins and performance reviews.</p>
<p>We are looking for an experienced Security Analyst II to join our team in Mount Laurel, New Jersey. In this contract role, you will play a key part in maintaining and enhancing security across various IT functional areas such as data systems, networks, and web applications. This position involves implementing security policies, monitoring systems for vulnerabilities, and providing expert guidance to ensure the organization’s security measures are robust and effective.</p><p><br></p><p>Responsibilities:</p><p>• Develop and oversee security protocols and procedures for multiple IT functional areas, ensuring comprehensive protection across systems.</p><p>• Implement and manage user authentication processes, firewall configurations, and encryption methods to safeguard data.</p><p>• Monitor and analyze potential security threats, including software viruses, and establish response strategies.</p><p>• Prepare detailed status reports on security matters and conduct risk analysis to identify vulnerabilities.</p><p>• Enforce security policies by administering and reviewing security profiles and investigating violations.</p><p>• Evaluate security tools and procedures to improve productivity and system effectiveness.</p><p>• Collaborate with IT and business teams to resolve security-related concerns and educate staff on security best practices.</p><p>• Provide expertise in security for organizational projects, ensuring compliance and addressing complex security challenges.</p><p>• Document and update security controls regularly, maintaining accurate records.</p><p>• Support enterprise security strategies through the management of security projects and technical evaluations.</p>
<p><strong>Role Overview:</strong></p><p>The IT Systems Manager is responsible for the effective management, security, and optimization of the organization's technology infrastructure. This role oversees disaster recovery strategies, ensures data protection and compliance, and manages critical systems, including virtualization platforms and backup and recovery technologies. Expertise in industry compliance frameworks such as NIST and SOC2 is required to maintain regulatory and operational standards.</p><p><strong>Key Responsibilities:</strong></p><ul><li>Manage day-to-day operations of IT infrastructure, including servers, networks, and cloud systems, ensuring reliability and performance.</li><li>Oversee the implementation and maintenance of backup and recovery technologies to protect essential business data.</li><li>Develop and test robust disaster recovery plans to ensure operational continuity in the event of disruptions.</li><li>Monitor and respond to security events proactively, mitigating risks and documenting resolution efforts as needed.</li><li>Manage and optimize virtualized systems for streamlined operations and scalability.</li><li>Collaborate with internal stakeholders to align IT systems and solutions with organizational goals and objectives.</li><li>Maintain strategic partnerships with vendors and manage contracts to ensure reliability and cost-effectiveness of services.</li><li>Conduct audits, risk assessments, and evaluations to ensure compliance with industry standards like NIST and SOC2.</li><li>Lead and mentor IT teams, fostering a culture of learning and innovation to support organizational success.</li></ul><p><br></p>
We are looking for a skilled Cyber Security Engineer to join our team in San Antonio, Texas. This Contract to permanent position offers an exciting opportunity to safeguard sensitive healthcare data while implementing robust security protocols. The ideal candidate will play a pivotal role in developing and maintaining security standards, ensuring compliance with federal and state regulations, and driving the continuous improvement of our cyber security program.<br><br>Responsibilities:<br>• Develop and implement security solutions to protect sensitive healthcare data and maintain compliance with relevant regulations and standards.<br>• Conduct audits, assessments, and remediation activities to ensure adherence to cybersecurity policies and procedures.<br>• Analyze and address IT security threats, evaluate risks, and articulate their operational impact as part of a collaborative team.<br>• Coordinate with technical teams to identify and resolve security vulnerabilities in operational systems.<br>• Lead disaster recovery planning and testing while aligning business continuity strategies with compliance and risk management objectives.<br>• Review and evaluate third-party security controls, conducting vendor security assessments for services involving data handling.<br>• Enhance cyber security measures by providing recommendations on best practices and program improvements.<br>• Oversee identity access management processes and perform quarterly audits to maintain security standards.<br>• Foster awareness and compliance with security policies across the organization.
We are looking for a highly motivated and experienced IT manager to lead our embedded systems and hardware initiatives in Hammonton, New Jersey. This role requires a deep understanding of hardware security, embedded systems, and the ability to mentor and guide a diverse team of professionals. If you have a passion for innovation and delivering exceptional client satisfaction, this opportunity is perfect for you.<br><br>Responsibilities:<br>• Lead and manage embedded systems and hardware projects, ensuring integration with firmware and software ecosystems.<br>• Provide mentorship and technical guidance to team members, fostering skill development and knowledge sharing.<br>• Monitor and analyze industry trends to drive innovative solutions and enhance team competencies.<br>• Collaborate with clients to identify their needs and articulate the value of embedded systems and hardware solutions.<br>• Conduct application security assessments, including threat modeling, design reviews, and vulnerability testing.<br>• Perform reverse engineering on hardware and software components to identify and address security weaknesses.<br>• Facilitate training sessions and develop resources to improve team expertise in embedded systems and security topics.<br>• Investigate and report vulnerabilities, recommending remediation strategies and demonstrating risk impact through post-exploitation activities.<br>• Track compliance with product security requirements throughout the software and hardware development lifecycle.<br>• Develop and implement methodologies and tools to improve security practices and solutions.
