OMNISOURCE
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

  • HOME
  • LOGIN
  • CAPABILITIES
  • TRAINING
  • CERTIFICATIONS
  • CMMC
  • PORTAL
  • CURRENT OPENINGS
  • CONTACT US
  • More
    • HOME
    • LOGIN
    • CAPABILITIES
    • TRAINING
    • CERTIFICATIONS
    • CMMC
    • PORTAL
    • CURRENT OPENINGS
    • CONTACT US
OMNISOURCE

Signed in as:

filler@godaddy.com

  • HOME
  • LOGIN
  • CAPABILITIES
  • TRAINING
  • CERTIFICATIONS
  • CMMC
  • PORTAL
  • CURRENT OPENINGS
  • CONTACT US

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

JOIN OUR TEAM OF EXPERTS

OMNISOURCE | Welcomes qualified applicants to submit their resumes for consideration to work in the areas of IT Systems Strategic Planning, Project Management and Auditing & Assessment, Governance, Risk & Compliance, and Cybersecurity.   


Security Clearance / Criminal Background Check 

A. A Contractor shall obtain at its own expense a Criminal Justice Information

System (CJIS) State and Federal criminal background check, including fingerprinting, for

each Contractor Personnel performing services under a TO Agreement. This check may

be performed by a public or private entity. A successful CJIS State criminal background

check shall be completed prior to any Contractor employee providing services onsite at any location covered by the TO Agreement. A CJIS Federal background check is

necessary for each employee assigned to work on the TO Agreement.


B. The Master Contractor shall provide certification to the agency that the Master

Contractor has completed the required CJIS criminal background checks described in this

TO Agreement and that the Master Contractor’s employees assigned to this TO

Agreement have successfully passed this check. The State reserves the right to refuse

any individual employee to work on State premises, based upon certain specified criminal

convictions, as specified by the State.


C. The CJIS criminal record check of each Contractor Personnel who will work on State

premises shall be reviewed by the Master Contractor for convictions of any of the

following crimes described in the Annotated Code of Maryland, Criminal Law Article:

(a) §§ 6-101 through 6-104, 6-201 through 6-205, 6-409 (various crimes against

property);

(b) any crime within Title 7, Subtitle 1 (various crimes involving theft);

(c) §§ 7-301 through 7-303, 7-313 through 7-317 (various crimes involving

telecommunications and electronics);

(d) §§ 8-201 through 8-302, 8-501 through 8-523 (various crimes involving fraud);

(e) §§9-101 through 9-417, 9-601 through 9-604, 9-701 through 9-706.1 (various

crimes against public administration); or

(f) a crime of violence as defined in CL § 14-101(a).


D. Contractor Personnel of the Master Contractor who has been convicted of a felony or of a

crime involving telecommunications and electronics from the above list of crimes shall

not be permitted to work on State premises pursuant to this Master Contract; Contractor

Personnel of the Master Contractor who has been convicted within the past five (5) years

of a misdemeanor from the above list of crimes shall not be permitted to work on State

premises.


E. A particular on-site agency location may require more restrictive conditions regarding the

nature of prior criminal convictions that would result in Contractor Personnel of the

Master Contractor not being permitted to work on that agency’s premises. Upon receipt

of an agency’s location more restrictive conditions regarding criminal convictions, the

Master Contractor shall provide an updated certification to that agency regarding the

Contractor Personnel working at or assigned to that agency’s premises.


If you are interested in joining a highly motivated Team, excelling in an exciting and challenging environment while receiving industry competitive benefits and recognition. Please inquire about our current openings below:


I. IT Security Consultant (4)- REMOTE

· Consult and support the IT function regarding IT process, security management and governance standards

· Initiate and facilitate the delivery of assurance by suppliers

· Coordinate process and security assurance and compliance activities

· Execute IT process and security maturity audits


II. Information Security Analyst (4) - REMOTE

· Testing and analyzing assets for potential security threats.

· Identifying possible security threats and determining the best security measures.

· Designing, implementing, and maintaining security protocols, policies, plans, and systems to cover all possible security threats.

