Stack Cybersecurity Jobs in Usa

1,310 positions found — Page 5

Cyber Security Analyst (Rif. 2025-127)
Salary not disclosed
Grand Rapids, MI 2 days ago

aizoOn, a technology consulting company, is looking for Cybersecurity Analyst.


AIZOON USA is expanding its Cybersecurity Division and seeks skilled Cybersecurity Analysts to operate and manage cyber security platforms. In this critical role, you'll be responsible for security threat monitoring, incident response, risk assessment, and client advisory services.


Key Responsibilities:


  • Operate cybersecurity monitoring platforms and conduct threat analysis
  • Respond to security incidents with defined escalation procedures
  • Conduct risk assessments and support compliance regulatory standards
  • Provide client support and continuous cybersecurity advisory services


Qualifications:


  • Experience with SOC operations, incident response, and threat intelligence
  • Familiarity with cybersecurity frameworks (NIST, ISO27001)
  • Strong analytical and problem-solving skills


aizoOn is an equal opportunity employer.

Not Specified
Security Control Assessor, Mid
Salary not disclosed
Fort Meade, MD 3 days ago
About Us

AGE Solutions is a premier technology and professional services company, providing in-depth consulting, advanced technology solutions, and essential services throughout the U.S. government, defense, and intelligence sectors. Prioritizing innovation and client-focused solutions, we assist major agencies in addressing intricate issues and ensuring a more secure future.

AGE Solutions is looking for a Security Control Assessor, Mid to join our team in support of a cybersecurity risk management and assessment program with our DoD customer.


Responsibilities:



  • Conduct cybersecurity assessments, audits, and inspections for DoD organizations and partners handling DoD information or connecting to the DoDIN.
  • Evaluate systems and Defensive Cyberspace Operations using cyber threat emulation and performance-based testing.
  • Adhere to policies and processes for each assessment type.
  • Support assessment development and execution to ensure security expertise is properly applied.
  • Coordinate logistics, test plans, and scope with the SCA Team Lead.
  • Perform vulnerability assessments, capture results using STIG Viewer or designated tools, and document findings in eMASS.
  • Analyze security gaps and provide mitigation recommendations.
  • Validate cybersecurity controls, TTPs, STIGs, RMF controls, and compliance with DoD policies and guidelines.
  • Provide risk analysis and assessment results for authorization recommendations.
  • Participate in daily assessment reviews, in-briefs, and out-briefs, sharing findings with the SCA-R.

Requirements:



  • Education:

    • Bachelor's degree (IT-related field preferred)


  • Experience:

    • Five (5) years of overall experience in cybersecurity or network security position
    • Three (3) years of experience in a Certification and Accreditation/A&A role


  • Clearance:

    • Must have and maintain an active DoD Top Secret clearance with SCI eligibility


  • Certifications:

    • DoD 8570 IA Technical (IAT) Level II certification


  • Skills and Knowledge:

    • Demonstrated experience with STIGs (Security Technical Implementation Guides), Security Requirement Guides (SRGs), Plan of Action and Milestones (POA&Ms) and cybersecurity best practices
    • Strong understanding of the RMF process, NIST SP 800- 37, NIST SP 800-53, CNSSI 1253
    • Demonstrated experience with relevant tools such as eMASS, STIG Viewer, Nessus, ACAS, SCAP, or HBSS
    • Demonstratable understanding of key technologies areas/domain such as: Network, Mobility, Windows, UNIX, Cloud Environments and Cloud Native Tools/Services, Host Based Security System (HBSS)/Endpoint Security Solutions (ESS), Databases, Applications
    • Strong written and verbal communication skills for reporting assessment findings.


  • Location:

    • This is a remote position requiring extensive travel (approximately 85%), inside and outside the continental United States and internationally (CONUS / OCONUS).
    • Candidates must have a valid US Passport, or the ability to obtain one quickly.



Compensation: $70,000+

At AGE Solutions, we reward performance, invest in growth, and share success. Our benefits support the whole person, professionally, financially, and personally.



  • 26 Days Paid Leave: Includes vacation, sick, personal time, and holidays. You choose how to use it.
  • Performance Bonuses: Performance bonuses are awarded based on individual contributions and company-wide results, aligning recognition with impact.
  • 401(k) with Match: We match 3% of your contributions with immediate vesting.
  • Financial Protection: Company-paid life insurance up to $300K and options for additional coverage for you and your dependents.
  • Health Benefits: Multiple medical plans, dental, vision, FSA and HSA options to fit your needs.
  • Parental Leave: 15 days of fully paid leave for new parents, because family matters.
  • Military Differential Pay: We bridge the gap for employees on active duty, so they don't take a financial hit while serving.
  • Professional Growth: Paid training and certifications, tuition reimbursement, and the tools and tech to get the job done right.
  • Shared Success: In the event of a company sale, our CEO has committed to returning 80% of net proceeds to employees. This ensures our team shares in the long term value they help create.

At AGE, you'll do work that matters, supported by a company that delivers for its people.

Not Specified
Sr. Cross Domain Solutions Support Specialist
🏢 AGE Solutions
Salary not disclosed
Fort Meade, MD 2 days ago
About Us

AGE Solutions is a premier technology and professional services company, providing in-depth consulting, advanced technology solutions, and essential services throughout the U.S. government, defense, and intelligence sectors. Prioritizing innovation and client-focused solutions, we assist major agencies in addressing intricate issues and ensuring a more secure future.

AGE Solutions is looking for a Sr. Cross Domain Solutions Support Specialist to join our team in support of an upcoming cybersecurity risk management and assessment program with our DoD customer. In this position, you will organize and manage DSAWG and CDTAB meetings, including scheduling, logistics, agendas, and minutes. You will also participate in and contribute to weekly, monthly, and quarterly working groups, boards, and panels to include CDTAB, DSAWG, Information Domain, and IRSMC board meetings.