We are looking for a highly skilled Systems Administrator to join our team in Boerne, Texas. This role requires a proactive individual with expertise in managing diverse operating systems, ensuring system security, and driving automation processes. The ideal candidate will possess strong technical knowledge, excellent problem-solving skills, and a commitment to maintaining robust and secure IT infrastructure.<br><br>Responsibilities:<br>• Oversee the administration and maintenance of multiple operating systems, including Windows Server, Windows 10/11, Linux, macOS, and Chrome OS.<br>• Manage endpoint protection and deployment tools such as Microsoft Intune, Jamf Pro, and Active Directory.<br>• Ensure the security of IT systems by addressing vulnerabilities, performing malware remediation, and implementing hardening measures.<br>• Develop and maintain backup procedures to safeguard data and support disaster recovery plans.<br>• Configure and manage enterprise virtualization platforms, such as VMware vSphere.<br>• Collaborate with teams to provide advanced troubleshooting for network protocols and system issues.<br>• Automate processes and reporting using PowerShell and other scripting languages to enhance efficiency.<br>• Provide expert support for messaging services, including Microsoft 365, Exchange Online, and Google Admin Console.<br>• Monitor and maintain network-attached devices, ensuring optimal functionality.<br>• Deliver documentation, reporting, and technical training to support organizational goals.
We are looking for an experienced Information Technology Administrator to oversee and enhance IT operations, infrastructure, and support systems within our organization. Based in San Antonio, Texas, this role requires a proactive, detail-oriented individual who can manage diverse technical environments and ensure seamless functionality of systems and networks. The ideal candidate will excel in system administration, network management, and automation while maintaining compliance with security standards.<br><br>Responsibilities:<br>• Provide advanced-level technical support for Windows, Mac, and Linux systems, addressing issues both remotely and in-person.<br>• Administer endpoint protection, oversee software deployment, and manage the lifecycle of IT assets across the company.<br>• Ensure the organization's wired and wireless networks maintain high availability and optimal performance.<br>• Manage and monitor firewalls, routers, switches, VPNs, and failover systems to ensure network security and reliability.<br>• Implement and maintain cloud-based tools and platforms, such as Azure AD, Okta, and Google Identity, to enhance system administration.<br>• Lead backup, disaster recovery, and continuity planning to safeguard critical business operations.<br>• Administer and configure enterprise applications, including SaaS platforms like Jira, Salesforce, and RingCentral, ensuring efficient integration and provisioning.<br>• Develop and maintain automation scripts (PowerShell, Bash) to streamline IT processes and improve operational efficiency.<br>• Create and manage comprehensive documentation, including system diagrams, SOPs, and knowledge bases, adhering to organizational standards.<br>• Enforce IT policies and compliance measures related to data security, access control, and conditional access policies.
We are looking for a skilled Lead Identity and Access Management (I& AM) System Engineer to join our team in Reston, Virginia. In this role, you will architect and manage enterprise identity solutions while ensuring robust access governance across hybrid and cloud environments. Your expertise will drive the implementation of advanced security measures and compliance frameworks to safeguard organizational systems and data.<br><br>Responsibilities:<br>• Design, implement, and maintain enterprise identity solutions using Microsoft Entra ID and related technologies.<br>• Administer and optimize Privileged Access Management and Privileged Identity Management frameworks to enhance security.<br>• Develop and enforce Conditional Access Policies to ensure secure user access across platforms.<br>• Manage Access Reviews and Just-in-Time (JiT) access models to uphold least privilege principles.<br>• Integrate Microsoft Defender for Cloud and Identity tools to improve detection and response capabilities.<br>• Oversee Single Sign-On integrations and dynamic group configurations for streamlined access management.<br>• Lead the organization's identity and access management program to align with cybersecurity and compliance goals.<br>• Collaborate with infrastructure, application, and security teams to implement cohesive identity controls.<br>• Communicate program roadmaps, risks, and security updates to senior leadership and stakeholders.<br>• Mentor and guide engineers at the beginning of their careers to foster growth and technical proficiency.
