OMNISOURCE welcomes qualified applicants to submit their resumes for consideration to work in the areas of IT systems strategic planning and Auditing & Assessment, Governance, Risk & Compliance, Cyber Security.
If you are interested in joining a highly motivated Team, excelling in an exciting and challenging environment, while receiving industry competitive benefits and recognition. Please inquire about our current openings below:
I. Chief Information Security Officer (1)- REMOTE- Filled
- Security operations: Real-time analysis of immediate threats, and triage when something goes wrong
- Cyber risk and cyber intelligence: Keeping abreast of developing security threats, and helping the board understand potential security problems that might arise from acquisitions or other big business moves
- Data loss and fraud prevention: Making sure internal staff doesn't misuse or steal data
- Security architecture: Planning, buying, and rolling out security hardware and software, and making sure IT and network infrastructure is designed with best security practices in mind
- Identity and access management: Ensuring that only authorized people have access to restricted data and systems
- Program management: Keeping ahead of security needs by implementing programs or projects that mitigate risks—regular system patches, for instance
- Investigations and forensics: Determining what went wrong in a breach, dealing with those responsible if they're internal, and planning to avoid repeats of the same crisis
- Governance: Making sure all of the above initiatives run smoothly and get the funding they need—and that corporate leadership understands their importance
II. IT Security Consultant (1)- REMOTE
· Consult and support the IT function regarding IT process, security management and governance standards
· Initiate and facilitate the delivery of assurance by suppliers
· Coordinate process and security assurance and compliance activities
· Execute IT process and security maturity audits
III. Information Security Analyst (4) - REMOTE
· Testing and analyzing assets for potential security threats.
· Identifying possible security threats and determining the best security measures.
· Designing, implementing, and maintaining security protocols, policies, plans, and systems to cover all possible security threats.
· Coordinating and briefing a team of security specialists and assigning tasks
IV. Administrator (1)- REMOTE
· Answers the telephone and provides exceptional customer service to internal and external customers.
· Drafts reports and correspondence.
· Orders supplies and equipment; maintains service contracts on office equipment.
· Attends meetings and takes meeting notes.
· Liaises with internal and external units to carryout job tasks.
V. Security Administrator (2) - REMOTE
- Create security requirements within your network
- Run security audits and create a list of policy recommendations
- Provide training and guidance to colleagues on strategies and policies
- Protect the system against illegal access or alterations
- Supervise the system for any suspicious activity or traffic
- Create a plan for recovery and how to continue with production
VI. Cryptographer (2)- REMOTE
- Guarantee financial data is protected and only available to authorized account holders
- Create security systems that guard against any exposures
- Ensure that all critical information is protected from being edited, copied or deleted
- Analyze data to solve any security issues using mathematical and/or statistical codes
- Test systems for any vulnerabilities and ensure they are accurate and reliable
- Aid in solving and security issues for the government or businesses
- Keep up to date with current research and strategies for coding and applications
VII. Security Specialist (2) - REMOTE
- Keep up to date with security updates and improvements
- Monitor the security administrations
- Protect the system against damage, changes or illegal access
- Ensure accurate security tools are running properly, including anti-virus software and firewalls
- Implement training to colleagues
- Develop system specialized security requirements
VIII. Incident Responder (2)
- Recognize any errors or possible vulnerabilities in the network or system
- Develop a system of procedures on how to handle an emergency
- Effectively oversee systems and applications for any suspicious activity
- Collaborate with other cyber security team members
- Run penetration tests, risk analysis and security audits
- Develop a system for the communication trail that needs to take place during an emergency, and how to relay necessary information to law enforcement
- Provide well-composed incident reports to proper management team members
IX. Cyber Security Instructor (4)- REMOTE
- Analyze customer requirements, available training methods and material, and facilities to deliver the required curriculum for classroom instruction.
- Provide classroom instruction that teaches assigned students in the manner described in the course textbooks and materials.
- Manage the instructional content for the assigned topic area.
- Develop and deliver new content and make recommendations for revisions of existing topic area content that is covered by this contract
- Conduct practical exercises in a laboratory environment, conduct student study hall periods and provide tutoring/remedial instruction.
X. Vulnerability Assessor (10)- REMOTE
- Test for vulnerability by creating and testing custom scripts and applications
- On a preset basis, oversee and run security audits and scans
- Recognize any vital defects in systems that could allow access to cyber invaders
- Eliminate laborious tasks in finding vulnerabilities by using preset tools, like Nessus
- Compose and describe a vulnerability assessment
- Use creative and hands on strategies to produce false vulnerabilities and discrepancies
- Implement a vulnerability assessment database
- For metric reasons, keep up with any system vulnerabilities over a period of time
XI. Security Control Assessor (11)- REMOTE
- Lead, Train & Instruct Vulnerability Assessment Team, Test for vulnerability by creating and testing custom scripts and applications
- On a preset basis, oversee and run security audits and scans
- Recognize any vital defects in systems that could allow access to cyber invaders
- Eliminate laborious tasks in finding vulnerabilities by using preset tools, like Nessus
- Compose and describe a vulnerability assessment
- Use creative and hands on strategies to produce false vulnerabilities and discrepancies
- Implement a vulnerability assessment database
- For metric reasons, keep up with any system vulnerabilities over a period of time
- Lead instruction and training for system administrators
Preferred Professional Background:
DoD Approved 8570 Baseline Certification (Any IAT/IAM Level 1 certification or higher)
3+ years of experience with a Bachelor’s degree in a cybersecurity related role or fitting experience: series/technology careers in the Information Technology
2+ years of post-secondary education experience or USASMA certified small group leader or 8 identifier serving 56 months or more in Military/ MOS fitting the experience listed above.
OMNISOURCE will consider candidates who do not meet the above criteria , certifications and/or professional requirements pending a panel interview, and agreement to attend OMNISOURCE training, and obtaining an IAT Level II or III certification within 3 months of becoming a employee of OMNISOURCE.
Minimum Education and Years of Experience:
- Associates Degree in IT related field or Relevant Experience
- Experience using NIST (RMF)
- 1-3 years of project management experience delivering various IT solutions within budget in an enterprise setting
- 1-3 years of experience in a technical environment with a variety of IT systems
- 1-3 years of experience leading the execution of IT projects in a Project Manager, Task Manager, or Coordinator role
Minimum Required Skills:
- Broad knowledge of information technology systems
- Exceptional ability to communicate technical decisions/issues to different stakeholders
- Strong organizational skills including attention to detail and multi-tasking skills
- Leadership skills to successfully manage diverse teams
Minimum Desired Skills/Certifications:
- Master’s Degree in a related field
- PMP certification
- CISM certification
- CISSP Certification
- CLOUD Certification
- CAP certification
- Agile Training/Knowledge
- Technical background in Systems Engineer, IT Operations, and/or Windows and SQL environment
Additional Requirements:
- Active Public Trust clearance
Please submit your inquiry and resume to info@omnisource.info
OMNISOURCE is proud to be an equal opportunity employer. In accordance with applicable law, does not discriminate in hiring or otherwise in employment on the basis of race, color, religion, sex, national origin, age, marital or Veteran status, disability, sexual orientation, or any other legally protected status.