Individuals in this role must be available to work on-site at Ft. Meade, MD for the majority of the workweek.


Responsibilities Include:



  • Coordinate with DISA stakeholders, ISSMs, and PMs to resolve non-compliance issues identified in the Cybersecurity Scorecard.
  • Keep DISA senior leadership and cybersecurity stakeholders informed of all Cybersecurity Scorecard non-compliance findings.
  • Serve as the primary briefer for CDS requests, tickets, ad-hoc meetings, and annual reviews at CDTAB, DSAWG, Information Domain, and IRSMC boards.
  • Apply broad technical expertise in cybersecurity, networking, system architecture, cross-domain technologies, DMZ design, and controlled interfaces.
  • Participate in and contribute to weekly, monthly, and quarterly working groups, boards, and panels.
  • Support the CDTAB Chair and Secretariat on CDS-related issues and actions.
  • Implement CDTAB strategic goals including policy planning, risk analysis, and vulnerability assessments.
  • Identify and propose issues requiring CDTAB risk decisions and organize topics for monthly meetings.
  • Execute DSAWG strategic goals and conduct risk and vulnerability assessments for related initiatives.
  • Maintain DSAWG and CDTAB online platforms, ensuring access to briefings, policies, references, tracking tools, and contact directories.
  • Notify the CDTAB community of all CDS tickets and requests pending review.
  • Organize and manage DSAWG and CDTAB meetings, including scheduling, logistics, agendas, and minutes.
  • Communicate deadlines for submission of agendas, briefs, and discussion topics.
  • Draft, proof, and distribute meeting materials to DSAWG and CDTAB members in advance.
  • Maintain standardized briefing templates and formats for both forums.
  • Record and publish all meeting minutes, decisions, briefings, and supporting documents.
  • Keep updated contact lists and email distribution groups for members and advisors.
  • Develop monthly status reports (MSRs) for CDTAB and DSAWG.
  • Prepare up to 10 SOPs or internal documents annually.
  • Create up to 5 technical papers per year on DSAWG-related issues for coordination with DoD/IC stakeholders.
  • Produce up to 12 white papers, CONOPS, and contingency plans annually to support RE4 functions.
  • Manage monthly ballots for CDTAB and DSAWG, averaging 20 CDS requests, 20 tickets, 10-20 briefings, and 15 annual reviews-volume may vary monthly.

Requirements:



  • Bachelor's degree (IT-related field preferred)
  • Six (6) or more years leading Risk Management teams
  • Five (5) or more years IT program management experience leading audits and inspections in DoD/Federal environment
  • Have an active DoD Top Secret clearance with SCI eligibility
  • DoD 8570 IAM or IAT Level III certification
  • Functional area expertise in National and DoD IT policy
  • Expert level knowledge and experience as a technical expert providing technical direction, interpretation, and alternatives in areas such as but not limited to; Information Systems Architecture, Telecommunications Systems Design, Architecture, Implementation, Information Systems Integration, Software Development Methodologies, Security Engineering, Communications and Network Systems Management.
  • Expert level knowledge in guiding the successful completion of major programs and may function in a project leadership role Proven ability to prepare and present technical documentation, strategic briefings, and governance materials for senior-level DoD boards (e.g., CDTAB, DSAWG, IRSMC)
  • Excellent technical writing and communication skills with the ability to convey complex information clearly to technical and non-technical audiences
  • Customer service skills

Compensation: $120,000+

At AGE Solutions, we reward performance, invest in growth, and share success. Our benefits support the whole person, professionally, financially, and personally.



  • 26 Days Paid Leave: Includes vacation, sick, personal time, and holidays. You choose how to use it.
  • Performance Bonuses: Performance bonuses are awarded based on individual contributions and company-wide results, aligning recognition with impact.
  • 401(k) with Match: We match 3% of your contributions with immediate vesting.
  • Financial Protection: Company-paid life insurance up to $300K and options for additional coverage for you and your dependents.
  • Health Benefits: Multiple medical plans, dental, vision, FSA and HSA options to fit your needs.
  • Parental Leave: 15 days of fully paid leave for new parents, because family matters.
  • Military Differential Pay: We bridge the gap for employees on active duty, so they don't take a financial hit while serving.
  • Professional Growth: Paid training and certifications, tuition reimbursement, and the tools and tech to get the job done right.
  • Shared Success: In the event of a company sale, our CEO has committed to returning 80% of net proceeds to employees. This ensures our team shares in the long term value they help create.

At AGE, you'll do work that matters, supported by a company that delivers for its people.

Not Specified
Cyber Cloud Assessment Engineer, Sr.
🏢 AGE Solutions
Salary not disclosed
Fort Meade, MD 2 days ago
About Us

AGE Solutions is a premier technology and professional services company, providing in-depth consulting, advanced technology solutions, and essential services throughout the U.S. government, defense, and intelligence sectors. Prioritizing innovation and client-focused solutions, we assist major agencies in addressing intricate issues and ensuring a more secure future.

AGE Solutions is looking for a Senior Cyber Cloud Assessment Engineer to join our team in support of an upcoming cybersecurity risk management and assessment program with our DoD customer. As a Team Lead, you will be responsible for performing analysis, conducting independent validations of assessments, and Continuous Monitoring (ConMon) for authorized CSPs and CSOs.


Individuals in this role must be available to work full-time on-site at Ft. Meade, MD.