We are looking for an experienced IT Manager to oversee and optimize the technological operations of our manufacturing facility in Telford, Pennsylvania. This role requires a hands-on approach to managing IT systems while ensuring compliance with evolving government security standards. The successful candidate will play a key role in maintaining system reliability, enhancing cybersecurity, and driving strategic IT initiatives.<br><br>Responsibilities:<br>• Manage daily IT operations, including system administration, network oversight, and hardware/software support.<br>• Lead the deployment, maintenance, and lifecycle management of IT equipment and infrastructure.<br>• Troubleshoot and resolve technical issues to ensure minimal disruption to manufacturing processes.<br>• Document system configurations, assets, and IT procedures to maintain accurate records.<br>• Collaborate with vendors and internal teams to implement upgrades, integrations, and new technologies.<br>• Develop and enforce IT policies and security measures to comply with government regulations.<br>• Conduct risk assessments and evaluate cybersecurity strategies to enhance system protection.<br>• Provide strategic recommendations to leadership on technology investments and modernization efforts.<br>• Stay updated on regulatory changes and ensure the organization meets current compliance standards.<br>• Support system optimization to improve operational efficiency within the manufacturing environment.
<p>Our client is seeking a strategic and visionary Senior Information Technology Manager to lead and oversee the organization’s IT infrastructure, systems, support services, and cybersecurity across all business units, including international operations. This hands-on leadership role ensures technology solutions are scalable, secure, and aligned with broader business objectives. You’ll partner closely with senior leadership to define and deliver a technical roadmap that supports business growth and risk mitigation.</p><p><br></p><p>Key Responsibilities:</p><p><strong>Strategic Planning & Technology Management (35%)</strong></p><ul><li>Collaborate with senior leadership to develop and execute IT strategies that drive innovation and support long-term business goals, organizational objectives, and risk management.</li><li>Manage enterprise-wide systems, networks, and applications, ensuring high availability, reliability, and performance. Provide after-hours support as needed.</li><li>Proactively implement controls to address evolving cybersecurity threats and ensure compliance with relevant standards. Safeguard data integrity and protect company assets.</li><li>Work cross-functionally to identify and deliver technology-driven process improvements, monitor industry trends, and recommend relevant solutions.</li></ul><p><strong>Team & Relationship Development (35%)</strong></p><ul><li>Lead, mentor, and support the IT team—including infrastructure, support, and systems administration—while promoting a collaborative and customer-focused culture.</li><li>Foster an environment that prioritizes professional growth and encourages a SMART, healthy workplace.</li><li>Provide direct oversight of global IT operations, ensuring alignment with overall standards and strategies.</li><li>Maintain strong relationships with international partners and ensure consistency in IT governance.</li><li>Manage vendor relationships, contracts, and service-level agreements.</li></ul><p><strong>Budgeting, Policy, & Compliance (30%)</strong></p><ul><li>Optimize IT budgets, forecasts, and resource allocation to maximize efficiency and scalability. Ensure on-time, on-budget project delivery.</li><li>Establish and enforce IT policies, procedures, and best practices organization-wide.</li><li>Lead internal and external IT audits, maintain audit readiness, and oversee documentation and remediation for regulatory and industry compliance (e.g., SOX, data privacy requirements).</li></ul>
<p>We are seeking an <strong>IT Security Specialist</strong> to join our team and play a key role in strengthening our cybersecurity posture. This position is focused on preemptive security measures, with an emphasis on vulnerability management and proactive risk mitigation. The ideal candidate is a hands-on professional who is developing their craft and eager to contribute to both the creation and maintenance of security improvements. Come join a great company as a IT Security Specialist! <u>Apply now, call 319-362-8606, or email your resume direct to: Shawn M Troy - Technology Practice Director with Robert Half (email information is on LinkedIn).</u> Key Responsibilities:</p><p><br></p><p><strong>Vulnerability Management:</strong></p><ul><li>Identify, assess, and remediate vulnerabilities across on-premises and cloud environments.</li><li>Collaborate with internal teams to ensure timely patching and risk reduction.</li></ul><p><strong>Security Guidelines:</strong></p><ul><li>Assist in developing new security policies and procedures.</li><li>Maintain and update existing security documentation to align with best practices.</li></ul><p><strong>Security Tools & Monitoring:</strong></p><ul><li>Work with SIEM and endpoint protection tools, including <strong>Microsoft Defender</strong>, <strong>Microsoft Sentinel</strong>, and <strong>Arctic Wolf</strong>.</li><li>Monitor alerts and assist in optimizing security tool configurations for better detection and prevention.</li></ul><p><strong>Collaboration & Compliance:</strong></p><ul><li>Support compliance initiatives and coordinate with other business units as needed.</li><li>Participate in internal and external audits/risk assessments.</li></ul><p><strong>Apply now, call 319-362-8606, or email your resume direct to: Shawn M Troy - Technology Practice Director with Robert Half (email information is on LinkedIn). </strong></p>
