Senior Information Security Specialist jobs in United States
cer-icon
Apply on Employer Site
company-logo

ISYS Solutions, Inc. · 2 months ago

Senior Information Security Specialist

I2X Technologies is a reputable technology services company to the Federal Government, engaged in programs across the country. They are seeking a Senior Information Security Specialist to support their customer’s operations in Washington, DC, focusing on IT staffing and consulting services.

AssociationCommunitiesMedical
check
Comp. & Benefits
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Administer and maintain intrusion detection/prevention systems (IDS/IPS), SIEM platforms, and firewalls for both on-premises and cloud environments, including authoring custom detection content
Monitor real-time network activity, analyze logs and metadata, and investigate anomalies to confirm and respond to intrusion attempts across hybrid infrastructures
Perform full-scope digital forensics and incident response (DFIR), covering all phases from scoping and containment to recovery and lessons learned
Design and maintain secure network architectures and data loss prevention (DLP) solutions to safeguard sensitive data in cloud and on-premises systems
Execute comprehensive security assessments, including penetration testing, ethical hacking, and static/dynamic code analysis, to uncover and address vulnerabilities
Demonstrate deep technical understanding of network protocols, system hardening, encryption, identity and access management (IAM), and application security
Conduct risk assessments, security gap analyses, and develop actionable mitigation strategies in alignment with NIST, OMB M-22-09, and other federal cybersecurity standards
Deploy and support identity, credential, and access management (ICAM) solutions, including multifactor authentication and identity governance frameworks for federal environments
Lead compliance efforts, including control assessments under NIST 800-53, POA&M management, and executive reporting on security posture and residual risk
Collaborate with stakeholders to build consensus on vulnerability management, prioritize remediation, and ensure alignment with agile development and zero trust initiatives

Qualification

Intrusion Detection SystemsSecurity InformationEvent ManagementData Loss PreventionIdentityAccess ManagementPenetration TestingDigital ForensicsRisk AssessmentVulnerability ManagementCloud SecurityAgile DevelopmentTechnical DocumentationCollaborationCommunication SkillsProblem SolvingTeam Leadership

Required

US Citizenship
5-10 years of experience in administering and maintaining intrusion detection, prevention, and analysis platforms, including SIEMs, host-based systems, and firewalls, while authoring and implementing custom detection logic
5-10 years of experience in monitoring real-time network activity and analyzing raw data, metadata, and logs to identify, investigating, and responding to anomalies and cybersecurity incidents across on-premises and cloud environments
5-10 years of experience in implementing and maintaining data loss prevention (DLP) capabilities for safeguarding sensitive information in both local and cloud-based systems
5-10 years of experience in designing, supporting, and managing security infrastructure, including upgrading toolsets, applying patches, and configuring settings to align with organizational security goals and zero trust architecture
5-10 years of experience in conducting comprehensive security testing—including ethical hacking, static/dynamic code reviews, and system architecture assessments—for evaluating controls and identifying vulnerabilities
5-10 years of experience in analyzing security data to identify risks, assessing system vulnerabilities, and developing mitigation strategies aligned with federal standards and best practices
5-10 years of experience in leading and supporting vulnerability management efforts, including executing scans, evaluating risk, tracking compliance with BOD 22-01, and generating reports to guide remediation efforts
5-10 years of experience in collaborating with stakeholders for conducting gap analyses, prioritizing vulnerabilities, and developing actionable remediation plans for enterprise systems and networks
5-10 years of experience in deploying and managing enterprise-wide Identity, Credential, and Access Management (ICAM) solutions, supporting MFA, privileged access management, and identity lifecycle governance in compliance with OMB and NIST guidance
5-10 years of experience in developing technical and executive-level documentation, reports, and presentations for communicating findings, readiness status, and recommendations for improving cybersecurity posture
A Bachelor's degree from an accredited college or university

Preferred

Certified Incident Handler (GCIH)
GIAC Network Forensic Analyst (GNFA)
GIAC Certified Forensic Analyst (GCFA)
Information Systems Security Engineering (ISSE)
Certified Cloud Security Engineer (CCSE)
Offensive Security Certified Professional (OSCP)
GIAC Penetration Tester (GPEN)
Certified Information Systems Security Professional (CISSP)
GIAC Enterprise Vulnerability Assessor (GEVA)
Certified Analytics Professional (CAP)

Company

ISYS Solutions, Inc.

twittertwittertwitter
company-logo
ISYS provides “Best in Class” medical case management to the worker’s compensation industry's claims professionals.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Alysha Loumakis-Calderon, B
President & CEO
linkedin
leader-logo
Chris Loumakis
Founder & Chairman
linkedin
Company data provided by crunchbase