Responsibilities Include:



  • Conduct cybersecurity assessments and validations of Cloud Service Offerings (CSOs) in support of the Department of Defense (DoD) Provisional Authorization (PA) process.
  • Evaluate Cloud Service Provider (CSP) documentation packages following government guidance and procedures, including key artifacts such as the Cloud Architecture Diagram, System Security Plan (SSP), SSP Addendum, Readiness Assessment Report (RAR), System Architecture, Security Assessment Plan (SAP), Security Assessment Report (SAR), and associated Plans of Action & Milestones (POA&Ms).
  • Review, analyze, and process additional documents including Change Requests, Extension Requests, Deviation Requests, Whitelist Requests, Corrective Action Plans, templates, process guide approvals, and continuous monitoring (ConMon) artifacts for existing Provisional Authorizations.
  • Prepare and deliver up to 30 Cloud Security Assessment Packages annually, each including validated cybersecurity controls, certifier recommendations, and a statement of residual risk.
  • Participate in technical kickoff meetings and review preliminary documentation to assess a CSP's readiness posture.
  • Analyze and provide detailed feedback on CSP submissions such as the RAR, SAP, SSP, and architectural diagrams.
  • Assess and document the operational impact of authorizations, changes, and vulnerabilities on the CSP environment.
  • Develop Cloud Security Assessment Packages in accordance with established guidelines, including the SAR, POA&M, and any Deviation Requests.
  • Draft Authorization Recommendation Memoranda outlining CSO compliance with DoD cybersecurity controls, residual risks, and technical findings.
  • Prepare formal DoD Provisional Authorization memoranda, detailing authorization length, CSO boundary, services provided, operating conditions, DoD usage considerations, and follow-on activities.
  • Validate CSO controls within eMASS or other government-provided Governance, Risk, and Compliance (GRC) tools; ensure accurate tracking in the Mission Status Report (MSR).
  • Review and verify the Customer Responsibility Matrix (CRM), ensuring proper control inheritance is reflected in eMASS/GRC systems.
  • Upload authorization conditions as system-level POA&Ms in eMASS and monitor their resolution.
  • Organize and associate all received documentation with applicable security controls within eMASS.
  • Maintain and update the DoD Cloud Process Guide, including all checklists, templates, forms, and guidance documents.
  • Assist in developing internal requirements and how-to guides for assessors conducting CSP validations.
  • Document and refine assessment procedures and validation best practices to align with DoDI 8510.01 and the DoD Cloud Computing Security Requirements Guide (SRG).
  • Contribute to the ongoing development and annual updates of the DoD Cloud Assessment Process Guides as requested by the Government.

Requirements:



  • Bachelor's degree (IT-related field preferred)
  • Eight (8) years of overall experience in cybersecurity or network security position
  • Have an active DoD Top Secret clearance with SCI eligibility
  • DoD 8570 IAM/IA Technical (IAT) Level III certification
  • Familiarity with security controls for Azure, AWS, and assorted cloud platforms
  • Solid understanding of DoD Risk Management Framework (RMF), DoDI 8510.01, and DoD Cloud Computing Security Requirements Guide (SRG)
  • Familiarity with security controls for Azure, AWS, and assorted cloud platforms
  • Hands-on experience with eMASS or other government-provided GRC tools
  • Familiarity with cloud security documentation, including SSPs, SARs, RARs, and POA&Ms
  • Ability to analyze complex cloud architectures and provide accurate risk assessments
  • Strong technical writing and communication skills to produce security assessment reports and formal recommendations
  • Applicants must reside within a commutable distance of Ft. Meade, MD in order to work onsite full time.

Compensation: $110,000+

At AGE Solutions, we reward performance, invest in growth, and share success. Our benefits support the whole person, professionally, financially, and personally.



  • 26 Days Paid Leave: Includes vacation, sick, personal time, and holidays. You choose how to use it.
  • Performance Bonuses: Performance bonuses are awarded based on individual contributions and company-wide results, aligning recognition with impact.
  • 401(k) with Match: We match 3% of your contributions with immediate vesting.
  • Financial Protection: Company-paid life insurance up to $300K and options for additional coverage for you and your dependents.
  • Health Benefits: Multiple medical plans, dental, vision, FSA and HSA options to fit your needs.
  • Parental Leave: 15 days of fully paid leave for new parents, because family matters.
  • Military Differential Pay: We bridge the gap for employees on active duty, so they don't take a financial hit while serving.
  • Professional Growth: Paid training and certifications, tuition reimbursement, and the tools and tech to get the job done right.
  • Shared Success: In the event of a company sale, our CEO has committed to returning 80% of net proceeds to employees. This ensures our team shares in the long term value they help create.

At AGE, you'll do work that matters, supported by a company that delivers for its people.

Not Specified
Cyber Cloud Assessment Engineer, Mid
🏢 AGE Solutions
Salary not disclosed
Fort Meade, MD 2 days ago
About Us

AGE Solutions is a premier technology and professional services company, providing in-depth consulting, advanced technology solutions, and essential services throughout the U.S. government, defense, and intelligence sectors. Prioritizing innovation and client-focused solutions, we assist major agencies in addressing intricate issues and ensuring a more secure future.

AGE Solutions is looking for a Cyber Cloud Assessment Engineer to join our team in support of a cybersecurity risk management and assessment program with our DoD customer. In this role, you will be part of a team responsible for performing analysis, conducting independent validations of assessments, and Continuous Monitoring (ConMon) for authorized CSPs and CSOs.


Individuals in this role must be available to work full-time on-site at Ft. Meade, MD.