<p>Seeking an IT Manager to oversee all technology operations within a manufacturing environment, ensuring systems are secure, efficient, and aligned with business objectives. This role involves managing IT infrastructure, supporting production systems, and delivering reliable technology solutions that optimize manufacturing processes. A key responsibility is the administration and optimization of the company’s ERP system, ensuring seamless integration with manufacturing and business operations.</p>
We are looking for an experienced Information Technology Administrator to join our team in Cibolo, Texas. In this role, you will oversee the management and optimization of IT systems, ensuring the infrastructure operates smoothly and securely. This position requires a proactive individual capable of addressing complex technical challenges while driving continuous improvement in system performance.<br><br>Responsibilities:<br>• Manage and maintain IT infrastructure, including servers, networks, and storage systems, to ensure optimal performance and security.<br>• Configure, monitor, and troubleshoot firewalls, VMware, and Veeam Backup solutions to protect and recover critical data.<br>• Administer Active Directory and Microsoft Windows Server environments, ensuring efficient user management and resource allocation.<br>• Support and maintain Citrix Technologies for seamless remote access and virtualization solutions.<br>• Conduct regular system updates, patch management, and performance monitoring to minimize downtime and vulnerabilities.<br>• Implement and manage Cisco networking solutions, including VLANs, WiFi controllers, and Fortinet firewalls.<br>• Collaborate with teams to identify IT requirements and translate them into effective technical solutions.<br>• Develop and enforce IT policies and procedures to maintain compliance and security standards.<br>• Provide technical support and training to users, troubleshooting hardware and software issues promptly.<br>• Evaluate emerging technologies to recommend upgrades or improvements that align with organizational goals.
<p>We are looking for an experienced Cybersecurity Leader to lead and strengthen our organization's security initiatives in New Haven County, Connecticut. This role involves overseeing cybersecurity strategies, managing risk assessments, and ensuring compliance with regulatory standards. The ideal candidate will bring innovative approaches to safeguarding digital assets, while fostering collaboration with internal teams and external stakeholders.</p><p><br></p><p>Responsibilities:</p><p>• Lead the implementation of cybersecurity initiatives, coordinating with internal teams and external vendors to ensure resilience and regular testing.</p><p>• Conduct audits and evaluations of cybersecurity systems, managing project planning, documentation, and annual budgeting.</p><p>• Stay updated on emerging security threats, technologies, and industry best practices to maintain a robust defense strategy.</p><p>• Develop and enforce security policies, procedures, and controls to protect networks, systems, and sensitive data.</p><p>• Perform risk assessments, vulnerability scans, and penetration tests to identify and mitigate potential threats.</p><p>• Design and execute incident response plans, monitoring security logs and ensuring rapid recovery from cyber incidents.</p><p>• Investigate security breaches and incidents, collaborating with vendors and teams to improve security measures.</p><p>• Ensure compliance with regulatory standards and government policies related to cybersecurity.</p><p>• Create and manage a security awareness program to educate employees and stakeholders on best practices.</p><p>• Assess and monitor the security practices of third-party vendors and partners to safeguard organizational systems.</p>
<p>We are seeking a skilled <strong>Network Security Administrator</strong> to manage and secure our network infrastructure. The ideal candidate will have hands-on experience with <strong>Cisco Meraki</strong> and <strong>FortiGate firewalls</strong>, ensuring optimal performance, security, and compliance across all network systems.</p><p>W<strong>Key Responsibilities:</strong></p><ul><li>Design, implement, and maintain secure network solutions using <strong>Cisco Meraki</strong> and <strong>FortiGate firewalls</strong>.</li><li>Monitor network performance and security, proactively identifying and resolving issues.</li><li>Configure and manage VPNs, VLANs, and firewall policies to support business needs.</li><li>Perform regular security audits, vulnerability assessments, and patch management.</li><li>Collaborate with IT teams to troubleshoot connectivity and security-related incidents.</li><li>Maintain documentation of network configurations, policies, and procedures.</li><li>Ensure compliance with industry standards and organizational security policies.</li></ul>