· Coordinating and briefing a team of security specialists and assigning tasks


III. Security Administrator (2) - REMOTE

  • Create security requirements within your network
  • Run security audits and create a list of policy recommendations
  • Provide training and guidance to colleagues on strategies and policies
  • Protect the system against illegal access or alterations
  • Supervise the system for any suspicious activity or traffic
  • Create a plan for recovery and how to continue with production


IV. Cryptographer (0)- Filled

  • Guarantee financial data is protected and only available to authorized account holders
  • Create security systems that guard against any exposures
  • Ensure that all critical information is protected from being edited, copied or deleted
  • Analyze data to solve any security issues using mathematical and/or statistical codes
  • Test systems for any vulnerabilities and ensure they are accurate and reliable
  • Aid in solving and security issues for the government or businesses
  • Keep up to date with current research and strategies for coding and applications


V. Security Specialist (3) - REMOTE

  • Keep up to date with security updates and improvements
  • Monitor the security administrations
  • Protect the system against damage, changes or illegal access
  • Ensure accurate security tools are running properly, including anti-virus software and firewalls
  • Implement training to colleagues
  • Develop system-specialized security requirements


VI. Incident Responder (3)

  • Recognize any errors or possible vulnerabilities in the network or system
  • Develop a system of procedures on how to handle an emergency
  • Effectively oversee systems and applications for any suspicious activity
  • Collaborate with other cyber security team members
  • Run penetration tests, risk analysis and security audits
  • Develop a system for the communication trail that needs to take place during an emergency, and how to relay necessary information to law enforcement
  • Provide well-composed incident reports to proper management team members


VII. Vulnerability Assessor (6)- REMOTE

  • Test for vulnerability by creating and testing custom scripts and applications
  • On a preset basis, oversee and run security audits and scans
  • Recognize any vital defects in systems that could allow access to cyber invaders
  • Eliminate laborious tasks in finding vulnerabilities by using preset tools, like Nessus
  • Compose and describe a vulnerability assessment
  • Use creative and hands on strategies to produce false vulnerabilities and discrepancies
  • Implement a vulnerability assessment database
  • For metric reasons, keep up with any system vulnerabilities over a period of time


VIII. Security Control Assessor (3)- REMOTE

  • Lead, Train & Instruct Vulnerability Assessment Team, Test for vulnerability by creating and testing custom scripts and applications
  • On a preset basis, oversee and run security audits and scans
  • Recognize any vital defects in systems that could allow access to cyber invaders
  • Eliminate laborious tasks in finding vulnerabilities by using preset tools, like Nessus
  • Compose and describe a vulnerability assessment
  • Use creative and hands on strategies to produce false vulnerabilities and discrepancies
  • Implement a vulnerability assessment database
  • For metric reasons, keep up with any system vulnerabilities over a period of time
  • Lead instruction and training for system administrators


Preferred  Professional Background:

DoD Approved 8570 Baseline Certification (Any IAT/IAM Level II certification or higher)

3+ years of experience with a Bachelor’s degree in a cybersecurity-related role or fitting experience: series/technology careers in Information Technology.


2+ years of post-secondary education experience or USASMA certified small group leader or 8 identifier serving 56 months or more in Military/ MOS fitting the experience listed above.


OMNISOURCE will consider candidates who do not meet the above criteria, certifications and/or professional requirements pending a panel interview, an agreement to attend OMNISOURCE training, and obtaining an IAT Level II or III certification within 3 months of becoming an employee of OMNISOURCE.


Minimum Education and Years of Experience:

  • Associate degree in IT related field or Relevant Experience
  • Experience using NIST (RMF)
  • 3 years of project management experience delivering various IT solutions within budget in an enterprise setting
  • 3 years of experience in a technical environment with a variety of IT systems
  • 3 years of experience leading the execution of IT projects in a Project Manager, Task Manager, or Coordinator role


Minimum Required Skills:

  • Broad knowledge of information technology systems
  • Exceptional ability to communicate technical decisions/issues to different stakeholders
  • Strong organizational skills including attention to detail and multi-tasking skills
  • Leadership skills to successfully manage diverse teams


Minimum Desired Skills/Certifications:

  • Master’s Degree in a related field
  • PMP certification 
  • CISM certification
  • CISSP Certification
  • CLOUD Certification
  • CAP certification
  • Agile Training/Knowledge
  • Technical background in Systems Engineer, IT Operations, and/or Windows and SQL environment


Additional Minimum Requirements:                                                  

  • Active Public Trust Clearance


Please submit your inquiry and resume to info@omnisource.info


OMNISOURCE| is proud to be an equal-opportunity employer. Per applicable law, Omnisource does not discriminate in hiring or otherwise in employment based on race, color, religion, sex, national origin, age, marital or Veteran status, disability, sexual orientation, or any other legally protected status.

  • SECURITY CATEGORIZATION
  • INFORMATION TYPES
  • SECURITY REQUIRMENTS
  • SECURITY CONTROLS
  • SECURITY ASSESSMENT

Copyright © 2025 Omnisource Consulting, Inc. - All Rights Reserved.