Essential Duties and Responsibilities



  • Conduct cybersecurity assessments and validations of Cloud Service Offerings (CSOs) in support of the DoD Provisional Authorization (PA) process
  • Prepare 30 Cloud Security Assessment Packages per year, including validated cybersecurity controls, certifier's recommendations, and residual risk statements
  • Review Cloud Service Provider (CSP) documentation packages, including architectural diagrams, System Security Plans (SSP) with Addendums, Readiness Assessment Reports (RAR), Security Assessment Plans (SAP), and Security Assessment Reports (SAR)
  • Evaluate supporting materials such as POA&Ms, Change Requests, Extension and Deviation Requests, Whitelist Requests, Corrective Action Plans, and applicable templates, checklists, and Continuous Monitoring (ConMon) artifacts
  • Attend technical kickoff meetings to evaluate and document the CSP's security posture and readiness for assessment
  • Analyze and provide feedback on assessment documentation, including the RAR, SAP, SSP, and system architecture diagrams
  • Identify and document the operational impact of security authorizations, changes, or identified vulnerabilities within the CSP's environment
  • Develop complete Cloud Security Assessment Packages in accordance with DoD standards, ensuring inclusion of SARs, POA&Ms, and Deviation Requests
  • Create authorization recommendation memorandums summarizing compliance with DoD cybersecurity controls, technical evaluation results, and residual risk considerations
  • Draft DoD PA memorandums outlining CSO boundary definitions, service offerings, authorization duration, terms and conditions, DoD usage considerations, and follow-on actions
  • Validate implementation of CSO controls within eMASS or a government-provided GRC platform, and log assessment completion in the Mission Security Review (MSR)
  • Review the Customer Responsibility Matrix (CRM) and ensure correct inheritance mapping within eMASS or the designated GRC tool
  • Enter all authorization conditions into eMASS as system-level POA&Ms and monitor for timely resolution
  • Upload and associate all CSP documentation with applicable security controls in eMASS or the appropriate system of record
  • Track and manage all CSO-related data using the Team Lead Resource (TLR) Assessment Database
  • Maintain and update the DoD Cloud Process Guide and associated templates, forms, checklists, and documentation
  • Contribute to the development of internal instructions, how-to guides, and reference material to support consistent assessor workflows
  • Ensure assessment activities are conducted in compliance with DoDI 8510.01 and the DoD Cloud Computing Security Requirements Guide (SRG)
  • Document assessment methodologies and validation best practices to continuously improve assessment accuracy, consistency, and process efficiency
  • Support the ongoing development and annual updates of the DoD Cloud Assessment Process Guides in alignment with evolving policy and government directives

Requirements:



  • Bachelor's degree (IT-related field preferred)
  • Five (5) years of overall experience in cybersecurity or network security position
  • Have an active DoD Top Secret clearance with SCI eligibility
  • DoD 8570 IAM/IA Technical (IAT) Level II certification
  • Working knowledge of DoD Risk Management Framework (RMF) and DoDI 8510.01
  • Familiarity with the DoD Cloud Computing Security Requirements Guide (SRG) and associated cloud security policies
  • Familiarity with security controls for Azure, AWS, and assorted cloud platforms
  • Experience conducting security assessments and developing security documentation (e.g., SSP, SAR, POA&M, SAP)
  • Proficiency with eMASS or equivalent Government Risk and Compliance (GRC) tools
  • Demonstrated ability to interpret and apply NIST SP 800-53 security controls in cloud environments
  • Strong analytical and technical writing skills with the ability to communicate complex topics clearly
  • Applicants must reside within a commutable distance of Ft. Meade, MD in order to work onsite full-time.

Work Environment:



  • Must be able to sit for long periods

Compensation: $85,000+

At AGE Solutions, we reward performance, invest in growth, and share success. Our benefits support the whole person, professionally, financially, and personally.



  • 26 Days Paid Leave: Includes vacation, sick, personal time, and holidays. You choose how to use it.
  • Performance Bonuses: Performance bonuses are awarded based on individual contributions and company-wide results, aligning recognition with impact.
  • 401(k) with Match: We match 3% of your contributions with immediate vesting.
  • Financial Protection: Company-paid life insurance up to $300K and options for additional coverage for you and your dependents.
  • Health Benefits: Multiple medical plans, dental, vision, FSA and HSA options to fit your needs.
  • Parental Leave: 15 days of fully paid leave for new parents, because family matters.
  • Military Differential Pay: We bridge the gap for employees on active duty, so they don't take a financial hit while serving.
  • Professional Growth: Paid training and certifications, tuition reimbursement, and the tools and tech to get the job done right.
  • Shared Success: In the event of a company sale, our CEO has committed to returning 80% of net proceeds to employees. This ensures our team shares in the long term value they help create.

At AGE, you'll do work that matters, supported by a company that delivers for its people.

Not Specified
Lecturer - Information Management - School of Information
✦ New
Salary not disclosed
Berkeley, CA 1 day ago
Position overview

Position title:
Lecturer

Salary range:
The starting, full-time equivalent annual salary rate ranges from $79,887 - $128,194 , depending on experience. Appointments are typically made at 25% time for 2-unit courses, 33% time for 3-unit courses, and 42% time for 4-unit courses, for a period of 5 months. This salary rate will increase in subsequent terms in accordance with the terms of the labor contract.

Percent time:
Percent time 12.5% to 100% time

Anticipated start:
Positions typically start in January, August, and occasionally June.

Review timeline:
Applicants are considered for positions as needs arise; the existence of this pool does not guarantee that a position is available.

Position duration:
Initial position duration is for up to one year, with possibility for renewal. Appointments may be renewed based on need, funding, and performance.

Application Window


Open date: March 4, 2026




Next review date: Thursday, Mar 19, 2026 at 11:59pm (Pacific Time)

Apply by this date to ensure full consideration by the committee.




Final date: Thursday, Mar 4, 2027 at 11:59pm (Pacific Time)

Applications will continue to be accepted until this date, but those received after the review date will only be considered if the position has not yet been filled.



Position description

The School of Information at the University of California, Berkeley, invites applications for a pool of part-time, non-tenure track lecturers to teach on-campus courses in the Master of Information Management and Systems. We seek exceptional instructors with professional and/or academic expertise who can teach courses for I School doctoral and master's level students and other UC Berkeley graduate students in related fields, as well as undergraduate courses. Screening of applicants is ongoing and will continue as needed. The number of positions varies from semester to semester, depending on the needs of the School.



Applicants will be selected from this pool for the academic year (including summer sessions), when there is curricular need. Positions typically start at the beginning of the semester, and appointments may be renewable based on need, funding, and performance. This is a primarily in-person role that typically requires physical presence on the UC Berkeley campus, although alternative modalities may be authorized for instruction when conditions require.