<p>We are looking for a dedicated IT Manager to oversee and enhance our organization's technology infrastructure. This Contract to permanent position is ideal for a proactive and detail-oriented individual who excels in both independent work and collaborative settings. </p><p><br></p><p>Responsibilities:</p><p>• Administer and maintain IT systems and network infrastructure to support business operations.</p><p>• Manage and integrate data within enterprise systems, including DelmiaWorks with an Oracle backend.</p><p>• Serve as a liaison between teams to address technical challenges and ensure smooth communication.</p><p>• Provide technical support and guidance to end users regarding IT systems and data processes.</p><p>• Implement strategies to enhance system reliability, security, and performance.</p><p>• Analyze and resolve system-related issues while maintaining operational efficiency.</p><p>• Collaborate on system upgrades and configurations to meet organizational needs.</p><p>• Maintain documentation on IT processes, configurations, and system changes.</p><p>• Utilize backup technologies to ensure data protection and recovery.</p><p>• Travel occasionally to provide on-site IT support and oversee system implementations.</p>
<p><strong>Systems Administrator</strong></p><p>The Systems Administrator maintains and administers computer networks and equipment to ensure optimal performance in and fast recovery from emergency situations. The incumbent ensures effective provisioning, installation, configuration, operation, and maintenance of systems hardware and software, and related infrastructure.</p><p><strong>Responsibilities:</strong></p><ul><li>Install, configure, and maintain servers, network equipment, and other technology infrastructure.</li><li>Monitor system performance, identify and troubleshoot issues, and ensure system uptime and reliability.</li><li>Manage user accounts, permissions, and access controls to maintain security.</li><li>Implement and oversee data backup, restore, and disaster recovery processes.</li><li>Apply operating system and software updates, patches, and security configurations.</li><li>Collaborate with IT and business teams to support technology initiatives and deploy new solutions.</li><li>Maintain documentation for system configurations, procedures, and troubleshooting guidelines.</li><li>Respond promptly to technical support requests and resolve user issues in a timely manner.</li><li>Enforce cybersecurity best practices and participate in security incident response.</li></ul><p><br></p>
<p>We are looking for an experienced Information Security Consultant to join our team on a long-term contract basis. In this role, you will focus on enhancing cyber and information security practices, proactively identifying risks, and implementing solutions to ensure the safety and integrity of organizational systems and data. Collaborating with cross-functional teams, you will contribute to the development and execution of strategic security initiatives that align with business objectives. This position is based in Sun Prairie, Wisconsin, with flexibility for remote work.</p><p><br></p><p>Responsibilities:</p><p>AZURE</p><p><br></p><p>• Lead the creation and execution of robust cybersecurity strategies by collaborating with stakeholders to assess and mitigate risks across the organization.</p><p>• Develop and refine security policies, standards, and procedures to improve risk management and organizational resilience.</p><p>• Ensure security frameworks align with business and technology strategies to deliver scalable and cohesive solutions.</p><p>• Evaluate and embed security requirements throughout the software development lifecycle to enhance protection.</p><p>• Define and maintain security protocols for software development, balancing functionality with cybersecurity best practices.</p><p>• Partner with Cyber Security Architecture teams to design security components that address risks in applications and cloud infrastructures.</p><p>• Conduct in-depth system security assessments and vulnerability analyses to identify threats and integration challenges.</p><p>• Build strong relationships across teams to address root-cause issues and implement solutions that reduce risks.</p><p>• Advocate for security best practices during architecture reviews and project planning to ensure proactive risk management.</p><p>• Provide leadership and guidance on security initiatives across both application-level and cloud projects.</p>
<p><strong>Systems Administrator</strong></p><p>The Systems Administrator maintains and administers computer networks and equipment to ensure optimal performance in and fast recovery from emergency situations. The incumbent ensures effective provisioning, installation, configuration, operation, and maintenance of systems hardware and software, and related infrastructure.</p><p><strong>Responsibilities:</strong></p><ul><li>Install, configure, and maintain servers, network equipment, and other technology infrastructure.</li><li>Monitor system performance, identify and troubleshoot issues, and ensure system uptime and reliability.</li><li>Manage user accounts, permissions, and access controls to maintain security.</li><li>Implement and oversee data backup, restore, and disaster recovery processes.</li><li>Apply operating system and software updates, patches, and security configurations.</li><li>Collaborate with IT and business teams to support technology initiatives and deploy new solutions.</li><li>Maintain documentation for system configurations, procedures, and troubleshooting guidelines.</li></ul><p><br></p>