Please Note:



Applicants must be authorized to work in the United States at the time of hire. Visa sponsorship is not available for this position.



About the I School

The Berkeley School of Information (I School) is a global bellwether in a world awash in information and data, boldly leading the way with education and fundamental research that translates into new knowledge, practices, policies, and solutions. I School scholars and practitioners thrive in the intersections where people, organizations, and societies interact with information, technology, and data. The faculty comprises a mix of disciplines, including information, computer science, economics, political science, law, sociology, design, media studies, and more.



The I School offers three professional master's degrees and an academic doctoral degree. The MIMS program trains students for careers as information professionals and emphasizes small classes and project-based learning. The online MIDS program trains data scientists to manage and analyze the coming onslaught of big data in a unique high-touch online degree. The online MICS program prepares cybersecurity leaders with the technical skills and contextual knowledge necessary to develop solutions for complex cybersecurity challenges. The Ph.D. program equips scholars to develop solutions and shape policies that influence how people seek, use, and share information. Our cohorts and classes are small enough to support intense student engagement, and we encourage collaboration among the students, faculty, and staff in the I School community. Our alumni have careers in diverse fields, such as data science, user experience design and research, product management, engineering, information policy, cybersecurity, and more.



We are committed to attracting outstanding instructors from academia and industry who bring diverse perspectives and experiences to the classroom. Whether your expertise lies in groundbreaking research, innovative industry applications, or both, we value professionals who can bridge theory and practice. Successful lecturers inspire graduate students by integrating real-world applications with deeper theoretical exploration, fostering critical discussions of historical and emerging trends, and preparing students to make an impact in cybersecurity.



If you are an enthusiastic educator or practitioner passionate about shaping the next generation of information leaders, we encourage you to join our exceptional instructional team.



Responsibilities Include:

Designing and Delivering Engaging Classes: Plan and lead dynamic in-person sessions emphasizing active learning. Facilitate meaningful discussions, group activities, and hands-on exercises that deepen students' understanding and application of key concepts.



Creating a Cohesive Course Experience: Develop a comprehensive syllabus outlining learning objectives, assessments, assignments, and expectations. Ensure all course elements, including lectures, materials, and activities, align with program goals and foster a cohesive student learning experience.



Facilitating Student-Centered Learning: Provide personalized support through office hours, one-on-one meetings, and guidance throughout the semester to address individual student needs and ensure academic success.



Designing and Refining Course Materials: Develop and update instructional materials, assignments, and assessments. Ensure all content aligns with program objectives, maintains academic rigor, and incorporates an inclusive and equitable learning environment.



Providing Constructive Feedback: Deliver timely, thoughtful, and actionable feedback on student assignments, projects, and assessments to promote continuous improvement and mastery of course competencies.



Managing Course Operations: Organize and communicate key course components, such as schedules, assignments, grading policies, and classroom logistics, to ensure a smooth learning experience for all students.



Collaborating with Instructional Teams: Participate actively in team meetings to share teaching strategies, address challenges, and ensure alignment on instructional practices. Attend faculty meetings to stay connected with program initiatives and goals.



Promoting Inclusion: Foster an inclusive, equitable learning environment that respects diverse perspectives and supports all students in achieving their academic and professional goals.



Please Note:



The use of a lecturer pool does not guarantee that an open position exists. See the review date in AP Recruit to determine whether applications are currently being reviewed. If no future review date is specified, your application may not be considered at this time.



UC Berkeley has several policies and programs to support all employees as they balance work and family.



Program: programs/mims

Policies and Programs to Support All Employees: support-faculty/family-responsive-policies-benefits-programs-and-resources

Course Descriptions: courses/info



Qualifications

Basic qualifications (required at time of application)

A bachelor's degree (or equivalent international degree).



Additional qualifications (required at time of start)

Minimum of 4 years professional experience in the relevant field.



Minimum of 2 years experience in teaching in higher education or professional development in relevant fields. Professional development instructional activities would include leading workshops, delivering executive education, providing corporate training, or offering industry-recognized certification programs.



Preferred qualifications

An advanced degree in a field such as Information, Information Science, Statistics, Computer Science, Engineering, Political Science, Sociology, Law, Economics, Human-Computer Interaction, or Design.



10 + years of professional experience in Information, Information Science, Statistics, Computer Science, Engineering, Political Science, Sociology, Law, Economics, Human-Computer Interaction, or Design.



Multiple years of demonstrated excellence in teaching college-level courses.



Familiarity with and use of collaborative learning techniques and student-centered methods of instruction.



Proven organizational skills and ability to complete assignments timely and accurately with minimal supervision.



Possess excellent communication skills, both oral and written, and the ability to communicate effectively with students with a wide range of skills.



Possess excellent interpersonal, customer service, and problem-solving skills. Ability to work well with students, faculty, and staff. Demonstrated strength or potential in teaching at the college level.



Demonstrated ability to support the academic, professional, and personal development of a diverse community through inclusive curriculum, classroom environment, and pedagogy in a multidisciplinary environment.



Professional and teaching experience in at least one of the following core areas (please see course descriptions online):




  • Algorithmic Fairness and Bias Mitigation
  • Blockchain and Decentralized Systems
  • Cloud Computing and Scalability
  • Cybersecurity and Information Assurance
  • Data Analysis and Visualization
  • Data Engineering and Analysis
  • Digital Ethics and Societal Impact
  • Digital Transformation in Organizations
  • Ethical Technology and Responsible AI
  • Generative AI and Its Applications
  • Human-AI Collaboration
  • Human-Computer Interaction (HCI)
  • Information Policy
  • Machine Learning
  • Natural Language Processing (NLP)
  • Privacy-Preserving Technologies
  • Product Management
  • Smart Cities and Urban Informatics
  • Social and Technical Innovation in Entrepreneurship
  • User-Centered Design
  • Other Areas of Information Science and Systems


Application Requirements

Document requirements

  • Curriculum Vitae - Your most recently updated C.V.


  • Cover Letter


  • Statement of Teaching Interests/Experience/Approach - Applicants must submit a brief statement outlining their teaching philosophy, experience, and methods. This may include, for example, fostering student success, connecting theory to practice, contributions to advancing an inclusive learning environment for all students, facilitating student-centered learning, or practical exercises that enhance students' understanding and application of core concepts. The statement should clearly describe the format, audience, and scope of teaching or professional development experience.



    The statement should highlight areas of expertise, and any experience with online or technology-enhanced teaching.



    Please indicate which class(es) you believe you are qualified to teach.


  • Teaching Evaluations, if available (Optional)




Reference requirements
  • 3 required (contact information only)


Apply link:
JPF05269

Help contact:



About UC Berkeley

UC Berkeley is committed to diversity, equity, inclusion, and belonging in our public mission of research, teaching, and service, consistent with UC Regents Policy 4400 and University of California Academic Personnel policy (APM 210 1-d). These values are embedded in our Principles of Community, which reflect our passion for critical inquiry, debate, discovery and innovation, and our deep commitment to contributing to a better world. Every member of the UC Berkeley community has a role in sustaining a safe, caring and humane environment in which these values can thrive.



The University of California, Berkeley is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, or protected veteran status.



For more information, please refer to the University of California's Affirmative Action and Nondiscrimination in Employment Policy and the University of California's Anti-Discrimination Policy.



In searches when letters of reference are required all letters will be treated as confidential per University of California policy and California state law. Please refer potential referees, including when letters are provided via a third party (i.e., dossier service or career center), to the UC Berkeley statement of confidentiality prior to submitting their letter.



As a University employee, you will be required to comply with all applicable University policies and/or collective bargaining agreements, as may be amended from time to time. Federal, state, or local government directives may impose additional requirements.


Unless stated otherwise, unambiguously, in the position description, this position does not include sponsorship of a new consular H-1B visa petition that would require payment of the $100,000 supplemental fee.



As a condition of employment, the finalist will be required to disclose if they are subject to any final administrative or judicial decisions within the last seven years determining that they committed any misconduct.




  • "Misconduct" means any violation of the policies or laws governing conduct at the applicant's previous place of employment, including, but not limited to, violations of policies or laws prohibiting sexual harassment, sexual assault, or other forms of harassment or discrimination, as defined by the employer.
  • UC Sexual Violence and Sexual Harassment Policy
  • UC Anti-Discrimination Policy
  • APM - 035: Affirmative Action and Nondiscrimination in Employment


Job location
Berkeley, CA
Not Specified
AI Security Engineer (IAM), Senior Advisor
✦ New
🏢 Dell
$152,000
Round Rock, Texas 1 day ago
AI Security Engineer (IAM), Senior Advisor

The Dell Security & Resiliency organization manages the security risk across all aspects of Dell’s business. You will have an excellent opportunity to influence the security culture at Dell and further develop your career.

Join us as an  AI Security Engineer (IAM), Senior Advisor  on our  Cybersecurity Engineering & Operations  team in  Round Rock, Texas  to do the best work of your career and make a profound social impact.

What you’ll achieve
As an  AI Security Engineer , you will be a member of our internal-facing, Cybersecurity organization with responsibility for contributing your advanced experience and technical skills into Dell security infrastructure environment. Your focus will be on engineering and operating the identity and access management AI tools which will include engaging and collaborating with internal stakeholders, customers, partners, and vendors.

You will:
Manage processes and technologies to implement identity lifecycle operations for AI agents and service principals, including creation, rotation, revocation, and decommissioning with strong auditability.

Administer RBAC and ABAC policies for agentic workflows and enforce guardrails across model endpoints, data stores, and tool integrations.

Manage secrets and credentials used by AI agents, including rotation schedules, vault policies, and detection of credential misuse.

Collaborate with product teams to capture use cases and translate them into concrete IAM controls for agents, models, and data access paths.

Assist in investigations and incident response involving agentic AI, correlating logs across prompts, actions, tool calls, and data access events.

Take the first step towards your dream career
Every Dell Technologies team member brings something unique to the table. Here’s what we are looking for with this role:

Essential Requirements
Own agent & service identity with modern auth (OAuth 2.0 + OIDC). Manage the full lifecycle for AI agents (Joiner/Mover/Leaver), implement machine to machine flows and wire up enterprise IdPs and API gateways (for example: Okta; Kong Gateways) you need to know about OAuth + OIDC flows and be able to understand AD/Entra group backed access (emit group claims in JWT/SAML with appropriate filtering) - fundamental IAM Knowledge is essential for this job role (authentication, authorization, PAM)
Preferred : light scripting (Python/Typescript) to automate integrations and reviews

Prove compliance: Align agent access with data residency/consent/retention and continuously produce evidence against Dell Agentic AI Standards ; work with AI/IAM Architects to maintain current IAM configs/runbooks/flows as capabilities evolve.

Hands‑on with agent frameworks (LangGraph/LangChain, CrewAI, AutoGen) and/or agent platforms (Lindy, ) to understand where policy decision points / policy enforcement points are applied in the right layer and to understand developers/platform teams.

Experience working with AI governance and MLOps platforms (e.g., DataRobot, Dataiku) supporting approvals, audit trails, and compliance sign‑offs. Strong cross‑functional collaboration skills and the ability to translate requirements into secure IAM and agent architectures in partnership with application, platform, security, and data teams.

Desirable Requirements
Bachelor’s degree in Computer Science, Management of Information Systems, Cybersecurity, Information Assurance, or a related field; or equivalent experience

12+ years of information security experience; 4+ years in Identity and Access Management or similar roles

Industry-standard cybersecurity certification from ISC (2), SANS, or similar entity

Compensation
Dell is committed to fair and equitable compensation practices. The compensation range for this position is $152,000 to $196,000.

Benefits and Perks of working at Dell Technologies
Your life. Your health. Supported by your benefits.  You can explore the overall benefits experience that awaits you as a Dell Technologies team member - right now at

Who we are
We believe that each of us has the power to make an impact. That’s why we put our team members at the center of everything we do. If you’re looking for an opportunity to grow your career with some of the best minds and most advanced tech in the industry, we’re looking for you.

Dell Technologies is a unique family of businesses that helps individuals and organizations transform how they work, live and play. Join us to build a future that works for everyone because Progress Takes All of Us.

Dell Technologies is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. Read the full Equal Employment Opportunity Policy  here .

Job ID: R283934
Not Specified
Information Technology Manager
✦ New
Salary not disclosed

We are looking for someone who can take ownership of their IT infrastructure and help modernize the technology supporting their production operations.


This role is a great fit for someone who enjoys both strategic leadership and hands-on technical work.


You would be responsible for overseeing the company’s IT systems, infrastructure, cybersecurity, and manufacturing technology environment, while also leading and developing the internal IT team.


Position Summary

  • Leads the planning, implementation, maintenance, and security of all information technology systems supporting manufacturing operations.
  • Ensures the reliability, performance, and security of IT infrastructure across the organization while maintaining systems that support production environments requiring high uptime and operational efficiency.
  • Requires a strategic and hands-on leader capable of managing IT infrastructure, budgets, and personnel while providing technical leadership when necessary.
  • Ensure IT systems effectively support production, logistics, quality, and overall operational performance.


Essential Duties and Responsibilities

  • Oversee the design, implementation, and maintenance of IT infrastructure including servers, networks, cloud platforms, storage solutions, and cybersecurity systems.
  • Ensure high system availability and reliability for manufacturing operations and production equipment.
  • Manage network performance, system monitoring, backups, disaster recovery planning, and business continuity strategies.
  • Support and maintain ERP systems, production technologies, and manufacturing systems integrated with plant operations.
  • Administer data analytics and reporting platforms such as Power BI and other business intelligence tools.
  • Collaborate with operations, maintenance, and engineering teams to support plant-floor technology and manufacturing systems.
  • Ensure IT infrastructure supports production uptime, automation systems, robotics, and equipment connectivity.
  • Provide support for warehouse management systems and logistics technologies as needed.
  • Maintain compliance with cybersecurity and data security requirements applicable to automotive and manufacturing industries.
  • Lead and develop IT team members through coaching, training, performance management, and succession planning.
  • Provide technical guidance and mentorship to strengthen team capabilities and technical expertise.
  • Promote a culture of collaboration, accountability, and continuous improvement.


Qualifications

Education

Bachelor’s degree in Information Technology, Computer Science, Information Systems, or a related field preferred.


Experience

  • 7+ years of progressive experience in IT, preferably within a manufacturing or industrial environment.
  • 3+ years of leadership or management experience supervising IT staff or technical teams.


Technical Expertise

Strong knowledge of:

  • Cloud platforms such as Azure, AWS, or similar
  • Server infrastructure and virtualization technologies
  • Network administration and security
  • Cybersecurity frameworks and best practices
  • Backup, disaster recovery, and business continuity planning
  • Data analytics and reporting tools (Power BI or similar)
  • ERP systems and manufacturing technologies
Not Specified
ReactDeveloper
Salary not disclosed
Jacksonville, FL 3 days ago
Job Title: React Developer

Location: Remote

Duration: 6 Months

Job Description:

The Cybersecurity Developer role is responsible for the development, programming, and coding of Information Technology solutions using ReactJS, Redux, D3 and NodeJS to enable Cybersecurity applications. They will engage in all phases of the software development lifecycle which include: gathering and analysing user/business system requirements, responding to outages and creating application system models. Developers are responsible for documenting detailed system specifications and will participate in evaluating, conducting performance testing, and all planned and unplanned maintenance for both internally developed applications and purchased products. They will participate in design meetings and consult with clients to refine, test and debug programs to meet business needs and interact and sometimes direct third party partners in the achievement of business and technology initiatives. Developers are responsible for including IT Controls to protect the confidentiality, integrity, as well as availability of the application and data processed or output by the application.

Essential Functions

* The essential functions listed represent the major duties of this role, additional duties may be assigned.

* Develop, support, and maintain web applications for enterprise and affiliates.

* Skilled in react, python, JavaScript, SQL, and other development languages.

* Supports API development.

* Supports front end and back-end development.

* Familiar with authentication and authorization technologies such as OAuth and JSON web tokens

* Familiar with CICD tools such as Jenkins.

* Monitors, reports on, and enhances performance of assigned technical security solutions

* Provides security technology incident response and problem management. Troubleshoots software and/or hardware issues/failures on assigned technical security solutions.

* Accountable for follow-up of all security work requests including collaborating with other IT areas to ensure timely completion/resolution and obtainment of appropriate approval levels.

* Supports escalations, known issues and out of cycle requests on multiple security solutions for the enterprise and its subsidiaries

* Supports the development and maintenance of operational documentation for technical security solutions (e.g. procedures, engineering diagrams, knowledgebase, etc.).

* Collects, analyses, synthesizes and presents data on technical security solutions and processes to peers, leadership and business stakeholders

* Assists the migration, upgrade and disposal of complex security capabilities and evaluates risks and impacts

* Collaborates with other business areas to deliver on work group initiatives for the enterprise and its subsidiaries

* Assists with developing continuous testing and validation of product performance and gap analysis for continuous security hardening processes

* Assists execution and alignment to security reference architecture standards and published blueprints.

* Assists Disaster Recovery planning, design, implementation and exercises on security technology solutions

* Assists remediation actions as a result of threat and vulnerability assessments or audits

* Provide training to others on security capabilities, processes, procedures and operational task

Additional Required Qualifications:

* Capacity to work independently and willingness to seek advice/assistance.

* Exposure to Project Management methodologies like Waterfall, Agile, Lean or SAFe methodologies

* Understanding of security concepts and controls for network, application, and operating systems.

* Ability to troubleshoot and investigate security related issues and having experience or knowledge with vulnerability and patch management.

* Strong technical, analytical, and administrative skills.

* Strong corporate work ethics.

* Strong Documentation and Review Skills.

* Have strong problem-solving skills.

* Maintain a positive attitude.

* Are professionals and possess excellent interpersonal and written communication skills.

* Have the desire and ability to learn new things fast.

* Strong Solutioning Skills to help facilitate new technology gaps

* Want to be part of an efficient and effective team.

* Display an ownership attitude and drive initiatives to completion.

* Are a team player that recognizes the bigger picture and understands the value of teamwork.

Required Work Experience:

3+ years related work experience

2+ years in application development

Required Education:

Related bachelor's degree or additional related equivalent work experience

Required Licenses and Certifications

Security+

**In alignment with Clients Cybersecurity requirements, contractors must possess a relevant cybersecurity or technical certification for this role. If a relevant certification is not possessed, the contractor will be expected to obtain a relevant certification within 6 months of hire. (Relevant certification will be defined by hiring manager)

Additional Preferred Qualifications:

Understanding of LDAP technologies such as Active Directory.

Azure Privileged and non-Privileged access management.

Well versed in the OWASP Top 10.

Position is offered by a no fee agency.
Not Specified
Junior data analyst/Machine learning engineer
✦ New
Salary not disclosed
Oakland 1 day ago
CS/IT Graduates or About to be Grads.

Get Hired by taking action.

If you just graduated (or you're about to) and the job search is already feeling confusing, you're not imagining it.

A degree proves you can learn—but employers hire for job readiness: projects that look like real work, current tech stacks, interview confidence, and the ability to contribute on day one.

That's why many new grads send hundreds of applications and still hear nothing back.

It's not because you're "not smart enough.” It's because most entry-level pipelines are crowded, and hiring teams filter heavily for candidates who look production-ready.

We are actively considering candidates for entry-level software engineering and data roles, especially Java full stack, Java/Python development, DevOps automation, data analytics, data engineering, data science, and ML/AI—full-time opportunities aligned to client needs.

Our core emphasis remains Java/Full Stack/DevOps and Data/Analytics/Engineering/ML.

SynergisticIT focuses on two high-demand lanes: Java / Full Stack / DevOps and Data (Data Analyst, Data Engineer, Data Scientist) + ML/AI—so you don't graduate with scattered skills, you graduate with an employable stack.

SynergisticIT since 2010, has helped candidates land full-time roles at major organizations (examples often cited include Google, Apple, PayPal, Visa, Western Union, Wells Fargo, Client, Banking, Wayfair, Client, Client, and more) with offers commonly in the $95k–$154k range depending on role and skill depth.

For a new grad, the bigger message isn't the number—it's that results require a structured pathway, not random applications.

Here's a realistic way to think about your advantage as a fresh graduate: you're early enough to build the right foundation before bad habits set in.

If you master fundamentals—coding, debugging, data structures, system thinking—and then layer modern tools on top (frameworks, cloud, CI/CD, analytics stacks), you become the kind of "entry-level” candidate who actually feels like a safe hire.

What roles are companies hiring for right now? A typical market demand pattern is clear: organizations still need entry-level software programmers, Java full stack developers, Python/Java developers, DevOps-focused engineers, and on the data side data analysts, BI analysts, data engineers, data scientists, and machine learning engineers.

The strongest candidates aren't "tool collectors”—they're people who can show end-to-end capability: build an API, connect a database, deploy a service, analyze data, explain results, and handle interviews calmly.

Why fresh grads get stuck— Fresh grads often struggle for four predictable reasons: Resume doesn't match job keywords (ATS filters you out).

Projects look like school assignments (not production-aligned).

Interview skills are undertrained (DSA, system design, SQL, behavioral).

No structured pipeline (random applying without feedback loops).

A job-placement-first approach addresses these systematically: build the right portfolio, practice the right interview questions, align your tech stack to roles, and keep improving until the market says "yes.” Who this path fits best If you're a recent graduate, you'll likely fit if you match any of these: New grads in CS, Engineering, Math, or Statistics with limited job experience Students finishing Bachelor's or Master's programs who need a real hiring plan Candidates who apply consistently but don't get callbacks Candidates who reach interviews but struggle to close International students on F-1/OPT who need a job plan for STEM extension/H-1B timing Graduates with strong academics but thin practical experience SynergisticIT helps STEM extension and work authorization pathways, and for candidates who need long-term stability, support related to H-1B and green card processes as part of employer-side realities.

If you're tired of guessing, stop treating your job search like a lottery.

Treat it like a project with milestones: skills → portfolio → interview readiness → targeted applications → scheduled interviews → offer.

If you want to explore, here are the key links: Event videos (OCW, JavaOne, Gartner): USA Today feature Contact & get a roadmap: Please read our blogs Why do Tech Companies not Hire recent Computer Science Graduates | SynergisticIT What Recruiters Look for in Junior Developers | SynergisticIT Software engineering or Data Science as a career? How OPT Students Can Land Tech Jobs – SynergisticIT Bottom line for fresh grads: Your degree is the starting line, not the finish line.

If you want to get hired faster, you don't need "more random courses.” You need a guided, job-focused path and the right people around you.

In tech, it's not just what you learn—it's how you learn and who you build with that decides how far you go.

Please note: Resume databases are shared with clients and interested clients will reach out directly if they find a qualified candidate for their req.

Resume submissions may be shared with our JOPP team database also.

Please unsubscribe if contacted or if you don't want to be contacted please don't submit your resume
Not Specified
jobs by JobLookup
✓ All jobs loaded